Update yaml org policies
This commit is contained in:
parent
6b767c9035
commit
d3bcf625f9
|
@ -3,71 +3,90 @@
|
||||||
# sample subset of useful organization policies, edit to suit requirements
|
# sample subset of useful organization policies, edit to suit requirements
|
||||||
|
|
||||||
compute.disableGuestAttributesAccess:
|
compute.disableGuestAttributesAccess:
|
||||||
enforce: true
|
rules:
|
||||||
|
- enforce: true
|
||||||
|
|
||||||
compute.requireOsLogin:
|
compute.requireOsLogin:
|
||||||
enforce: true
|
rules:
|
||||||
|
- enforce: true
|
||||||
|
|
||||||
compute.restrictLoadBalancerCreationForTypes:
|
compute.restrictLoadBalancerCreationForTypes:
|
||||||
allow:
|
rules:
|
||||||
|
- allow:
|
||||||
values:
|
values:
|
||||||
- in:INTERNAL
|
- in:INTERNAL
|
||||||
|
|
||||||
compute.skipDefaultNetworkCreation:
|
compute.skipDefaultNetworkCreation:
|
||||||
enforce: true
|
rules:
|
||||||
|
- enforce: true
|
||||||
|
|
||||||
compute.vmExternalIpAccess:
|
compute.vmExternalIpAccess:
|
||||||
deny:
|
rules:
|
||||||
|
- deny:
|
||||||
all: true
|
all: true
|
||||||
|
|
||||||
|
|
||||||
# compute.disableInternetNetworkEndpointGroup:
|
# compute.disableInternetNetworkEndpointGroup:
|
||||||
# enforce: true
|
# rules:
|
||||||
|
# - enforce: true
|
||||||
|
|
||||||
# compute.disableNestedVirtualization:
|
# compute.disableNestedVirtualization:
|
||||||
# enforce: true
|
# rules:
|
||||||
|
# - enforce: true
|
||||||
|
|
||||||
# compute.disableSerialPortAccess:
|
# compute.disableSerialPortAccess:
|
||||||
# enforce: true
|
# rules:
|
||||||
|
# - enforce: true
|
||||||
|
|
||||||
# compute.restrictCloudNATUsage:
|
# compute.restrictCloudNATUsage:
|
||||||
# deny:
|
# rules:
|
||||||
|
# - deny:
|
||||||
# all: true
|
# all: true
|
||||||
|
|
||||||
# compute.restrictDedicatedInterconnectUsage:
|
# compute.restrictDedicatedInterconnectUsage:
|
||||||
# deny:
|
# rules:
|
||||||
|
# - deny:
|
||||||
# all: true
|
# all: true
|
||||||
|
|
||||||
# compute.restrictPartnerInterconnectUsage:
|
# compute.restrictPartnerInterconnectUsage:
|
||||||
# deny:
|
# rules:
|
||||||
|
# - deny:
|
||||||
# all: true
|
# all: true
|
||||||
|
|
||||||
# compute.restrictProtocolForwardingCreationForTypes:
|
# compute.restrictProtocolForwardingCreationForTypes:
|
||||||
# deny:
|
# rules:
|
||||||
|
# - deny:
|
||||||
# all: true
|
# all: true
|
||||||
|
|
||||||
# compute.restrictSharedVpcHostProjects:
|
# compute.restrictSharedVpcHostProjects:
|
||||||
# deny:
|
# rules:
|
||||||
|
# - deny:
|
||||||
# all: true
|
# all: true
|
||||||
|
|
||||||
# compute.restrictSharedVpcSubnetworks:
|
# compute.restrictSharedVpcSubnetworks:
|
||||||
# deny:
|
# rules:
|
||||||
|
# - deny:
|
||||||
# all: true
|
# all: true
|
||||||
|
|
||||||
# compute.restrictVpcPeering:
|
# compute.restrictVpcPeering:
|
||||||
# deny:
|
# rules:
|
||||||
|
# - deny:
|
||||||
# all: true
|
# all: true
|
||||||
|
|
||||||
# compute.restrictVpnPeerIPs:
|
# compute.restrictVpnPeerIPs:
|
||||||
# deny:
|
# rules:
|
||||||
|
# - deny:
|
||||||
# all: true
|
# all: true
|
||||||
|
|
||||||
# compute.restrictXpnProjectLienRemoval:
|
# compute.restrictXpnProjectLienRemoval:
|
||||||
# enforce: true
|
# rules:
|
||||||
|
# - enforce: true
|
||||||
|
|
||||||
# compute.setNewProjectDefaultToZonalDNSOnly:
|
# compute.setNewProjectDefaultToZonalDNSOnly:
|
||||||
# enforce: true
|
# rules:
|
||||||
|
# - enforce: true
|
||||||
|
|
||||||
# compute.vmCanIpForward:
|
# compute.vmCanIpForward:
|
||||||
# deny:
|
# rules:
|
||||||
|
# - deny:
|
||||||
# all: true
|
# all: true
|
||||||
|
|
|
@ -3,10 +3,13 @@
|
||||||
# sample subset of useful organization policies, edit to suit requirements
|
# sample subset of useful organization policies, edit to suit requirements
|
||||||
|
|
||||||
iam.automaticIamGrantsForDefaultServiceAccounts:
|
iam.automaticIamGrantsForDefaultServiceAccounts:
|
||||||
enforce: true
|
rules:
|
||||||
|
- enforce: true
|
||||||
|
|
||||||
iam.disableServiceAccountKeyCreation:
|
iam.disableServiceAccountKeyCreation:
|
||||||
enforce: true
|
rules:
|
||||||
|
- enforce: true
|
||||||
|
|
||||||
iam.disableServiceAccountKeyUpload:
|
iam.disableServiceAccountKeyUpload:
|
||||||
enforce: true
|
rules:
|
||||||
|
- enforce: true
|
||||||
|
|
|
@ -3,24 +3,29 @@
|
||||||
# sample subset of useful organization policies, edit to suit requirements
|
# sample subset of useful organization policies, edit to suit requirements
|
||||||
|
|
||||||
run.allowedIngress:
|
run.allowedIngress:
|
||||||
allow:
|
rules:
|
||||||
|
- allow:
|
||||||
values:
|
values:
|
||||||
- is:internal
|
- is:internal
|
||||||
|
|
||||||
# run.allowedVPCEgress:
|
# run.allowedVPCEgress:
|
||||||
# allow:
|
# rules:
|
||||||
|
# - allow:
|
||||||
# values:
|
# values:
|
||||||
# - is:private-ranges-only
|
# - is:private-ranges-only
|
||||||
|
|
||||||
# cloudfunctions.allowedIngressSettings:
|
# cloudfunctions.allowedIngressSettings:
|
||||||
# allow:
|
# rules:
|
||||||
|
# - allow:
|
||||||
# values:
|
# values:
|
||||||
# - is:ALLOW_INTERNAL_ONLY
|
# - is:ALLOW_INTERNAL_ONLY
|
||||||
|
|
||||||
# cloudfunctions.allowedVpcConnectorEgressSettings:
|
# cloudfunctions.allowedVpcConnectorEgressSettings:
|
||||||
# allow:
|
# rules:
|
||||||
|
# - allow:
|
||||||
# values:
|
# values:
|
||||||
# - is:PRIVATE_RANGES_ONLY
|
# - is:PRIVATE_RANGES_ONLY
|
||||||
|
|
||||||
# cloudfunctions.requireVPCConnector:
|
# cloudfunctions.requireVPCConnector:
|
||||||
# enforce: true
|
# rules:
|
||||||
|
# - enforce: true
|
||||||
|
|
|
@ -3,7 +3,9 @@
|
||||||
# sample subset of useful organization policies, edit to suit requirements
|
# sample subset of useful organization policies, edit to suit requirements
|
||||||
|
|
||||||
sql.restrictAuthorizedNetworks:
|
sql.restrictAuthorizedNetworks:
|
||||||
enforce: true
|
rules:
|
||||||
|
- enforce: true
|
||||||
|
|
||||||
sql.restrictPublicIp:
|
sql.restrictPublicIp:
|
||||||
enforce: true
|
rules:
|
||||||
|
- enforce: true
|
||||||
|
|
|
@ -3,4 +3,5 @@
|
||||||
# sample subset of useful organization policies, edit to suit requirements
|
# sample subset of useful organization policies, edit to suit requirements
|
||||||
|
|
||||||
storage.uniformBucketLevelAccess:
|
storage.uniformBucketLevelAccess:
|
||||||
enforce: true
|
rules:
|
||||||
|
- enforce: true
|
||||||
|
|
|
@ -3,71 +3,90 @@
|
||||||
# sample subset of useful organization policies, edit to suit requirements
|
# sample subset of useful organization policies, edit to suit requirements
|
||||||
|
|
||||||
compute.disableGuestAttributesAccess:
|
compute.disableGuestAttributesAccess:
|
||||||
enforce: true
|
rules:
|
||||||
|
- enforce: true
|
||||||
|
|
||||||
compute.requireOsLogin:
|
compute.requireOsLogin:
|
||||||
enforce: true
|
rules:
|
||||||
|
- enforce: true
|
||||||
|
|
||||||
compute.restrictLoadBalancerCreationForTypes:
|
compute.restrictLoadBalancerCreationForTypes:
|
||||||
allow:
|
rules:
|
||||||
|
- allow:
|
||||||
values:
|
values:
|
||||||
- in:INTERNAL
|
- in:INTERNAL
|
||||||
|
|
||||||
compute.skipDefaultNetworkCreation:
|
compute.skipDefaultNetworkCreation:
|
||||||
enforce: true
|
rules:
|
||||||
|
- enforce: true
|
||||||
|
|
||||||
compute.vmExternalIpAccess:
|
compute.vmExternalIpAccess:
|
||||||
deny:
|
rules:
|
||||||
|
- deny:
|
||||||
all: true
|
all: true
|
||||||
|
|
||||||
|
|
||||||
# compute.disableInternetNetworkEndpointGroup:
|
# compute.disableInternetNetworkEndpointGroup:
|
||||||
# enforce: true
|
# rules:
|
||||||
|
# - enforce: true
|
||||||
|
|
||||||
# compute.disableNestedVirtualization:
|
# compute.disableNestedVirtualization:
|
||||||
# enforce: true
|
# rules:
|
||||||
|
# - enforce: true
|
||||||
|
|
||||||
# compute.disableSerialPortAccess:
|
# compute.disableSerialPortAccess:
|
||||||
# enforce: true
|
# rules:
|
||||||
|
# - enforce: true
|
||||||
|
|
||||||
# compute.restrictCloudNATUsage:
|
# compute.restrictCloudNATUsage:
|
||||||
# deny:
|
# rules:
|
||||||
|
# - deny:
|
||||||
# all: true
|
# all: true
|
||||||
|
|
||||||
# compute.restrictDedicatedInterconnectUsage:
|
# compute.restrictDedicatedInterconnectUsage:
|
||||||
# deny:
|
# rules:
|
||||||
|
# - deny:
|
||||||
# all: true
|
# all: true
|
||||||
|
|
||||||
# compute.restrictPartnerInterconnectUsage:
|
# compute.restrictPartnerInterconnectUsage:
|
||||||
# deny:
|
# rules:
|
||||||
|
# - deny:
|
||||||
# all: true
|
# all: true
|
||||||
|
|
||||||
# compute.restrictProtocolForwardingCreationForTypes:
|
# compute.restrictProtocolForwardingCreationForTypes:
|
||||||
# deny:
|
# rules:
|
||||||
|
# - deny:
|
||||||
# all: true
|
# all: true
|
||||||
|
|
||||||
# compute.restrictSharedVpcHostProjects:
|
# compute.restrictSharedVpcHostProjects:
|
||||||
# deny:
|
# rules:
|
||||||
|
# - deny:
|
||||||
# all: true
|
# all: true
|
||||||
|
|
||||||
# compute.restrictSharedVpcSubnetworks:
|
# compute.restrictSharedVpcSubnetworks:
|
||||||
# deny:
|
# rules:
|
||||||
|
# - deny:
|
||||||
# all: true
|
# all: true
|
||||||
|
|
||||||
# compute.restrictVpcPeering:
|
# compute.restrictVpcPeering:
|
||||||
# deny:
|
# rules:
|
||||||
|
# - deny:
|
||||||
# all: true
|
# all: true
|
||||||
|
|
||||||
# compute.restrictVpnPeerIPs:
|
# compute.restrictVpnPeerIPs:
|
||||||
# deny:
|
# rules:
|
||||||
|
# - deny:
|
||||||
# all: true
|
# all: true
|
||||||
|
|
||||||
# compute.restrictXpnProjectLienRemoval:
|
# compute.restrictXpnProjectLienRemoval:
|
||||||
# enforce: true
|
# rules:
|
||||||
|
# - enforce: true
|
||||||
|
|
||||||
# compute.setNewProjectDefaultToZonalDNSOnly:
|
# compute.setNewProjectDefaultToZonalDNSOnly:
|
||||||
# enforce: true
|
# rules:
|
||||||
|
# - enforce: true
|
||||||
|
|
||||||
# compute.vmCanIpForward:
|
# compute.vmCanIpForward:
|
||||||
# deny:
|
# rules:
|
||||||
|
# - deny:
|
||||||
# all: true
|
# all: true
|
||||||
|
|
|
@ -3,10 +3,13 @@
|
||||||
# sample subset of useful organization policies, edit to suit requirements
|
# sample subset of useful organization policies, edit to suit requirements
|
||||||
|
|
||||||
iam.automaticIamGrantsForDefaultServiceAccounts:
|
iam.automaticIamGrantsForDefaultServiceAccounts:
|
||||||
enforce: true
|
rules:
|
||||||
|
- enforce: true
|
||||||
|
|
||||||
iam.disableServiceAccountKeyCreation:
|
iam.disableServiceAccountKeyCreation:
|
||||||
enforce: true
|
rules:
|
||||||
|
- enforce: true
|
||||||
|
|
||||||
iam.disableServiceAccountKeyUpload:
|
iam.disableServiceAccountKeyUpload:
|
||||||
enforce: true
|
rules:
|
||||||
|
- enforce: true
|
||||||
|
|
|
@ -3,24 +3,29 @@
|
||||||
# sample subset of useful organization policies, edit to suit requirements
|
# sample subset of useful organization policies, edit to suit requirements
|
||||||
|
|
||||||
run.allowedIngress:
|
run.allowedIngress:
|
||||||
allow:
|
rules:
|
||||||
|
- allow:
|
||||||
values:
|
values:
|
||||||
- is:internal
|
- is:internal
|
||||||
|
|
||||||
# run.allowedVPCEgress:
|
# run.allowedVPCEgress:
|
||||||
# allow:
|
# rules:
|
||||||
|
# - allow:
|
||||||
# values:
|
# values:
|
||||||
# - is:private-ranges-only
|
# - is:private-ranges-only
|
||||||
|
|
||||||
# cloudfunctions.allowedIngressSettings:
|
# cloudfunctions.allowedIngressSettings:
|
||||||
# allow:
|
# rules:
|
||||||
|
# - allow:
|
||||||
# values:
|
# values:
|
||||||
# - is:ALLOW_INTERNAL_ONLY
|
# - is:ALLOW_INTERNAL_ONLY
|
||||||
|
|
||||||
# cloudfunctions.allowedVpcConnectorEgressSettings:
|
# cloudfunctions.allowedVpcConnectorEgressSettings:
|
||||||
# allow:
|
# rules:
|
||||||
|
# - allow:
|
||||||
# values:
|
# values:
|
||||||
# - is:PRIVATE_RANGES_ONLY
|
# - is:PRIVATE_RANGES_ONLY
|
||||||
|
|
||||||
# cloudfunctions.requireVPCConnector:
|
# cloudfunctions.requireVPCConnector:
|
||||||
# enforce: true
|
# rules:
|
||||||
|
# - enforce: true
|
||||||
|
|
|
@ -3,4 +3,5 @@
|
||||||
# sample subset of useful organization policies, edit to suit requirements
|
# sample subset of useful organization policies, edit to suit requirements
|
||||||
|
|
||||||
storage.uniformBucketLevelAccess:
|
storage.uniformBucketLevelAccess:
|
||||||
enforce: true
|
rules:
|
||||||
|
- enforce: true
|
||||||
|
|
|
@ -3,71 +3,90 @@
|
||||||
# sample subset of useful organization policies, edit to suit requirements
|
# sample subset of useful organization policies, edit to suit requirements
|
||||||
|
|
||||||
compute.disableGuestAttributesAccess:
|
compute.disableGuestAttributesAccess:
|
||||||
enforce: true
|
rules:
|
||||||
|
- enforce: true
|
||||||
|
|
||||||
compute.requireOsLogin:
|
compute.requireOsLogin:
|
||||||
enforce: true
|
rules:
|
||||||
|
- enforce: true
|
||||||
|
|
||||||
compute.restrictLoadBalancerCreationForTypes:
|
compute.restrictLoadBalancerCreationForTypes:
|
||||||
allow:
|
rules:
|
||||||
|
- allow:
|
||||||
values:
|
values:
|
||||||
- in:INTERNAL
|
- in:INTERNAL
|
||||||
|
|
||||||
compute.skipDefaultNetworkCreation:
|
compute.skipDefaultNetworkCreation:
|
||||||
enforce: true
|
rules:
|
||||||
|
- enforce: true
|
||||||
|
|
||||||
compute.vmExternalIpAccess:
|
compute.vmExternalIpAccess:
|
||||||
deny:
|
rules:
|
||||||
|
- deny:
|
||||||
all: true
|
all: true
|
||||||
|
|
||||||
|
|
||||||
# compute.disableInternetNetworkEndpointGroup:
|
# compute.disableInternetNetworkEndpointGroup:
|
||||||
# enforce: true
|
# rules:
|
||||||
|
# - enforce: true
|
||||||
|
|
||||||
# compute.disableNestedVirtualization:
|
# compute.disableNestedVirtualization:
|
||||||
# enforce: true
|
# rules:
|
||||||
|
# - enforce: true
|
||||||
|
|
||||||
# compute.disableSerialPortAccess:
|
# compute.disableSerialPortAccess:
|
||||||
# enforce: true
|
# rules:
|
||||||
|
# - enforce: true
|
||||||
|
|
||||||
# compute.restrictCloudNATUsage:
|
# compute.restrictCloudNATUsage:
|
||||||
# deny:
|
# rules:
|
||||||
|
# - deny:
|
||||||
# all: true
|
# all: true
|
||||||
|
|
||||||
# compute.restrictDedicatedInterconnectUsage:
|
# compute.restrictDedicatedInterconnectUsage:
|
||||||
# deny:
|
# rules:
|
||||||
|
# - deny:
|
||||||
# all: true
|
# all: true
|
||||||
|
|
||||||
# compute.restrictPartnerInterconnectUsage:
|
# compute.restrictPartnerInterconnectUsage:
|
||||||
# deny:
|
# rules:
|
||||||
|
# - deny:
|
||||||
# all: true
|
# all: true
|
||||||
|
|
||||||
# compute.restrictProtocolForwardingCreationForTypes:
|
# compute.restrictProtocolForwardingCreationForTypes:
|
||||||
# deny:
|
# rules:
|
||||||
|
# - deny:
|
||||||
# all: true
|
# all: true
|
||||||
|
|
||||||
# compute.restrictSharedVpcHostProjects:
|
# compute.restrictSharedVpcHostProjects:
|
||||||
# deny:
|
# rules:
|
||||||
|
# - deny:
|
||||||
# all: true
|
# all: true
|
||||||
|
|
||||||
# compute.restrictSharedVpcSubnetworks:
|
# compute.restrictSharedVpcSubnetworks:
|
||||||
# deny:
|
# rules:
|
||||||
|
# - deny:
|
||||||
# all: true
|
# all: true
|
||||||
|
|
||||||
# compute.restrictVpcPeering:
|
# compute.restrictVpcPeering:
|
||||||
# deny:
|
# rules:
|
||||||
|
# - deny:
|
||||||
# all: true
|
# all: true
|
||||||
|
|
||||||
# compute.restrictVpnPeerIPs:
|
# compute.restrictVpnPeerIPs:
|
||||||
# deny:
|
# rules:
|
||||||
|
# - deny:
|
||||||
# all: true
|
# all: true
|
||||||
|
|
||||||
# compute.restrictXpnProjectLienRemoval:
|
# compute.restrictXpnProjectLienRemoval:
|
||||||
# enforce: true
|
# rules:
|
||||||
|
# - enforce: true
|
||||||
|
|
||||||
# compute.setNewProjectDefaultToZonalDNSOnly:
|
# compute.setNewProjectDefaultToZonalDNSOnly:
|
||||||
# enforce: true
|
# rules:
|
||||||
|
# - enforce: true
|
||||||
|
|
||||||
# compute.vmCanIpForward:
|
# compute.vmCanIpForward:
|
||||||
# deny:
|
# rules:
|
||||||
|
# - deny:
|
||||||
# all: true
|
# all: true
|
||||||
|
|
|
@ -3,10 +3,13 @@
|
||||||
# sample subset of useful organization policies, edit to suit requirements
|
# sample subset of useful organization policies, edit to suit requirements
|
||||||
|
|
||||||
iam.automaticIamGrantsForDefaultServiceAccounts:
|
iam.automaticIamGrantsForDefaultServiceAccounts:
|
||||||
enforce: true
|
rules:
|
||||||
|
- enforce: true
|
||||||
|
|
||||||
iam.disableServiceAccountKeyCreation:
|
iam.disableServiceAccountKeyCreation:
|
||||||
enforce: true
|
rules:
|
||||||
|
- enforce: true
|
||||||
|
|
||||||
iam.disableServiceAccountKeyUpload:
|
iam.disableServiceAccountKeyUpload:
|
||||||
enforce: true
|
rules:
|
||||||
|
- enforce: true
|
||||||
|
|
|
@ -3,24 +3,29 @@
|
||||||
# sample subset of useful organization policies, edit to suit requirements
|
# sample subset of useful organization policies, edit to suit requirements
|
||||||
|
|
||||||
run.allowedIngress:
|
run.allowedIngress:
|
||||||
allow:
|
rules:
|
||||||
|
- allow:
|
||||||
values:
|
values:
|
||||||
- is:internal
|
- is:internal
|
||||||
|
|
||||||
# run.allowedVPCEgress:
|
# run.allowedVPCEgress:
|
||||||
# allow:
|
# rules:
|
||||||
|
# - allow:
|
||||||
# values:
|
# values:
|
||||||
# - is:private-ranges-only
|
# - is:private-ranges-only
|
||||||
|
|
||||||
# cloudfunctions.allowedIngressSettings:
|
# cloudfunctions.allowedIngressSettings:
|
||||||
# allow:
|
# rules:
|
||||||
|
# - allow:
|
||||||
# values:
|
# values:
|
||||||
# - is:ALLOW_INTERNAL_ONLY
|
# - is:ALLOW_INTERNAL_ONLY
|
||||||
|
|
||||||
# cloudfunctions.allowedVpcConnectorEgressSettings:
|
# cloudfunctions.allowedVpcConnectorEgressSettings:
|
||||||
# allow:
|
# rules:
|
||||||
|
# - allow:
|
||||||
# values:
|
# values:
|
||||||
# - is:PRIVATE_RANGES_ONLY
|
# - is:PRIVATE_RANGES_ONLY
|
||||||
|
|
||||||
# cloudfunctions.requireVPCConnector:
|
# cloudfunctions.requireVPCConnector:
|
||||||
# enforce: true
|
# rules:
|
||||||
|
# - enforce: true
|
||||||
|
|
|
@ -3,7 +3,9 @@
|
||||||
# sample subset of useful organization policies, edit to suit requirements
|
# sample subset of useful organization policies, edit to suit requirements
|
||||||
|
|
||||||
sql.restrictAuthorizedNetworks:
|
sql.restrictAuthorizedNetworks:
|
||||||
enforce: true
|
rules:
|
||||||
|
- enforce: true
|
||||||
|
|
||||||
sql.restrictPublicIp:
|
sql.restrictPublicIp:
|
||||||
enforce: true
|
rules:
|
||||||
|
- enforce: true
|
||||||
|
|
|
@ -3,4 +3,5 @@
|
||||||
# sample subset of useful organization policies, edit to suit requirements
|
# sample subset of useful organization policies, edit to suit requirements
|
||||||
|
|
||||||
storage.uniformBucketLevelAccess:
|
storage.uniformBucketLevelAccess:
|
||||||
enforce: true
|
rules:
|
||||||
|
- enforce: true
|
||||||
|
|
|
@ -11,7 +11,6 @@ org_policies = {
|
||||||
}]
|
}]
|
||||||
}
|
}
|
||||||
"compute.restrictLoadBalancerCreationForTypes" = {
|
"compute.restrictLoadBalancerCreationForTypes" = {
|
||||||
|
|
||||||
rules = [
|
rules = [
|
||||||
{
|
{
|
||||||
condition = {
|
condition = {
|
||||||
|
|
Loading…
Reference in New Issue