Skip to content

Commit

Permalink
Fetch all roles
Browse files Browse the repository at this point in the history
  • Loading branch information
bgeesaman committed Oct 25, 2024
1 parent 917a1bc commit 2c13b23
Show file tree
Hide file tree
Showing 32 changed files with 121 additions and 92 deletions.
62 changes: 31 additions & 31 deletions gcp_roles_cai.json

Large diffs are not rendered by default.

1 change: 1 addition & 0 deletions roles/anthossupport.serviceAgent
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@
"gkehub.features.list",
"gkehub.fleet.get",
"gkehub.fleet.getFreeTrial",
"gkehub.gateway.generateCredentials",
"gkehub.gateway.get",
"gkehub.locations.get",
"gkehub.locations.list",
Expand Down
8 changes: 4 additions & 4 deletions roles/backupdr.admin
Original file line number Diff line number Diff line change
Expand Up @@ -2,16 +2,16 @@
"description": "Provides full access to all Backup and DR resources. ",
"etag": "AA==",
"includedPermissions": [
"backupdr.backupPlanAssociations.create",
"backupdr.backupPlanAssociations.delete",
"backupdr.backupPlanAssociations.createForComputeInstance",
"backupdr.backupPlanAssociations.deleteForComputeInstance",
"backupdr.backupPlanAssociations.get",
"backupdr.backupPlanAssociations.list",
"backupdr.backupPlanAssociations.triggerBackup",
"backupdr.backupPlanAssociations.triggerBackupForComputeInstance",
"backupdr.backupPlans.create",
"backupdr.backupPlans.delete",
"backupdr.backupPlans.get",
"backupdr.backupPlans.list",
"backupdr.backupPlans.useComputeInstanceOnly",
"backupdr.backupPlans.useForComputeInstance",
"backupdr.backupVaults.associate",
"backupdr.backupVaults.create",
"backupdr.backupVaults.delete",
Expand Down
8 changes: 4 additions & 4 deletions roles/backupdr.backupUser
Original file line number Diff line number Diff line change
Expand Up @@ -2,14 +2,14 @@
"description": "Allows the user to apply existing backup plans. This role cannot create backup plans or restore from a backup.",
"etag": "AA==",
"includedPermissions": [
"backupdr.backupPlanAssociations.create",
"backupdr.backupPlanAssociations.delete",
"backupdr.backupPlanAssociations.createForComputeInstance",
"backupdr.backupPlanAssociations.deleteForComputeInstance",
"backupdr.backupPlanAssociations.get",
"backupdr.backupPlanAssociations.list",
"backupdr.backupPlanAssociations.triggerBackup",
"backupdr.backupPlanAssociations.triggerBackupForComputeInstance",
"backupdr.backupPlans.get",
"backupdr.backupPlans.list",
"backupdr.backupPlans.useComputeInstanceOnly",
"backupdr.backupPlans.useForComputeInstance",
"backupdr.backupVaults.get",
"backupdr.backupVaults.list",
"backupdr.bvbackups.get",
Expand Down
4 changes: 2 additions & 2 deletions roles/backupdr.user
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,8 @@
"description": "Provides access to management console. Granular Backup and DR permissions depend on ACL configuration provided by Backup and DR admin within the management console.",
"etag": "AA==",
"includedPermissions": [
"backupdr.backupPlanAssociations.create",
"backupdr.backupPlanAssociations.delete",
"backupdr.backupPlanAssociations.createForComputeInstance",
"backupdr.backupPlanAssociations.deleteForComputeInstance",
"backupdr.managementServers.access",
"backupdr.managementServers.backupAccess",
"backupdr.managementServers.get",
Expand Down
5 changes: 5 additions & 0 deletions roles/batch.serviceAgent
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,11 @@
"description": "Gives Google Batch account access to manage customer resources.",
"etag": "AA==",
"includedPermissions": [
"backupdr.backupPlanAssociations.createForComputeInstance",
"backupdr.backupPlanAssociations.deleteForComputeInstance",
"backupdr.backupPlanAssociations.list",
"backupdr.backupPlanAssociations.triggerBackupForComputeInstance",
"backupdr.backupPlans.useForComputeInstance",
"compute.acceleratorTypes.get",
"compute.acceleratorTypes.list",
"compute.addresses.createInternal",
Expand Down
7 changes: 0 additions & 7 deletions roles/cloudsql.admin
Original file line number Diff line number Diff line change
Expand Up @@ -7,11 +7,6 @@
"cloudsql.backupRuns.delete",
"cloudsql.backupRuns.get",
"cloudsql.backupRuns.list",
"cloudsql.backups.create",
"cloudsql.backups.delete",
"cloudsql.backups.get",
"cloudsql.backups.list",
"cloudsql.backups.update",
"cloudsql.databases.create",
"cloudsql.databases.delete",
"cloudsql.databases.get",
Expand Down Expand Up @@ -52,8 +47,6 @@
"cloudsql.instances.stopReplica",
"cloudsql.instances.truncateLog",
"cloudsql.instances.update",
"cloudsql.operations.get",
"cloudsql.operations.list",
"cloudsql.schemas.view",
"cloudsql.sslCerts.create",
"cloudsql.sslCerts.delete",
Expand Down
4 changes: 0 additions & 4 deletions roles/cloudsql.viewer
Original file line number Diff line number Diff line change
Expand Up @@ -5,8 +5,6 @@
"cloudaicompanion.entitlements.get",
"cloudsql.backupRuns.get",
"cloudsql.backupRuns.list",
"cloudsql.backups.get",
"cloudsql.backups.list",
"cloudsql.databases.get",
"cloudsql.databases.list",
"cloudsql.instances.export",
Expand All @@ -17,8 +15,6 @@
"cloudsql.instances.listServerCas",
"cloudsql.instances.listServerCertificates",
"cloudsql.instances.listTagBindings",
"cloudsql.operations.get",
"cloudsql.operations.list",
"cloudsql.sslCerts.get",
"cloudsql.sslCerts.list",
"cloudsql.users.get",
Expand Down
5 changes: 5 additions & 0 deletions roles/cloudtpu.serviceAgent
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,11 @@
"description": "Give Cloud TPUs service account access to managed resources",
"etag": "AA==",
"includedPermissions": [
"backupdr.backupPlanAssociations.createForComputeInstance",
"backupdr.backupPlanAssociations.deleteForComputeInstance",
"backupdr.backupPlanAssociations.list",
"backupdr.backupPlanAssociations.triggerBackupForComputeInstance",
"backupdr.backupPlans.useForComputeInstance",
"compute.acceleratorTypes.get",
"compute.acceleratorTypes.list",
"compute.addresses.create",
Expand Down
12 changes: 5 additions & 7 deletions roles/composer.serviceAgent
Original file line number Diff line number Diff line change
Expand Up @@ -30,17 +30,17 @@
"artifactregistry.repositories.get",
"artifactregistry.repositories.list",
"artifactregistry.repositories.update",
"backupdr.backupPlanAssociations.createForComputeInstance",
"backupdr.backupPlanAssociations.deleteForComputeInstance",
"backupdr.backupPlanAssociations.list",
"backupdr.backupPlanAssociations.triggerBackupForComputeInstance",
"backupdr.backupPlans.useForComputeInstance",
"cloudaicompanion.entitlements.get",
"cloudnotifications.activities.list",
"cloudsql.backupRuns.create",
"cloudsql.backupRuns.delete",
"cloudsql.backupRuns.get",
"cloudsql.backupRuns.list",
"cloudsql.backups.create",
"cloudsql.backups.delete",
"cloudsql.backups.get",
"cloudsql.backups.list",
"cloudsql.backups.update",
"cloudsql.databases.create",
"cloudsql.databases.delete",
"cloudsql.databases.get",
Expand Down Expand Up @@ -81,8 +81,6 @@
"cloudsql.instances.stopReplica",
"cloudsql.instances.truncateLog",
"cloudsql.instances.update",
"cloudsql.operations.get",
"cloudsql.operations.list",
"cloudsql.schemas.view",
"cloudsql.sslCerts.create",
"cloudsql.sslCerts.delete",
Expand Down
5 changes: 5 additions & 0 deletions roles/compute.admin
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,11 @@
"description": "Full control of all Compute Engine resources.",
"etag": "AA==",
"includedPermissions": [
"backupdr.backupPlanAssociations.createForComputeInstance",
"backupdr.backupPlanAssociations.deleteForComputeInstance",
"backupdr.backupPlanAssociations.list",
"backupdr.backupPlanAssociations.triggerBackupForComputeInstance",
"backupdr.backupPlans.useForComputeInstance",
"compute.acceleratorTypes.get",
"compute.acceleratorTypes.list",
"compute.addresses.create",
Expand Down
5 changes: 5 additions & 0 deletions roles/compute.instanceAdmin
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,11 @@
"description": "Full control of Compute Engine instance resources.",
"etag": "AA==",
"includedPermissions": [
"backupdr.backupPlanAssociations.createForComputeInstance",
"backupdr.backupPlanAssociations.deleteForComputeInstance",
"backupdr.backupPlanAssociations.list",
"backupdr.backupPlanAssociations.triggerBackupForComputeInstance",
"backupdr.backupPlans.useForComputeInstance",
"compute.acceleratorTypes.get",
"compute.acceleratorTypes.list",
"compute.addresses.createInternal",
Expand Down
5 changes: 5 additions & 0 deletions roles/compute.instanceAdmin.v1
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,11 @@
"description": "Full control of Compute Engine instances, instance groups, disks, snapshots, and images. Read access to all Compute Engine networking resources.",
"etag": "AA==",
"includedPermissions": [
"backupdr.backupPlanAssociations.createForComputeInstance",
"backupdr.backupPlanAssociations.deleteForComputeInstance",
"backupdr.backupPlanAssociations.list",
"backupdr.backupPlanAssociations.triggerBackupForComputeInstance",
"backupdr.backupPlans.useForComputeInstance",
"compute.acceleratorTypes.get",
"compute.acceleratorTypes.list",
"compute.addresses.createInternal",
Expand Down
1 change: 1 addition & 0 deletions roles/contactcenterinsights.editor
Original file line number Diff line number Diff line change
Expand Up @@ -67,6 +67,7 @@
"contactcenterinsights.qaScorecardRevisions.get",
"contactcenterinsights.qaScorecardRevisions.list",
"contactcenterinsights.qaScorecardRevisions.tune",
"contactcenterinsights.qaScorecardRevisions.undeploy",
"contactcenterinsights.qaScorecards.create",
"contactcenterinsights.qaScorecards.delete",
"contactcenterinsights.qaScorecards.get",
Expand Down
5 changes: 5 additions & 0 deletions roles/container.serviceAgent
Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,11 @@
"autoscaling.sites.readRecommendations",
"autoscaling.sites.writeMetrics",
"autoscaling.sites.writeState",
"backupdr.backupPlanAssociations.createForComputeInstance",
"backupdr.backupPlanAssociations.deleteForComputeInstance",
"backupdr.backupPlanAssociations.list",
"backupdr.backupPlanAssociations.triggerBackupForComputeInstance",
"backupdr.backupPlans.useForComputeInstance",
"bigquery.datasets.create",
"bigquery.datasets.get",
"bigquery.tables.create",
Expand Down
5 changes: 5 additions & 0 deletions roles/dataflow.serviceAgent
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,11 @@
"description": "Gives Cloud Dataflow service account access to managed resources. Includes access to service accounts.",
"etag": "AA==",
"includedPermissions": [
"backupdr.backupPlanAssociations.createForComputeInstance",
"backupdr.backupPlanAssociations.deleteForComputeInstance",
"backupdr.backupPlanAssociations.list",
"backupdr.backupPlanAssociations.triggerBackupForComputeInstance",
"backupdr.backupPlans.useForComputeInstance",
"bigquery.bireservations.get",
"bigquery.bireservations.update",
"bigquery.capacityCommitments.create",
Expand Down
1 change: 0 additions & 1 deletion roles/datafusion.serviceAgent
Original file line number Diff line number Diff line change
Expand Up @@ -533,7 +533,6 @@
"serviceusage.services.get",
"serviceusage.services.list",
"spanner.databaseOperations.cancel",
"spanner.databaseOperations.delete",
"spanner.databaseOperations.get",
"spanner.databaseOperations.list",
"spanner.databases.beginOrRollbackReadWriteTransaction",
Expand Down
2 changes: 1 addition & 1 deletion roles/datamigration.serviceAgent
Original file line number Diff line number Diff line change
Expand Up @@ -24,6 +24,7 @@
"cloudsql.instances.delete",
"cloudsql.instances.demoteMaster",
"cloudsql.instances.executeSql",
"cloudsql.instances.export",
"cloudsql.instances.get",
"cloudsql.instances.import",
"cloudsql.instances.list",
Expand All @@ -33,7 +34,6 @@
"cloudsql.instances.startReplica",
"cloudsql.instances.stopReplica",
"cloudsql.instances.update",
"cloudsql.operations.get",
"compute.forwardingRules.use",
"compute.globalAddresses.create",
"compute.globalAddresses.createInternal",
Expand Down
7 changes: 7 additions & 0 deletions roles/dataproc.serviceAgent
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,11 @@
"description": "Gives Dataproc Service Account access to service accounts, compute resources, storage resources, and kubernetes resources. Includes access to service accounts.",
"etag": "AA==",
"includedPermissions": [
"backupdr.backupPlanAssociations.createForComputeInstance",
"backupdr.backupPlanAssociations.deleteForComputeInstance",
"backupdr.backupPlanAssociations.list",
"backupdr.backupPlanAssociations.triggerBackupForComputeInstance",
"backupdr.backupPlans.useForComputeInstance",
"compute.acceleratorTypes.get",
"compute.acceleratorTypes.list",
"compute.addresses.createInternal",
Expand Down Expand Up @@ -318,7 +323,9 @@
"resourcemanager.hierarchyNodes.listEffectiveTags",
"resourcemanager.projects.get",
"resourcemanager.projects.list",
"servicemanagement.services.bind",
"serviceusage.quotas.get",
"serviceusage.services.enable",
"serviceusage.services.get",
"serviceusage.services.list",
"serviceusage.services.use",
Expand Down
1 change: 1 addition & 0 deletions roles/dspm.serviceAgent
Original file line number Diff line number Diff line change
Expand Up @@ -43,6 +43,7 @@
"securitycentermanagement.securityHealthAnalyticsCustomModules.get",
"securityposture.operations.get",
"securityposture.postureDeployments.create",
"securityposture.postureDeployments.delete",
"securityposture.postures.create",
"securityposture.postures.get",
"storage.buckets.createTagBinding",
Expand Down
18 changes: 6 additions & 12 deletions roles/editor
Original file line number Diff line number Diff line change
Expand Up @@ -1124,16 +1124,16 @@
"autoscaling.sites.readRecommendations",
"autoscaling.sites.writeMetrics",
"autoscaling.sites.writeState",
"backupdr.backupPlanAssociations.create",
"backupdr.backupPlanAssociations.delete",
"backupdr.backupPlanAssociations.createForComputeInstance",
"backupdr.backupPlanAssociations.deleteForComputeInstance",
"backupdr.backupPlanAssociations.get",
"backupdr.backupPlanAssociations.list",
"backupdr.backupPlanAssociations.triggerBackup",
"backupdr.backupPlanAssociations.triggerBackupForComputeInstance",
"backupdr.backupPlans.create",
"backupdr.backupPlans.delete",
"backupdr.backupPlans.get",
"backupdr.backupPlans.list",
"backupdr.backupPlans.useComputeInstanceOnly",
"backupdr.backupPlans.useForComputeInstance",
"backupdr.backupVaults.associate",
"backupdr.backupVaults.create",
"backupdr.backupVaults.delete",
Expand Down Expand Up @@ -2244,11 +2244,6 @@
"cloudsql.backupRuns.delete",
"cloudsql.backupRuns.get",
"cloudsql.backupRuns.list",
"cloudsql.backups.create",
"cloudsql.backups.delete",
"cloudsql.backups.get",
"cloudsql.backups.list",
"cloudsql.backups.update",
"cloudsql.databases.create",
"cloudsql.databases.delete",
"cloudsql.databases.get",
Expand Down Expand Up @@ -2287,8 +2282,6 @@
"cloudsql.instances.stopReplica",
"cloudsql.instances.truncateLog",
"cloudsql.instances.update",
"cloudsql.operations.get",
"cloudsql.operations.list",
"cloudsql.schemas.view",
"cloudsql.sslCerts.create",
"cloudsql.sslCerts.delete",
Expand Down Expand Up @@ -3514,6 +3507,7 @@
"contactcenterinsights.qaScorecardRevisions.get",
"contactcenterinsights.qaScorecardRevisions.list",
"contactcenterinsights.qaScorecardRevisions.tune",
"contactcenterinsights.qaScorecardRevisions.undeploy",
"contactcenterinsights.qaScorecards.create",
"contactcenterinsights.qaScorecards.delete",
"contactcenterinsights.qaScorecards.get",
Expand Down Expand Up @@ -6743,6 +6737,7 @@
"networkconnectivity.hubs.getIamPolicy",
"networkconnectivity.hubs.list",
"networkconnectivity.hubs.listSpokes",
"networkconnectivity.hubs.queryStatus",
"networkconnectivity.hubs.update",
"networkconnectivity.internalRanges.create",
"networkconnectivity.internalRanges.delete",
Expand Down Expand Up @@ -8265,7 +8260,6 @@
"spanner.backups.restoreDatabase",
"spanner.backups.update",
"spanner.databaseOperations.cancel",
"spanner.databaseOperations.delete",
"spanner.databaseOperations.get",
"spanner.databaseOperations.list",
"spanner.databaseRoles.list",
Expand Down
2 changes: 0 additions & 2 deletions roles/iam.securityAdmin
Original file line number Diff line number Diff line change
Expand Up @@ -540,10 +540,8 @@
"cloudsecurityscanner.scanruns.list",
"cloudsecurityscanner.scans.list",
"cloudsql.backupRuns.list",
"cloudsql.backups.list",
"cloudsql.databases.list",
"cloudsql.instances.list",
"cloudsql.operations.list",
"cloudsql.sslCerts.list",
"cloudsql.users.list",
"cloudsupport.accounts.getIamPolicy",
Expand Down
2 changes: 0 additions & 2 deletions roles/iam.securityReviewer
Original file line number Diff line number Diff line change
Expand Up @@ -482,10 +482,8 @@
"cloudsecurityscanner.scanruns.list",
"cloudsecurityscanner.scans.list",
"cloudsql.backupRuns.list",
"cloudsql.backups.list",
"cloudsql.databases.list",
"cloudsql.instances.list",
"cloudsql.operations.list",
"cloudsql.sslCerts.list",
"cloudsql.users.list",
"cloudsupport.accounts.getIamPolicy",
Expand Down
5 changes: 5 additions & 0 deletions roles/lifesciences.serviceAgent
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,11 @@
"description": "Gives Cloud Life Sciences Service Account access to compute resources. Includes access to service accounts.",
"etag": "AA==",
"includedPermissions": [
"backupdr.backupPlanAssociations.createForComputeInstance",
"backupdr.backupPlanAssociations.deleteForComputeInstance",
"backupdr.backupPlanAssociations.list",
"backupdr.backupPlanAssociations.triggerBackupForComputeInstance",
"backupdr.backupPlans.useForComputeInstance",
"compute.acceleratorTypes.get",
"compute.acceleratorTypes.list",
"compute.addresses.createInternal",
Expand Down
1 change: 1 addition & 0 deletions roles/networkconnectivity.hubAdmin
Original file line number Diff line number Diff line change
Expand Up @@ -23,6 +23,7 @@
"networkconnectivity.hubs.getIamPolicy",
"networkconnectivity.hubs.list",
"networkconnectivity.hubs.listSpokes",
"networkconnectivity.hubs.queryStatus",
"networkconnectivity.hubs.setIamPolicy",
"networkconnectivity.hubs.update",
"networkconnectivity.locations.get",
Expand Down
1 change: 1 addition & 0 deletions roles/networkconnectivity.hubViewer
Original file line number Diff line number Diff line change
Expand Up @@ -15,6 +15,7 @@
"networkconnectivity.hubs.getIamPolicy",
"networkconnectivity.hubs.list",
"networkconnectivity.hubs.listSpokes",
"networkconnectivity.hubs.queryStatus",
"networkconnectivity.locations.get",
"networkconnectivity.locations.list",
"networkconnectivity.spokes.get",
Expand Down
Loading

0 comments on commit 2c13b23

Please sign in to comment.