diff --git a/gcp_roles_cai.json b/gcp_roles_cai.json index 1511fc5d..d140478f 100644 --- a/gcp_roles_cai.json +++ b/gcp_roles_cai.json @@ -1186,14 +1186,6 @@ {"description":"Gives the On-Demand Scanning API the access it needs to function.","etag":"AA==","includedPermissions":["artifactregistry.dockerimages.get","artifactregistry.dockerimages.list","artifactregistry.files.download","artifactregistry.files.get","artifactregistry.files.list","artifactregistry.locations.get","artifactregistry.locations.list","artifactregistry.mavenartifacts.get","artifactregistry.mavenartifacts.list","artifactregistry.npmpackages.get","artifactregistry.npmpackages.list","artifactregistry.packages.get","artifactregistry.packages.list","artifactregistry.projectsettings.get","artifactregistry.pythonpackages.get","artifactregistry.pythonpackages.list","artifactregistry.repositories.downloadArtifacts","artifactregistry.repositories.get","artifactregistry.repositories.list","artifactregistry.repositories.listEffectiveTags","artifactregistry.repositories.listTagBindings","artifactregistry.repositories.readViaVirtualRepository","artifactregistry.tags.get","artifactregistry.tags.list","artifactregistry.versions.get","artifactregistry.versions.list","resourcemanager.projects.get","resourcemanager.projects.list","storage.objects.get","storage.objects.list"],"name":"roles/ondemandscanning.serviceAgent","stage":"GA","title":"On-Demand Scanning Service Agent","asset_type":"iam.googleapis.com/ExportedIAMRole"} {"description":"Read-only access to resource metadata.","etag":"AA==","includedPermissions":["opsconfigmonitoring.resourceMetadata.list"],"name":"roles/opsconfigmonitoring.resourceMetadata.viewer","stage":"BETA","title":"Ops Config Monitoring Resource Metadata Viewer","asset_type":"iam.googleapis.com/ExportedIAMRole"} {"description":"Write-only access to resource metadata. This provides exactly the permissions needed by the Ops Config Monitoring metadata agent and other systems that send metadata.","etag":"AA==","includedPermissions":["opsconfigmonitoring.resourceMetadata.write"],"name":"roles/opsconfigmonitoring.resourceMetadata.writer","stage":"BETA","title":"Ops Config Monitoring Resource Metadata Writer","asset_type":"iam.googleapis.com/ExportedIAMRole"} -{"description":"Grants full access to manage all Oracle Database resources.","etag":"AA==","includedPermissions":["resourcemanager.projects.get","resourcemanager.projects.list"],"name":"roles/oracledatabase.admin","stage":"ALPHA","title":"Oracle Database @ Google Cloud admin","asset_type":"iam.googleapis.com/ExportedIAMRole"} -{"description":"Grants full access to manage all Autonomous Database resources.","etag":"AA==","includedPermissions":["resourcemanager.projects.get","resourcemanager.projects.list"],"name":"roles/oracledatabase.autonomousDatabaseAdmin","stage":"ALPHA","title":"Oracle Database @ Google Cloud Autonomous Database Admin","asset_type":"iam.googleapis.com/ExportedIAMRole"} -{"description":"Grants read access to see all Autonomous Database resources.","etag":"AA==","includedPermissions":["resourcemanager.projects.get","resourcemanager.projects.list"],"name":"roles/oracledatabase.autonomousDatabaseViewer","stage":"ALPHA","title":"Oracle Database @ Google Cloud Autonomous Database Viewer","asset_type":"iam.googleapis.com/ExportedIAMRole"} -{"description":"Grants full access to manage all Exadata Infrastructure resources.","etag":"AA==","includedPermissions":["resourcemanager.projects.get","resourcemanager.projects.list"],"name":"roles/oracledatabase.cloudExadataInfrastructureAdmin","stage":"ALPHA","title":"Oracle Database @ Google Cloud Exadata Infrastructure Admin","asset_type":"iam.googleapis.com/ExportedIAMRole"} -{"description":"Grants read access to see all Exadata Infrastructure resources.","etag":"AA==","includedPermissions":["resourcemanager.projects.get","resourcemanager.projects.list"],"name":"roles/oracledatabase.cloudExadataInfrastructureViewer","stage":"ALPHA","title":"Oracle Database @ Google Cloud Exadata Infrastructure Viewer","asset_type":"iam.googleapis.com/ExportedIAMRole"} -{"description":"Grants full access to manage all VM Cluster resources.","etag":"AA==","includedPermissions":["resourcemanager.projects.get","resourcemanager.projects.list"],"name":"roles/oracledatabase.cloudVmClusterAdmin","stage":"ALPHA","title":"Oracle Database @ Google Cloud VM Cluster Admin","asset_type":"iam.googleapis.com/ExportedIAMRole"} -{"description":"Grants read access to see all VM Cluster resources.","etag":"AA==","includedPermissions":["resourcemanager.projects.get","resourcemanager.projects.list"],"name":"roles/oracledatabase.cloudVmClusterViewer","stage":"ALPHA","title":"Oracle Database @ Google Cloud VM Cluster Viewer","asset_type":"iam.googleapis.com/ExportedIAMRole"} -{"description":"Grants view access to all Oracle Database resources.","etag":"AA==","includedPermissions":["resourcemanager.projects.get","resourcemanager.projects.list"],"name":"roles/oracledatabase.viewer","stage":"ALPHA","title":"Oracle Database @ Google Cloud viewer","asset_type":"iam.googleapis.com/ExportedIAMRole"} {"description":"The permission to set Organization Policies on resources.","etag":"AA==","includedPermissions":["orgpolicy.constraints.list","orgpolicy.customConstraints.create","orgpolicy.customConstraints.delete","orgpolicy.customConstraints.get","orgpolicy.customConstraints.list","orgpolicy.customConstraints.update","orgpolicy.policies.create","orgpolicy.policies.delete","orgpolicy.policies.list","orgpolicy.policies.update","orgpolicy.policy.get","orgpolicy.policy.set","policysimulator.orgPolicyViolations.list","policysimulator.orgPolicyViolationsPreviews.create","policysimulator.orgPolicyViolationsPreviews.get","policysimulator.orgPolicyViolationsPreviews.list"],"name":"roles/orgpolicy.policyAdmin","stage":"GA","title":"Organization Policy Administrator","asset_type":"iam.googleapis.com/ExportedIAMRole"} {"description":"Access to view Organization Policies on resources.","etag":"AA==","includedPermissions":["orgpolicy.constraints.list","orgpolicy.customConstraints.get","orgpolicy.customConstraints.list","orgpolicy.policies.list","orgpolicy.policy.get"],"name":"roles/orgpolicy.policyViewer","stage":"GA","title":"Organization Policy Viewer","asset_type":"iam.googleapis.com/ExportedIAMRole"} {"description":"Full access to OS Config resources","etag":"AA==","includedPermissions":["osconfig.guestPolicies.create","osconfig.guestPolicies.delete","osconfig.guestPolicies.get","osconfig.guestPolicies.list","osconfig.guestPolicies.update","osconfig.instanceOSPoliciesCompliances.get","osconfig.instanceOSPoliciesCompliances.list","osconfig.inventories.get","osconfig.inventories.list","osconfig.osPolicyAssignmentReports.get","osconfig.osPolicyAssignmentReports.list","osconfig.osPolicyAssignmentReports.searchSummaries","osconfig.osPolicyAssignments.create","osconfig.osPolicyAssignments.delete","osconfig.osPolicyAssignments.get","osconfig.osPolicyAssignments.list","osconfig.osPolicyAssignments.searchPolicies","osconfig.osPolicyAssignments.update","osconfig.patchDeployments.create","osconfig.patchDeployments.delete","osconfig.patchDeployments.execute","osconfig.patchDeployments.get","osconfig.patchDeployments.list","osconfig.patchDeployments.pause","osconfig.patchDeployments.resume","osconfig.patchDeployments.update","osconfig.patchJobs.exec","osconfig.patchJobs.get","osconfig.patchJobs.list","osconfig.projectFeatureSettings.get","osconfig.projectFeatureSettings.update","osconfig.upgradeReports.get","osconfig.upgradeReports.getSummary","osconfig.upgradeReports.list","osconfig.upgradeReports.searchSummaries","osconfig.vulnerabilityReports.get","osconfig.vulnerabilityReports.list"],"name":"roles/osconfig.admin","stage":"BETA","title":"OS Config Admin","asset_type":"iam.googleapis.com/ExportedIAMRole"} diff --git a/roles/oracledatabase.admin b/roles/oracledatabase.admin deleted file mode 100644 index b13a05cf..00000000 --- a/roles/oracledatabase.admin +++ /dev/null @@ -1,11 +0,0 @@ -{ - "description": "Grants full access to manage all Oracle Database resources.", - "etag": "AA==", - "includedPermissions": [ - "resourcemanager.projects.get", - "resourcemanager.projects.list" - ], - "name": "roles/oracledatabase.admin", - "stage": "ALPHA", - "title": "Oracle Database @ Google Cloud admin" -} diff --git a/roles/oracledatabase.autonomousDatabaseAdmin b/roles/oracledatabase.autonomousDatabaseAdmin deleted file mode 100644 index 19118e7a..00000000 --- a/roles/oracledatabase.autonomousDatabaseAdmin +++ /dev/null @@ -1,11 +0,0 @@ -{ - "description": "Grants full access to manage all Autonomous Database resources.", - "etag": "AA==", - "includedPermissions": [ - "resourcemanager.projects.get", - "resourcemanager.projects.list" - ], - "name": "roles/oracledatabase.autonomousDatabaseAdmin", - "stage": "ALPHA", - "title": "Oracle Database @ Google Cloud Autonomous Database Admin" -} diff --git a/roles/oracledatabase.autonomousDatabaseViewer b/roles/oracledatabase.autonomousDatabaseViewer deleted file mode 100644 index 7e1cead7..00000000 --- a/roles/oracledatabase.autonomousDatabaseViewer +++ /dev/null @@ -1,11 +0,0 @@ -{ - "description": "Grants read access to see all Autonomous Database resources.", - "etag": "AA==", - "includedPermissions": [ - "resourcemanager.projects.get", - "resourcemanager.projects.list" - ], - "name": "roles/oracledatabase.autonomousDatabaseViewer", - "stage": "ALPHA", - "title": "Oracle Database @ Google Cloud Autonomous Database Viewer" -} diff --git a/roles/oracledatabase.cloudExadataInfrastructureAdmin b/roles/oracledatabase.cloudExadataInfrastructureAdmin deleted file mode 100644 index 4c759fc5..00000000 --- a/roles/oracledatabase.cloudExadataInfrastructureAdmin +++ /dev/null @@ -1,11 +0,0 @@ -{ - "description": "Grants full access to manage all Exadata Infrastructure resources.", - "etag": "AA==", - "includedPermissions": [ - "resourcemanager.projects.get", - "resourcemanager.projects.list" - ], - "name": "roles/oracledatabase.cloudExadataInfrastructureAdmin", - "stage": "ALPHA", - "title": "Oracle Database @ Google Cloud Exadata Infrastructure Admin" -} diff --git a/roles/oracledatabase.cloudExadataInfrastructureViewer b/roles/oracledatabase.cloudExadataInfrastructureViewer deleted file mode 100644 index c177ea04..00000000 --- a/roles/oracledatabase.cloudExadataInfrastructureViewer +++ /dev/null @@ -1,11 +0,0 @@ -{ - "description": "Grants read access to see all Exadata Infrastructure resources.", - "etag": "AA==", - "includedPermissions": [ - "resourcemanager.projects.get", - "resourcemanager.projects.list" - ], - "name": "roles/oracledatabase.cloudExadataInfrastructureViewer", - "stage": "ALPHA", - "title": "Oracle Database @ Google Cloud Exadata Infrastructure Viewer" -} diff --git a/roles/oracledatabase.cloudVmClusterAdmin b/roles/oracledatabase.cloudVmClusterAdmin deleted file mode 100644 index 94469d1e..00000000 --- a/roles/oracledatabase.cloudVmClusterAdmin +++ /dev/null @@ -1,11 +0,0 @@ -{ - "description": "Grants full access to manage all VM Cluster resources.", - "etag": "AA==", - "includedPermissions": [ - "resourcemanager.projects.get", - "resourcemanager.projects.list" - ], - "name": "roles/oracledatabase.cloudVmClusterAdmin", - "stage": "ALPHA", - "title": "Oracle Database @ Google Cloud VM Cluster Admin" -} diff --git a/roles/oracledatabase.cloudVmClusterViewer b/roles/oracledatabase.cloudVmClusterViewer deleted file mode 100644 index ea9c1675..00000000 --- a/roles/oracledatabase.cloudVmClusterViewer +++ /dev/null @@ -1,11 +0,0 @@ -{ - "description": "Grants read access to see all VM Cluster resources.", - "etag": "AA==", - "includedPermissions": [ - "resourcemanager.projects.get", - "resourcemanager.projects.list" - ], - "name": "roles/oracledatabase.cloudVmClusterViewer", - "stage": "ALPHA", - "title": "Oracle Database @ Google Cloud VM Cluster Viewer" -} diff --git a/roles/oracledatabase.viewer b/roles/oracledatabase.viewer deleted file mode 100644 index e58c346e..00000000 --- a/roles/oracledatabase.viewer +++ /dev/null @@ -1,11 +0,0 @@ -{ - "description": "Grants view access to all Oracle Database resources.", - "etag": "AA==", - "includedPermissions": [ - "resourcemanager.projects.get", - "resourcemanager.projects.list" - ], - "name": "roles/oracledatabase.viewer", - "stage": "ALPHA", - "title": "Oracle Database @ Google Cloud viewer" -}