roles: add more pre-defined roles to audit.viewer and prow.viewer#2099
roles: add more pre-defined roles to audit.viewer and prow.viewer#2099k8s-ci-robot merged 3 commits intokubernetes:mainfrom
Conversation
Include permissions from service-specific viewer roles based on a survey of services that are active across the organization: - roles/bigquery.metadataViewer - roles/bigquery.resourceViewer - roles/cloudkms.publicKeyViewer - roles/container.clusterViewer - roles/logging.viewer # see note below - roles/monitoring.viewer - roles/pubsub.viewer NOTE: the logging.queries.* permissions that would normally come in from roles/logging.viewer have been excluded, to prevent auditors from modifying existing logging queries in projects Add TODO's for two services we should audit, but may need to avoid if there are potentially sensitive values accidentally stored in configuration-related resources: - roles/cloudbuild.builds.viewer - roles/run.viewer Rephrase TODO for serviceusage role. We should really stop applying it at the organization level.
Include some of the same roles included for audit.viewer
|
@spiffxp: GitHub didn't allow me to request PR reviews from the following users: bernokl. Note that only kubernetes members and repo collaborators can review this PR, and authors cannot review their own PRs. |
|
/hold |
|
Ran Using #2100 to test |
|
/hold cancel |
|
/approve |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: dims, spiffxp The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
This will hopefully address the audit job not seeing all bigquery assets: #2029 (comment)
For audit.viewer...
Include permissions from service-specific viewer roles based on a survey of services that are active across the organization:
NOTE: the logging.queries.* permissions that would normally come in from roles/logging.viewer have been excluded, to prevent auditors from modifying existing logging queries in projects
Add TODO's for two services we should audit, but may need to avoid if there are potentially sensitive values accidentally stored in configuration-related resources:
Rephrase TODO for serviceusage role. We should really stop applying it at the organization level.
For prow.viewer, add: