Skip to content

audit: update as of 2021-05-19#2011

Merged
k8s-ci-robot merged 1 commit intokubernetes:mainfrom
cncf-ci:autoaudit-prow
May 19, 2021
Merged

audit: update as of 2021-05-19#2011
k8s-ci-robot merged 1 commit intokubernetes:mainfrom
cncf-ci:autoaudit-prow

Conversation

@cncf-ci
Copy link
Contributor

@cncf-ci cncf-ci commented May 6, 2021

Audit Updates wg-k8s-infra

@k8s-ci-robot k8s-ci-robot added the cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. label May 6, 2021
@k8s-ci-robot
Copy link
Contributor

Hi @cncf-ci. Thanks for your PR.

I'm waiting for a kubernetes member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@k8s-ci-robot k8s-ci-robot added needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. size/XXL Denotes a PR that changes 1000+ lines, ignoring generated files. area/audit Audit of project resources, audit followup issues, code in audit/ labels May 6, 2021
@k8s-ci-robot k8s-ci-robot requested review from nikhita and thockin May 6, 2021 17:26
@cncf-ci cncf-ci changed the title audit: update as of 2021-05-06 audit: update as of 2021-05-07 May 7, 2021
@cncf-ci cncf-ci force-pushed the autoaudit-prow branch 3 times, most recently from abe7fc9 to c1124f0 Compare May 7, 2021 17:26
@ameukam
Copy link
Member

ameukam commented May 7, 2021

@spiffxp Any reason why the audit logs for the Boskos projects are deleted ? (just curious).

@cncf-ci cncf-ci changed the title audit: update as of 2021-05-07 audit: update as of 2021-05-08 May 8, 2021
@cncf-ci cncf-ci force-pushed the autoaudit-prow branch 4 times, most recently from 9b59233 to befdc19 Compare May 8, 2021 23:27
@cncf-ci cncf-ci changed the title audit: update as of 2021-05-08 audit: update as of 2021-05-09 May 9, 2021
@cncf-ci cncf-ci force-pushed the autoaudit-prow branch 4 times, most recently from f6dbe60 to 64e31b3 Compare May 9, 2021 23:29
@cncf-ci cncf-ci changed the title audit: update as of 2021-05-09 audit: update as of 2021-05-10 May 10, 2021
@cncf-ci cncf-ci force-pushed the autoaudit-prow branch 4 times, most recently from 7266cb5 to e6c3e52 Compare May 10, 2021 23:31
@cncf-ci cncf-ci force-pushed the autoaudit-prow branch 3 times, most recently from ccb1ac9 to 8029c36 Compare May 15, 2021 23:36
@cncf-ci cncf-ci changed the title audit: update as of 2021-05-15 audit: update as of 2021-05-16 May 16, 2021
@cncf-ci cncf-ci force-pushed the autoaudit-prow branch 4 times, most recently from 00b13a8 to 292a300 Compare May 16, 2021 23:38
@cncf-ci cncf-ci changed the title audit: update as of 2021-05-16 audit: update as of 2021-05-17 May 17, 2021
@cncf-ci cncf-ci force-pushed the autoaudit-prow branch 4 times, most recently from 0b6da0e to 8dab371 Compare May 17, 2021 23:38
@cncf-ci cncf-ci changed the title audit: update as of 2021-05-17 audit: update as of 2021-05-18 May 18, 2021
@spiffxp
Copy link
Contributor

spiffxp commented May 18, 2021

Uhhhh, well everything in audit/ getting deleted is certainly disconcerting. I'm going to assume the projects are all still present or we'd have heard a lot more complaints by now. Seems like the first commit for this PR deleted everything.

I'm going to guess #2010 is the culprit, specifically 9ebc221. What bindings does the group have that the service account does not?

@cncf-ci cncf-ci force-pushed the autoaudit-prow branch 2 times, most recently from 7bfee0f to 8d7408a Compare May 18, 2021 17:39
@spiffxp
Copy link
Contributor

spiffxp commented May 18, 2021

/assign

@cncf-ci cncf-ci changed the title audit: update as of 2021-05-18 audit: update as of 2021-05-19 May 19, 2021
{
"createTime": "2021-05-12T09:38:46.426Z",
"lifecycleState": "ACTIVE",
"name": "k8s-infra-public-pii",
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Project created by #2031.

Comment on lines +2 to +5
bigquery.googleapis.com BigQuery API
bigquerystorage.googleapis.com BigQuery Storage API
logging.googleapis.com Cloud Logging API
storage-component.googleapis.com Cloud Storage
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Services enabled by #2031.

@@ -0,0 +1,11 @@
{
"bindings": [
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

binding created when I created the project in #2031

Copy link
Contributor

@spiffxp spiffxp left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/approve
/lgtm
Merging to keep us current. I have some outstanding questions but nothing I feel compelled to block on.

Regard my reviews of k8s-infra-ii-sandbox: it's your playground, and if you'd rather move fast and iterate manually that's cool. I thought I'd review as if you were planning to actively use terraform to manage your project.

Comment on lines -98 to -103
{
"members": [
"group:k8s-infra-gcp-auditors@kubernetes.io"
],
"role": "roles/secretmanager.viewer"
},
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Expected. This was #2058 (specifically 16506e0)

Comment on lines +961 to +966
"secretmanager.locations.get",
"secretmanager.locations.list",
"secretmanager.secrets.get",
"secretmanager.secrets.getIamPolicy",
"secretmanager.secrets.list",
"secretmanager.versions.get",
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Expected. This was #2058, specifically 268c44d

Missing these permissions is what was breaking the audit job: #2055 (comment)

@@ -1,5 +1,6 @@
{
"createTime": "2021-04-08T20:32:11.215176Z",
"etag": "\"15bf7bf125b148\"",
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is new... we should make sure the audit script is deleting these

Opened #2062

Comment on lines +1 to +3
Bucket Policy Only setting for gs://export-c2e4nmc5jmg9n5nacc60:
Enabled: False

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

What created this bucket? @BobyMCbobs @bernokl @hh

Comment on lines +1 to +4
Bucket Policy Only setting for gs://ii_bq_scratch_dump:
Enabled: True
LockedTime: 2021-08-09 23:05:03.678000+00:00

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

What created this bucket? @BobyMCbobs @bernokl @hh

Comment on lines +3 to +5
bigqueryconnection.googleapis.com BigQuery Connection API
bigquerydatatransfer.googleapis.com BigQuery Data Transfer API
bigqueryreservation.googleapis.com BigQuery Reservation API
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

What enabled these services? @BobyMCbobs @bernokl @hh

Comment on lines +1 to +11
{
"createTime": "2021-05-12T09:38:46.426Z",
"lifecycleState": "ACTIVE",
"name": "k8s-infra-public-pii",
"parent": {
"id": "758905017065",
"type": "organization"
},
"projectId": "k8s-infra-public-pii",
"projectNumber": "226195303281"
}
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is there a PR open for this? @ameukam

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes, @ameukam reviewed before I finished my review. #2031

"members": [
"group:k8s-infra-staging-cluster-api-gcp@kubernetes.io"
"group:k8s-infra-staging-cluster-api-gcp@kubernetes.io",
"serviceAccount:gcb-builder-cluster-api-gcp@k8s-staging-cluster-api-gcp.iam.gserviceaccount.com"
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Expected. This was #2025

Comment on lines +24 to +29
{
"members": [
"serviceAccount:service-606075400249@compute-system.iam.gserviceaccount.com"
],
"role": "roles/compute.serviceAgent"
},
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This was also #2025

containerregistry.googleapis.com Container Registry API
containerscanning.googleapis.com Container Scanning API
logging.googleapis.com Cloud Logging API
oslogin.googleapis.com Cloud OS Login API
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Compute depends on this, so this gets enabled

@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: cncf-ci, spiffxp

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. area/audit Audit of project resources, audit followup issues, code in audit/ cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. lgtm "Looks good to me", indicates that a PR is ready to be merged. needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. size/L Denotes a PR that changes 100-499 lines, ignoring generated files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants