Skip to content

Commit

Permalink
Fetch all roles
Browse files Browse the repository at this point in the history
  • Loading branch information
bgeesaman committed Sep 21, 2024
1 parent eb5d3c2 commit 2b6ffde
Show file tree
Hide file tree
Showing 9 changed files with 0 additions and 96 deletions.
8 changes: 0 additions & 8 deletions gcp_roles_cai.json
Original file line number Diff line number Diff line change
Expand Up @@ -1186,14 +1186,6 @@
{"description":"Gives the On-Demand Scanning API the access it needs to function.","etag":"AA==","includedPermissions":["artifactregistry.dockerimages.get","artifactregistry.dockerimages.list","artifactregistry.files.download","artifactregistry.files.get","artifactregistry.files.list","artifactregistry.locations.get","artifactregistry.locations.list","artifactregistry.mavenartifacts.get","artifactregistry.mavenartifacts.list","artifactregistry.npmpackages.get","artifactregistry.npmpackages.list","artifactregistry.packages.get","artifactregistry.packages.list","artifactregistry.projectsettings.get","artifactregistry.pythonpackages.get","artifactregistry.pythonpackages.list","artifactregistry.repositories.downloadArtifacts","artifactregistry.repositories.get","artifactregistry.repositories.list","artifactregistry.repositories.listEffectiveTags","artifactregistry.repositories.listTagBindings","artifactregistry.repositories.readViaVirtualRepository","artifactregistry.tags.get","artifactregistry.tags.list","artifactregistry.versions.get","artifactregistry.versions.list","resourcemanager.projects.get","resourcemanager.projects.list","storage.objects.get","storage.objects.list"],"name":"roles/ondemandscanning.serviceAgent","stage":"GA","title":"On-Demand Scanning Service Agent","asset_type":"iam.googleapis.com/ExportedIAMRole"}
{"description":"Read-only access to resource metadata.","etag":"AA==","includedPermissions":["opsconfigmonitoring.resourceMetadata.list"],"name":"roles/opsconfigmonitoring.resourceMetadata.viewer","stage":"BETA","title":"Ops Config Monitoring Resource Metadata Viewer","asset_type":"iam.googleapis.com/ExportedIAMRole"}
{"description":"Write-only access to resource metadata. This provides exactly the permissions needed by the Ops Config Monitoring metadata agent and other systems that send metadata.","etag":"AA==","includedPermissions":["opsconfigmonitoring.resourceMetadata.write"],"name":"roles/opsconfigmonitoring.resourceMetadata.writer","stage":"BETA","title":"Ops Config Monitoring Resource Metadata Writer","asset_type":"iam.googleapis.com/ExportedIAMRole"}
{"description":"Grants full access to manage all Oracle Database resources.","etag":"AA==","includedPermissions":["resourcemanager.projects.get","resourcemanager.projects.list"],"name":"roles/oracledatabase.admin","stage":"ALPHA","title":"Oracle Database @ Google Cloud admin","asset_type":"iam.googleapis.com/ExportedIAMRole"}
{"description":"Grants full access to manage all Autonomous Database resources.","etag":"AA==","includedPermissions":["resourcemanager.projects.get","resourcemanager.projects.list"],"name":"roles/oracledatabase.autonomousDatabaseAdmin","stage":"ALPHA","title":"Oracle Database @ Google Cloud Autonomous Database Admin","asset_type":"iam.googleapis.com/ExportedIAMRole"}
{"description":"Grants read access to see all Autonomous Database resources.","etag":"AA==","includedPermissions":["resourcemanager.projects.get","resourcemanager.projects.list"],"name":"roles/oracledatabase.autonomousDatabaseViewer","stage":"ALPHA","title":"Oracle Database @ Google Cloud Autonomous Database Viewer","asset_type":"iam.googleapis.com/ExportedIAMRole"}
{"description":"Grants full access to manage all Exadata Infrastructure resources.","etag":"AA==","includedPermissions":["resourcemanager.projects.get","resourcemanager.projects.list"],"name":"roles/oracledatabase.cloudExadataInfrastructureAdmin","stage":"ALPHA","title":"Oracle Database @ Google Cloud Exadata Infrastructure Admin","asset_type":"iam.googleapis.com/ExportedIAMRole"}
{"description":"Grants read access to see all Exadata Infrastructure resources.","etag":"AA==","includedPermissions":["resourcemanager.projects.get","resourcemanager.projects.list"],"name":"roles/oracledatabase.cloudExadataInfrastructureViewer","stage":"ALPHA","title":"Oracle Database @ Google Cloud Exadata Infrastructure Viewer","asset_type":"iam.googleapis.com/ExportedIAMRole"}
{"description":"Grants full access to manage all VM Cluster resources.","etag":"AA==","includedPermissions":["resourcemanager.projects.get","resourcemanager.projects.list"],"name":"roles/oracledatabase.cloudVmClusterAdmin","stage":"ALPHA","title":"Oracle Database @ Google Cloud VM Cluster Admin","asset_type":"iam.googleapis.com/ExportedIAMRole"}
{"description":"Grants read access to see all VM Cluster resources.","etag":"AA==","includedPermissions":["resourcemanager.projects.get","resourcemanager.projects.list"],"name":"roles/oracledatabase.cloudVmClusterViewer","stage":"ALPHA","title":"Oracle Database @ Google Cloud VM Cluster Viewer","asset_type":"iam.googleapis.com/ExportedIAMRole"}
{"description":"Grants view access to all Oracle Database resources.","etag":"AA==","includedPermissions":["resourcemanager.projects.get","resourcemanager.projects.list"],"name":"roles/oracledatabase.viewer","stage":"ALPHA","title":"Oracle Database @ Google Cloud viewer","asset_type":"iam.googleapis.com/ExportedIAMRole"}
{"description":"The permission to set Organization Policies on resources.","etag":"AA==","includedPermissions":["orgpolicy.constraints.list","orgpolicy.customConstraints.create","orgpolicy.customConstraints.delete","orgpolicy.customConstraints.get","orgpolicy.customConstraints.list","orgpolicy.customConstraints.update","orgpolicy.policies.create","orgpolicy.policies.delete","orgpolicy.policies.list","orgpolicy.policies.update","orgpolicy.policy.get","orgpolicy.policy.set","policysimulator.orgPolicyViolations.list","policysimulator.orgPolicyViolationsPreviews.create","policysimulator.orgPolicyViolationsPreviews.get","policysimulator.orgPolicyViolationsPreviews.list"],"name":"roles/orgpolicy.policyAdmin","stage":"GA","title":"Organization Policy Administrator","asset_type":"iam.googleapis.com/ExportedIAMRole"}
{"description":"Access to view Organization Policies on resources.","etag":"AA==","includedPermissions":["orgpolicy.constraints.list","orgpolicy.customConstraints.get","orgpolicy.customConstraints.list","orgpolicy.policies.list","orgpolicy.policy.get"],"name":"roles/orgpolicy.policyViewer","stage":"GA","title":"Organization Policy Viewer","asset_type":"iam.googleapis.com/ExportedIAMRole"}
{"description":"Full access to OS Config resources","etag":"AA==","includedPermissions":["osconfig.guestPolicies.create","osconfig.guestPolicies.delete","osconfig.guestPolicies.get","osconfig.guestPolicies.list","osconfig.guestPolicies.update","osconfig.instanceOSPoliciesCompliances.get","osconfig.instanceOSPoliciesCompliances.list","osconfig.inventories.get","osconfig.inventories.list","osconfig.osPolicyAssignmentReports.get","osconfig.osPolicyAssignmentReports.list","osconfig.osPolicyAssignmentReports.searchSummaries","osconfig.osPolicyAssignments.create","osconfig.osPolicyAssignments.delete","osconfig.osPolicyAssignments.get","osconfig.osPolicyAssignments.list","osconfig.osPolicyAssignments.searchPolicies","osconfig.osPolicyAssignments.update","osconfig.patchDeployments.create","osconfig.patchDeployments.delete","osconfig.patchDeployments.execute","osconfig.patchDeployments.get","osconfig.patchDeployments.list","osconfig.patchDeployments.pause","osconfig.patchDeployments.resume","osconfig.patchDeployments.update","osconfig.patchJobs.exec","osconfig.patchJobs.get","osconfig.patchJobs.list","osconfig.projectFeatureSettings.get","osconfig.projectFeatureSettings.update","osconfig.upgradeReports.get","osconfig.upgradeReports.getSummary","osconfig.upgradeReports.list","osconfig.upgradeReports.searchSummaries","osconfig.vulnerabilityReports.get","osconfig.vulnerabilityReports.list"],"name":"roles/osconfig.admin","stage":"BETA","title":"OS Config Admin","asset_type":"iam.googleapis.com/ExportedIAMRole"}
Expand Down
11 changes: 0 additions & 11 deletions roles/oracledatabase.admin

This file was deleted.

11 changes: 0 additions & 11 deletions roles/oracledatabase.autonomousDatabaseAdmin

This file was deleted.

11 changes: 0 additions & 11 deletions roles/oracledatabase.autonomousDatabaseViewer

This file was deleted.

11 changes: 0 additions & 11 deletions roles/oracledatabase.cloudExadataInfrastructureAdmin

This file was deleted.

11 changes: 0 additions & 11 deletions roles/oracledatabase.cloudExadataInfrastructureViewer

This file was deleted.

11 changes: 0 additions & 11 deletions roles/oracledatabase.cloudVmClusterAdmin

This file was deleted.

11 changes: 0 additions & 11 deletions roles/oracledatabase.cloudVmClusterViewer

This file was deleted.

11 changes: 0 additions & 11 deletions roles/oracledatabase.viewer

This file was deleted.

0 comments on commit 2b6ffde

Please sign in to comment.