diff --git a/audit/org_kubernetes.io/roles/CustomRole.json b/audit/org_kubernetes.io/roles/CustomRole.json index f7968ed678d..4dea07dd2db 100644 --- a/audit/org_kubernetes.io/roles/CustomRole.json +++ b/audit/org_kubernetes.io/roles/CustomRole.json @@ -1,6 +1,7 @@ { "description": "View access to billing info", "includedPermissions": [ + "billing.accounts.getPricing", "billing.accounts.getSpendingInformation", "billing.budgets.get", "billing.budgets.list", @@ -9,6 +10,7 @@ "billing.resourceCosts.get", "billing.subscriptions.get", "billing.subscriptions.list", + "commerceoffercatalog.offers.get", "resourcemanager.projects.get", "resourcemanager.projects.list" ], diff --git a/audit/org_kubernetes.io/roles/audit.viewer.json b/audit/org_kubernetes.io/roles/audit.viewer.json index abf9e44806d..58d0c987f41 100644 --- a/audit/org_kubernetes.io/roles/audit.viewer.json +++ b/audit/org_kubernetes.io/roles/audit.viewer.json @@ -48,6 +48,7 @@ "apigee.developerapps.list", "apigee.developerattributes.list", "apigee.developers.list", + "apigee.developersubscriptions.list", "apigee.envgroupattachments.list", "apigee.envgroups.list", "apigee.environments.getIamPolicy", @@ -66,6 +67,7 @@ "apigee.proxies.list", "apigee.proxyrevisions.list", "apigee.queries.list", + "apigee.rateplans.list", "apigee.references.list", "apigee.reports.list", "apigee.resourcefiles.list", @@ -162,6 +164,7 @@ "cloudkms.importJobs.list", "cloudkms.keyRings.getIamPolicy", "cloudkms.keyRings.list", + "cloudkms.locations.list", "cloudnotifications.activities.list", "cloudprivatecatalogproducer.associations.list", "cloudprivatecatalogproducer.catalogAssociations.list", @@ -206,6 +209,7 @@ "cloudvolumesgcp-api.netapp.com/serviceLevels.list", "cloudvolumesgcp-api.netapp.com/snapshots.list", "cloudvolumesgcp-api.netapp.com/volumes.list", + "commerceprice.privateoffers.list", "composer.environments.list", "composer.imageversions.list", "composer.operations.list", @@ -480,6 +484,8 @@ "datafusion.instances.getIamPolicy", "datafusion.instances.list", "datafusion.locations.list", + "datafusion.namespaces.getIamPolicy", + "datafusion.namespaces.list", "datafusion.operations.list", "datalabeling.annotateddatasets.list", "datalabeling.annotationspecsets.list", @@ -618,6 +624,12 @@ "genomics.datasets.getIamPolicy", "genomics.datasets.list", "genomics.operations.list", + "gkemulticloud.awsClusters.list", + "gkemulticloud.awsNodePools.list", + "gkemulticloud.azureClients.list", + "gkemulticloud.azureClusters.list", + "gkemulticloud.azureNodePools.list", + "gkemulticloud.operations.list", "gsuiteaddons.deployments.list", "healthcare.annotationStores.getIamPolicy", "healthcare.annotationStores.list", @@ -677,6 +689,7 @@ "memcache.instances.list", "memcache.locations.list", "memcache.operations.list", + "metastore.backups.list", "metastore.imports.list", "metastore.locations.list", "metastore.operations.list", @@ -735,6 +748,7 @@ "notebooks.schedules.getIamPolicy", "notebooks.schedules.list", "ondemandscanning.operations.list", + "opsconfigmonitoring.resourceMetadata.list", "osconfig.guestPolicies.list", "osconfig.patchDeployments.list", "osconfig.patchJobs.list", diff --git a/audit/org_kubernetes.io/roles/prow.viewer.json b/audit/org_kubernetes.io/roles/prow.viewer.json index 350d23251fa..a28b8d98eeb 100644 --- a/audit/org_kubernetes.io/roles/prow.viewer.json +++ b/audit/org_kubernetes.io/roles/prow.viewer.json @@ -382,6 +382,7 @@ "monitoring.timeSeries.list", "monitoring.uptimeCheckConfigs.get", "monitoring.uptimeCheckConfigs.list", + "opsconfigmonitoring.resourceMetadata.list", "resourcemanager.projects.get", "resourcemanager.projects.list", "serviceusage.quotas.get", diff --git a/audit/projects/k8s-artifacts-prod-bak/iam.json b/audit/projects/k8s-artifacts-prod-bak/iam.json index 3c5750bd5d0..a36f46d22c0 100644 --- a/audit/projects/k8s-artifacts-prod-bak/iam.json +++ b/audit/projects/k8s-artifacts-prod-bak/iam.json @@ -20,12 +20,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-artifact-admins@kubernetes.io" diff --git a/audit/projects/k8s-artifacts-prod/iam.json b/audit/projects/k8s-artifacts-prod/iam.json index cfbbf436c2a..532984c35cb 100644 --- a/audit/projects/k8s-artifacts-prod/iam.json +++ b/audit/projects/k8s-artifacts-prod/iam.json @@ -46,12 +46,6 @@ ], "role": "roles/iam.serviceAccountTokenCreator" }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-artifact-admins@kubernetes.io" diff --git a/audit/projects/k8s-cip-test-prod/iam.json b/audit/projects/k8s-cip-test-prod/iam.json index 056a7911d2c..d5e8d4831b5 100644 --- a/audit/projects/k8s-cip-test-prod/iam.json +++ b/audit/projects/k8s-cip-test-prod/iam.json @@ -26,12 +26,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-artifact-admins@kubernetes.io", diff --git a/audit/projects/k8s-conform/iam.json b/audit/projects/k8s-conform/iam.json index 844bf3926c0..a3abe291ac6 100644 --- a/audit/projects/k8s-conform/iam.json +++ b/audit/projects/k8s-conform/iam.json @@ -13,12 +13,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-artifact-admins@kubernetes.io" diff --git a/audit/projects/k8s-gcr-audit-test-prod/iam.json b/audit/projects/k8s-gcr-audit-test-prod/iam.json index d3d740143d2..04da94880b7 100644 --- a/audit/projects/k8s-gcr-audit-test-prod/iam.json +++ b/audit/projects/k8s-gcr-audit-test-prod/iam.json @@ -38,13 +38,6 @@ ], "role": "roles/logging.admin" }, - { - "members": [ - "user:linusa@google.com", - "user:thockin@google.com" - ], - "role": "roles/owner" - }, { "members": [ "serviceAccount:k8s-infra-gcr-promoter@k8s-gcr-audit-test-prod.iam.gserviceaccount.com" diff --git a/audit/projects/k8s-gcr-backup-test-prod-bak/iam.json b/audit/projects/k8s-gcr-backup-test-prod-bak/iam.json index a0edcc7dcf1..808482f5f62 100644 --- a/audit/projects/k8s-gcr-backup-test-prod-bak/iam.json +++ b/audit/projects/k8s-gcr-backup-test-prod-bak/iam.json @@ -20,12 +20,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-artifact-admins@kubernetes.io", diff --git a/audit/projects/k8s-gcr-backup-test-prod/iam.json b/audit/projects/k8s-gcr-backup-test-prod/iam.json index 43b40d4226a..45305271447 100644 --- a/audit/projects/k8s-gcr-backup-test-prod/iam.json +++ b/audit/projects/k8s-gcr-backup-test-prod/iam.json @@ -12,12 +12,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-artifact-admins@kubernetes.io", diff --git a/audit/projects/k8s-gsuite/iam.json b/audit/projects/k8s-gsuite/iam.json index 377800a3e08..652512b0ef2 100644 --- a/audit/projects/k8s-gsuite/iam.json +++ b/audit/projects/k8s-gsuite/iam.json @@ -2,7 +2,6 @@ "bindings": [ { "members": [ - "user:thockin@google.com", "user:wg-k8s-infra-api@kubernetes.io" ], "role": "roles/owner" diff --git a/audit/projects/k8s-gsuite/secrets/gsuite-groups-manager_key/iam.json b/audit/projects/k8s-gsuite/secrets/gsuite-groups-manager_key/iam.json index 97c93795b8e..c75b70ac86b 100644 --- a/audit/projects/k8s-gsuite/secrets/gsuite-groups-manager_key/iam.json +++ b/audit/projects/k8s-gsuite/secrets/gsuite-groups-manager_key/iam.json @@ -2,6 +2,7 @@ "bindings": [ { "members": [ + "group:k8s-infra-group-admins@kubernetes.io", "serviceAccount:gsuite-groups-manager@k8s-gsuite.iam.gserviceaccount.com" ], "role": "roles/secretmanager.secretAccessor" diff --git a/audit/projects/k8s-infra-e2e-boskos-001/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-001/services/compute/project-info.json index cec7f34746c..43a5cb832c5 100644 --- a/audit/projects/k8s-infra-e2e-boskos-001/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-001/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDNmod3WnxDQ9f7EJSzZwvclM5CCDYZZXdx5K9cUa6CW/XJIsA/zurPZbH1jHp3QLX1DMR49GR+P8ACm6tP91qbVtdLxDyTeeLlRmXQEri7Bis2uwUXK7QkxmLgiUKzq95QwkYFGUafEy+we+OR4+Rj2C4rrFOriwqfWEjbGVPPt6ihfUauaSWKBkoF+X6YjJ+1zTtrQGqAyBpbhqCEUkWTOnG7Y7Wycqf30lw9Bs6ngw8QPhUyc3Pbjxj2aPOpDQVMPT03TjFT5F8pn2nU9trQuFdbnsY1Bjyd4Q2/jqfSjg1bbFEaEjV1FPHo/OeZNsXRTAj0Hh3A4KapLubvdT2n root@5d02d822-da00-11ea-8c1c-d23af84fd26f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC/mk6vRaJfkpfIWG0Evihh/q0x5W5nz943WE69/mk+Q1hJOJpNj7GJc0y0moVsiVaXXVMXRAoC/wQDzB+XRf44Js2lojJmhABqG/kVEAwgwgLk/nEZATGbwyGbXFcq267f6jTGNOY9HbRrq6gMOyzdRy1uzX286Uav7gKBDY5IP3lBLOKX857D0XhIQx/ry9hmb5GzIKSSL1Zmv6O0iQqiubbVCglKdIZ1AQoIud5tvzmghb7fAACkPfQ9kqwrbLFVUh/nKRhIQxeOr2QF2Uv0/YQFiULb/iw70Z/QI8QDnUrnPq9MMIHR2YpkX0K3qZeguqNgToiuYu2d/1RXxhGF root@1c7dbf9d-e14f-11ea-8c67-968ff53f47c5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDIm/Z3K0oPSZa0eLXTydSTcJFy9Gj1bE5QdAJt61f6abW0SQqlcez+PScnQFyqU8AFFRtO4kXB0JyDcobF3qQSXTN3P/NvV2psw/lHBes7uScfVDvfm7nDK1ndEbb24wBzXdc4wdZeCW+NoDEa8btslsSoGgINsUeI/oyME872WalXQuSiIFy4R7P3XmCXSePb8b+4HUa7vd5IpB+2K18oTmf+F93ZSPRJxTk8ZCJME6LnN7LxJkHYpnO+hC9IMPbAzWc0LDWpCNDuu0LO2rtvP/y/opj4it6i8l+FUg6hAHPlUos6vd3DCjkf3ylBwCAMOdRJp27DJmLx8+U+jiRz root@1e8e278f-f707-11ea-ae6d-8ed64f3416c0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDpcmjugW/itfeCL7WeZnea2YOEfzZgxMPTsvuHk39woyTRxJdjq4v/zMLSOXNBrdZFyqdW+F2ySS2GxCpvR5O2QKxEiqCcGOPK3xdQNRIP5mHtELgoPvPc4i22u3+ipfB/CrdrjN/ELwpUZXHrah5bNxOivEbNwYvQ3bMq+WbduRRLdKr10fwdyErywnqex4PvolxR2bOAnNdhakoUH31pSSECBKOX6YUh+TOG2Hh4wpyAJxSwxg7o5IgglU+ok9i6lK8g42CSlq+NBRp2AmoXd82KzXBfqpbTMJd2A8EnZrtq/VKGXFpWE4BzlA6+H7y3jxfcvTDfxH7I7YTgRUvB root@d99b53dd-f8b6-11ea-926e-7e7ea190b727\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDtu4A2VuzGX/fH0HUjKcVqBi/+Fdd/kigCvQMWF3Uw6k8Q71l7ewcDDtfs+WDk06bNg50JsdaA+OcetrpL0yLPuKBvtSg/vl8msn8uxPbhHAgQ/QaaTLWYnztioPEsX4GHj6IcskwLGWNR+mIlqxY+cximmQ1O7hj1IGPNLuePysM9ZdpMDT7xOVc73PXd/t5+kZPjnKEQlsz5Zd7FtQH6QJ7ptKLYfcS062ZQlQJNaQPVIPk/TA9xLAEHaTSw0u1eJHuyXvbSbqvj8e/69wWMR32QmN6mKus3hQZjPMm+DzmDIWq2wt96i1eickCGSvpfXG4j6TIYmTVu3yTDe+ER root@1d6a8847-0838-11eb-b895-6272783fc925\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC5eYrnUmX0URxEg778N+rOLSPqYJk1nPe3ppy/X7zf6rs514UlmBpftsI+ZC5iFxJKIfI1+IECBydUmMtcMeDNq6TJ+QtPaQjonX0jp7Cm4fdOmTfiDnuY1qhepvdKN7oWmZeNT1xrdAe8qeeLIbup92zIlU8++nusMmrAyvmmSjPtl41YNufj3g+4MEryQ6lq43RdkXT35GfZPdWUD3ZUrsc2b568NzBCdCG0j+/RYWHUxnRWiReJzhcrZX+dFACNL7Br5UVz6vmWNV8hLfrVJAAjHNtqWP0m4VCUOX84dfvmTa5I1xOjrqMNMLdWhNCKbR8zOJfaM86lzh66+yQv root@91bc69a5-532d-11eb-b6a5-7e8b7adfd54c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC2cYpeZLD9y25W19mQbvRxg7slzivZIV8y+p8XCIT2xddSl1HQ7Fz1Ir1iUzq0cqniTzHnmM8+RC47XaMMOaXaZjjPcpyNiaFOczCn9c4M5E48ipAa105HP9vj1yewWfgCbPxRP6QSweR8BOVLZHUpZwebPen1XwXUYrUBC0rhPHcFKPUtla4hlUEqI9/ca1yiohCUWDSpO9y5wazA54rZhkN/AHxhPCE0v8xcjJKbcZoUdyFFjY7kMXsL6AOpNwqpFzmhi01+ei3BikcRyKQnWAK15n+F0N4d1tYW5FPEAeepx/BsUnAlX3pji6N11c+sPg3laspWOvVTFgBWrpDd root@12716507-5573-11eb-b690-769430c9414e\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC1HW5T8W/GHe9ba3zZhCR59IjYskzVSoR9KQQF97qG37mPsgvp+HZaFN4czh5Nq5SL7EbCZsROj50cMaO4Q37wCKvIQoWQtaFnBZkzvcADqPAyvIkGjsVRP7+3bSW+2vFr1bqmE8X5lFvIrAdR6BFbgirfTdeOT4SZo6OzyXm4mznYFQMxz5MIqNA+64qMq7UKWKYULRI33YMn8kvUVi3/sATPjOt4v0lQAM8i0g6IKw9MYlLNBQ9G7nH3tYWBBXAMboOT5TsGKGSt8FooNhxKuygbSyJoQL9T5x24sDjxqOVMvtTLRk3NtigdIcigiFgbRxGSmoNXGg9OIIP5Bcyh root@df1a6954-82ae-11eb-b915-56a8d6cedae4\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDfySXJDe/9NLf9ek6OEu5CKV4ugzXnI4I+Ealg9fqaB2+S0BCsSGnrCOGUjKH0PWy85VqwhIhd+rTPz3sZRsbWTVvtnTWgLzBFnC20TuJlhmj+EUIIJcigSrkQcOOpGJi2trDBr1eXAN6SY9ZqHQRicndDVsJ9oi9eXrTUYoSwM+gbIWxscrRdvnsT61m1wLSmxJOoEb9013ow66j+RhDRd1MtJrrF1qoKOIPo9FtVHoOJuZ8gV2mASemGGx1xiTZSboDubvkKVroGzhG+uVEXaTqh7GJsmdN8yvjw/9qfphU7ihDuqZCIpiFx3HNV4tYsA6h1DhD92E7mInGC7Zsn root@d594c422-84c1-11eb-b098-eeb808a18dc8\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDhsM5onslgH0nRFnAumVOGK9oHjF1t3VduBnRW5e3XgBu/qxoP3eT7qHYozRGTFLOrHPWIJ1ScyOEfV8cTT9aVNVamk3/5+UR34yOxQR/L5mrDyOd9o8hBvQ3BJiM6S775zQ4sy+oKTL9MMoT3m8/tC8n+lS+SNHyVFQXQmFEOLdiMN+qKenkYt5cv+lIzqKXUxtiJ5GQOsK2mY2TC+JtyeDSeCEjv1e/bmiEkWmiG1e550VdPffBfD0DOp5DWgkGM0a72SW1mPxjaxUy4ttk7JEPA76WiuLwG/mc6t28R5fmklQOyYK1LppGX1NhhLSGtwJ/abN8rgyWJqDyny+43 root@ad4d54b9-8af8-11eb-8155-227e2855667f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDIciYtiBpbHldYdy3OXDuSRbR4SgnK/kzx3fVYKb6+HCyiPBFEPON6xuxBTgb2i5vwuWH4tq7zA25+8we95Y81DSUaPs3kOMS+m03Nwg76LmYZxZTF7HTCp72QMSFZFPp0hu+IZertWcJ21CrnA9nxOd/XfCS+ZgtbCDZW4MrUP4Dx/Gs1dUyqqla/0GvU7StQjwGHGs7j+59w5W2oYrK75pW1VETikPNISAKorNE9U6yOGmQHk9Iw4qkY3UpGYSB2wKLuNAH6dVPBxEkW+PqL8jiyaXsKWA8WGnxSZtm2LUuXbEJ7Va16AVkzz0NLecBaCtR3q+CL1fOoDO0wlqlr root@3c8b1b38-8c41-11eb-b692-3a35d43432cb\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDFpnDgq2z7HFkMOm5cFxWC/ygaQZz6WIr/ADtBlkGNdfhXfQXOwPx6I9CuaUApj+6EmSUMWOHFJ+2vBqL7n06OEmua1zhNjYJxjyI9Fovektew6idwcXYntUmWoYusoVyitI8JLIh9qwuOp7JHDzIw3e28o6k+z8VliVNoe2k+O516x3CTlaYFpnJfxXi1YmCAPuq0i1YYNqJ6AvA1axHUeq0YYw3ruNriNsENlgwVUO3HP+JjxI5PIYZHFv/ZYvYgcXBfDMrT29BiC1CTM5dVtT9OstMxtSSOR2JB5PTN/FukNigdne2APgG00p/QZcNIDvVCoDgNI+mTrDdAMVfd root@3599990f-8e54-11eb-adda-5eb174036857\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDGwOPOG1FFup69yB/68lDCeIz1/outPDVIpyhaPZhxpy11w3wp/XFbaS807TNUKRs0vD43vxX3U2OS+hl4g+8p+uRdT9bVoFm5+PqxsDuSVLI3Ch5/itCo+Ux37wLLda9eBPqHC7fvgNyFqly00MeviZr1mooxgdxDOgLb4UHtKI9ke9QXlcxBkkEcWFZe6KLM5spcau5N9mhMWJryoUfwBHY6L/zcdIC0+YtUCT4Gz94J3YHv/ADDYfo73r5IfDJHXFqEXfZo++4nGIjFsW32emLJW9+S99GkDrnQEjUpwiybhhDklsiFe98/+oX7iDJcvzsirhGtZnMnj6FoCJEV root@a9e3680e-914c-11eb-827a-4615317e4d96" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDNmod3WnxDQ9f7EJSzZwvclM5CCDYZZXdx5K9cUa6CW/XJIsA/zurPZbH1jHp3QLX1DMR49GR+P8ACm6tP91qbVtdLxDyTeeLlRmXQEri7Bis2uwUXK7QkxmLgiUKzq95QwkYFGUafEy+we+OR4+Rj2C4rrFOriwqfWEjbGVPPt6ihfUauaSWKBkoF+X6YjJ+1zTtrQGqAyBpbhqCEUkWTOnG7Y7Wycqf30lw9Bs6ngw8QPhUyc3Pbjxj2aPOpDQVMPT03TjFT5F8pn2nU9trQuFdbnsY1Bjyd4Q2/jqfSjg1bbFEaEjV1FPHo/OeZNsXRTAj0Hh3A4KapLubvdT2n root@5d02d822-da00-11ea-8c1c-d23af84fd26f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC/mk6vRaJfkpfIWG0Evihh/q0x5W5nz943WE69/mk+Q1hJOJpNj7GJc0y0moVsiVaXXVMXRAoC/wQDzB+XRf44Js2lojJmhABqG/kVEAwgwgLk/nEZATGbwyGbXFcq267f6jTGNOY9HbRrq6gMOyzdRy1uzX286Uav7gKBDY5IP3lBLOKX857D0XhIQx/ry9hmb5GzIKSSL1Zmv6O0iQqiubbVCglKdIZ1AQoIud5tvzmghb7fAACkPfQ9kqwrbLFVUh/nKRhIQxeOr2QF2Uv0/YQFiULb/iw70Z/QI8QDnUrnPq9MMIHR2YpkX0K3qZeguqNgToiuYu2d/1RXxhGF root@1c7dbf9d-e14f-11ea-8c67-968ff53f47c5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDIm/Z3K0oPSZa0eLXTydSTcJFy9Gj1bE5QdAJt61f6abW0SQqlcez+PScnQFyqU8AFFRtO4kXB0JyDcobF3qQSXTN3P/NvV2psw/lHBes7uScfVDvfm7nDK1ndEbb24wBzXdc4wdZeCW+NoDEa8btslsSoGgINsUeI/oyME872WalXQuSiIFy4R7P3XmCXSePb8b+4HUa7vd5IpB+2K18oTmf+F93ZSPRJxTk8ZCJME6LnN7LxJkHYpnO+hC9IMPbAzWc0LDWpCNDuu0LO2rtvP/y/opj4it6i8l+FUg6hAHPlUos6vd3DCjkf3ylBwCAMOdRJp27DJmLx8+U+jiRz root@1e8e278f-f707-11ea-ae6d-8ed64f3416c0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDpcmjugW/itfeCL7WeZnea2YOEfzZgxMPTsvuHk39woyTRxJdjq4v/zMLSOXNBrdZFyqdW+F2ySS2GxCpvR5O2QKxEiqCcGOPK3xdQNRIP5mHtELgoPvPc4i22u3+ipfB/CrdrjN/ELwpUZXHrah5bNxOivEbNwYvQ3bMq+WbduRRLdKr10fwdyErywnqex4PvolxR2bOAnNdhakoUH31pSSECBKOX6YUh+TOG2Hh4wpyAJxSwxg7o5IgglU+ok9i6lK8g42CSlq+NBRp2AmoXd82KzXBfqpbTMJd2A8EnZrtq/VKGXFpWE4BzlA6+H7y3jxfcvTDfxH7I7YTgRUvB root@d99b53dd-f8b6-11ea-926e-7e7ea190b727\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDtu4A2VuzGX/fH0HUjKcVqBi/+Fdd/kigCvQMWF3Uw6k8Q71l7ewcDDtfs+WDk06bNg50JsdaA+OcetrpL0yLPuKBvtSg/vl8msn8uxPbhHAgQ/QaaTLWYnztioPEsX4GHj6IcskwLGWNR+mIlqxY+cximmQ1O7hj1IGPNLuePysM9ZdpMDT7xOVc73PXd/t5+kZPjnKEQlsz5Zd7FtQH6QJ7ptKLYfcS062ZQlQJNaQPVIPk/TA9xLAEHaTSw0u1eJHuyXvbSbqvj8e/69wWMR32QmN6mKus3hQZjPMm+DzmDIWq2wt96i1eickCGSvpfXG4j6TIYmTVu3yTDe+ER root@1d6a8847-0838-11eb-b895-6272783fc925\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC5eYrnUmX0URxEg778N+rOLSPqYJk1nPe3ppy/X7zf6rs514UlmBpftsI+ZC5iFxJKIfI1+IECBydUmMtcMeDNq6TJ+QtPaQjonX0jp7Cm4fdOmTfiDnuY1qhepvdKN7oWmZeNT1xrdAe8qeeLIbup92zIlU8++nusMmrAyvmmSjPtl41YNufj3g+4MEryQ6lq43RdkXT35GfZPdWUD3ZUrsc2b568NzBCdCG0j+/RYWHUxnRWiReJzhcrZX+dFACNL7Br5UVz6vmWNV8hLfrVJAAjHNtqWP0m4VCUOX84dfvmTa5I1xOjrqMNMLdWhNCKbR8zOJfaM86lzh66+yQv root@91bc69a5-532d-11eb-b6a5-7e8b7adfd54c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC2cYpeZLD9y25W19mQbvRxg7slzivZIV8y+p8XCIT2xddSl1HQ7Fz1Ir1iUzq0cqniTzHnmM8+RC47XaMMOaXaZjjPcpyNiaFOczCn9c4M5E48ipAa105HP9vj1yewWfgCbPxRP6QSweR8BOVLZHUpZwebPen1XwXUYrUBC0rhPHcFKPUtla4hlUEqI9/ca1yiohCUWDSpO9y5wazA54rZhkN/AHxhPCE0v8xcjJKbcZoUdyFFjY7kMXsL6AOpNwqpFzmhi01+ei3BikcRyKQnWAK15n+F0N4d1tYW5FPEAeepx/BsUnAlX3pji6N11c+sPg3laspWOvVTFgBWrpDd root@12716507-5573-11eb-b690-769430c9414e\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC1HW5T8W/GHe9ba3zZhCR59IjYskzVSoR9KQQF97qG37mPsgvp+HZaFN4czh5Nq5SL7EbCZsROj50cMaO4Q37wCKvIQoWQtaFnBZkzvcADqPAyvIkGjsVRP7+3bSW+2vFr1bqmE8X5lFvIrAdR6BFbgirfTdeOT4SZo6OzyXm4mznYFQMxz5MIqNA+64qMq7UKWKYULRI33YMn8kvUVi3/sATPjOt4v0lQAM8i0g6IKw9MYlLNBQ9G7nH3tYWBBXAMboOT5TsGKGSt8FooNhxKuygbSyJoQL9T5x24sDjxqOVMvtTLRk3NtigdIcigiFgbRxGSmoNXGg9OIIP5Bcyh root@df1a6954-82ae-11eb-b915-56a8d6cedae4\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDfySXJDe/9NLf9ek6OEu5CKV4ugzXnI4I+Ealg9fqaB2+S0BCsSGnrCOGUjKH0PWy85VqwhIhd+rTPz3sZRsbWTVvtnTWgLzBFnC20TuJlhmj+EUIIJcigSrkQcOOpGJi2trDBr1eXAN6SY9ZqHQRicndDVsJ9oi9eXrTUYoSwM+gbIWxscrRdvnsT61m1wLSmxJOoEb9013ow66j+RhDRd1MtJrrF1qoKOIPo9FtVHoOJuZ8gV2mASemGGx1xiTZSboDubvkKVroGzhG+uVEXaTqh7GJsmdN8yvjw/9qfphU7ihDuqZCIpiFx3HNV4tYsA6h1DhD92E7mInGC7Zsn root@d594c422-84c1-11eb-b098-eeb808a18dc8\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDhsM5onslgH0nRFnAumVOGK9oHjF1t3VduBnRW5e3XgBu/qxoP3eT7qHYozRGTFLOrHPWIJ1ScyOEfV8cTT9aVNVamk3/5+UR34yOxQR/L5mrDyOd9o8hBvQ3BJiM6S775zQ4sy+oKTL9MMoT3m8/tC8n+lS+SNHyVFQXQmFEOLdiMN+qKenkYt5cv+lIzqKXUxtiJ5GQOsK2mY2TC+JtyeDSeCEjv1e/bmiEkWmiG1e550VdPffBfD0DOp5DWgkGM0a72SW1mPxjaxUy4ttk7JEPA76WiuLwG/mc6t28R5fmklQOyYK1LppGX1NhhLSGtwJ/abN8rgyWJqDyny+43 root@ad4d54b9-8af8-11eb-8155-227e2855667f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDIciYtiBpbHldYdy3OXDuSRbR4SgnK/kzx3fVYKb6+HCyiPBFEPON6xuxBTgb2i5vwuWH4tq7zA25+8we95Y81DSUaPs3kOMS+m03Nwg76LmYZxZTF7HTCp72QMSFZFPp0hu+IZertWcJ21CrnA9nxOd/XfCS+ZgtbCDZW4MrUP4Dx/Gs1dUyqqla/0GvU7StQjwGHGs7j+59w5W2oYrK75pW1VETikPNISAKorNE9U6yOGmQHk9Iw4qkY3UpGYSB2wKLuNAH6dVPBxEkW+PqL8jiyaXsKWA8WGnxSZtm2LUuXbEJ7Va16AVkzz0NLecBaCtR3q+CL1fOoDO0wlqlr root@3c8b1b38-8c41-11eb-b692-3a35d43432cb\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDFpnDgq2z7HFkMOm5cFxWC/ygaQZz6WIr/ADtBlkGNdfhXfQXOwPx6I9CuaUApj+6EmSUMWOHFJ+2vBqL7n06OEmua1zhNjYJxjyI9Fovektew6idwcXYntUmWoYusoVyitI8JLIh9qwuOp7JHDzIw3e28o6k+z8VliVNoe2k+O516x3CTlaYFpnJfxXi1YmCAPuq0i1YYNqJ6AvA1axHUeq0YYw3ruNriNsENlgwVUO3HP+JjxI5PIYZHFv/ZYvYgcXBfDMrT29BiC1CTM5dVtT9OstMxtSSOR2JB5PTN/FukNigdne2APgG00p/QZcNIDvVCoDgNI+mTrDdAMVfd root@3599990f-8e54-11eb-adda-5eb174036857\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDGwOPOG1FFup69yB/68lDCeIz1/outPDVIpyhaPZhxpy11w3wp/XFbaS807TNUKRs0vD43vxX3U2OS+hl4g+8p+uRdT9bVoFm5+PqxsDuSVLI3Ch5/itCo+Ux37wLLda9eBPqHC7fvgNyFqly00MeviZr1mooxgdxDOgLb4UHtKI9ke9QXlcxBkkEcWFZe6KLM5spcau5N9mhMWJryoUfwBHY6L/zcdIC0+YtUCT4Gz94J3YHv/ADDYfo73r5IfDJHXFqEXfZo++4nGIjFsW32emLJW9+S99GkDrnQEjUpwiybhhDklsiFe98/+oX7iDJcvzsirhGtZnMnj6FoCJEV root@a9e3680e-914c-11eb-827a-4615317e4d96\nkubetest2:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" } ], "kind": "compute#metadata" diff --git a/audit/projects/k8s-infra-e2e-boskos-002/iam.json b/audit/projects/k8s-infra-e2e-boskos-002/iam.json index e557bc81f98..5f700974bdd 100644 --- a/audit/projects/k8s-infra-e2e-boskos-002/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-002/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-003/iam.json b/audit/projects/k8s-infra-e2e-boskos-003/iam.json index 3d01f57668e..ab7a2948024 100644 --- a/audit/projects/k8s-infra-e2e-boskos-003/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-003/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-004/iam.json b/audit/projects/k8s-infra-e2e-boskos-004/iam.json index b045f08d09c..58ea83ce4e4 100644 --- a/audit/projects/k8s-infra-e2e-boskos-004/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-004/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-005/iam.json b/audit/projects/k8s-infra-e2e-boskos-005/iam.json index 9dc1a88fa18..f8dc5460c76 100644 --- a/audit/projects/k8s-infra-e2e-boskos-005/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-005/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-006/iam.json b/audit/projects/k8s-infra-e2e-boskos-006/iam.json index 607d5142cb7..c8183858bb2 100644 --- a/audit/projects/k8s-infra-e2e-boskos-006/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-006/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-007/iam.json b/audit/projects/k8s-infra-e2e-boskos-007/iam.json index 66d47eb8f04..8103305927c 100644 --- a/audit/projects/k8s-infra-e2e-boskos-007/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-007/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-008/iam.json b/audit/projects/k8s-infra-e2e-boskos-008/iam.json index 26b6d8bbd32..95ba9281bb3 100644 --- a/audit/projects/k8s-infra-e2e-boskos-008/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-008/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-009/iam.json b/audit/projects/k8s-infra-e2e-boskos-009/iam.json index a3a2de9f47c..50893e205da 100644 --- a/audit/projects/k8s-infra-e2e-boskos-009/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-009/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-010/iam.json b/audit/projects/k8s-infra-e2e-boskos-010/iam.json index b6a4fb2e4a3..1332384aa44 100644 --- a/audit/projects/k8s-infra-e2e-boskos-010/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-010/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-011/iam.json b/audit/projects/k8s-infra-e2e-boskos-011/iam.json index 5858c020cbd..d0c1cbccc84 100644 --- a/audit/projects/k8s-infra-e2e-boskos-011/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-011/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-012/iam.json b/audit/projects/k8s-infra-e2e-boskos-012/iam.json index 15b4032d71e..ae594336322 100644 --- a/audit/projects/k8s-infra-e2e-boskos-012/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-012/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-013/iam.json b/audit/projects/k8s-infra-e2e-boskos-013/iam.json index e25435b92e0..31c28dccbcd 100644 --- a/audit/projects/k8s-infra-e2e-boskos-013/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-013/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-014/iam.json b/audit/projects/k8s-infra-e2e-boskos-014/iam.json index 0b909f27a93..98a96d13305 100644 --- a/audit/projects/k8s-infra-e2e-boskos-014/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-014/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-015/iam.json b/audit/projects/k8s-infra-e2e-boskos-015/iam.json index d3d0a9827f4..54797318316 100644 --- a/audit/projects/k8s-infra-e2e-boskos-015/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-015/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-016/iam.json b/audit/projects/k8s-infra-e2e-boskos-016/iam.json index d5b48990f62..a8a37c72551 100644 --- a/audit/projects/k8s-infra-e2e-boskos-016/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-016/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-017/iam.json b/audit/projects/k8s-infra-e2e-boskos-017/iam.json index 17b137b2440..8c2e0b8ac67 100644 --- a/audit/projects/k8s-infra-e2e-boskos-017/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-017/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-018/iam.json b/audit/projects/k8s-infra-e2e-boskos-018/iam.json index 806377501e7..cab5e774ee0 100644 --- a/audit/projects/k8s-infra-e2e-boskos-018/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-018/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-019/iam.json b/audit/projects/k8s-infra-e2e-boskos-019/iam.json index 0de9c2edd13..eb4e2a7ff53 100644 --- a/audit/projects/k8s-infra-e2e-boskos-019/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-019/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-020/iam.json b/audit/projects/k8s-infra-e2e-boskos-020/iam.json index fcdba972f7f..f95abfb0b62 100644 --- a/audit/projects/k8s-infra-e2e-boskos-020/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-020/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-021/iam.json b/audit/projects/k8s-infra-e2e-boskos-021/iam.json index 9f25de255ca..3febfd1caed 100644 --- a/audit/projects/k8s-infra-e2e-boskos-021/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-021/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-022/iam.json b/audit/projects/k8s-infra-e2e-boskos-022/iam.json index eab4f413dd3..2ee22138760 100644 --- a/audit/projects/k8s-infra-e2e-boskos-022/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-022/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-023/iam.json b/audit/projects/k8s-infra-e2e-boskos-023/iam.json index 72f93f7ccf1..47053cab24f 100644 --- a/audit/projects/k8s-infra-e2e-boskos-023/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-023/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-024/iam.json b/audit/projects/k8s-infra-e2e-boskos-024/iam.json index 3162e6dbb62..7fb60788f01 100644 --- a/audit/projects/k8s-infra-e2e-boskos-024/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-024/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-025/iam.json b/audit/projects/k8s-infra-e2e-boskos-025/iam.json index 206e4bdcb2c..c18c9c0d1bd 100644 --- a/audit/projects/k8s-infra-e2e-boskos-025/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-025/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-026/iam.json b/audit/projects/k8s-infra-e2e-boskos-026/iam.json index 207114d6c5f..314b6ec230e 100644 --- a/audit/projects/k8s-infra-e2e-boskos-026/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-026/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-027/iam.json b/audit/projects/k8s-infra-e2e-boskos-027/iam.json index 07e3725af6e..1c099104d39 100644 --- a/audit/projects/k8s-infra-e2e-boskos-027/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-027/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-028/iam.json b/audit/projects/k8s-infra-e2e-boskos-028/iam.json index d683189c200..0f53aa9d2cd 100644 --- a/audit/projects/k8s-infra-e2e-boskos-028/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-028/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-029/iam.json b/audit/projects/k8s-infra-e2e-boskos-029/iam.json index 2257f5c0b00..b7ab9744367 100644 --- a/audit/projects/k8s-infra-e2e-boskos-029/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-029/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-030/iam.json b/audit/projects/k8s-infra-e2e-boskos-030/iam.json index a3a21efba2a..a86775654df 100644 --- a/audit/projects/k8s-infra-e2e-boskos-030/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-030/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-031/iam.json b/audit/projects/k8s-infra-e2e-boskos-031/iam.json index 506731533b3..6ab243bc0ac 100644 --- a/audit/projects/k8s-infra-e2e-boskos-031/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-031/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-032/iam.json b/audit/projects/k8s-infra-e2e-boskos-032/iam.json index 9cc5d7e3764..e0b4b77ad7d 100644 --- a/audit/projects/k8s-infra-e2e-boskos-032/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-032/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-033/iam.json b/audit/projects/k8s-infra-e2e-boskos-033/iam.json index 3cab226138a..421fb923419 100644 --- a/audit/projects/k8s-infra-e2e-boskos-033/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-033/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-034/iam.json b/audit/projects/k8s-infra-e2e-boskos-034/iam.json index 84c34b40fdc..44fe0c1aba5 100644 --- a/audit/projects/k8s-infra-e2e-boskos-034/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-034/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-035/iam.json b/audit/projects/k8s-infra-e2e-boskos-035/iam.json index b6da5951c0b..7a423f31a6b 100644 --- a/audit/projects/k8s-infra-e2e-boskos-035/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-035/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-036/iam.json b/audit/projects/k8s-infra-e2e-boskos-036/iam.json index 20067cef025..384a3f09368 100644 --- a/audit/projects/k8s-infra-e2e-boskos-036/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-036/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-037/iam.json b/audit/projects/k8s-infra-e2e-boskos-037/iam.json index 2ef0fc8e08b..4f38f3837e4 100644 --- a/audit/projects/k8s-infra-e2e-boskos-037/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-037/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-037/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-037/services/compute/project-info.json index 215573928e7..7684ebaaa8c 100644 --- a/audit/projects/k8s-infra-e2e-boskos-037/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-037/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDZYp+nFxO2rFzjROtfYKiya/gSJTgaAS+CTgpjbVfMVC+pJdCEkraWXJ/s1rAE//w0JYFZw9EvThE3TlywYQ3buOVuYeQ7kwJ8K8Z7W+vCI2H0tVckLA4lLRvno1XV/64r9z1brtiRVtNC+vvJqr5x8qPfbgBo5EOCelu1ke5DS835tHZqfvobS5KvSBwHFqNJHQok19T4aKO72m3tHgyRZKFm07XLXcVHeAfvJcffIisF90scGWKTru6x2YoLZyoFKI7VmO8VfaJSjLt/fN9LcXYKAWiQlaMC/xYsFypdFcUOt4SZHpdQvbJJ9wYA0bi1Q9D9jBZ1L6jFKJeQI8qT root@2b90260a-dced-11ea-9424-2680bd79560c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC2cuHumWYKeeAsW0gWjT1NT3M6xGVl7q1diQ2+m9qzIgp81boWFbD53ro8yTA/jmb0jPjY0KzKPG47j6owUGUaNlKosWu+mXeVDvxG0HSyWsCEwc/dCJXXzo6YAy/PIIMeyLXZhPX2C24NK4ecJxebkjVbN6FxNk1Prrc1bcdiKEcg9tJocKy2EMT9CVfO224J2NsA+cbRv7lnzZm9h/K0+fDB0UyNAE70sjA3uh8mp5yFRm/OL9ydTRlsxBapTjN+y8Skbdu6iABmCoKoQcziGnFOJFk1Q2G2Fr8/xeqNcLtAMKFcjYDQEcih8ZTPwHhJBhYeD4nydiNrxdvdLdVL root@8d924166-e094-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmlJ/i5QzgOAaoF68VfF/4sbRn78AGvJdp/YdEAXJDM5iuZdtjJO2YMSgdAS2CiDtpMGTYpQSFkQBn7EwaYcac9exKE+CxAAZDTuvUEsQBxSg8TJsD/rMJIBf4OxBrTjakqqfnvOqXX0za26ImGKjE3+pw8Q8GnwzqmZCEJ5ny2LPiDYltvythSa5xQCReda9IL9g4iW0E15GD8ymGnRzdT9PYS8q7vAkdMybYT6GdwrlInC/uGu/j/UqLf5PweFJxdTx33DMUwPP9n/PEK4NoWHP64rYw/ABJ/584LiPwSnclmGIPjCeWPk7wX4HU00W1+XBS5Dj+FGasKSkizpnT root@f4e58d0d-e4a0-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDV12T0kH6Jw3qfrPkZetlAmATPI4xT1OMtoN7EjY9GFy7gCXmRHWyNlMn5j0bEsilZ7caRYEdzeAK3gdvvbcQPweM+HQv5RFjKUFNkhuSl1PiTmJTZRTdCeLQYOulXL95rwb6hhIR9piX72ZxIZHRVP0d5klmZ8V7LCUzEXI/p7kmI48QmdkU4jXpr/0fdGdFMUPrCr8geHu3RFkiX3RQ4UZaDkn0MKa69H3OcRW/7wqXC5oFusDtRZCS/Vgo8griybLCLE0W17QRHrabqDDY+DyoM8adTfExS5zwUPVwxwl6KkWr5QjIy8N85g8WcTA1SRoy/07JMC8H968o7s7V7 root@ca081b1f-edd9-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDQOsyCl//nJDqAdkzcijvvLGHlaZgIvB0weamRm3MjYSg9UaNgCGfkEnzK1SEAlYQMEAG4jAV0KJ6sXavF27kQgzTI3vg4pb/PjIUDeir4tBb7rheDA91TFIEbftFKD2BgGUII554MQlr0uUmfjNrz9jO7mDK8uShvfzMkERtDZxMJD6jg4d6Yzk9Rz+Cjh6GGHJz8Le1iIOSUYdnpSosc8Nb9DYulZTmr9x27MT+QLShdT2R3RsZnn+k/AN+lKnq+YJ7EFwfPEtFB5F4/AV2mSbf9CxwkWTpb63zcaJNfsDZhPfNU3/arRvVU68ELKQ6BbeSeHqIVXf+/05/Rcd5D root@30480320-fb48-11ea-9c73-86173d37727b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+G+IVIo+5r7xFfwZFky1tW9bvR/RxfYJEQZcriMWkgjMyDIjOwGGvzQU24TrjL9L7nAVtEY+842Y0c8qNfA0xyzqMF8KQTLwvdBRAwKVCExNVUp2haw3s8WU6U9WN0BidD3m5LM/3bx9qjmrFrr3bX4WvvzVqQP7BPbvpvUBFq9w1ofoMtIVrh3RFqUMd3fpe0xn/S85F6UjE6IDEoFdm2V/JlxcEKgIv0E2I07GkTtYqPo8NZ27O25pUD0AWvQbeJ8KCbPnkosIsbru683VX+h5wwpWUinr92KI+0nrMgqx8hVE1u6iATbqltFoKtH8KZG4agJQchcdes/XpXm9v root@188cacd8-05c0-11eb-9dc4-ba187aea6a9a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDi89iJlbIJEbbLUBCzZgCezvVK66RdW7HXB119TzC1SEK4Pu+cUDpCavcgesfvnaYP7epSTqoNJDyGscapngBVP1C8jpE8ZXJ8J7EessWWVcdMcOiFdl+aLttcO3QMpNxtQ9XsfAoy5sOPik2IqtqYx6nlSDksnS1YET6qQVHv7m0cbC1NW0SVPT7xluyM1eKmT+GRsahqdesA55XWaKs0+BqeSrQ4Z/q5fmQAb2QsaHadXeUsJHebwWqrp2TSzP5Jly1a1itnD01f7EVmkhJ+CUuC/vCInt0HR1gtMnDBmyYAQg2ByLW/c62w1sRkpgGQaMHcbW1QDoaxVFkvs10/ root@a25feb1f-0754-11eb-bde8-b2e010cd58b2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDmnQHYynC8ZU8mKTd8rXecKjy+XJNEobOrss9FBuBcYeYeG8SDABQMNrPpsiWrdTcHVe5MpdA95KqHQXu9njcPnaodP9ZkT7aNVWWQWAXBF/t8xWLUwDMSw1m4fJgCmoi3H1Z1f12pdqKjwPYMzFP3Iq46rqCP1bIQQKcortkBU504NbpVG82X09oQwYt8fsMuHVGG2Zdc/CZmpvVE0q7Jm0Wtybc4Wem7H27UBVGWeHebI1OzJ3uKsxJKC3duYHPp9WEcoFtKGrZlgYk37sRO+4xDt8U/hSntB4mME41T5caO0x/hpAnsBYJXqoPew3IKx+yZw3xfecojokZ4YOQV root@508e8b1e-1490-11eb-8a3c-66d0ef5d093b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDues++FyvCmCLqUQlIBj5EQWb90/SbMzz4gFvSPpxVy2UHtqaJK8WjyEtAdwslMoJ2Q5qD50rSeUuNfiStrfl6bxiU50tQ4FdSUh7IBRJR0iT6L2LqfhuKfZ+bk9uhyul+HhW034ZlsopEkSGszewXoL19Z0IGqSl6bTJewAOqTlN9C10Q7j9L9bcNYRREJsMARfRhWFmaGfKTW5J9Y/ytFOmtoLmHBitLwR8ghVLuX3rEDqGvWHxjvtm5/TY606RaLZkyfUGVzXHffKCz1MpPwr3Xj/wXAOj9IRkLE767j93CnKrVdmC/QeCF8NMuq9XRzcjcXZSQJNeeOG4vIvT9 root@40be8d11-20cf-11eb-95d4-12a87eb4bba5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC5+tMeQUMzmlXZkBvmCNsQTLZF0Ruf0a+UqyqA53sVa9XoPqGY7aBXCbKlsOy8YrW4xqPVh9OR7etmXkDm0aKSpSa9QUlmC91yrGIGqAY4Lo9p0l4NjWII1yivFis0ORsc/y+wWUDFwWlY9Bp8t/X+Giz7nlZhVmCQpvedERYfeOjvtQjxXT9SH78zwV7Ng1CwpIePYyyFmLxF6OZh/QsrjzflnZMSBUrOgnb9bZMYKEb6hvLf9Z3MgIWoiOueKkpuFT9ym5TW0Z403wOeuGtcVcmV/5BI4Ffqhouayxeu4PeMNwzMSNN4pi0hXntWWijgJ4dqDwD4izbWVGzne0Bb root@871323b2-224a-11eb-95d4-12a87eb4bba5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCy2bzPga1qhHkd0wNMvo7RpuKPeAUFTLR9zUSVrbEN8ymOepXd2D7LWbAEgMxny0RgrRPcs1SoZqB52MqvAs6x748atJNAdpoP3lgRF5U5ZIMeLhPwQ3C5hoIvIXNlfk7rOONk/t7/k1D2ngMmdlyINfp8Fun2aCxGGLjn66hN9B+HfJuyCdu+Roj+/Xn0+COJFs79h3M2C1X9GrWSiOE+sjvpWFZTMX8v+uSnXdvTzrccJwPq4o7HZGkBBGAy6CMvPUGMOxJglsaLlHAP0KowQUOL2QLJGg/KeGbHXlco4E7hHQCjflZCu+CamwOGukXOiw5q7HimUlt13m9YLS8H root@07b3ceb9-232e-11eb-bccb-526de22ef413\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDNIS0MVSgAlPRBeEOssPUDnO/vPEB7pBOFcaOSUVZGxuuHU6ujMGzhT3+V8n25rKQKkwB1049vGFqS6ck98vqF0gCx8S4s14ierIZC5+lBxjAtUw8rBinwChgma+3fl33KChAdx8pThai3M7PTZpo15p/WS6301qNYwU139HwuN4Ah9glDXug5la5k2j84DmSbsvaJ+4Rouy/VxbIiEXHbLBF6TlzL5OiNnKzVgg3CWbLLPd+K9VkLjOO9fkZs56QJnC7G1lRBmaiKuA9+SJN1oRdHItYDs+ALreCZdfnpWRnym5A8v228V72m85Jy+i4+MNws9gzSc2BMVwVZaH6B root@f318cf0d-35a5-11eb-8ecf-c2fbd71c5254\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDHj5o/1Dip+0bhOlnZFHTf18wPc3ZG7y9bhF46aOrFsSDbOuCK6ouJc5s0gQT7WEwRsuNMBqgkIONi1rOppFcX68IC7PIX5E2wP36Is1C7Cj4cxCo04u6r/5WLcptd97iq1cx+0JspyO60IFAN+L2g+ABx0ifF4VQm5pryrmVEVxVpPiHLURkqTEeFsAC8/5DIRS8sobxruptgjbszo56spgFNdUxXnaiU8zIpUYeCfUgdaiki33vvnteOjEIX0pSEVXPz3LGaeSCTfkp6UwwiWxdFp3UhEqwGffEGvCqRkq/dpfgG3BZ6nJzegrhF6qAqwbD8VsOzHxCMI47iMWTH root@3c048471-3afb-11eb-a164-f6e7f2ebcce2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDNpGXZ4guH1dzGaGjYrk5e61f6ywBy/WeO5lr2CDwXq2OuAGsDQmJEnWwottI7QgZQiOKNeEe/NfuWm9U28AhrbmPpK+oH8tAXfLcDKXnFw3/nkJVWCCbrXrDFDVHabNrwTwNyn+EUEZJXfAeKETyT4QPAjaCr28QdfglsncJpB8CR904DvRtld5xkJzwDDG7ZFVMhZ2ILhht1cWOsUo7e9kl4B6upUKI3N176S2SKbMOyF9jx+FnieqZ/Xdn3P6qp5RHNMIUTnhW/6Gca9MJdQQ2m2yT3uDgCX+XMraz55sorAQoS67YnDH53WAgvgUvgy0VO9AR9ni7qqpyqzEpp root@435c28e4-49fe-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDQT6C4KroqpS1AxhbHm8JyP7EelFnnGuGM9BwZpRKDdwZQVECdSgRBK1YwIDvCtvcn2RQw4fI2Rp5FzIkKAPgaYRnn0FqBZzUiRdUaqwAUUWCbgw1LohS1brVlNklbylLCAlKRvvHmB/fnBeHPpVWlzOr0CRk/hGWwgm71RdXqHrAPgxBLjadEZZjZCxXUnS3/ByulnR63UNOWlkoqFV2+Hd/CGm+VpkLOZaO+uamrSd3gy/KGjnAgYFQ5leROCMUvTDkR0G8omwZjY1xrZlphJnpDo4tK3QE2rW1jvDFG7w5GsgLd+QbxWzrDTnPapfnbCb5HkTHFt0FnJzOzo3Fd root@a9417353-4a7c-11eb-af93-4e5abfa0c065\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDdjqFeMWn7tM5+sYftft4I+h6bmGLIQvv+h5/mSvsx9ad/KWO1FRAaIzfRSXA9usnEFwmbZ2lW02FRHp4q1DoJNNtKz8xhue4Sn6G6ciodWTCb9aq3E2XLmnvmLl+MiotFRhLRjDave5WARl7fuCVNVKhLuMF0yFMr12FKy/QK8NBwcNi7tvYGYn2CPViWH7hFTJw217lzQW5rk9UJSLiLgAk1tcmSMyJT7xDs8ekd6dGzTSTE/lNArVJ8xEQMcCOgYZjq552QzyNZX7pU/hnBx9i1yZFWG5oaqGJ2yEFwozQRfIfhj3DPP5wYJjnUlP3YBY+SZXjZTZ+IraYL2f8/ root@2676b961-51fe-11eb-b6a5-7e8b7adfd54c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCnC/L0BfXENuwVBDm0x8KdAEsU4TSluXb5E3kwfJwgJxihVPNZNBw59nPaId+ncnpuSoxx4fYtyE8mJpIUwJJFThkEWpRpuyg0r8suJ4IBbGJuRcyagJx0lgewVIDVDjFJPnUaVn+SQ54S1KZ9pISMyWidfObfyqyoVZrpX0K1cOg94DcwJfyiQx73rfmaa0sMvl99qZGBSrHWM5VB7tZpU4T8kXkc46HtEfe6NvKe8foN4Q5lDroE04RFDzVbUl9KQ+DqThprA7WHGhDSGHUGnFp+lB790HPvTri0W70msuySJYGXjEYiVRJ+FW3fbe7piMhKTlj6Z8xlxIT6wQYr root@dae36b07-5346-11eb-b6a5-7e8b7adfd54c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC/F9z7FAC+7fo6iwv2uXuF3WbWbRb3b++hN7Xq9ypOAjzx7Rsz2EZdYUBeiDJPr65tBW2gC5iq7EGF/lz9TpmE3D1UZZ/X03n4Z1o4i86/buZLfuZHECaBYrem5CfG1byIN0O+tM8swHWClBfc7KwzpV5+0g6QbyHc51MCLT2JltqsGHQqKcyIWgCMDuhSBKc0VVaRcpVgtiE3AGiGki7MeUnVomGOmo/rlFRrZlSXX8309cS9aILGfxVldXVd58vlPqKTPclUSujCljGTNmPkolEbTnRoH5Ho6wTnFksdKUST9Q8jRJVO/OdpDYqPfmNFea/UYHoZ4uDwMibmb/ZP root@6fce2fe4-7ebb-11eb-b28d-fa3b92b2ac7d\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDYLYufYkIh/3Tz4JUfe9awZAd7dqoZRb1/7Mm7UnniPKBdEBwjjQQCXR2c94/Gyss2orSSsx+qMSknWY5JX82jwvIe3Tsldr+1tZOiEPiwGEaSlOfso25TdaFYd1mQOIBw4cEEHt2md9Y4FGzaXLUWc1zBmwd5xBn89WqIwULke+NDL+xmiwpf7rU87BfWkW+zB/fNBVF0jvKfrIfY414KexQcOHy7hF3VWCkmA39ZYXPa6xYPcalA0E0syU/Hr49nFR9gcFEhYavSG6YMyyKRmP5zipMjKGwLezo9hZtT1coUYPLNXivZz+HCnIH4VJSCYXMkFDvcm5Mo2rud3+GH root@6534fb18-897d-11eb-8155-227e2855667f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDS6/JR76AY6nyB6OFSabwsjXLfaNGj98ZDGTXnVPRJUMbfKD0dN3KIRH2wNmHmaNIOgbkAjvTQ4vQCEw5qCVKvj9nwSlElE0pScmCZm7E7Z3hyMggvgsGDEEwU8l6wjHG9C2xx+IAzsB96z4gCcnJ2wdzVU0lO10uMkQFlojw/mpDYnxao0bOr0DIUmXMhZej1izJ7vQP6U/Rh0+nzaiRkHnYNpJTugRQR3x/Nsp6U7e65/InXv92Q5nr8M+GSEfgHIBkNq9HCSIAKnGxWInDZJxCeV1rjUR3P78Zf4LZkmqNpZxes3tEbPnACWKNG9kPV/TiRxQvQ03HD8SovG3C9 root@a20163af-8a49-11eb-8155-227e2855667f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqOz1kHlsfzeRHCW6ehFtRQDhEdMPnEt8GQWBxZYEKv6VzrSngl8HlRMnL6elmwik+veKlmPp8o2ynIhSdgu/7YeYZNDo3CBmuikma7SXmp0Sdv6hRWZPmBH4g8FIYJ7tHOn9c3y4JG95UGJWOZ8MJBSeiuXVe0DZKlrHCK7fRqQiz4VwBqJ3bdHcGqpFZSr3vUbSiakiYjOpecT9+0j4EXdG8/Fe7jOV17dtf5Pb3qKIiKqvf0S09SQhL+q0e9TPyESnQtJMSagiYrGWQtlJ9T4alE6Tu4lnI+kzoYtmDpHlC+6AJg9Csx54b5f5N9/zIGN9QB4NtxvaDOAn+CC1Z root@88ca2b7f-8a93-11eb-8155-227e2855667f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDcBFEtCSi8NYhV2LNkEUXLJBz/7Jch+R1dIGIn51BWM/QM8j9rL6PsNezTlgtYjGKG2znZSPaxHVpdM3gjKgtm55w0IKnk56mllN7eAPC4JSM0zyYaPGi1edG11UweHPnF65LTvHYB22+BuhpC5rwFVtJnf7ozP6U40RW+zSgTWd/GO7WLjvtTMAkX25TWY5jdu1FrP5UFHmah10kLLgPuACoNLBdau200/DCLOPHQR73i0KfIxvq5Z+k2EwzHnzcMspIV9eUdq02TT6HZ+HrXQYmh4JUgjhD+wkpbPR4YEqmUjhR1by95Q2gR9sLQzE3+XHjyAtMzhxGpjgnd+T5D root@fabd7601-9214-11eb-8bc0-d2e3f345847f" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDZYp+nFxO2rFzjROtfYKiya/gSJTgaAS+CTgpjbVfMVC+pJdCEkraWXJ/s1rAE//w0JYFZw9EvThE3TlywYQ3buOVuYeQ7kwJ8K8Z7W+vCI2H0tVckLA4lLRvno1XV/64r9z1brtiRVtNC+vvJqr5x8qPfbgBo5EOCelu1ke5DS835tHZqfvobS5KvSBwHFqNJHQok19T4aKO72m3tHgyRZKFm07XLXcVHeAfvJcffIisF90scGWKTru6x2YoLZyoFKI7VmO8VfaJSjLt/fN9LcXYKAWiQlaMC/xYsFypdFcUOt4SZHpdQvbJJ9wYA0bi1Q9D9jBZ1L6jFKJeQI8qT root@2b90260a-dced-11ea-9424-2680bd79560c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC2cuHumWYKeeAsW0gWjT1NT3M6xGVl7q1diQ2+m9qzIgp81boWFbD53ro8yTA/jmb0jPjY0KzKPG47j6owUGUaNlKosWu+mXeVDvxG0HSyWsCEwc/dCJXXzo6YAy/PIIMeyLXZhPX2C24NK4ecJxebkjVbN6FxNk1Prrc1bcdiKEcg9tJocKy2EMT9CVfO224J2NsA+cbRv7lnzZm9h/K0+fDB0UyNAE70sjA3uh8mp5yFRm/OL9ydTRlsxBapTjN+y8Skbdu6iABmCoKoQcziGnFOJFk1Q2G2Fr8/xeqNcLtAMKFcjYDQEcih8ZTPwHhJBhYeD4nydiNrxdvdLdVL root@8d924166-e094-11ea-a57e-2eecf92acd21\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmlJ/i5QzgOAaoF68VfF/4sbRn78AGvJdp/YdEAXJDM5iuZdtjJO2YMSgdAS2CiDtpMGTYpQSFkQBn7EwaYcac9exKE+CxAAZDTuvUEsQBxSg8TJsD/rMJIBf4OxBrTjakqqfnvOqXX0za26ImGKjE3+pw8Q8GnwzqmZCEJ5ny2LPiDYltvythSa5xQCReda9IL9g4iW0E15GD8ymGnRzdT9PYS8q7vAkdMybYT6GdwrlInC/uGu/j/UqLf5PweFJxdTx33DMUwPP9n/PEK4NoWHP64rYw/ABJ/584LiPwSnclmGIPjCeWPk7wX4HU00W1+XBS5Dj+FGasKSkizpnT root@f4e58d0d-e4a0-11ea-99eb-2ebeded86955\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDV12T0kH6Jw3qfrPkZetlAmATPI4xT1OMtoN7EjY9GFy7gCXmRHWyNlMn5j0bEsilZ7caRYEdzeAK3gdvvbcQPweM+HQv5RFjKUFNkhuSl1PiTmJTZRTdCeLQYOulXL95rwb6hhIR9piX72ZxIZHRVP0d5klmZ8V7LCUzEXI/p7kmI48QmdkU4jXpr/0fdGdFMUPrCr8geHu3RFkiX3RQ4UZaDkn0MKa69H3OcRW/7wqXC5oFusDtRZCS/Vgo8griybLCLE0W17QRHrabqDDY+DyoM8adTfExS5zwUPVwxwl6KkWr5QjIy8N85g8WcTA1SRoy/07JMC8H968o7s7V7 root@ca081b1f-edd9-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDQOsyCl//nJDqAdkzcijvvLGHlaZgIvB0weamRm3MjYSg9UaNgCGfkEnzK1SEAlYQMEAG4jAV0KJ6sXavF27kQgzTI3vg4pb/PjIUDeir4tBb7rheDA91TFIEbftFKD2BgGUII554MQlr0uUmfjNrz9jO7mDK8uShvfzMkERtDZxMJD6jg4d6Yzk9Rz+Cjh6GGHJz8Le1iIOSUYdnpSosc8Nb9DYulZTmr9x27MT+QLShdT2R3RsZnn+k/AN+lKnq+YJ7EFwfPEtFB5F4/AV2mSbf9CxwkWTpb63zcaJNfsDZhPfNU3/arRvVU68ELKQ6BbeSeHqIVXf+/05/Rcd5D root@30480320-fb48-11ea-9c73-86173d37727b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+G+IVIo+5r7xFfwZFky1tW9bvR/RxfYJEQZcriMWkgjMyDIjOwGGvzQU24TrjL9L7nAVtEY+842Y0c8qNfA0xyzqMF8KQTLwvdBRAwKVCExNVUp2haw3s8WU6U9WN0BidD3m5LM/3bx9qjmrFrr3bX4WvvzVqQP7BPbvpvUBFq9w1ofoMtIVrh3RFqUMd3fpe0xn/S85F6UjE6IDEoFdm2V/JlxcEKgIv0E2I07GkTtYqPo8NZ27O25pUD0AWvQbeJ8KCbPnkosIsbru683VX+h5wwpWUinr92KI+0nrMgqx8hVE1u6iATbqltFoKtH8KZG4agJQchcdes/XpXm9v root@188cacd8-05c0-11eb-9dc4-ba187aea6a9a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDi89iJlbIJEbbLUBCzZgCezvVK66RdW7HXB119TzC1SEK4Pu+cUDpCavcgesfvnaYP7epSTqoNJDyGscapngBVP1C8jpE8ZXJ8J7EessWWVcdMcOiFdl+aLttcO3QMpNxtQ9XsfAoy5sOPik2IqtqYx6nlSDksnS1YET6qQVHv7m0cbC1NW0SVPT7xluyM1eKmT+GRsahqdesA55XWaKs0+BqeSrQ4Z/q5fmQAb2QsaHadXeUsJHebwWqrp2TSzP5Jly1a1itnD01f7EVmkhJ+CUuC/vCInt0HR1gtMnDBmyYAQg2ByLW/c62w1sRkpgGQaMHcbW1QDoaxVFkvs10/ root@a25feb1f-0754-11eb-bde8-b2e010cd58b2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDmnQHYynC8ZU8mKTd8rXecKjy+XJNEobOrss9FBuBcYeYeG8SDABQMNrPpsiWrdTcHVe5MpdA95KqHQXu9njcPnaodP9ZkT7aNVWWQWAXBF/t8xWLUwDMSw1m4fJgCmoi3H1Z1f12pdqKjwPYMzFP3Iq46rqCP1bIQQKcortkBU504NbpVG82X09oQwYt8fsMuHVGG2Zdc/CZmpvVE0q7Jm0Wtybc4Wem7H27UBVGWeHebI1OzJ3uKsxJKC3duYHPp9WEcoFtKGrZlgYk37sRO+4xDt8U/hSntB4mME41T5caO0x/hpAnsBYJXqoPew3IKx+yZw3xfecojokZ4YOQV root@508e8b1e-1490-11eb-8a3c-66d0ef5d093b\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDues++FyvCmCLqUQlIBj5EQWb90/SbMzz4gFvSPpxVy2UHtqaJK8WjyEtAdwslMoJ2Q5qD50rSeUuNfiStrfl6bxiU50tQ4FdSUh7IBRJR0iT6L2LqfhuKfZ+bk9uhyul+HhW034ZlsopEkSGszewXoL19Z0IGqSl6bTJewAOqTlN9C10Q7j9L9bcNYRREJsMARfRhWFmaGfKTW5J9Y/ytFOmtoLmHBitLwR8ghVLuX3rEDqGvWHxjvtm5/TY606RaLZkyfUGVzXHffKCz1MpPwr3Xj/wXAOj9IRkLE767j93CnKrVdmC/QeCF8NMuq9XRzcjcXZSQJNeeOG4vIvT9 root@40be8d11-20cf-11eb-95d4-12a87eb4bba5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC5+tMeQUMzmlXZkBvmCNsQTLZF0Ruf0a+UqyqA53sVa9XoPqGY7aBXCbKlsOy8YrW4xqPVh9OR7etmXkDm0aKSpSa9QUlmC91yrGIGqAY4Lo9p0l4NjWII1yivFis0ORsc/y+wWUDFwWlY9Bp8t/X+Giz7nlZhVmCQpvedERYfeOjvtQjxXT9SH78zwV7Ng1CwpIePYyyFmLxF6OZh/QsrjzflnZMSBUrOgnb9bZMYKEb6hvLf9Z3MgIWoiOueKkpuFT9ym5TW0Z403wOeuGtcVcmV/5BI4Ffqhouayxeu4PeMNwzMSNN4pi0hXntWWijgJ4dqDwD4izbWVGzne0Bb root@871323b2-224a-11eb-95d4-12a87eb4bba5\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCy2bzPga1qhHkd0wNMvo7RpuKPeAUFTLR9zUSVrbEN8ymOepXd2D7LWbAEgMxny0RgrRPcs1SoZqB52MqvAs6x748atJNAdpoP3lgRF5U5ZIMeLhPwQ3C5hoIvIXNlfk7rOONk/t7/k1D2ngMmdlyINfp8Fun2aCxGGLjn66hN9B+HfJuyCdu+Roj+/Xn0+COJFs79h3M2C1X9GrWSiOE+sjvpWFZTMX8v+uSnXdvTzrccJwPq4o7HZGkBBGAy6CMvPUGMOxJglsaLlHAP0KowQUOL2QLJGg/KeGbHXlco4E7hHQCjflZCu+CamwOGukXOiw5q7HimUlt13m9YLS8H root@07b3ceb9-232e-11eb-bccb-526de22ef413\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDNIS0MVSgAlPRBeEOssPUDnO/vPEB7pBOFcaOSUVZGxuuHU6ujMGzhT3+V8n25rKQKkwB1049vGFqS6ck98vqF0gCx8S4s14ierIZC5+lBxjAtUw8rBinwChgma+3fl33KChAdx8pThai3M7PTZpo15p/WS6301qNYwU139HwuN4Ah9glDXug5la5k2j84DmSbsvaJ+4Rouy/VxbIiEXHbLBF6TlzL5OiNnKzVgg3CWbLLPd+K9VkLjOO9fkZs56QJnC7G1lRBmaiKuA9+SJN1oRdHItYDs+ALreCZdfnpWRnym5A8v228V72m85Jy+i4+MNws9gzSc2BMVwVZaH6B root@f318cf0d-35a5-11eb-8ecf-c2fbd71c5254\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDHj5o/1Dip+0bhOlnZFHTf18wPc3ZG7y9bhF46aOrFsSDbOuCK6ouJc5s0gQT7WEwRsuNMBqgkIONi1rOppFcX68IC7PIX5E2wP36Is1C7Cj4cxCo04u6r/5WLcptd97iq1cx+0JspyO60IFAN+L2g+ABx0ifF4VQm5pryrmVEVxVpPiHLURkqTEeFsAC8/5DIRS8sobxruptgjbszo56spgFNdUxXnaiU8zIpUYeCfUgdaiki33vvnteOjEIX0pSEVXPz3LGaeSCTfkp6UwwiWxdFp3UhEqwGffEGvCqRkq/dpfgG3BZ6nJzegrhF6qAqwbD8VsOzHxCMI47iMWTH root@3c048471-3afb-11eb-a164-f6e7f2ebcce2\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDNpGXZ4guH1dzGaGjYrk5e61f6ywBy/WeO5lr2CDwXq2OuAGsDQmJEnWwottI7QgZQiOKNeEe/NfuWm9U28AhrbmPpK+oH8tAXfLcDKXnFw3/nkJVWCCbrXrDFDVHabNrwTwNyn+EUEZJXfAeKETyT4QPAjaCr28QdfglsncJpB8CR904DvRtld5xkJzwDDG7ZFVMhZ2ILhht1cWOsUo7e9kl4B6upUKI3N176S2SKbMOyF9jx+FnieqZ/Xdn3P6qp5RHNMIUTnhW/6Gca9MJdQQ2m2yT3uDgCX+XMraz55sorAQoS67YnDH53WAgvgUvgy0VO9AR9ni7qqpyqzEpp root@435c28e4-49fe-11eb-acd8-6a2a49dd8a76\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDQT6C4KroqpS1AxhbHm8JyP7EelFnnGuGM9BwZpRKDdwZQVECdSgRBK1YwIDvCtvcn2RQw4fI2Rp5FzIkKAPgaYRnn0FqBZzUiRdUaqwAUUWCbgw1LohS1brVlNklbylLCAlKRvvHmB/fnBeHPpVWlzOr0CRk/hGWwgm71RdXqHrAPgxBLjadEZZjZCxXUnS3/ByulnR63UNOWlkoqFV2+Hd/CGm+VpkLOZaO+uamrSd3gy/KGjnAgYFQ5leROCMUvTDkR0G8omwZjY1xrZlphJnpDo4tK3QE2rW1jvDFG7w5GsgLd+QbxWzrDTnPapfnbCb5HkTHFt0FnJzOzo3Fd root@a9417353-4a7c-11eb-af93-4e5abfa0c065\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDdjqFeMWn7tM5+sYftft4I+h6bmGLIQvv+h5/mSvsx9ad/KWO1FRAaIzfRSXA9usnEFwmbZ2lW02FRHp4q1DoJNNtKz8xhue4Sn6G6ciodWTCb9aq3E2XLmnvmLl+MiotFRhLRjDave5WARl7fuCVNVKhLuMF0yFMr12FKy/QK8NBwcNi7tvYGYn2CPViWH7hFTJw217lzQW5rk9UJSLiLgAk1tcmSMyJT7xDs8ekd6dGzTSTE/lNArVJ8xEQMcCOgYZjq552QzyNZX7pU/hnBx9i1yZFWG5oaqGJ2yEFwozQRfIfhj3DPP5wYJjnUlP3YBY+SZXjZTZ+IraYL2f8/ root@2676b961-51fe-11eb-b6a5-7e8b7adfd54c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCnC/L0BfXENuwVBDm0x8KdAEsU4TSluXb5E3kwfJwgJxihVPNZNBw59nPaId+ncnpuSoxx4fYtyE8mJpIUwJJFThkEWpRpuyg0r8suJ4IBbGJuRcyagJx0lgewVIDVDjFJPnUaVn+SQ54S1KZ9pISMyWidfObfyqyoVZrpX0K1cOg94DcwJfyiQx73rfmaa0sMvl99qZGBSrHWM5VB7tZpU4T8kXkc46HtEfe6NvKe8foN4Q5lDroE04RFDzVbUl9KQ+DqThprA7WHGhDSGHUGnFp+lB790HPvTri0W70msuySJYGXjEYiVRJ+FW3fbe7piMhKTlj6Z8xlxIT6wQYr root@dae36b07-5346-11eb-b6a5-7e8b7adfd54c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC/F9z7FAC+7fo6iwv2uXuF3WbWbRb3b++hN7Xq9ypOAjzx7Rsz2EZdYUBeiDJPr65tBW2gC5iq7EGF/lz9TpmE3D1UZZ/X03n4Z1o4i86/buZLfuZHECaBYrem5CfG1byIN0O+tM8swHWClBfc7KwzpV5+0g6QbyHc51MCLT2JltqsGHQqKcyIWgCMDuhSBKc0VVaRcpVgtiE3AGiGki7MeUnVomGOmo/rlFRrZlSXX8309cS9aILGfxVldXVd58vlPqKTPclUSujCljGTNmPkolEbTnRoH5Ho6wTnFksdKUST9Q8jRJVO/OdpDYqPfmNFea/UYHoZ4uDwMibmb/ZP root@6fce2fe4-7ebb-11eb-b28d-fa3b92b2ac7d\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDYLYufYkIh/3Tz4JUfe9awZAd7dqoZRb1/7Mm7UnniPKBdEBwjjQQCXR2c94/Gyss2orSSsx+qMSknWY5JX82jwvIe3Tsldr+1tZOiEPiwGEaSlOfso25TdaFYd1mQOIBw4cEEHt2md9Y4FGzaXLUWc1zBmwd5xBn89WqIwULke+NDL+xmiwpf7rU87BfWkW+zB/fNBVF0jvKfrIfY414KexQcOHy7hF3VWCkmA39ZYXPa6xYPcalA0E0syU/Hr49nFR9gcFEhYavSG6YMyyKRmP5zipMjKGwLezo9hZtT1coUYPLNXivZz+HCnIH4VJSCYXMkFDvcm5Mo2rud3+GH root@6534fb18-897d-11eb-8155-227e2855667f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDS6/JR76AY6nyB6OFSabwsjXLfaNGj98ZDGTXnVPRJUMbfKD0dN3KIRH2wNmHmaNIOgbkAjvTQ4vQCEw5qCVKvj9nwSlElE0pScmCZm7E7Z3hyMggvgsGDEEwU8l6wjHG9C2xx+IAzsB96z4gCcnJ2wdzVU0lO10uMkQFlojw/mpDYnxao0bOr0DIUmXMhZej1izJ7vQP6U/Rh0+nzaiRkHnYNpJTugRQR3x/Nsp6U7e65/InXv92Q5nr8M+GSEfgHIBkNq9HCSIAKnGxWInDZJxCeV1rjUR3P78Zf4LZkmqNpZxes3tEbPnACWKNG9kPV/TiRxQvQ03HD8SovG3C9 root@a20163af-8a49-11eb-8155-227e2855667f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqOz1kHlsfzeRHCW6ehFtRQDhEdMPnEt8GQWBxZYEKv6VzrSngl8HlRMnL6elmwik+veKlmPp8o2ynIhSdgu/7YeYZNDo3CBmuikma7SXmp0Sdv6hRWZPmBH4g8FIYJ7tHOn9c3y4JG95UGJWOZ8MJBSeiuXVe0DZKlrHCK7fRqQiz4VwBqJ3bdHcGqpFZSr3vUbSiakiYjOpecT9+0j4EXdG8/Fe7jOV17dtf5Pb3qKIiKqvf0S09SQhL+q0e9TPyESnQtJMSagiYrGWQtlJ9T4alE6Tu4lnI+kzoYtmDpHlC+6AJg9Csx54b5f5N9/zIGN9QB4NtxvaDOAn+CC1Z root@88ca2b7f-8a93-11eb-8155-227e2855667f\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDcBFEtCSi8NYhV2LNkEUXLJBz/7Jch+R1dIGIn51BWM/QM8j9rL6PsNezTlgtYjGKG2znZSPaxHVpdM3gjKgtm55w0IKnk56mllN7eAPC4JSM0zyYaPGi1edG11UweHPnF65LTvHYB22+BuhpC5rwFVtJnf7ozP6U40RW+zSgTWd/GO7WLjvtTMAkX25TWY5jdu1FrP5UFHmah10kLLgPuACoNLBdau200/DCLOPHQR73i0KfIxvq5Z+k2EwzHnzcMspIV9eUdq02TT6HZ+HrXQYmh4JUgjhD+wkpbPR4YEqmUjhR1by95Q2gR9sLQzE3+XHjyAtMzhxGpjgnd+T5D root@fabd7601-9214-11eb-8bc0-d2e3f345847f\nkubetest2:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" } ], "kind": "compute#metadata" diff --git a/audit/projects/k8s-infra-e2e-boskos-038/iam.json b/audit/projects/k8s-infra-e2e-boskos-038/iam.json index 7b2d71af6da..149069aa2dd 100644 --- a/audit/projects/k8s-infra-e2e-boskos-038/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-038/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-039/iam.json b/audit/projects/k8s-infra-e2e-boskos-039/iam.json index 2f8f9564b1a..b79b9fbd88d 100644 --- a/audit/projects/k8s-infra-e2e-boskos-039/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-039/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-040/iam.json b/audit/projects/k8s-infra-e2e-boskos-040/iam.json index dd3fee3724e..68e8741564c 100644 --- a/audit/projects/k8s-infra-e2e-boskos-040/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-040/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-041/iam.json b/audit/projects/k8s-infra-e2e-boskos-041/iam.json index 92ff0a667d1..4b21bdf7b3b 100644 --- a/audit/projects/k8s-infra-e2e-boskos-041/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-041/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-042/iam.json b/audit/projects/k8s-infra-e2e-boskos-042/iam.json index f2f1eab8604..aeb5da155c7 100644 --- a/audit/projects/k8s-infra-e2e-boskos-042/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-042/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-043/iam.json b/audit/projects/k8s-infra-e2e-boskos-043/iam.json index 275b6663aa1..e4525be9786 100644 --- a/audit/projects/k8s-infra-e2e-boskos-043/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-043/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-044/iam.json b/audit/projects/k8s-infra-e2e-boskos-044/iam.json index 73d07a312a3..31ccfc60743 100644 --- a/audit/projects/k8s-infra-e2e-boskos-044/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-044/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-045/iam.json b/audit/projects/k8s-infra-e2e-boskos-045/iam.json index 58872747598..e2d25fa682e 100644 --- a/audit/projects/k8s-infra-e2e-boskos-045/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-045/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-046/iam.json b/audit/projects/k8s-infra-e2e-boskos-046/iam.json index 1033114b7a3..b86f8222fab 100644 --- a/audit/projects/k8s-infra-e2e-boskos-046/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-046/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-047/iam.json b/audit/projects/k8s-infra-e2e-boskos-047/iam.json index 81130854d45..852b1d49f19 100644 --- a/audit/projects/k8s-infra-e2e-boskos-047/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-047/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-048/iam.json b/audit/projects/k8s-infra-e2e-boskos-048/iam.json index c90cb93e746..a7745233ea5 100644 --- a/audit/projects/k8s-infra-e2e-boskos-048/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-048/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-049/iam.json b/audit/projects/k8s-infra-e2e-boskos-049/iam.json index 300dad08dd7..a45ed1db0d5 100644 --- a/audit/projects/k8s-infra-e2e-boskos-049/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-049/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-050/iam.json b/audit/projects/k8s-infra-e2e-boskos-050/iam.json index f0d831e4346..c6cf4cce2d4 100644 --- a/audit/projects/k8s-infra-e2e-boskos-050/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-050/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-051/iam.json b/audit/projects/k8s-infra-e2e-boskos-051/iam.json index 38c783477d6..ecb2dba1288 100644 --- a/audit/projects/k8s-infra-e2e-boskos-051/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-051/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-052/iam.json b/audit/projects/k8s-infra-e2e-boskos-052/iam.json index 2d72b361a7c..55375e9a9ea 100644 --- a/audit/projects/k8s-infra-e2e-boskos-052/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-052/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-053/iam.json b/audit/projects/k8s-infra-e2e-boskos-053/iam.json index d76cb74514d..022311d6853 100644 --- a/audit/projects/k8s-infra-e2e-boskos-053/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-053/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-054/iam.json b/audit/projects/k8s-infra-e2e-boskos-054/iam.json index 4b6e565e70f..9816538a5b3 100644 --- a/audit/projects/k8s-infra-e2e-boskos-054/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-054/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-055/iam.json b/audit/projects/k8s-infra-e2e-boskos-055/iam.json index 5df4e334742..435bd80dc24 100644 --- a/audit/projects/k8s-infra-e2e-boskos-055/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-055/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-056/iam.json b/audit/projects/k8s-infra-e2e-boskos-056/iam.json index 24ecf5f3796..cfd77162972 100644 --- a/audit/projects/k8s-infra-e2e-boskos-056/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-056/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-057/iam.json b/audit/projects/k8s-infra-e2e-boskos-057/iam.json index b3ce7b9dc12..29d95d2c492 100644 --- a/audit/projects/k8s-infra-e2e-boskos-057/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-057/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-058/iam.json b/audit/projects/k8s-infra-e2e-boskos-058/iam.json index 7ec92d3f5b7..7bed24908c6 100644 --- a/audit/projects/k8s-infra-e2e-boskos-058/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-058/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-059/iam.json b/audit/projects/k8s-infra-e2e-boskos-059/iam.json index 347293e8121..c924cddc86e 100644 --- a/audit/projects/k8s-infra-e2e-boskos-059/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-059/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-060/iam.json b/audit/projects/k8s-infra-e2e-boskos-060/iam.json index d17cda77286..b4c49447202 100644 --- a/audit/projects/k8s-infra-e2e-boskos-060/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-060/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-061/iam.json b/audit/projects/k8s-infra-e2e-boskos-061/iam.json index 87727ebb453..46ca9a1b2b4 100644 --- a/audit/projects/k8s-infra-e2e-boskos-061/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-061/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-062/iam.json b/audit/projects/k8s-infra-e2e-boskos-062/iam.json index ec3f1b339b6..64736580374 100644 --- a/audit/projects/k8s-infra-e2e-boskos-062/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-062/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-063/iam.json b/audit/projects/k8s-infra-e2e-boskos-063/iam.json index 061745c869d..5619fade6ac 100644 --- a/audit/projects/k8s-infra-e2e-boskos-063/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-063/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-064/iam.json b/audit/projects/k8s-infra-e2e-boskos-064/iam.json index ee148f6e5b5..e64342ffb4d 100644 --- a/audit/projects/k8s-infra-e2e-boskos-064/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-064/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-065/iam.json b/audit/projects/k8s-infra-e2e-boskos-065/iam.json index b6b4711a5b4..fb766a34e60 100644 --- a/audit/projects/k8s-infra-e2e-boskos-065/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-065/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-066/iam.json b/audit/projects/k8s-infra-e2e-boskos-066/iam.json index 4b67cf1eaa6..db865a4e690 100644 --- a/audit/projects/k8s-infra-e2e-boskos-066/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-066/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-067/iam.json b/audit/projects/k8s-infra-e2e-boskos-067/iam.json index 52a8aea7958..f82abdda255 100644 --- a/audit/projects/k8s-infra-e2e-boskos-067/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-067/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-068/iam.json b/audit/projects/k8s-infra-e2e-boskos-068/iam.json index 7ec7858e150..9464e135aae 100644 --- a/audit/projects/k8s-infra-e2e-boskos-068/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-068/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-069/iam.json b/audit/projects/k8s-infra-e2e-boskos-069/iam.json index 4b00fe470a9..a7d53340ef3 100644 --- a/audit/projects/k8s-infra-e2e-boskos-069/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-069/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-070/iam.json b/audit/projects/k8s-infra-e2e-boskos-070/iam.json index a38f37ed84f..82b17edf50d 100644 --- a/audit/projects/k8s-infra-e2e-boskos-070/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-070/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-071/iam.json b/audit/projects/k8s-infra-e2e-boskos-071/iam.json index 573de17a96a..15a6d721147 100644 --- a/audit/projects/k8s-infra-e2e-boskos-071/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-071/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-072/iam.json b/audit/projects/k8s-infra-e2e-boskos-072/iam.json index cb361fc0856..0a0e2c03aa6 100644 --- a/audit/projects/k8s-infra-e2e-boskos-072/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-072/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-073/iam.json b/audit/projects/k8s-infra-e2e-boskos-073/iam.json index 842d991e0c6..6db099b715e 100644 --- a/audit/projects/k8s-infra-e2e-boskos-073/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-073/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-074/iam.json b/audit/projects/k8s-infra-e2e-boskos-074/iam.json index d72a6939eb4..cabc5bbd168 100644 --- a/audit/projects/k8s-infra-e2e-boskos-074/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-074/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-075/iam.json b/audit/projects/k8s-infra-e2e-boskos-075/iam.json index b80c7572220..ee59502a2ce 100644 --- a/audit/projects/k8s-infra-e2e-boskos-075/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-075/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-076/iam.json b/audit/projects/k8s-infra-e2e-boskos-076/iam.json index ca21d9cca40..15d7f8347a9 100644 --- a/audit/projects/k8s-infra-e2e-boskos-076/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-076/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-077/iam.json b/audit/projects/k8s-infra-e2e-boskos-077/iam.json index 02d8ecbb2b6..62d31a57b60 100644 --- a/audit/projects/k8s-infra-e2e-boskos-077/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-077/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-078/iam.json b/audit/projects/k8s-infra-e2e-boskos-078/iam.json index cf7893aec63..c0a3cd3884d 100644 --- a/audit/projects/k8s-infra-e2e-boskos-078/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-078/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-079/iam.json b/audit/projects/k8s-infra-e2e-boskos-079/iam.json index 1c2bc20edce..0f496c32e56 100644 --- a/audit/projects/k8s-infra-e2e-boskos-079/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-079/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-080/iam.json b/audit/projects/k8s-infra-e2e-boskos-080/iam.json index 637c5934959..5036ded9127 100644 --- a/audit/projects/k8s-infra-e2e-boskos-080/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-080/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-081/iam.json b/audit/projects/k8s-infra-e2e-boskos-081/iam.json index 2f5ecda0b2b..d8255c326da 100644 --- a/audit/projects/k8s-infra-e2e-boskos-081/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-081/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-082/iam.json b/audit/projects/k8s-infra-e2e-boskos-082/iam.json index 1e3217d0e32..672c4952b5b 100644 --- a/audit/projects/k8s-infra-e2e-boskos-082/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-082/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-083/iam.json b/audit/projects/k8s-infra-e2e-boskos-083/iam.json index b1d3adcff8a..e9406fb0ad5 100644 --- a/audit/projects/k8s-infra-e2e-boskos-083/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-083/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-084/iam.json b/audit/projects/k8s-infra-e2e-boskos-084/iam.json index 3d919288ed0..7811fb72c15 100644 --- a/audit/projects/k8s-infra-e2e-boskos-084/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-084/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-085/iam.json b/audit/projects/k8s-infra-e2e-boskos-085/iam.json index d918935a36e..7585c0a7891 100644 --- a/audit/projects/k8s-infra-e2e-boskos-085/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-085/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-086/iam.json b/audit/projects/k8s-infra-e2e-boskos-086/iam.json index 841bcc983ab..aef63f039f4 100644 --- a/audit/projects/k8s-infra-e2e-boskos-086/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-086/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-087/iam.json b/audit/projects/k8s-infra-e2e-boskos-087/iam.json index 200ed55c714..1e7bab2cb0a 100644 --- a/audit/projects/k8s-infra-e2e-boskos-087/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-087/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-088/iam.json b/audit/projects/k8s-infra-e2e-boskos-088/iam.json index 5e05c063090..f5f0a5fda18 100644 --- a/audit/projects/k8s-infra-e2e-boskos-088/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-088/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-089/iam.json b/audit/projects/k8s-infra-e2e-boskos-089/iam.json index 95cf43a64a5..d51838bd6a2 100644 --- a/audit/projects/k8s-infra-e2e-boskos-089/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-089/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-090/iam.json b/audit/projects/k8s-infra-e2e-boskos-090/iam.json index 41f9eb86a74..6f93a46d81a 100644 --- a/audit/projects/k8s-infra-e2e-boskos-090/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-090/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-091/iam.json b/audit/projects/k8s-infra-e2e-boskos-091/iam.json index 248bd0a7eac..2c119095066 100644 --- a/audit/projects/k8s-infra-e2e-boskos-091/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-091/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-092/iam.json b/audit/projects/k8s-infra-e2e-boskos-092/iam.json index 06d02bd3878..d6b7ba1283f 100644 --- a/audit/projects/k8s-infra-e2e-boskos-092/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-092/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-093/iam.json b/audit/projects/k8s-infra-e2e-boskos-093/iam.json index 00e085ceb3a..6a0f1a6b2f5 100644 --- a/audit/projects/k8s-infra-e2e-boskos-093/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-093/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-094/iam.json b/audit/projects/k8s-infra-e2e-boskos-094/iam.json index e3106e16b64..4cc93a4a0f1 100644 --- a/audit/projects/k8s-infra-e2e-boskos-094/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-094/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-095/iam.json b/audit/projects/k8s-infra-e2e-boskos-095/iam.json index 581928395b6..b9ccdb899be 100644 --- a/audit/projects/k8s-infra-e2e-boskos-095/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-095/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-096/iam.json b/audit/projects/k8s-infra-e2e-boskos-096/iam.json index 29bab499a48..797a22094c3 100644 --- a/audit/projects/k8s-infra-e2e-boskos-096/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-096/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-097/iam.json b/audit/projects/k8s-infra-e2e-boskos-097/iam.json index 14832104fdb..e96d86d0243 100644 --- a/audit/projects/k8s-infra-e2e-boskos-097/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-097/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-098/iam.json b/audit/projects/k8s-infra-e2e-boskos-098/iam.json index 895a7cf4013..179dae62a18 100644 --- a/audit/projects/k8s-infra-e2e-boskos-098/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-098/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-099/iam.json b/audit/projects/k8s-infra-e2e-boskos-099/iam.json index 1b784415bff..f7ee4c06928 100644 --- a/audit/projects/k8s-infra-e2e-boskos-099/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-099/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-100/iam.json b/audit/projects/k8s-infra-e2e-boskos-100/iam.json index 16611058755..7ecd972273b 100644 --- a/audit/projects/k8s-infra-e2e-boskos-100/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-100/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-101/iam.json b/audit/projects/k8s-infra-e2e-boskos-101/iam.json index 5935cf1d33f..c3b20281c28 100644 --- a/audit/projects/k8s-infra-e2e-boskos-101/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-101/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-102/iam.json b/audit/projects/k8s-infra-e2e-boskos-102/iam.json index 5cd3d1ccd5a..688e9035d5f 100644 --- a/audit/projects/k8s-infra-e2e-boskos-102/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-102/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-103/iam.json b/audit/projects/k8s-infra-e2e-boskos-103/iam.json index 784a37d9795..849015a05cf 100644 --- a/audit/projects/k8s-infra-e2e-boskos-103/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-103/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-103/services/compute/project-info.json b/audit/projects/k8s-infra-e2e-boskos-103/services/compute/project-info.json index 2814a3b89a4..f9f3c4ef2b5 100644 --- a/audit/projects/k8s-infra-e2e-boskos-103/services/compute/project-info.json +++ b/audit/projects/k8s-infra-e2e-boskos-103/services/compute/project-info.json @@ -3,7 +3,7 @@ "items": [ { "key": "ssh-keys", - "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDmWZMOWHz/IP2I58x0lZo6Vx48t6Eg3SEk8+1hAIPfx/tqR8LkFKZhNjNK2V2VHxTk/DYJG+ZuDd9r59tIulX/zlZrIADTtiXs714OoNgwLHwlaV9PFfNgFH4mtJLfPxILea84VNYWVFAHEOKTE9VprPIB80/QCoFPVvEwnU0AzmdK57IzWYCA8CK88JMcUvJtRvOC1S39NfOEkvY2JqB0GORzysxlhu7oHrcngu2KDAvWsufce3VzCFZ0vQdAXl/F0jaV59r3o/5S68lM7RWPCRpLodu4HS4JjNp89UtPmnDZZF+3XRCIL7VGdXvmyyJ1s9+E9cniBpTdIaO/CUH7 root@758363cf-e797-11ea-8112-a64f894a1815\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC8TXB9pOwJVMjUIkkOgwj+Vf/QyVV09KL7avlpFrabAue1UeVZFMw36e6hPe5tNbuBZUsRnu6WwuYPEEuv3E56mfFqKEnpIR6n9D+DR5NXpQUNOpKG8srAJpPjoeVXPkklJNn64vcud0xgKvAO5uMoGUIBWIAo41+JddT4Hzq1Ldq4ESmK8I9SmClnI3SChms4+u6crPq9WXhqaqtfInzFBLXa8LGnhXbNewz5curM84ks6lnE4a2JmP08ocPe0i+furvVkU43dMIeQBsyBjqzIitKkt3foTCqGBkEORiTmUOpK28Edsw9Le+/BqSnoK9Be5CCmOK1d7+HTC6JhyaP root@7ee79d0b-efd3-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDIt1q0ztkTXiwLQhomDuM73r/D+bLO7mkLMDjOeZfCJfDloCce73Oq/Poh5kGAC9wL0FFZdedO4T50jQ8niR+bofiHqnEZArT0Bib5m1nDKrO0whvsOOt06wcxte3SZ8rb6Ksg2hjgFTqrChC8E68V1XzZ8rnVFFSoSkps78chdKDPyPoq6HEZ0x0MhEHDFExvOG1IV2fXAsF5QVe6+k7bcXmuqZyD159Y1TkAuyFbaYtNjd4aCgLeWPD11Hv5JlDJYDj6Y6xSeyraAX9HoDU16yCl+oQJvA4sImPg2NGcNvucym3x7rwzv/IvlVoxNTV2V2nyl5dtljYH0LaRAF0Z root@a5755062-f43b-11ea-a379-bea988342348\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCtW7AFxx6w81o8WA2QgG244lM9SVRoJ17uwVIocV6MwFxQgNsQECWvL2HiHJghByNRzIzzUsiaJ5YbCscWbcG0hPJPLyT1ZI4dEY3x6Ph+OHhH4z/0whLAb5bVmfTywFdq5Px3dbJDaN71uRxRtDuEqm0o7DKUajVIECCP/XG7qblkdrBHiDytvARBplO3rJBZ2TOl3zGg6R8py3qXiy8Y3ys2hdRdh9frIZWhKSeCvwFyWSmEoVwY4pgJ3olmK7rKEMRoktLijyPncihLTa4pRtdKSP45c7zwDCMQmV4QmZB3TzPD7ilEa5rhRaPUeesjDmcDj+f+yYz8qbdULp35 root@425dc066-fc5e-11ea-8986-ae48fe2da37c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQD0E//pDrt7HDd02ONwTFjzN4WgVHNBk8k4yltH+kNsupFtowan7r+2IbxwN8OxGxI8f9Ifes3pIXyNUea1NMY4aNpzn64Q84TuozYqq0wYufK6ctRaEsBamyH4B2oYqSWZnClWaH8itbGtefN2lAMmZkXnbXshMSq+NJawPvjRK3AfjgQwSmrRjFE5pCE9yIVKNMCTz3FLn/FnZ0PWsp2xtKC717f5dZvm8ASbgnneNHEoYa+kTBLhiRyq7lufNAFqeVsuHwpl3v4fOCdMakIkLqcNOglUmG3LEbM/oDkoiSNUwQeL/IBdhNdCJZf1Lwiwd/N31MgExnxr8JbfYbj3 root@13c37c28-0fec-11eb-9a43-0aa5164aad51\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDcanUKE4i+ACnK4jLTXnxQ/gKE5UK0pYh6/go15Mw56qlSs/f+HpHUtZrXdioe7FJ522/z8wa8k7zO7ovz44hCvmsqPieBJZD3BimhCpWXWeMwUX/e7unNJPFslA4dYOiUYmcw2U0ydxdS+8hj8sdAVO6dytM3ZTCrvwCw1Z5Av/URBL2PXD5/7u+/CC54Nc2jEsiE7hXUD5pzIrhaa55AeMulvCGFJuMhK6ZASDDa8Um3zrVebqm0z57rXbDRH84wdHKHKwb9p8Bt4QwoEj1A8pYD+L/V1k3EeJPoQhE4iCsVIkVVGXsrLmsRykRtkvpYrlAN08pRjvmDH4FJCIyd root@d0e88663-13ac-11eb-a3c5-629ea79d0103\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCiHNn233Vfjc/P8YXS+hVpAZuElTn9xuxqeUAk5uEVJjg2KHlFezhOIGCoLIpT0oLAy6Xgjmqw6TRKTxL3yeTuJAJY0Ugt42jvY1RqDfFuQNmNn6F+q4KS6FUED6KRPkqcQdQJ2949JRkgvlqkc8slaZe9nc0emFACMHKl3gtlIsnoyn++yiPxqbkbOUEXNJYu3V9EA57TjTlLCB4sekLVYTbAMazjyZOGF2A7LjJdYjRCG1Ya4JIaF+OGVik3IuuOSvjRZXhrzhzwJwtzqsTC5JekLDMyshoxQoXotGIcSx0ooG4cnZ2bS2k2TX7hyiYS2tarQny6TPfu13ixu17J root@97572f1a-176d-11eb-b256-6ee25ea2e440\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC2GYJmo1F6Hb31V4vNTO81MdrG/p5lZT4/uUA1BRRgUQ1RYxu7Z7ypaEbI3CaDQ7UkLELLtVSaKv1iB0Up6gCiNvZjsBJr6tZglVUoet2NS9YSzbAE7fullGWO9drJkDHC0N+sSiazTuB6+IOXeNSCyG24z0R7LIVEYBuPVr3wmtXsHGDY1t82yv1iM3bqFl28O7E1MPGPIT+BJYMq/rKHx0fgapMNqAgtr2D0dQ1iB4HxCDSb0enaWf+2KHZm1e7NxPhe+cPFefWUu70rc+B9M+U2DqZhJSkGP6CfnfcIjf4lBGTLLA+WLDEW/pI8qbBTc0AzqRLdXBjZIZzGucDl root@0dc9836f-2da6-11eb-a59c-42dfb897bae6\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC2f1WhYHliBXscugTm5zRMz35YOy8B1Nb0IkIQgj2y18Ghm3yspIITMxuuc6BSDsrDt0i5M4C2A0U5vKm+ATnvZXa8T/pWIsaBjO9VvvruFyfruDaP/cS39RC53FtFb5TG97f9N5ZTVt+2SRHd0AkOYghE++ETYd3UhKnGssrPo89RUq1xlZZpYruTxgFy2Web4002udi2UWkV2HRkPo2/tiQryXNwdoMo7goKKEQqYkY1fQ8dM1tEFEvMYyLbrTuXSVqNGZsveXW+GALRsdBg9hE6BDP3e9Cjq8gYmnkc+o5nAFt3BKyBFDaWAC4vanAnmSNk96nmCvDxZuLc4a7n root@6667cf1b-3dd8-11eb-a772-a610f2f25584\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDAvENKUhxDIdJJhVxn5ND8iWOJxYAnZh2YZ6780/E8dX8V64eUMmlkXp4ok9/8pTML7zANtx2dDnOAzGnS7jPYfpuEr6Zun64Dwg+2faSjwqpNCU1gB2Ocg3z+LWBOOrTjU6RYElCVSBG1lT/paPtZqcYORS8AsoSzNkmc0DgE5dMb5R3l0TeW7wswBLO5ydCDMoUhyXW/49y6g2/1+uK8T7HwVnawROSpBqSHtbDFEnn6zC0nrI1Dj9uc6VZic3ZpmOHlgJqAsk+PgdHIGBoxWYFt5XjfTMO/PSQ4UFdZvCqctNf1Cnd47SOE51hHohQ914evDDpYwJb+7VX2nG4r root@8b2b788b-3e3d-11eb-a772-a610f2f25584\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC3sFw9NxjGNL+YknwSN8NwdQkN7J/wSCV8zGGUqv+WA8Yx+BKfgKrWha3AtQ9lrGfbDBTeljAk1H0PXqJRX7Nqk+UWurTQiATQjW3FYIn4aFnScPf+b6ALWqg7fScdQUFLlSjBRwIBpEhBho7TxIW+0XVUADTQs80bZlcKRvmaU5DjZOfntdiok6r6Gt+sb+tEajvQQHKsgCtLuEHcygyEgxOt6w1fD4ayXZY2FlpIY8IYpyV7F9UntMjwYxxKg9yzIb/XzvpHAjOBOQs5xLmwnYmq2795OKZR57n/sWC6XnszfWhdJla3pI0VO/1NWjku8Pflt0iT54BqMzMqbmmZ root@624c3ae5-69cb-11eb-b9bb-1a3a58844fd0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCzWb/BrESNphrmyQbBGJ8tHawgaYPeaXIEdDJ1J3Tllwp2ZjY39nUYDLSxlZduYVfGD3PR9D0jxA08yII2ikrNlljg5e7a8x2iILQOQxigaV5uPqtjImwwvMVS0pNbnFUacp9N+TTLMba8LJQjS6Rh85cJosjeIf3AdX22VYkc0zvOwp8+FZA1LYE7dh4mEYLN4xJL7qOqoDPriM+8biVIprQUCvULn29JPvwMQ/LYewV5uXQd/qw7A8UeRfrbbJx2mjhR5t+pKL8aLaoBzBCEaCKRngVzqaTRrdvLj5QNakfwo3Dt1bpADkIk7Js6t8ptnkgnZdPWpz3APhs6H8Xt root@489ad4a6-797f-11eb-a603-2218f636630c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDU78xy36+oajQ8ol6Da6K5fQ2tE743z1UI+BKSMiVC9NrUJ3BremxCDaVZc88cgQn6aStnVkvgEHPB7dHwIro34dxWZfLBHGr5lJLLjdYxzhqHso0tTQevr5nnaEfL9rR7ExwYGx+p7z4V//mPeuX6k3aquEEJHlMAGed7SCKB2W8xzgQV23t5tzFbFz6zJMCU8+Q6ojHYBqH4FbC9x/UIf30tMg/6k8a0EVNbu9eWUNqa/PzRU8PkwUI3bj1wL6L3X0YXfM8Kf+ZI0ydDErJG7su2gMqv/3WzYHD9gTOCeYy+YuPHWngXL35IPSwOjoIrixohESqNzaKlfXfgPZ+T root@2b6b00b3-8da5-11eb-adda-5eb174036857" + "value": "prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nprow:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDmWZMOWHz/IP2I58x0lZo6Vx48t6Eg3SEk8+1hAIPfx/tqR8LkFKZhNjNK2V2VHxTk/DYJG+ZuDd9r59tIulX/zlZrIADTtiXs714OoNgwLHwlaV9PFfNgFH4mtJLfPxILea84VNYWVFAHEOKTE9VprPIB80/QCoFPVvEwnU0AzmdK57IzWYCA8CK88JMcUvJtRvOC1S39NfOEkvY2JqB0GORzysxlhu7oHrcngu2KDAvWsufce3VzCFZ0vQdAXl/F0jaV59r3o/5S68lM7RWPCRpLodu4HS4JjNp89UtPmnDZZF+3XRCIL7VGdXvmyyJ1s9+E9cniBpTdIaO/CUH7 root@758363cf-e797-11ea-8112-a64f894a1815\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC8TXB9pOwJVMjUIkkOgwj+Vf/QyVV09KL7avlpFrabAue1UeVZFMw36e6hPe5tNbuBZUsRnu6WwuYPEEuv3E56mfFqKEnpIR6n9D+DR5NXpQUNOpKG8srAJpPjoeVXPkklJNn64vcud0xgKvAO5uMoGUIBWIAo41+JddT4Hzq1Ldq4ESmK8I9SmClnI3SChms4+u6crPq9WXhqaqtfInzFBLXa8LGnhXbNewz5curM84ks6lnE4a2JmP08ocPe0i+furvVkU43dMIeQBsyBjqzIitKkt3foTCqGBkEORiTmUOpK28Edsw9Le+/BqSnoK9Be5CCmOK1d7+HTC6JhyaP root@7ee79d0b-efd3-11ea-81dc-96f5b1c9140a\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDIt1q0ztkTXiwLQhomDuM73r/D+bLO7mkLMDjOeZfCJfDloCce73Oq/Poh5kGAC9wL0FFZdedO4T50jQ8niR+bofiHqnEZArT0Bib5m1nDKrO0whvsOOt06wcxte3SZ8rb6Ksg2hjgFTqrChC8E68V1XzZ8rnVFFSoSkps78chdKDPyPoq6HEZ0x0MhEHDFExvOG1IV2fXAsF5QVe6+k7bcXmuqZyD159Y1TkAuyFbaYtNjd4aCgLeWPD11Hv5JlDJYDj6Y6xSeyraAX9HoDU16yCl+oQJvA4sImPg2NGcNvucym3x7rwzv/IvlVoxNTV2V2nyl5dtljYH0LaRAF0Z root@a5755062-f43b-11ea-a379-bea988342348\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCtW7AFxx6w81o8WA2QgG244lM9SVRoJ17uwVIocV6MwFxQgNsQECWvL2HiHJghByNRzIzzUsiaJ5YbCscWbcG0hPJPLyT1ZI4dEY3x6Ph+OHhH4z/0whLAb5bVmfTywFdq5Px3dbJDaN71uRxRtDuEqm0o7DKUajVIECCP/XG7qblkdrBHiDytvARBplO3rJBZ2TOl3zGg6R8py3qXiy8Y3ys2hdRdh9frIZWhKSeCvwFyWSmEoVwY4pgJ3olmK7rKEMRoktLijyPncihLTa4pRtdKSP45c7zwDCMQmV4QmZB3TzPD7ilEa5rhRaPUeesjDmcDj+f+yYz8qbdULp35 root@425dc066-fc5e-11ea-8986-ae48fe2da37c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQD0E//pDrt7HDd02ONwTFjzN4WgVHNBk8k4yltH+kNsupFtowan7r+2IbxwN8OxGxI8f9Ifes3pIXyNUea1NMY4aNpzn64Q84TuozYqq0wYufK6ctRaEsBamyH4B2oYqSWZnClWaH8itbGtefN2lAMmZkXnbXshMSq+NJawPvjRK3AfjgQwSmrRjFE5pCE9yIVKNMCTz3FLn/FnZ0PWsp2xtKC717f5dZvm8ASbgnneNHEoYa+kTBLhiRyq7lufNAFqeVsuHwpl3v4fOCdMakIkLqcNOglUmG3LEbM/oDkoiSNUwQeL/IBdhNdCJZf1Lwiwd/N31MgExnxr8JbfYbj3 root@13c37c28-0fec-11eb-9a43-0aa5164aad51\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDcanUKE4i+ACnK4jLTXnxQ/gKE5UK0pYh6/go15Mw56qlSs/f+HpHUtZrXdioe7FJ522/z8wa8k7zO7ovz44hCvmsqPieBJZD3BimhCpWXWeMwUX/e7unNJPFslA4dYOiUYmcw2U0ydxdS+8hj8sdAVO6dytM3ZTCrvwCw1Z5Av/URBL2PXD5/7u+/CC54Nc2jEsiE7hXUD5pzIrhaa55AeMulvCGFJuMhK6ZASDDa8Um3zrVebqm0z57rXbDRH84wdHKHKwb9p8Bt4QwoEj1A8pYD+L/V1k3EeJPoQhE4iCsVIkVVGXsrLmsRykRtkvpYrlAN08pRjvmDH4FJCIyd root@d0e88663-13ac-11eb-a3c5-629ea79d0103\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCiHNn233Vfjc/P8YXS+hVpAZuElTn9xuxqeUAk5uEVJjg2KHlFezhOIGCoLIpT0oLAy6Xgjmqw6TRKTxL3yeTuJAJY0Ugt42jvY1RqDfFuQNmNn6F+q4KS6FUED6KRPkqcQdQJ2949JRkgvlqkc8slaZe9nc0emFACMHKl3gtlIsnoyn++yiPxqbkbOUEXNJYu3V9EA57TjTlLCB4sekLVYTbAMazjyZOGF2A7LjJdYjRCG1Ya4JIaF+OGVik3IuuOSvjRZXhrzhzwJwtzqsTC5JekLDMyshoxQoXotGIcSx0ooG4cnZ2bS2k2TX7hyiYS2tarQny6TPfu13ixu17J root@97572f1a-176d-11eb-b256-6ee25ea2e440\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC2GYJmo1F6Hb31V4vNTO81MdrG/p5lZT4/uUA1BRRgUQ1RYxu7Z7ypaEbI3CaDQ7UkLELLtVSaKv1iB0Up6gCiNvZjsBJr6tZglVUoet2NS9YSzbAE7fullGWO9drJkDHC0N+sSiazTuB6+IOXeNSCyG24z0R7LIVEYBuPVr3wmtXsHGDY1t82yv1iM3bqFl28O7E1MPGPIT+BJYMq/rKHx0fgapMNqAgtr2D0dQ1iB4HxCDSb0enaWf+2KHZm1e7NxPhe+cPFefWUu70rc+B9M+U2DqZhJSkGP6CfnfcIjf4lBGTLLA+WLDEW/pI8qbBTc0AzqRLdXBjZIZzGucDl root@0dc9836f-2da6-11eb-a59c-42dfb897bae6\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC2f1WhYHliBXscugTm5zRMz35YOy8B1Nb0IkIQgj2y18Ghm3yspIITMxuuc6BSDsrDt0i5M4C2A0U5vKm+ATnvZXa8T/pWIsaBjO9VvvruFyfruDaP/cS39RC53FtFb5TG97f9N5ZTVt+2SRHd0AkOYghE++ETYd3UhKnGssrPo89RUq1xlZZpYruTxgFy2Web4002udi2UWkV2HRkPo2/tiQryXNwdoMo7goKKEQqYkY1fQ8dM1tEFEvMYyLbrTuXSVqNGZsveXW+GALRsdBg9hE6BDP3e9Cjq8gYmnkc+o5nAFt3BKyBFDaWAC4vanAnmSNk96nmCvDxZuLc4a7n root@6667cf1b-3dd8-11eb-a772-a610f2f25584\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDAvENKUhxDIdJJhVxn5ND8iWOJxYAnZh2YZ6780/E8dX8V64eUMmlkXp4ok9/8pTML7zANtx2dDnOAzGnS7jPYfpuEr6Zun64Dwg+2faSjwqpNCU1gB2Ocg3z+LWBOOrTjU6RYElCVSBG1lT/paPtZqcYORS8AsoSzNkmc0DgE5dMb5R3l0TeW7wswBLO5ydCDMoUhyXW/49y6g2/1+uK8T7HwVnawROSpBqSHtbDFEnn6zC0nrI1Dj9uc6VZic3ZpmOHlgJqAsk+PgdHIGBoxWYFt5XjfTMO/PSQ4UFdZvCqctNf1Cnd47SOE51hHohQ914evDDpYwJb+7VX2nG4r root@8b2b788b-3e3d-11eb-a772-a610f2f25584\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC3sFw9NxjGNL+YknwSN8NwdQkN7J/wSCV8zGGUqv+WA8Yx+BKfgKrWha3AtQ9lrGfbDBTeljAk1H0PXqJRX7Nqk+UWurTQiATQjW3FYIn4aFnScPf+b6ALWqg7fScdQUFLlSjBRwIBpEhBho7TxIW+0XVUADTQs80bZlcKRvmaU5DjZOfntdiok6r6Gt+sb+tEajvQQHKsgCtLuEHcygyEgxOt6w1fD4ayXZY2FlpIY8IYpyV7F9UntMjwYxxKg9yzIb/XzvpHAjOBOQs5xLmwnYmq2795OKZR57n/sWC6XnszfWhdJla3pI0VO/1NWjku8Pflt0iT54BqMzMqbmmZ root@624c3ae5-69cb-11eb-b9bb-1a3a58844fd0\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCzWb/BrESNphrmyQbBGJ8tHawgaYPeaXIEdDJ1J3Tllwp2ZjY39nUYDLSxlZduYVfGD3PR9D0jxA08yII2ikrNlljg5e7a8x2iILQOQxigaV5uPqtjImwwvMVS0pNbnFUacp9N+TTLMba8LJQjS6Rh85cJosjeIf3AdX22VYkc0zvOwp8+FZA1LYE7dh4mEYLN4xJL7qOqoDPriM+8biVIprQUCvULn29JPvwMQ/LYewV5uXQd/qw7A8UeRfrbbJx2mjhR5t+pKL8aLaoBzBCEaCKRngVzqaTRrdvLj5QNakfwo3Dt1bpADkIk7Js6t8ptnkgnZdPWpz3APhs6H8Xt root@489ad4a6-797f-11eb-a603-2218f636630c\nkubetest2:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDU78xy36+oajQ8ol6Da6K5fQ2tE743z1UI+BKSMiVC9NrUJ3BremxCDaVZc88cgQn6aStnVkvgEHPB7dHwIro34dxWZfLBHGr5lJLLjdYxzhqHso0tTQevr5nnaEfL9rR7ExwYGx+p7z4V//mPeuX6k3aquEEJHlMAGed7SCKB2W8xzgQV23t5tzFbFz6zJMCU8+Q6ojHYBqH4FbC9x/UIf30tMg/6k8a0EVNbu9eWUNqa/PzRU8PkwUI3bj1wL6L3X0YXfM8Kf+ZI0ydDErJG7su2gMqv/3WzYHD9gTOCeYy+YuPHWngXL35IPSwOjoIrixohESqNzaKlfXfgPZ+T root@2b6b00b3-8da5-11eb-adda-5eb174036857\nkubetest2:prow:ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmYxHh/wwcV0P1aChuFLpl28w6DFyc7G5Xrw1F8wH1Re9AdxyemM2bTZ/PhsP3u9VDnNbyOw3UN00VFdumkFLjLf1WQ7Q6rZDlPjlw7urBIvAMqUecY6ae1znqsZ0dMBxOuPXHznlnjLjM5b7O7q5WsQMCA9Szbmz6DsuSyCuX0It2osBTN+8P/Fa6BNh3W8AF60M7L8/aUzLfbXVS2LIQKAHHD8CWqvXhLPuTJ03iSwFvgtAK1/J2XJwUP+OzAFrxj6A9LW5ZZgk3R3kRKr0xT/L7hga41rB1qy8Uz+Xr/PTVMNGW+nmU4bPgFchCK0JBK7B12ZcdVVFUEdpaAiKZ prow" } ], "kind": "compute#metadata" diff --git a/audit/projects/k8s-infra-e2e-boskos-104/iam.json b/audit/projects/k8s-infra-e2e-boskos-104/iam.json index 07be7cae68a..c7ede12ec8f 100644 --- a/audit/projects/k8s-infra-e2e-boskos-104/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-104/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-105/iam.json b/audit/projects/k8s-infra-e2e-boskos-105/iam.json index 0a3b1d2e41c..3dfc92aef81 100644 --- a/audit/projects/k8s-infra-e2e-boskos-105/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-105/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-106/iam.json b/audit/projects/k8s-infra-e2e-boskos-106/iam.json index 8364b938ae1..9e97b69a2f0 100644 --- a/audit/projects/k8s-infra-e2e-boskos-106/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-106/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-107/iam.json b/audit/projects/k8s-infra-e2e-boskos-107/iam.json index 15ba27032c6..05b6e921b1d 100644 --- a/audit/projects/k8s-infra-e2e-boskos-107/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-107/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-108/iam.json b/audit/projects/k8s-infra-e2e-boskos-108/iam.json index a414ba41969..9276fcdaf57 100644 --- a/audit/projects/k8s-infra-e2e-boskos-108/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-108/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-109/iam.json b/audit/projects/k8s-infra-e2e-boskos-109/iam.json index 77bf7b0c869..5c41a7db934 100644 --- a/audit/projects/k8s-infra-e2e-boskos-109/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-109/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-110/iam.json b/audit/projects/k8s-infra-e2e-boskos-110/iam.json index 89a23a8f4c8..eb0877f311c 100644 --- a/audit/projects/k8s-infra-e2e-boskos-110/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-110/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-111/iam.json b/audit/projects/k8s-infra-e2e-boskos-111/iam.json index 4291c82a1a5..f9014008e8c 100644 --- a/audit/projects/k8s-infra-e2e-boskos-111/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-111/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-112/iam.json b/audit/projects/k8s-infra-e2e-boskos-112/iam.json index 657247922c2..de24681bf7a 100644 --- a/audit/projects/k8s-infra-e2e-boskos-112/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-112/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-113/iam.json b/audit/projects/k8s-infra-e2e-boskos-113/iam.json index 5d642105fcb..e4a92be9fbf 100644 --- a/audit/projects/k8s-infra-e2e-boskos-113/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-113/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-114/iam.json b/audit/projects/k8s-infra-e2e-boskos-114/iam.json index 948f27567ab..1c090ebc477 100644 --- a/audit/projects/k8s-infra-e2e-boskos-114/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-114/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-115/iam.json b/audit/projects/k8s-infra-e2e-boskos-115/iam.json index 867ee7d074c..768ddc4e6af 100644 --- a/audit/projects/k8s-infra-e2e-boskos-115/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-115/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-116/iam.json b/audit/projects/k8s-infra-e2e-boskos-116/iam.json index 4c8d6365919..f0586c51388 100644 --- a/audit/projects/k8s-infra-e2e-boskos-116/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-116/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-117/iam.json b/audit/projects/k8s-infra-e2e-boskos-117/iam.json index 0591e044773..2abb2101cad 100644 --- a/audit/projects/k8s-infra-e2e-boskos-117/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-117/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-118/iam.json b/audit/projects/k8s-infra-e2e-boskos-118/iam.json index 6532e55304e..c76acf15a70 100644 --- a/audit/projects/k8s-infra-e2e-boskos-118/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-118/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-119/iam.json b/audit/projects/k8s-infra-e2e-boskos-119/iam.json index a4f6aa860f3..80fbe81d1b7 100644 --- a/audit/projects/k8s-infra-e2e-boskos-119/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-119/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-120/iam.json b/audit/projects/k8s-infra-e2e-boskos-120/iam.json index 92b6fa0c623..a7df4d36a01 100644 --- a/audit/projects/k8s-infra-e2e-boskos-120/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-120/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-01/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-01/iam.json index 7bea6c44694..7e35734e2e6 100644 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-01/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-01/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-02/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-02/iam.json index d81cb198397..4286bacc9cf 100644 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-02/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-02/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-03/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-03/iam.json index d467f8c5928..4574cbc3b11 100644 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-03/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-03/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-04/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-04/iam.json index 353a8448bf7..291d1c23847 100644 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-04/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-04/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-05/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-05/iam.json index 8734fb22fac..9595b7208d3 100644 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-05/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-05/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-06/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-06/iam.json index 0cca53764ce..0cc71c402e0 100644 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-06/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-06/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-07/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-07/iam.json index 2552c356d95..8eb65e0f6ee 100644 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-07/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-07/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-08/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-08/iam.json index ba6d46aca86..809297e6e66 100644 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-08/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-08/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-09/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-09/iam.json index cb7cbba9d9e..711b3214e91 100644 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-09/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-09/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-gpu-10/iam.json b/audit/projects/k8s-infra-e2e-boskos-gpu-10/iam.json index 4d72ed505c2..05faf50d6ae 100644 --- a/audit/projects/k8s-infra-e2e-boskos-gpu-10/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-gpu-10/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-02/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-02/iam.json index 9b6f0c3a407..dbfc6e0df9d 100644 --- a/audit/projects/k8s-infra-e2e-boskos-scale-02/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-scale-02/iam.json @@ -30,8 +30,7 @@ { "members": [ "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-sig-scalability-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-03/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-03/iam.json index 470801d86b3..a93332816c8 100644 --- a/audit/projects/k8s-infra-e2e-boskos-scale-03/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-scale-03/iam.json @@ -30,8 +30,7 @@ { "members": [ "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-sig-scalability-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-04/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-04/iam.json index 4ad8b5889b4..c403ea5fa77 100644 --- a/audit/projects/k8s-infra-e2e-boskos-scale-04/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-scale-04/iam.json @@ -30,8 +30,7 @@ { "members": [ "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-sig-scalability-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-05/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-05/iam.json index 55151d102c6..3f9267e5dcb 100644 --- a/audit/projects/k8s-infra-e2e-boskos-scale-05/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-scale-05/iam.json @@ -30,8 +30,7 @@ { "members": [ "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-sig-scalability-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-06/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-06/iam.json index 5a359ede73e..ec90b59c0bb 100644 --- a/audit/projects/k8s-infra-e2e-boskos-scale-06/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-scale-06/iam.json @@ -30,8 +30,7 @@ { "members": [ "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-sig-scalability-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-07/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-07/iam.json index 1347b6c35e7..27e50d285d2 100644 --- a/audit/projects/k8s-infra-e2e-boskos-scale-07/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-scale-07/iam.json @@ -30,8 +30,7 @@ { "members": [ "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-sig-scalability-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-08/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-08/iam.json index b50d14f25c5..d89885648a8 100644 --- a/audit/projects/k8s-infra-e2e-boskos-scale-08/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-scale-08/iam.json @@ -30,8 +30,7 @@ { "members": [ "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-sig-scalability-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-09/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-09/iam.json index 9f5c2e33b04..b683595a0d1 100644 --- a/audit/projects/k8s-infra-e2e-boskos-scale-09/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-scale-09/iam.json @@ -30,8 +30,7 @@ { "members": [ "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-sig-scalability-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-10/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-10/iam.json index 10cc68d630f..0db1732479a 100644 --- a/audit/projects/k8s-infra-e2e-boskos-scale-10/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-scale-10/iam.json @@ -30,8 +30,7 @@ { "members": [ "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-sig-scalability-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-11/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-11/iam.json index 8227d51ce4c..13e4ebfdbdf 100644 --- a/audit/projects/k8s-infra-e2e-boskos-scale-11/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-scale-11/iam.json @@ -30,8 +30,7 @@ { "members": [ "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-sig-scalability-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-12/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-12/iam.json index b660d1aa4be..0009d473ee2 100644 --- a/audit/projects/k8s-infra-e2e-boskos-scale-12/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-scale-12/iam.json @@ -36,8 +36,7 @@ { "members": [ "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-sig-scalability-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-13/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-13/iam.json index 788d93d3061..b5dc5b995c8 100644 --- a/audit/projects/k8s-infra-e2e-boskos-scale-13/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-scale-13/iam.json @@ -30,8 +30,7 @@ { "members": [ "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-sig-scalability-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-14/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-14/iam.json index 0948aca054a..2dd1b4599c7 100644 --- a/audit/projects/k8s-infra-e2e-boskos-scale-14/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-scale-14/iam.json @@ -30,8 +30,7 @@ { "members": [ "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-sig-scalability-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-15/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-15/iam.json index a1959edf39e..4d0296ddf86 100644 --- a/audit/projects/k8s-infra-e2e-boskos-scale-15/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-scale-15/iam.json @@ -30,8 +30,7 @@ { "members": [ "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-sig-scalability-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-16/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-16/iam.json index 298ff329adc..e934fda5dd0 100644 --- a/audit/projects/k8s-infra-e2e-boskos-scale-16/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-scale-16/iam.json @@ -30,8 +30,7 @@ { "members": [ "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-sig-scalability-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-17/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-17/iam.json index 4c6904a0f61..7fd1371f5ba 100644 --- a/audit/projects/k8s-infra-e2e-boskos-scale-17/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-scale-17/iam.json @@ -30,8 +30,7 @@ { "members": [ "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-sig-scalability-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-18/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-18/iam.json index 7e4aa5280e0..dc62d2d5158 100644 --- a/audit/projects/k8s-infra-e2e-boskos-scale-18/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-scale-18/iam.json @@ -30,8 +30,7 @@ { "members": [ "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-sig-scalability-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-19/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-19/iam.json index b7953b3b346..14c368700a7 100644 --- a/audit/projects/k8s-infra-e2e-boskos-scale-19/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-scale-19/iam.json @@ -30,8 +30,7 @@ { "members": [ "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-sig-scalability-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-20/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-20/iam.json index 968124f261a..453698811d0 100644 --- a/audit/projects/k8s-infra-e2e-boskos-scale-20/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-scale-20/iam.json @@ -30,8 +30,7 @@ { "members": [ "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-sig-scalability-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-21/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-21/iam.json index 95e7f32f2db..a43a1cd4aeb 100644 --- a/audit/projects/k8s-infra-e2e-boskos-scale-21/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-scale-21/iam.json @@ -30,8 +30,7 @@ { "members": [ "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-sig-scalability-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-22/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-22/iam.json index bf4c33f04fd..a818ecc02da 100644 --- a/audit/projects/k8s-infra-e2e-boskos-scale-22/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-scale-22/iam.json @@ -30,8 +30,7 @@ { "members": [ "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-sig-scalability-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-23/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-23/iam.json index 9c4cf96e32e..a3803e22356 100644 --- a/audit/projects/k8s-infra-e2e-boskos-scale-23/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-scale-23/iam.json @@ -30,8 +30,7 @@ { "members": [ "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-sig-scalability-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-24/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-24/iam.json index ab8334092e9..db3ef9e19b3 100644 --- a/audit/projects/k8s-infra-e2e-boskos-scale-24/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-scale-24/iam.json @@ -30,8 +30,7 @@ { "members": [ "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-sig-scalability-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-25/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-25/iam.json index 2840087883c..2e3c9081a3e 100644 --- a/audit/projects/k8s-infra-e2e-boskos-scale-25/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-scale-25/iam.json @@ -30,8 +30,7 @@ { "members": [ "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-sig-scalability-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-26/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-26/iam.json index ad879c80131..70261820686 100644 --- a/audit/projects/k8s-infra-e2e-boskos-scale-26/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-scale-26/iam.json @@ -30,8 +30,7 @@ { "members": [ "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-sig-scalability-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-27/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-27/iam.json index c854960a436..8a495a59db7 100644 --- a/audit/projects/k8s-infra-e2e-boskos-scale-27/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-scale-27/iam.json @@ -30,8 +30,7 @@ { "members": [ "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-sig-scalability-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-28/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-28/iam.json index e4c21cf863d..0490db71949 100644 --- a/audit/projects/k8s-infra-e2e-boskos-scale-28/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-scale-28/iam.json @@ -30,8 +30,7 @@ { "members": [ "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-sig-scalability-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-29/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-29/iam.json index 2d09caa8096..18c1e7021a5 100644 --- a/audit/projects/k8s-infra-e2e-boskos-scale-29/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-scale-29/iam.json @@ -30,8 +30,7 @@ { "members": [ "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-sig-scalability-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-boskos-scale-30/iam.json b/audit/projects/k8s-infra-e2e-boskos-scale-30/iam.json index 32b534481a1..da844e090c9 100644 --- a/audit/projects/k8s-infra-e2e-boskos-scale-30/iam.json +++ b/audit/projects/k8s-infra-e2e-boskos-scale-30/iam.json @@ -30,8 +30,7 @@ { "members": [ "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-sig-scalability-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-gpu-project/iam.json b/audit/projects/k8s-infra-e2e-gpu-project/iam.json index cb5ffefaf9e..2cbdf9364c9 100644 --- a/audit/projects/k8s-infra-e2e-gpu-project/iam.json +++ b/audit/projects/k8s-infra-e2e-gpu-project/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-ingress-project/iam.json b/audit/projects/k8s-infra-e2e-ingress-project/iam.json index 27cc998ad22..5f175e87c3e 100644 --- a/audit/projects/k8s-infra-e2e-ingress-project/iam.json +++ b/audit/projects/k8s-infra-e2e-ingress-project/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-node-e2e-project/iam.json b/audit/projects/k8s-infra-e2e-node-e2e-project/iam.json index 612e479daf6..a3cb69caa8e 100644 --- a/audit/projects/k8s-infra-e2e-node-e2e-project/iam.json +++ b/audit/projects/k8s-infra-e2e-node-e2e-project/iam.json @@ -29,8 +29,7 @@ }, { "members": [ - "group:k8s-infra-prow-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-prow-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-infra-e2e-scale-project/iam.json b/audit/projects/k8s-infra-e2e-scale-project/iam.json index 7810d241a0f..8b91b4c2e99 100644 --- a/audit/projects/k8s-infra-e2e-scale-project/iam.json +++ b/audit/projects/k8s-infra-e2e-scale-project/iam.json @@ -31,8 +31,7 @@ { "members": [ "group:k8s-infra-prow-oncall@kubernetes.io", - "group:k8s-infra-sig-scalability-oncall@kubernetes.io", - "user:spiffxp@google.com" + "group:k8s-infra-sig-scalability-oncall@kubernetes.io" ], "role": "roles/owner" } diff --git a/audit/projects/k8s-release-test-prod/iam.json b/audit/projects/k8s-release-test-prod/iam.json index c735197e434..4408007639e 100644 --- a/audit/projects/k8s-release-test-prod/iam.json +++ b/audit/projects/k8s-release-test-prod/iam.json @@ -53,12 +53,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-release-admins@kubernetes.io", diff --git a/audit/projects/k8s-release-test-prod/services/enabled.txt b/audit/projects/k8s-release-test-prod/services/enabled.txt index f9b13078140..0d782aac9a4 100644 --- a/audit/projects/k8s-release-test-prod/services/enabled.txt +++ b/audit/projects/k8s-release-test-prod/services/enabled.txt @@ -7,5 +7,6 @@ containerregistry.googleapis.com Container Registry API logging.googleapis.com Cloud Logging API oslogin.googleapis.com Cloud OS Login API pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-release/iam.json b/audit/projects/k8s-release/iam.json index 32926c3ec53..f8cd5ab3d14 100644 --- a/audit/projects/k8s-release/iam.json +++ b/audit/projects/k8s-release/iam.json @@ -35,15 +35,21 @@ }, { "members": [ - "serviceAccount:service-304687256732@containerregistry.iam.gserviceaccount.com" + "serviceAccount:service-304687256732@container-analysis.iam.gserviceaccount.com" ], - "role": "roles/editor" + "role": "roles/containeranalysis.ServiceAgent" + }, + { + "members": [ + "serviceAccount:service-304687256732@gcp-sa-containerscanning.iam.gserviceaccount.com" + ], + "role": "roles/containerscanning.ServiceAgent" }, { "members": [ - "user:spiffxp@google.com" + "serviceAccount:service-304687256732@containerregistry.iam.gserviceaccount.com" ], - "role": "roles/owner" + "role": "roles/editor" }, { "members": [ diff --git a/audit/projects/k8s-release/services/enabled.txt b/audit/projects/k8s-release/services/enabled.txt index d0f1e5a23de..ab1ef15e4e2 100644 --- a/audit/projects/k8s-release/services/enabled.txt +++ b/audit/projects/k8s-release/services/enabled.txt @@ -1,10 +1,13 @@ NAME TITLE cloudbuild.googleapis.com Cloud Build API cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API logging.googleapis.com Cloud Logging API monitoring.googleapis.com Cloud Monitoring API pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API stackdriver.googleapis.com Stackdriver API storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-releng-prod/iam.json b/audit/projects/k8s-releng-prod/iam.json index 9b34de93b47..068db083766 100644 --- a/audit/projects/k8s-releng-prod/iam.json +++ b/audit/projects/k8s-releng-prod/iam.json @@ -12,12 +12,6 @@ ], "role": "roles/cloudkms.cryptoKeyEncrypterDecrypter" }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-release-admins@kubernetes.io" diff --git a/audit/projects/k8s-staging-addon-manager/iam.json b/audit/projects/k8s-staging-addon-manager/iam.json index a18f2814b77..4a87fc6d949 100644 --- a/audit/projects/k8s-staging-addon-manager/iam.json +++ b/audit/projects/k8s-staging-addon-manager/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/containerscanning.ServiceAgent" }, - { - "members": [ - "user:spiffxp@google.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-addon-manager@kubernetes.io" diff --git a/audit/projects/k8s-staging-apisnoop/iam.json b/audit/projects/k8s-staging-apisnoop/iam.json index 63a99f51e03..1946d5fce9f 100644 --- a/audit/projects/k8s-staging-apisnoop/iam.json +++ b/audit/projects/k8s-staging-apisnoop/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-apisnoop@kubernetes.io" diff --git a/audit/projects/k8s-staging-artifact-promoter/iam.json b/audit/projects/k8s-staging-artifact-promoter/iam.json index b4a5bf11f51..d52f5443a48 100644 --- a/audit/projects/k8s-staging-artifact-promoter/iam.json +++ b/audit/projects/k8s-staging-artifact-promoter/iam.json @@ -52,12 +52,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-artifact-promoter@kubernetes.io" diff --git a/audit/projects/k8s-staging-artifact-promoter/services/compute/project-info.json b/audit/projects/k8s-staging-artifact-promoter/services/compute/project-info.json deleted file mode 100644 index dd6d7217a9c..00000000000 --- a/audit/projects/k8s-staging-artifact-promoter/services/compute/project-info.json +++ /dev/null @@ -1,171 +0,0 @@ -{ - "commonInstanceMetadata": { - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-05-06T21:55:38.693-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "675573440409-compute@developer.gserviceaccount.com", - "id": "1279192389912504869", - "kind": "compute#project", - "name": "k8s-staging-artifact-promoter", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-staging-artifact-promoter", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-staging-artifact-promoter/services/enabled.txt b/audit/projects/k8s-staging-artifact-promoter/services/enabled.txt index 661451636fa..30cdd842f18 100644 --- a/audit/projects/k8s-staging-artifact-promoter/services/enabled.txt +++ b/audit/projects/k8s-staging-artifact-promoter/services/enabled.txt @@ -1,12 +1,10 @@ NAME TITLE cloudbuild.googleapis.com Cloud Build API cloudkms.googleapis.com Cloud Key Management Service (KMS) API -compute.googleapis.com Compute Engine API containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API containerscanning.googleapis.com Container Scanning API logging.googleapis.com Cloud Logging API -oslogin.googleapis.com Cloud OS Login API pubsub.googleapis.com Cloud Pub/Sub API secretmanager.googleapis.com Secret Manager API storage-api.googleapis.com Google Cloud Storage JSON API diff --git a/audit/projects/k8s-staging-autoscaling/iam.json b/audit/projects/k8s-staging-autoscaling/iam.json index cacc23a9bc5..ead10ba0ba1 100644 --- a/audit/projects/k8s-staging-autoscaling/iam.json +++ b/audit/projects/k8s-staging-autoscaling/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-autoscaling@kubernetes.io" diff --git a/audit/projects/k8s-staging-bootkube/iam.json b/audit/projects/k8s-staging-bootkube/iam.json index e2de3521596..9c154c41276 100644 --- a/audit/projects/k8s-staging-bootkube/iam.json +++ b/audit/projects/k8s-staging-bootkube/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-bootkube@kubernetes.io" diff --git a/audit/projects/k8s-staging-boskos/iam.json b/audit/projects/k8s-staging-boskos/iam.json index 0bfd08bceba..a8d2a5181e9 100644 --- a/audit/projects/k8s-staging-boskos/iam.json +++ b/audit/projects/k8s-staging-boskos/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:spiffxp@google.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-boskos@kubernetes.io" diff --git a/audit/projects/k8s-staging-build-image/iam.json b/audit/projects/k8s-staging-build-image/iam.json index 5b242c2f45b..74d2cd22a48 100644 --- a/audit/projects/k8s-staging-build-image/iam.json +++ b/audit/projects/k8s-staging-build-image/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-build-image@kubernetes.io" diff --git a/audit/projects/k8s-staging-capi-docker/iam.json b/audit/projects/k8s-staging-capi-docker/iam.json index 49e8f2bc823..eb6e826e096 100644 --- a/audit/projects/k8s-staging-capi-docker/iam.json +++ b/audit/projects/k8s-staging-capi-docker/iam.json @@ -52,12 +52,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-capi-docker@kubernetes.io" diff --git a/audit/projects/k8s-staging-capi-docker/services/compute/project-info.json b/audit/projects/k8s-staging-capi-docker/services/compute/project-info.json deleted file mode 100644 index 85663d82e33..00000000000 --- a/audit/projects/k8s-staging-capi-docker/services/compute/project-info.json +++ /dev/null @@ -1,171 +0,0 @@ -{ - "commonInstanceMetadata": { - "kind": "compute#metadata" - }, - "creationTimestamp": "2021-02-16T16:34:10.559-08:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "44019431644-compute@developer.gserviceaccount.com", - "id": "1894482911793633901", - "kind": "compute#project", - "name": "k8s-staging-capi-docker", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-staging-capi-docker", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-staging-capi-docker/services/dns/info.json b/audit/projects/k8s-staging-capi-docker/services/dns/info.json deleted file mode 100644 index a8b96d9e2c0..00000000000 --- a/audit/projects/k8s-staging-capi-docker/services/dns/info.json +++ /dev/null @@ -1,53 +0,0 @@ -{ - "id": "k8s-staging-capi-docker", - "kind": "dns#project", - "number": "44019431644", - "quota": { - "dnsKeysPerManagedZone": 4, - "kind": "dns#quota", - "managedZones": 10000, - "managedZonesPerNetwork": 10000, - "networksPerManagedZone": 100, - "networksPerPolicy": 100, - "policies": 100, - "resourceRecordsPerRrset": 100, - "rrsetAdditionsPerChange": 1000, - "rrsetDeletionsPerChange": 1000, - "rrsetsPerManagedZone": 10000, - "targetNameServersPerManagedZone": 50, - "targetNameServersPerPolicy": 50, - "totalRrdataSizePerChange": 100000, - "whitelistedKeySpecs": [ - { - "algorithm": "ecdsap256sha256", - "kind": "dns#dnsKeySpec" - }, - { - "algorithm": "ecdsap384sha384", - "kind": "dns#dnsKeySpec" - }, - { - "algorithm": "rsasha256", - "keyLength": 2048, - "kind": "dns#dnsKeySpec" - }, - { - "algorithm": "rsasha256", - "keyLength": 1024, - "keyType": "zoneSigning", - "kind": "dns#dnsKeySpec" - }, - { - "algorithm": "rsasha512", - "keyLength": 2048, - "kind": "dns#dnsKeySpec" - }, - { - "algorithm": "rsasha512", - "keyLength": 1024, - "keyType": "zoneSigning", - "kind": "dns#dnsKeySpec" - } - ] - } -} diff --git a/audit/projects/k8s-staging-capi-docker/services/dns/zones.json b/audit/projects/k8s-staging-capi-docker/services/dns/zones.json deleted file mode 100644 index fe51488c706..00000000000 --- a/audit/projects/k8s-staging-capi-docker/services/dns/zones.json +++ /dev/null @@ -1 +0,0 @@ -[] diff --git a/audit/projects/k8s-staging-capi-docker/services/enabled.txt b/audit/projects/k8s-staging-capi-docker/services/enabled.txt index da913ca321e..30cdd842f18 100644 --- a/audit/projects/k8s-staging-capi-docker/services/enabled.txt +++ b/audit/projects/k8s-staging-capi-docker/services/enabled.txt @@ -1,13 +1,10 @@ NAME TITLE cloudbuild.googleapis.com Cloud Build API cloudkms.googleapis.com Cloud Key Management Service (KMS) API -compute.googleapis.com Compute Engine API containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API containerscanning.googleapis.com Container Scanning API -dns.googleapis.com Cloud DNS API logging.googleapis.com Cloud Logging API -oslogin.googleapis.com Cloud OS Login API pubsub.googleapis.com Cloud Pub/Sub API secretmanager.googleapis.com Secret Manager API storage-api.googleapis.com Google Cloud Storage JSON API diff --git a/audit/projects/k8s-staging-capi-kubeadm/iam.json b/audit/projects/k8s-staging-capi-kubeadm/iam.json index 00379dcb600..89e7f17e16c 100644 --- a/audit/projects/k8s-staging-capi-kubeadm/iam.json +++ b/audit/projects/k8s-staging-capi-kubeadm/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-capi-kubeadm@kubernetes.io" diff --git a/audit/projects/k8s-staging-capi-openstack/iam.json b/audit/projects/k8s-staging-capi-openstack/iam.json index d8d733608fc..14145e2c7e9 100644 --- a/audit/projects/k8s-staging-capi-openstack/iam.json +++ b/audit/projects/k8s-staging-capi-openstack/iam.json @@ -52,12 +52,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-capi-openstack@kubernetes.io" diff --git a/audit/projects/k8s-staging-capi-openstack/services/compute/project-info.json b/audit/projects/k8s-staging-capi-openstack/services/compute/project-info.json deleted file mode 100644 index 13944aaefcc..00000000000 --- a/audit/projects/k8s-staging-capi-openstack/services/compute/project-info.json +++ /dev/null @@ -1,171 +0,0 @@ -{ - "commonInstanceMetadata": { - "kind": "compute#metadata" - }, - "creationTimestamp": "2019-09-11T13:09:53.115-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "129051311436-compute@developer.gserviceaccount.com", - "id": "1191636999154756222", - "kind": "compute#project", - "name": "k8s-staging-capi-openstack", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-staging-capi-openstack", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-staging-capi-openstack/services/enabled.txt b/audit/projects/k8s-staging-capi-openstack/services/enabled.txt index 661451636fa..30cdd842f18 100644 --- a/audit/projects/k8s-staging-capi-openstack/services/enabled.txt +++ b/audit/projects/k8s-staging-capi-openstack/services/enabled.txt @@ -1,12 +1,10 @@ NAME TITLE cloudbuild.googleapis.com Cloud Build API cloudkms.googleapis.com Cloud Key Management Service (KMS) API -compute.googleapis.com Compute Engine API containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API containerscanning.googleapis.com Container Scanning API logging.googleapis.com Cloud Logging API -oslogin.googleapis.com Cloud OS Login API pubsub.googleapis.com Cloud Pub/Sub API secretmanager.googleapis.com Secret Manager API storage-api.googleapis.com Google Cloud Storage JSON API diff --git a/audit/projects/k8s-staging-capi-vsphere/iam.json b/audit/projects/k8s-staging-capi-vsphere/iam.json index 023846f2be6..c4d4287f5b9 100644 --- a/audit/projects/k8s-staging-capi-vsphere/iam.json +++ b/audit/projects/k8s-staging-capi-vsphere/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-capi-vsphere@kubernetes.io" diff --git a/audit/projects/k8s-staging-ci-images/iam.json b/audit/projects/k8s-staging-ci-images/iam.json index ad0d7d76f71..401f1f66d5e 100644 --- a/audit/projects/k8s-staging-ci-images/iam.json +++ b/audit/projects/k8s-staging-ci-images/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/containerscanning.ServiceAgent" }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-ci-images@kubernetes.io" diff --git a/audit/projects/k8s-staging-cip-test/iam.json b/audit/projects/k8s-staging-cip-test/iam.json index de1fef665ea..fa29dc03f84 100644 --- a/audit/projects/k8s-staging-cip-test/iam.json +++ b/audit/projects/k8s-staging-cip-test/iam.json @@ -52,12 +52,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-cip-test@kubernetes.io" diff --git a/audit/projects/k8s-staging-cip-test/services/bigquery/bigquery.datasets.json b/audit/projects/k8s-staging-cip-test/services/bigquery/bigquery.datasets.json deleted file mode 100644 index e69de29bb2d..00000000000 diff --git a/audit/projects/k8s-staging-cip-test/services/compute/project-info.json b/audit/projects/k8s-staging-cip-test/services/compute/project-info.json deleted file mode 100644 index f7fd8861bd1..00000000000 --- a/audit/projects/k8s-staging-cip-test/services/compute/project-info.json +++ /dev/null @@ -1,171 +0,0 @@ -{ - "commonInstanceMetadata": { - "kind": "compute#metadata" - }, - "creationTimestamp": "2019-04-05T15:41:27.369-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "324460563566-compute@developer.gserviceaccount.com", - "id": "1907738506999523192", - "kind": "compute#project", - "name": "k8s-staging-cip-test", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-staging-cip-test", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-staging-cip-test/services/enabled.txt b/audit/projects/k8s-staging-cip-test/services/enabled.txt index 8dfee4cb671..30cdd842f18 100644 --- a/audit/projects/k8s-staging-cip-test/services/enabled.txt +++ b/audit/projects/k8s-staging-cip-test/services/enabled.txt @@ -1,23 +1,11 @@ NAME TITLE -bigquery.googleapis.com BigQuery API -bigquerystorage.googleapis.com BigQuery Storage API -cloudapis.googleapis.com Google Cloud APIs cloudbuild.googleapis.com Cloud Build API -clouddebugger.googleapis.com Cloud Debugger API cloudkms.googleapis.com Cloud Key Management Service (KMS) API -cloudtrace.googleapis.com Cloud Trace API -compute.googleapis.com Compute Engine API containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API containerscanning.googleapis.com Container Scanning API -datastore.googleapis.com Cloud Datastore API logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API pubsub.googleapis.com Cloud Pub/Sub API secretmanager.googleapis.com Secret Manager API -servicemanagement.googleapis.com Service Management API -serviceusage.googleapis.com Service Usage API -sql-component.googleapis.com Cloud SQL storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-cloud-provider-gcp/iam.json b/audit/projects/k8s-staging-cloud-provider-gcp/iam.json index 50903a4fdf6..386ebf4a880 100644 --- a/audit/projects/k8s-staging-cloud-provider-gcp/iam.json +++ b/audit/projects/k8s-staging-cloud-provider-gcp/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:spiffxp@google.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-cloud-provider-gcp@kubernetes.io" diff --git a/audit/projects/k8s-staging-cluster-addons/iam.json b/audit/projects/k8s-staging-cluster-addons/iam.json index f4279ad8444..4c3770f492d 100644 --- a/audit/projects/k8s-staging-cluster-addons/iam.json +++ b/audit/projects/k8s-staging-cluster-addons/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:spiffxp@google.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-cluster-addons@kubernetes.io" diff --git a/audit/projects/k8s-staging-cluster-api-aws/iam.json b/audit/projects/k8s-staging-cluster-api-aws/iam.json index ee0b51c0233..845d5de2d78 100644 --- a/audit/projects/k8s-staging-cluster-api-aws/iam.json +++ b/audit/projects/k8s-staging-cluster-api-aws/iam.json @@ -52,12 +52,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-cluster-api-aws@kubernetes.io" diff --git a/audit/projects/k8s-staging-cluster-api-aws/services/compute/project-info.json b/audit/projects/k8s-staging-cluster-api-aws/services/compute/project-info.json deleted file mode 100644 index 690ce8b6bf7..00000000000 --- a/audit/projects/k8s-staging-cluster-api-aws/services/compute/project-info.json +++ /dev/null @@ -1,171 +0,0 @@ -{ - "commonInstanceMetadata": { - "kind": "compute#metadata" - }, - "creationTimestamp": "2019-07-24T09:10:39.578-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "433651898792-compute@developer.gserviceaccount.com", - "id": "3226456422251576336", - "kind": "compute#project", - "name": "k8s-staging-cluster-api-aws", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-staging-cluster-api-aws", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-staging-cluster-api-aws/services/enabled.txt b/audit/projects/k8s-staging-cluster-api-aws/services/enabled.txt index 661451636fa..30cdd842f18 100644 --- a/audit/projects/k8s-staging-cluster-api-aws/services/enabled.txt +++ b/audit/projects/k8s-staging-cluster-api-aws/services/enabled.txt @@ -1,12 +1,10 @@ NAME TITLE cloudbuild.googleapis.com Cloud Build API cloudkms.googleapis.com Cloud Key Management Service (KMS) API -compute.googleapis.com Compute Engine API containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API containerscanning.googleapis.com Container Scanning API logging.googleapis.com Cloud Logging API -oslogin.googleapis.com Cloud OS Login API pubsub.googleapis.com Cloud Pub/Sub API secretmanager.googleapis.com Secret Manager API storage-api.googleapis.com Google Cloud Storage JSON API diff --git a/audit/projects/k8s-staging-cluster-api-azure/iam.json b/audit/projects/k8s-staging-cluster-api-azure/iam.json index 81fe953b330..6e0188319e1 100644 --- a/audit/projects/k8s-staging-cluster-api-azure/iam.json +++ b/audit/projects/k8s-staging-cluster-api-azure/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-cluster-api-azure@kubernetes.io" diff --git a/audit/projects/k8s-staging-cluster-api-do/iam.json b/audit/projects/k8s-staging-cluster-api-do/iam.json index 348d16cbd36..f64e231d876 100644 --- a/audit/projects/k8s-staging-cluster-api-do/iam.json +++ b/audit/projects/k8s-staging-cluster-api-do/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-cluster-api-do@kubernetes.io" diff --git a/audit/projects/k8s-staging-cluster-api-gcp/iam.json b/audit/projects/k8s-staging-cluster-api-gcp/iam.json index 4eb3bfe64b6..3c5c86374df 100644 --- a/audit/projects/k8s-staging-cluster-api-gcp/iam.json +++ b/audit/projects/k8s-staging-cluster-api-gcp/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-cluster-api-gcp@kubernetes.io" diff --git a/audit/projects/k8s-staging-cluster-api/iam.json b/audit/projects/k8s-staging-cluster-api/iam.json index c34cafcd494..355f8e45526 100644 --- a/audit/projects/k8s-staging-cluster-api/iam.json +++ b/audit/projects/k8s-staging-cluster-api/iam.json @@ -52,12 +52,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-cluster-api@kubernetes.io" diff --git a/audit/projects/k8s-staging-cluster-api/services/bigquery/bigquery.datasets.json b/audit/projects/k8s-staging-cluster-api/services/bigquery/bigquery.datasets.json deleted file mode 100644 index e69de29bb2d..00000000000 diff --git a/audit/projects/k8s-staging-cluster-api/services/compute/project-info.json b/audit/projects/k8s-staging-cluster-api/services/compute/project-info.json deleted file mode 100644 index 56759d0d8ba..00000000000 --- a/audit/projects/k8s-staging-cluster-api/services/compute/project-info.json +++ /dev/null @@ -1,171 +0,0 @@ -{ - "commonInstanceMetadata": { - "kind": "compute#metadata" - }, - "creationTimestamp": "2019-04-05T15:41:49.921-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "190130481896-compute@developer.gserviceaccount.com", - "id": "1516574978991613762", - "kind": "compute#project", - "name": "k8s-staging-cluster-api", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-staging-cluster-api", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-staging-cluster-api/services/enabled.txt b/audit/projects/k8s-staging-cluster-api/services/enabled.txt index 8dfee4cb671..30cdd842f18 100644 --- a/audit/projects/k8s-staging-cluster-api/services/enabled.txt +++ b/audit/projects/k8s-staging-cluster-api/services/enabled.txt @@ -1,23 +1,11 @@ NAME TITLE -bigquery.googleapis.com BigQuery API -bigquerystorage.googleapis.com BigQuery Storage API -cloudapis.googleapis.com Google Cloud APIs cloudbuild.googleapis.com Cloud Build API -clouddebugger.googleapis.com Cloud Debugger API cloudkms.googleapis.com Cloud Key Management Service (KMS) API -cloudtrace.googleapis.com Cloud Trace API -compute.googleapis.com Compute Engine API containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API containerscanning.googleapis.com Container Scanning API -datastore.googleapis.com Cloud Datastore API logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API pubsub.googleapis.com Cloud Pub/Sub API secretmanager.googleapis.com Secret Manager API -servicemanagement.googleapis.com Service Management API -serviceusage.googleapis.com Service Usage API -sql-component.googleapis.com Cloud SQL storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-coredns/iam.json b/audit/projects/k8s-staging-coredns/iam.json index 3edd75be767..c6409cab5b1 100644 --- a/audit/projects/k8s-staging-coredns/iam.json +++ b/audit/projects/k8s-staging-coredns/iam.json @@ -52,12 +52,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-coredns@kubernetes.io" diff --git a/audit/projects/k8s-staging-coredns/services/bigquery/bigquery.datasets.json b/audit/projects/k8s-staging-coredns/services/bigquery/bigquery.datasets.json deleted file mode 100644 index e69de29bb2d..00000000000 diff --git a/audit/projects/k8s-staging-coredns/services/compute/project-info.json b/audit/projects/k8s-staging-coredns/services/compute/project-info.json deleted file mode 100644 index acc9ffda6e6..00000000000 --- a/audit/projects/k8s-staging-coredns/services/compute/project-info.json +++ /dev/null @@ -1,171 +0,0 @@ -{ - "commonInstanceMetadata": { - "kind": "compute#metadata" - }, - "creationTimestamp": "2019-02-11T15:03:46.669-08:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "848617618266-compute@developer.gserviceaccount.com", - "id": "7398414115419210173", - "kind": "compute#project", - "name": "k8s-staging-coredns", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-staging-coredns", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-staging-coredns/services/enabled.txt b/audit/projects/k8s-staging-coredns/services/enabled.txt index 8dfee4cb671..30cdd842f18 100644 --- a/audit/projects/k8s-staging-coredns/services/enabled.txt +++ b/audit/projects/k8s-staging-coredns/services/enabled.txt @@ -1,23 +1,11 @@ NAME TITLE -bigquery.googleapis.com BigQuery API -bigquerystorage.googleapis.com BigQuery Storage API -cloudapis.googleapis.com Google Cloud APIs cloudbuild.googleapis.com Cloud Build API -clouddebugger.googleapis.com Cloud Debugger API cloudkms.googleapis.com Cloud Key Management Service (KMS) API -cloudtrace.googleapis.com Cloud Trace API -compute.googleapis.com Compute Engine API containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API containerscanning.googleapis.com Container Scanning API -datastore.googleapis.com Cloud Datastore API logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API pubsub.googleapis.com Cloud Pub/Sub API secretmanager.googleapis.com Secret Manager API -servicemanagement.googleapis.com Service Management API -serviceusage.googleapis.com Service Usage API -sql-component.googleapis.com Cloud SQL storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-cpa/iam.json b/audit/projects/k8s-staging-cpa/iam.json index 2a2e8cc5548..b64fe14a267 100644 --- a/audit/projects/k8s-staging-cpa/iam.json +++ b/audit/projects/k8s-staging-cpa/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:spiffxp@google.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-cpa@kubernetes.io" diff --git a/audit/projects/k8s-staging-cri-tools/iam.json b/audit/projects/k8s-staging-cri-tools/iam.json index 221bc30ae02..4fdb3ca3ef3 100644 --- a/audit/projects/k8s-staging-cri-tools/iam.json +++ b/audit/projects/k8s-staging-cri-tools/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/containerscanning.ServiceAgent" }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-cri-tools@kubernetes.io" diff --git a/audit/projects/k8s-staging-csi-secrets-store/iam.json b/audit/projects/k8s-staging-csi-secrets-store/iam.json index 2c946ed21cc..0799c26ac16 100644 --- a/audit/projects/k8s-staging-csi-secrets-store/iam.json +++ b/audit/projects/k8s-staging-csi-secrets-store/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-csi-secrets-store@kubernetes.io" diff --git a/audit/projects/k8s-staging-csi/iam.json b/audit/projects/k8s-staging-csi/iam.json index 29a76a61c63..586db1e4882 100644 --- a/audit/projects/k8s-staging-csi/iam.json +++ b/audit/projects/k8s-staging-csi/iam.json @@ -58,12 +58,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-csi@kubernetes.io" diff --git a/audit/projects/k8s-staging-csi/services/bigquery/bigquery.datasets.json b/audit/projects/k8s-staging-csi/services/bigquery/bigquery.datasets.json deleted file mode 100644 index e69de29bb2d..00000000000 diff --git a/audit/projects/k8s-staging-csi/services/compute/project-info.json b/audit/projects/k8s-staging-csi/services/compute/project-info.json deleted file mode 100644 index e9807ac182b..00000000000 --- a/audit/projects/k8s-staging-csi/services/compute/project-info.json +++ /dev/null @@ -1,171 +0,0 @@ -{ - "commonInstanceMetadata": { - "kind": "compute#metadata" - }, - "creationTimestamp": "2019-04-05T15:41:40.479-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "874328413592-compute@developer.gserviceaccount.com", - "id": "202554181734262603", - "kind": "compute#project", - "name": "k8s-staging-csi", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-staging-csi", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-staging-csi/services/enabled.txt b/audit/projects/k8s-staging-csi/services/enabled.txt index 92aba6dc429..30cdd842f18 100644 --- a/audit/projects/k8s-staging-csi/services/enabled.txt +++ b/audit/projects/k8s-staging-csi/services/enabled.txt @@ -1,25 +1,11 @@ NAME TITLE -bigquery.googleapis.com BigQuery API -bigquerystorage.googleapis.com BigQuery Storage API -cloudapis.googleapis.com Google Cloud APIs cloudbuild.googleapis.com Cloud Build API -clouddebugger.googleapis.com Cloud Debugger API cloudkms.googleapis.com Cloud Key Management Service (KMS) API -cloudtrace.googleapis.com Cloud Trace API -compute.googleapis.com Compute Engine API containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API containerscanning.googleapis.com Container Scanning API -datastore.googleapis.com Cloud Datastore API -iam.googleapis.com Identity and Access Management (IAM) API -iamcredentials.googleapis.com IAM Service Account Credentials API logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API pubsub.googleapis.com Cloud Pub/Sub API secretmanager.googleapis.com Secret Manager API -servicemanagement.googleapis.com Service Management API -serviceusage.googleapis.com Service Usage API -sql-component.googleapis.com Cloud SQL storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-descheduler/iam.json b/audit/projects/k8s-staging-descheduler/iam.json index 9860c6e479b..3f9ac8cff7c 100644 --- a/audit/projects/k8s-staging-descheduler/iam.json +++ b/audit/projects/k8s-staging-descheduler/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-descheduler@kubernetes.io" diff --git a/audit/projects/k8s-staging-dns/iam.json b/audit/projects/k8s-staging-dns/iam.json index d1eb5a5a295..242fbf1286c 100644 --- a/audit/projects/k8s-staging-dns/iam.json +++ b/audit/projects/k8s-staging-dns/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-dns@kubernetes.io" diff --git a/audit/projects/k8s-staging-e2e-test-images/iam.json b/audit/projects/k8s-staging-e2e-test-images/iam.json index 0bd0c1b0322..6c58d9d074f 100644 --- a/audit/projects/k8s-staging-e2e-test-images/iam.json +++ b/audit/projects/k8s-staging-e2e-test-images/iam.json @@ -58,12 +58,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, { "members": [ "serviceAccount:456067983721@cloudbuild.gserviceaccount.com" diff --git a/audit/projects/k8s-staging-e2e-test-images/services/bigquery/bigquery.datasets.json b/audit/projects/k8s-staging-e2e-test-images/services/bigquery/bigquery.datasets.json deleted file mode 100644 index e69de29bb2d..00000000000 diff --git a/audit/projects/k8s-staging-e2e-test-images/services/compute/project-info.json b/audit/projects/k8s-staging-e2e-test-images/services/compute/project-info.json deleted file mode 100644 index f753bd4b71a..00000000000 --- a/audit/projects/k8s-staging-e2e-test-images/services/compute/project-info.json +++ /dev/null @@ -1,171 +0,0 @@ -{ - "commonInstanceMetadata": { - "kind": "compute#metadata" - }, - "creationTimestamp": "2020-05-13T12:40:53.841-07:00", - "defaultNetworkTier": "PREMIUM", - "defaultServiceAccount": "456067983721-compute@developer.gserviceaccount.com", - "id": "2870902180273058730", - "kind": "compute#project", - "name": "k8s-staging-e2e-test-images", - "quotas": [ - { - "limit": 10000, - "metric": "SNAPSHOTS" - }, - { - "limit": 30, - "metric": "NETWORKS" - }, - { - "limit": 500, - "metric": "FIREWALLS" - }, - { - "limit": 5000, - "metric": "IMAGES" - }, - { - "limit": 175, - "metric": "STATIC_ADDRESSES" - }, - { - "limit": 300, - "metric": "ROUTES" - }, - { - "limit": 150, - "metric": "FORWARDING_RULES" - }, - { - "limit": 500, - "metric": "TARGET_POOLS" - }, - { - "limit": 500, - "metric": "HEALTH_CHECKS" - }, - { - "limit": 575, - "metric": "IN_USE_ADDRESSES" - }, - { - "limit": 500, - "metric": "TARGET_INSTANCES" - }, - { - "limit": 100, - "metric": "TARGET_HTTP_PROXIES" - }, - { - "limit": 100, - "metric": "URL_MAPS" - }, - { - "limit": 30, - "metric": "BACKEND_SERVICES" - }, - { - "limit": 1000, - "metric": "INSTANCE_TEMPLATES" - }, - { - "limit": 50, - "metric": "TARGET_VPN_GATEWAYS" - }, - { - "limit": 100, - "metric": "VPN_TUNNELS" - }, - { - "limit": 30, - "metric": "BACKEND_BUCKETS" - }, - { - "limit": 20, - "metric": "ROUTERS" - }, - { - "limit": 100, - "metric": "TARGET_SSL_PROXIES" - }, - { - "limit": 100, - "metric": "TARGET_HTTPS_PROXIES" - }, - { - "limit": 100, - "metric": "SSL_CERTIFICATES" - }, - { - "limit": 275, - "metric": "SUBNETWORKS" - }, - { - "limit": 100, - "metric": "TARGET_TCP_PROXIES" - }, - { - "limit": 10, - "metric": "SECURITY_POLICIES" - }, - { - "limit": 200, - "metric": "SECURITY_POLICY_RULES" - }, - { - "limit": 1000, - "metric": "XPN_SERVICE_PROJECTS" - }, - { - "limit": 150, - "metric": "PACKET_MIRRORINGS" - }, - { - "limit": 1000, - "metric": "NETWORK_ENDPOINT_GROUPS" - }, - { - "limit": 6, - "metric": "INTERCONNECTS" - }, - { - "limit": 5000, - "metric": "GLOBAL_INTERNAL_ADDRESSES" - }, - { - "limit": 50, - "metric": "VPN_GATEWAYS" - }, - { - "limit": 5000, - "metric": "MACHINE_IMAGES" - }, - { - "limit": 20, - "metric": "SECURITY_POLICY_CEVAL_RULES" - }, - { - "limit": 50, - "metric": "EXTERNAL_VPN_GATEWAYS" - }, - { - "limit": 1, - "metric": "PUBLIC_ADVERTISED_PREFIXES" - }, - { - "limit": 10, - "metric": "PUBLIC_DELEGATED_PREFIXES" - }, - { - "limit": 1024, - "metric": "STATIC_BYOIP_ADDRESSES" - }, - { - "limit": 150, - "metric": "INTERNAL_TRAFFIC_DIRECTOR_FORWARDING_RULES" - } - ], - "selfLink": "https://www.googleapis.com/compute/v1/projects/k8s-staging-e2e-test-images", - "xpnProjectStatus": "UNSPECIFIED_XPN_PROJECT_STATUS" -} diff --git a/audit/projects/k8s-staging-e2e-test-images/services/container/clusters.txt b/audit/projects/k8s-staging-e2e-test-images/services/container/clusters.txt deleted file mode 100644 index e69de29bb2d..00000000000 diff --git a/audit/projects/k8s-staging-e2e-test-images/services/enabled.txt b/audit/projects/k8s-staging-e2e-test-images/services/enabled.txt index c77a6232e1f..30cdd842f18 100644 --- a/audit/projects/k8s-staging-e2e-test-images/services/enabled.txt +++ b/audit/projects/k8s-staging-e2e-test-images/services/enabled.txt @@ -1,20 +1,11 @@ -NAME TITLE -bigquery.googleapis.com BigQuery API -bigquerystorage.googleapis.com BigQuery Storage API -cloudbuild.googleapis.com Cloud Build API -cloudkms.googleapis.com Cloud Key Management Service (KMS) API -compute.googleapis.com Compute Engine API -container.googleapis.com Kubernetes Engine API -containeranalysis.googleapis.com Container Analysis API -containerregistry.googleapis.com Container Registry API -containerscanning.googleapis.com Container Scanning API -iam.googleapis.com Identity and Access Management (IAM) API -iamcredentials.googleapis.com IAM Service Account Credentials API -logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API -oslogin.googleapis.com Cloud OS Login API -policytroubleshooter.googleapis.com Policy Troubleshooter API -pubsub.googleapis.com Cloud Pub/Sub API -secretmanager.googleapis.com Secret Manager API -storage-api.googleapis.com Google Cloud Storage JSON API -storage-component.googleapis.com Cloud Storage +NAME TITLE +cloudbuild.googleapis.com Cloud Build API +cloudkms.googleapis.com Cloud Key Management Service (KMS) API +containeranalysis.googleapis.com Container Analysis API +containerregistry.googleapis.com Container Registry API +containerscanning.googleapis.com Container Scanning API +logging.googleapis.com Cloud Logging API +pubsub.googleapis.com Cloud Pub/Sub API +secretmanager.googleapis.com Secret Manager API +storage-api.googleapis.com Google Cloud Storage JSON API +storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-etcd/iam.json b/audit/projects/k8s-staging-etcd/iam.json index 55d9e45629c..aee17c6fe88 100644 --- a/audit/projects/k8s-staging-etcd/iam.json +++ b/audit/projects/k8s-staging-etcd/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:spiffxp@google.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-etcd@kubernetes.io" diff --git a/audit/projects/k8s-staging-etcdadm/iam.json b/audit/projects/k8s-staging-etcdadm/iam.json index 6aa922eb50b..fa04070b089 100644 --- a/audit/projects/k8s-staging-etcdadm/iam.json +++ b/audit/projects/k8s-staging-etcdadm/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:spiffxp@google.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-etcdadm@kubernetes.io" diff --git a/audit/projects/k8s-staging-examples/iam.json b/audit/projects/k8s-staging-examples/iam.json index 2cdf9fc1239..ec2db528bac 100644 --- a/audit/projects/k8s-staging-examples/iam.json +++ b/audit/projects/k8s-staging-examples/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/containerscanning.ServiceAgent" }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-examples@kubernetes.io" diff --git a/audit/projects/k8s-staging-experimental/iam.json b/audit/projects/k8s-staging-experimental/iam.json index c1bc3819b87..2d6cdb76189 100644 --- a/audit/projects/k8s-staging-experimental/iam.json +++ b/audit/projects/k8s-staging-experimental/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/containerscanning.ServiceAgent" }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-experimental@kubernetes.io" diff --git a/audit/projects/k8s-staging-external-dns/iam.json b/audit/projects/k8s-staging-external-dns/iam.json index 66fc2e22c14..341e4c57ba4 100644 --- a/audit/projects/k8s-staging-external-dns/iam.json +++ b/audit/projects/k8s-staging-external-dns/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-external-dns@kubernetes.io" diff --git a/audit/projects/k8s-staging-git-sync/iam.json b/audit/projects/k8s-staging-git-sync/iam.json index a2e49c60923..7528571d983 100644 --- a/audit/projects/k8s-staging-git-sync/iam.json +++ b/audit/projects/k8s-staging-git-sync/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-git-sync@kubernetes.io" diff --git a/audit/projects/k8s-staging-infra-tools/iam.json b/audit/projects/k8s-staging-infra-tools/iam.json index 814c638d133..8563df438d9 100644 --- a/audit/projects/k8s-staging-infra-tools/iam.json +++ b/audit/projects/k8s-staging-infra-tools/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:spiffxp@google.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-infra-tools@kubernetes.io" diff --git a/audit/projects/k8s-staging-ingress-nginx/iam.json b/audit/projects/k8s-staging-ingress-nginx/iam.json index 0087922c52c..4f19f52f0d6 100644 --- a/audit/projects/k8s-staging-ingress-nginx/iam.json +++ b/audit/projects/k8s-staging-ingress-nginx/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:spiffxp@google.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-ingress-nginx@kubernetes.io" diff --git a/audit/projects/k8s-staging-ingress-nginx/services/enabled.txt b/audit/projects/k8s-staging-ingress-nginx/services/enabled.txt index ab1ef15e4e2..30cdd842f18 100644 --- a/audit/projects/k8s-staging-ingress-nginx/services/enabled.txt +++ b/audit/projects/k8s-staging-ingress-nginx/services/enabled.txt @@ -5,9 +5,7 @@ containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API containerscanning.googleapis.com Container Scanning API logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API pubsub.googleapis.com Cloud Pub/Sub API secretmanager.googleapis.com Secret Manager API -stackdriver.googleapis.com Stackdriver API storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-ingressconformance/iam.json b/audit/projects/k8s-staging-ingressconformance/iam.json index 31f0ec95071..29300951b3f 100644 --- a/audit/projects/k8s-staging-ingressconformance/iam.json +++ b/audit/projects/k8s-staging-ingressconformance/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:spiffxp@google.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-ingressconformance@kubernetes.io" diff --git a/audit/projects/k8s-staging-k8s-gsm-tools/buckets/artifacts.k8s-staging-k8s-gsm-tools.appspot.com/iam.json b/audit/projects/k8s-staging-k8s-gsm-tools/buckets/artifacts.k8s-staging-k8s-gsm-tools.appspot.com/iam.json index 3fb8dd67686..79684cb1214 100644 --- a/audit/projects/k8s-staging-k8s-gsm-tools/buckets/artifacts.k8s-staging-k8s-gsm-tools.appspot.com/iam.json +++ b/audit/projects/k8s-staging-k8s-gsm-tools/buckets/artifacts.k8s-staging-k8s-gsm-tools.appspot.com/iam.json @@ -16,7 +16,14 @@ }, { "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io" + "group:k8s-infra-staging-k8s-gsm-tools@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-k8s-gsm-tools@kubernetes.io" ], "role": "roles/storage.objectAdmin" }, diff --git a/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools-gcb/iam.json b/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools-gcb/iam.json index bb97d296470..fc206fddf5e 100644 --- a/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools-gcb/iam.json +++ b/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools-gcb/iam.json @@ -16,7 +16,14 @@ }, { "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io" + "group:k8s-infra-staging-k8s-gsm-tools@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-k8s-gsm-tools@kubernetes.io" ], "role": "roles/storage.objectAdmin" }, diff --git a/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools/iam.json b/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools/iam.json index 3fb8dd67686..79684cb1214 100644 --- a/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools/iam.json +++ b/audit/projects/k8s-staging-k8s-gsm-tools/buckets/k8s-staging-k8s-gsm-tools/iam.json @@ -16,7 +16,14 @@ }, { "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io" + "group:k8s-infra-staging-k8s-gsm-tools@kubernetes.io" + ], + "role": "roles/storage.legacyBucketWriter" + }, + { + "members": [ + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-k8s-gsm-tools@kubernetes.io" ], "role": "roles/storage.objectAdmin" }, diff --git a/audit/projects/k8s-staging-k8s-gsm-tools/iam.json b/audit/projects/k8s-staging-k8s-gsm-tools/iam.json index 438898fcb66..33bd43fb269 100644 --- a/audit/projects/k8s-staging-k8s-gsm-tools/iam.json +++ b/audit/projects/k8s-staging-k8s-gsm-tools/iam.json @@ -8,6 +8,12 @@ ], "role": "roles/cloudbuild.builds.builder" }, + { + "members": [ + "group:k8s-infra-staging-k8s-gsm-tools@kubernetes.io" + ], + "role": "roles/cloudbuild.builds.editor" + }, { "members": [ "serviceAccount:service-1073099305721@gcp-sa-cloudbuild.iam.gserviceaccount.com" @@ -40,13 +46,14 @@ }, { "members": [ - "user:spiffxp@google.com" + "group:k8s-infra-staging-k8s-gsm-tools@kubernetes.io" ], - "role": "roles/owner" + "role": "roles/serviceusage.serviceUsageConsumer" }, { "members": [ - "group:k8s-infra-artifact-admins@kubernetes.io" + "group:k8s-infra-artifact-admins@kubernetes.io", + "group:k8s-infra-staging-k8s-gsm-tools@kubernetes.io" ], "role": "roles/viewer" } diff --git a/audit/projects/k8s-staging-kas-network-proxy/iam.json b/audit/projects/k8s-staging-kas-network-proxy/iam.json index 2e8c6549dc6..26bfcf5a3c5 100644 --- a/audit/projects/k8s-staging-kas-network-proxy/iam.json +++ b/audit/projects/k8s-staging-kas-network-proxy/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-kas-network-proxy@kubernetes.io" diff --git a/audit/projects/k8s-staging-kind/iam.json b/audit/projects/k8s-staging-kind/iam.json index bc341d60da3..9255809dee0 100644 --- a/audit/projects/k8s-staging-kind/iam.json +++ b/audit/projects/k8s-staging-kind/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:spiffxp@google.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-kind@kubernetes.io" diff --git a/audit/projects/k8s-staging-kops/iam.json b/audit/projects/k8s-staging-kops/iam.json index 8087c78e48e..4f57d815c8c 100644 --- a/audit/projects/k8s-staging-kops/iam.json +++ b/audit/projects/k8s-staging-kops/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-kops@kubernetes.io" diff --git a/audit/projects/k8s-staging-kops/services/bigquery/bigquery.datasets.json b/audit/projects/k8s-staging-kops/services/bigquery/bigquery.datasets.json deleted file mode 100644 index e69de29bb2d..00000000000 diff --git a/audit/projects/k8s-staging-kops/services/enabled.txt b/audit/projects/k8s-staging-kops/services/enabled.txt index 49f45ad4895..30cdd842f18 100644 --- a/audit/projects/k8s-staging-kops/services/enabled.txt +++ b/audit/projects/k8s-staging-kops/services/enabled.txt @@ -1,22 +1,11 @@ NAME TITLE -bigquery.googleapis.com BigQuery API -bigquery.googleapis.com BigQuery API -bigquerystorage.googleapis.com BigQuery Storage API -cloudapis.googleapis.com Google Cloud APIs cloudbuild.googleapis.com Cloud Build API -clouddebugger.googleapis.com Cloud Debugger API cloudkms.googleapis.com Cloud Key Management Service (KMS) API -cloudtrace.googleapis.com Cloud Trace API containeranalysis.googleapis.com Container Analysis API containerregistry.googleapis.com Container Registry API containerscanning.googleapis.com Container Scanning API -datastore.googleapis.com Cloud Datastore API logging.googleapis.com Cloud Logging API -monitoring.googleapis.com Cloud Monitoring API pubsub.googleapis.com Cloud Pub/Sub API secretmanager.googleapis.com Secret Manager API -servicemanagement.googleapis.com Service Management API -serviceusage.googleapis.com Service Usage API -sql-component.googleapis.com Cloud SQL storage-api.googleapis.com Google Cloud Storage JSON API storage-component.googleapis.com Cloud Storage diff --git a/audit/projects/k8s-staging-kube-state-metrics/iam.json b/audit/projects/k8s-staging-kube-state-metrics/iam.json index 2bcb3327766..98b3310ddd0 100644 --- a/audit/projects/k8s-staging-kube-state-metrics/iam.json +++ b/audit/projects/k8s-staging-kube-state-metrics/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-kube-state-metrics@kubernetes.io" diff --git a/audit/projects/k8s-staging-kubeadm/iam.json b/audit/projects/k8s-staging-kubeadm/iam.json index 778b4ab5414..d5680b73d99 100644 --- a/audit/projects/k8s-staging-kubeadm/iam.json +++ b/audit/projects/k8s-staging-kubeadm/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-kubeadm@kubernetes.io" diff --git a/audit/projects/k8s-staging-kubernetes/iam.json b/audit/projects/k8s-staging-kubernetes/iam.json index 559c1720f33..4a4961ce434 100644 --- a/audit/projects/k8s-staging-kubernetes/iam.json +++ b/audit/projects/k8s-staging-kubernetes/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-kubernetes@kubernetes.io" diff --git a/audit/projects/k8s-staging-kustomize/iam.json b/audit/projects/k8s-staging-kustomize/iam.json index b40fbbaa08b..2c94c990844 100644 --- a/audit/projects/k8s-staging-kustomize/iam.json +++ b/audit/projects/k8s-staging-kustomize/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/containerscanning.ServiceAgent" }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-kustomize@kubernetes.io" diff --git a/audit/projects/k8s-staging-metrics-server/iam.json b/audit/projects/k8s-staging-metrics-server/iam.json index 93b3279985d..c7d231447bb 100644 --- a/audit/projects/k8s-staging-metrics-server/iam.json +++ b/audit/projects/k8s-staging-metrics-server/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-metrics-server@kubernetes.io" diff --git a/audit/projects/k8s-staging-mirror/iam.json b/audit/projects/k8s-staging-mirror/iam.json index 3db8b2573b5..65759e58348 100644 --- a/audit/projects/k8s-staging-mirror/iam.json +++ b/audit/projects/k8s-staging-mirror/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/containerscanning.ServiceAgent" }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-mirror@kubernetes.io" diff --git a/audit/projects/k8s-staging-multitenancy/iam.json b/audit/projects/k8s-staging-multitenancy/iam.json index c72a0d682fa..3e242e02562 100644 --- a/audit/projects/k8s-staging-multitenancy/iam.json +++ b/audit/projects/k8s-staging-multitenancy/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-multitenancy@kubernetes.io" diff --git a/audit/projects/k8s-staging-networking/iam.json b/audit/projects/k8s-staging-networking/iam.json index 4ce9c18b4ca..04ebe434d2f 100644 --- a/audit/projects/k8s-staging-networking/iam.json +++ b/audit/projects/k8s-staging-networking/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/containerscanning.ServiceAgent" }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-networking@kubernetes.io" diff --git a/audit/projects/k8s-staging-nfd/iam.json b/audit/projects/k8s-staging-nfd/iam.json index 9b862b00a6a..673b81533f9 100644 --- a/audit/projects/k8s-staging-nfd/iam.json +++ b/audit/projects/k8s-staging-nfd/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-nfd@kubernetes.io" diff --git a/audit/projects/k8s-staging-npd/iam.json b/audit/projects/k8s-staging-npd/iam.json index 630b64ec856..8ffdd9d593d 100644 --- a/audit/projects/k8s-staging-npd/iam.json +++ b/audit/projects/k8s-staging-npd/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-npd@kubernetes.io" diff --git a/audit/projects/k8s-staging-provider-aws/iam.json b/audit/projects/k8s-staging-provider-aws/iam.json index 614c21cd87e..353a9182530 100644 --- a/audit/projects/k8s-staging-provider-aws/iam.json +++ b/audit/projects/k8s-staging-provider-aws/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:spiffxp@google.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-provider-aws@kubernetes.io" diff --git a/audit/projects/k8s-staging-provider-azure/iam.json b/audit/projects/k8s-staging-provider-azure/iam.json index e2499de3d89..af5acd58069 100644 --- a/audit/projects/k8s-staging-provider-azure/iam.json +++ b/audit/projects/k8s-staging-provider-azure/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-provider-azure@kubernetes.io" diff --git a/audit/projects/k8s-staging-provider-openstack/iam.json b/audit/projects/k8s-staging-provider-openstack/iam.json index cc5b48444ff..2e51ad20178 100644 --- a/audit/projects/k8s-staging-provider-openstack/iam.json +++ b/audit/projects/k8s-staging-provider-openstack/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/containerscanning.ServiceAgent" }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-provider-openstack@kubernetes.io" diff --git a/audit/projects/k8s-staging-publishing-bot/iam.json b/audit/projects/k8s-staging-publishing-bot/iam.json index 77ddc123451..d2fcbdff68b 100644 --- a/audit/projects/k8s-staging-publishing-bot/iam.json +++ b/audit/projects/k8s-staging-publishing-bot/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-publishing-bot@kubernetes.io" diff --git a/audit/projects/k8s-staging-releng-test/iam.json b/audit/projects/k8s-staging-releng-test/iam.json index d44cf27a97a..7c2d0abba4f 100644 --- a/audit/projects/k8s-staging-releng-test/iam.json +++ b/audit/projects/k8s-staging-releng-test/iam.json @@ -45,12 +45,6 @@ ], "role": "roles/containerscanning.ServiceAgent" }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-releng-test@kubernetes.io" diff --git a/audit/projects/k8s-staging-releng/iam.json b/audit/projects/k8s-staging-releng/iam.json index 28f53099da4..f536b1323e7 100644 --- a/audit/projects/k8s-staging-releng/iam.json +++ b/audit/projects/k8s-staging-releng/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-releng@kubernetes.io" diff --git a/audit/projects/k8s-staging-scheduler-plugins/iam.json b/audit/projects/k8s-staging-scheduler-plugins/iam.json index c716dcce807..b2ae542ea4d 100644 --- a/audit/projects/k8s-staging-scheduler-plugins/iam.json +++ b/audit/projects/k8s-staging-scheduler-plugins/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-scheduler-plugins@kubernetes.io" diff --git a/audit/projects/k8s-staging-scl-image-builder/iam.json b/audit/projects/k8s-staging-scl-image-builder/iam.json index 58a3bfb4e30..9609375bb29 100644 --- a/audit/projects/k8s-staging-scl-image-builder/iam.json +++ b/audit/projects/k8s-staging-scl-image-builder/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-scl-image-builder@kubernetes.io" diff --git a/audit/projects/k8s-staging-service-apis/iam.json b/audit/projects/k8s-staging-service-apis/iam.json index 3ba8c9b53e2..691f031d06f 100644 --- a/audit/projects/k8s-staging-service-apis/iam.json +++ b/audit/projects/k8s-staging-service-apis/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-service-apis@kubernetes.io" diff --git a/audit/projects/k8s-staging-sig-docs/iam.json b/audit/projects/k8s-staging-sig-docs/iam.json index fd67ba5c6f9..937f48e7d5a 100644 --- a/audit/projects/k8s-staging-sig-docs/iam.json +++ b/audit/projects/k8s-staging-sig-docs/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/containerscanning.ServiceAgent" }, - { - "members": [ - "user:spiffxp@google.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-sig-docs@kubernetes.io" diff --git a/audit/projects/k8s-staging-sig-storage/iam.json b/audit/projects/k8s-staging-sig-storage/iam.json index 99e50ff82ad..8d770e85ca2 100644 --- a/audit/projects/k8s-staging-sig-storage/iam.json +++ b/audit/projects/k8s-staging-sig-storage/iam.json @@ -46,18 +46,12 @@ }, { "members": [ + "serviceAccount:272675062337-compute@developer.gserviceaccount.com", "serviceAccount:272675062337@cloudservices.gserviceaccount.com", - "serviceAccount:service-272675062337@containerregistry.iam.gserviceaccount.com", - "serviceAccount:272675062337-compute@developer.gserviceaccount.com" + "serviceAccount:service-272675062337@containerregistry.iam.gserviceaccount.com" ], "role": "roles/editor" }, - { - "members": [ - "user:spiffxp@google.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-sig-storage@kubernetes.io" diff --git a/audit/projects/k8s-staging-slack-infra/iam.json b/audit/projects/k8s-staging-slack-infra/iam.json index f1fcf4d5419..7e83874d391 100644 --- a/audit/projects/k8s-staging-slack-infra/iam.json +++ b/audit/projects/k8s-staging-slack-infra/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:spiffxp@google.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-slack-infra@kubernetes.io" diff --git a/audit/projects/k8s-staging-sp-operator/iam.json b/audit/projects/k8s-staging-sp-operator/iam.json index 5b966c2d595..52b2405293e 100644 --- a/audit/projects/k8s-staging-sp-operator/iam.json +++ b/audit/projects/k8s-staging-sp-operator/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/containerscanning.ServiceAgent" }, - { - "members": [ - "user:davanum@gmail.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-sp-operator@kubernetes.io" diff --git a/audit/projects/k8s-staging-txtdirect/iam.json b/audit/projects/k8s-staging-txtdirect/iam.json index 08acc36425f..e949794f651 100644 --- a/audit/projects/k8s-staging-txtdirect/iam.json +++ b/audit/projects/k8s-staging-txtdirect/iam.json @@ -44,12 +44,6 @@ ], "role": "roles/editor" }, - { - "members": [ - "user:thockin@google.com" - ], - "role": "roles/owner" - }, { "members": [ "group:k8s-infra-staging-txtdirect@kubernetes.io" diff --git a/audit/projects/kubernetes-public/iam.json b/audit/projects/kubernetes-public/iam.json index f4a576e574a..dcd68a8b59b 100644 --- a/audit/projects/kubernetes-public/iam.json +++ b/audit/projects/kubernetes-public/iam.json @@ -114,19 +114,11 @@ }, { "members": [ - "group:gke-security-groups@kubernetes.io" + "group:gke-security-groups@kubernetes.io", + "serviceAccount:k8s-infra-monitoring-viewer@kubernetes-public.iam.gserviceaccount.com" ], "role": "roles/monitoring.viewer" }, - { - "members": [ - "user:domain-admin-lf@kubernetes.io", - "user:ihor@cncf.io", - "user:psharma@linuxfoundation.org", - "user:thockin@google.com" - ], - "role": "roles/owner" - }, { "members": [ "serviceAccount:service-127754664067@serverless-robot-prod.iam.gserviceaccount.com" diff --git a/audit/projects/kubernetes-public/roles/ServiceAccountLister.json b/audit/projects/kubernetes-public/roles/ServiceAccountLister.json deleted file mode 100644 index 8886765ebb8..00000000000 --- a/audit/projects/kubernetes-public/roles/ServiceAccountLister.json +++ /dev/null @@ -1,9 +0,0 @@ -{ - "description": "Can list ServiceAccounts.", - "includedPermissions": [ - "iam.serviceAccounts.list" - ], - "name": "projects/kubernetes-public/roles/ServiceAccountLister", - "stage": "GA", - "title": "Service Account Lister" -}