Skip to content

Commit

Permalink
Fetch all roles
Browse files Browse the repository at this point in the history
  • Loading branch information
bgeesaman committed Sep 25, 2024
1 parent 2b6ffde commit 92e9676
Show file tree
Hide file tree
Showing 2 changed files with 2 additions and 2 deletions.
2 changes: 1 addition & 1 deletion gcp_roles_cai.json
Original file line number Diff line number Diff line change
Expand Up @@ -346,7 +346,7 @@
{"description":"Write access to all profile data in Cloud Talent Solution.","etag":"AA==","includedPermissions":["cloudjobdiscovery.events.create","cloudjobdiscovery.profiles.create","cloudjobdiscovery.profiles.delete","cloudjobdiscovery.profiles.get","cloudjobdiscovery.profiles.search","cloudjobdiscovery.profiles.update","cloudjobdiscovery.tenants.create","cloudjobdiscovery.tenants.delete","cloudjobdiscovery.tenants.get","cloudjobdiscovery.tenants.update","resourcemanager.projects.get","resourcemanager.projects.list"],"name":"roles/cloudjobdiscovery.profilesEditor","stage":"GA","title":"Profile Editor","asset_type":"iam.googleapis.com/ExportedIAMRole"}
{"description":"Read access to all profile data in Cloud Talent Solution.","etag":"AA==","includedPermissions":["cloudjobdiscovery.profiles.get","cloudjobdiscovery.profiles.search","cloudjobdiscovery.tenants.get","resourcemanager.projects.get","resourcemanager.projects.list"],"name":"roles/cloudjobdiscovery.profilesViewer","stage":"GA","title":"Profile Viewer","asset_type":"iam.googleapis.com/ExportedIAMRole"}
{"description":"Enables management of crypto resources.","etag":"AA==","includedPermissions":["cloudkms.autokeyConfigs.get","cloudkms.autokeyConfigs.update","cloudkms.cryptoKeyVersions.create","cloudkms.cryptoKeyVersions.destroy","cloudkms.cryptoKeyVersions.get","cloudkms.cryptoKeyVersions.list","cloudkms.cryptoKeyVersions.restore","cloudkms.cryptoKeyVersions.update","cloudkms.cryptoKeyVersions.useToDecryptViaDelegation","cloudkms.cryptoKeyVersions.useToEncryptViaDelegation","cloudkms.cryptoKeys.create","cloudkms.cryptoKeys.get","cloudkms.cryptoKeys.getIamPolicy","cloudkms.cryptoKeys.list","cloudkms.cryptoKeys.setIamPolicy","cloudkms.cryptoKeys.update","cloudkms.ekmConfigs.get","cloudkms.ekmConfigs.getIamPolicy","cloudkms.ekmConfigs.setIamPolicy","cloudkms.ekmConfigs.update","cloudkms.ekmConnections.create","cloudkms.ekmConnections.get","cloudkms.ekmConnections.getIamPolicy","cloudkms.ekmConnections.list","cloudkms.ekmConnections.setIamPolicy","cloudkms.ekmConnections.update","cloudkms.ekmConnections.use","cloudkms.ekmConnections.verifyConnectivity","cloudkms.importJobs.create","cloudkms.importJobs.get","cloudkms.importJobs.getIamPolicy","cloudkms.importJobs.list","cloudkms.importJobs.setIamPolicy","cloudkms.importJobs.useToImport","cloudkms.keyHandles.create","cloudkms.keyHandles.get","cloudkms.keyHandles.list","cloudkms.keyRings.create","cloudkms.keyRings.createTagBinding","cloudkms.keyRings.deleteTagBinding","cloudkms.keyRings.get","cloudkms.keyRings.getIamPolicy","cloudkms.keyRings.list","cloudkms.keyRings.listEffectiveTags","cloudkms.keyRings.listTagBindings","cloudkms.keyRings.setIamPolicy","cloudkms.locations.get","cloudkms.locations.list","cloudkms.locations.optOutKeyDeletionMsa","cloudkms.operations.get","cloudkms.projects.showEffectiveAutokeyConfig","resourcemanager.projects.get"],"name":"roles/cloudkms.admin","stage":"GA","title":"Cloud KMS Admin","asset_type":"iam.googleapis.com/ExportedIAMRole"}
{"description":"Enables management of AutokeyConfig.","etag":"AA==","includedPermissions":["cloudkms.autokeyConfigs.get","cloudkms.autokeyConfigs.update","cloudkms.projects.showEffectiveAutokeyConfig"],"name":"roles/cloudkms.autokeyAdmin","stage":"BETA","title":"Cloud KMS Autokey Admin","asset_type":"iam.googleapis.com/ExportedIAMRole"}
{"description":"Enables management of AutokeyConfig.","etag":"AA==","includedPermissions":["cloudkms.autokeyConfigs.get","cloudkms.autokeyConfigs.update","cloudkms.projects.showEffectiveAutokeyConfig"],"name":"roles/cloudkms.autokeyAdmin","stage":"GA","title":"Cloud KMS Autokey Admin","asset_type":"iam.googleapis.com/ExportedIAMRole"}
{"description":"Grants ability to use KeyHandle resources.","etag":"AA==","includedPermissions":["cloudkms.keyHandles.create","cloudkms.keyHandles.get","cloudkms.keyHandles.list","cloudkms.operations.get","cloudkms.projects.showEffectiveAutokeyConfig"],"name":"roles/cloudkms.autokeyUser","stage":"BETA","title":"Cloud KMS Autokey User","asset_type":"iam.googleapis.com/ExportedIAMRole"}
{"description":"Enables Decrypt operations","etag":"AA==","includedPermissions":["cloudkms.cryptoKeyVersions.useToDecrypt","cloudkms.locations.get","cloudkms.locations.list","resourcemanager.projects.get"],"name":"roles/cloudkms.cryptoKeyDecrypter","stage":"GA","title":"Cloud KMS CryptoKey Decrypter","asset_type":"iam.googleapis.com/ExportedIAMRole"}
{"description":"Enables Decrypt operations via other GCP services","etag":"AA==","includedPermissions":["cloudkms.cryptoKeyVersions.useToDecryptViaDelegation","cloudkms.locations.get","cloudkms.locations.list","resourcemanager.projects.get","resourcemanager.projects.list"],"name":"roles/cloudkms.cryptoKeyDecrypterViaDelegation","stage":"GA","title":"Cloud KMS CryptoKey Decrypter Via Delegation","asset_type":"iam.googleapis.com/ExportedIAMRole"}
Expand Down
2 changes: 1 addition & 1 deletion roles/cloudkms.autokeyAdmin
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,6 @@
"cloudkms.projects.showEffectiveAutokeyConfig"
],
"name": "roles/cloudkms.autokeyAdmin",
"stage": "BETA",
"stage": "GA",
"title": "Cloud KMS Autokey Admin"
}

0 comments on commit 92e9676

Please sign in to comment.