From 94d3fe23ea152d90864b532954ff03a902ad6bf3 Mon Sep 17 00:00:00 2001 From: bgeesaman Date: Thu, 26 Sep 2024 01:27:28 +0000 Subject: [PATCH] Fetch all roles --- gcp_roles_cai.json | 4 ++-- roles/cloudkms.autokeyAdmin | 2 +- roles/cloudkms.autokeyUser | 2 +- 3 files changed, 4 insertions(+), 4 deletions(-) diff --git a/gcp_roles_cai.json b/gcp_roles_cai.json index fd91efd7..ee9c4e97 100644 --- a/gcp_roles_cai.json +++ b/gcp_roles_cai.json @@ -346,8 +346,8 @@ {"description":"Write access to all profile data in Cloud Talent Solution.","etag":"AA==","includedPermissions":["cloudjobdiscovery.events.create","cloudjobdiscovery.profiles.create","cloudjobdiscovery.profiles.delete","cloudjobdiscovery.profiles.get","cloudjobdiscovery.profiles.search","cloudjobdiscovery.profiles.update","cloudjobdiscovery.tenants.create","cloudjobdiscovery.tenants.delete","cloudjobdiscovery.tenants.get","cloudjobdiscovery.tenants.update","resourcemanager.projects.get","resourcemanager.projects.list"],"name":"roles/cloudjobdiscovery.profilesEditor","stage":"GA","title":"Profile Editor","asset_type":"iam.googleapis.com/ExportedIAMRole"} {"description":"Read access to all profile data in Cloud Talent Solution.","etag":"AA==","includedPermissions":["cloudjobdiscovery.profiles.get","cloudjobdiscovery.profiles.search","cloudjobdiscovery.tenants.get","resourcemanager.projects.get","resourcemanager.projects.list"],"name":"roles/cloudjobdiscovery.profilesViewer","stage":"GA","title":"Profile Viewer","asset_type":"iam.googleapis.com/ExportedIAMRole"} {"description":"Enables management of crypto resources.","etag":"AA==","includedPermissions":["cloudkms.autokeyConfigs.get","cloudkms.autokeyConfigs.update","cloudkms.cryptoKeyVersions.create","cloudkms.cryptoKeyVersions.destroy","cloudkms.cryptoKeyVersions.get","cloudkms.cryptoKeyVersions.list","cloudkms.cryptoKeyVersions.restore","cloudkms.cryptoKeyVersions.update","cloudkms.cryptoKeyVersions.useToDecryptViaDelegation","cloudkms.cryptoKeyVersions.useToEncryptViaDelegation","cloudkms.cryptoKeys.create","cloudkms.cryptoKeys.get","cloudkms.cryptoKeys.getIamPolicy","cloudkms.cryptoKeys.list","cloudkms.cryptoKeys.setIamPolicy","cloudkms.cryptoKeys.update","cloudkms.ekmConfigs.get","cloudkms.ekmConfigs.getIamPolicy","cloudkms.ekmConfigs.setIamPolicy","cloudkms.ekmConfigs.update","cloudkms.ekmConnections.create","cloudkms.ekmConnections.get","cloudkms.ekmConnections.getIamPolicy","cloudkms.ekmConnections.list","cloudkms.ekmConnections.setIamPolicy","cloudkms.ekmConnections.update","cloudkms.ekmConnections.use","cloudkms.ekmConnections.verifyConnectivity","cloudkms.importJobs.create","cloudkms.importJobs.get","cloudkms.importJobs.getIamPolicy","cloudkms.importJobs.list","cloudkms.importJobs.setIamPolicy","cloudkms.importJobs.useToImport","cloudkms.keyHandles.create","cloudkms.keyHandles.get","cloudkms.keyHandles.list","cloudkms.keyRings.create","cloudkms.keyRings.createTagBinding","cloudkms.keyRings.deleteTagBinding","cloudkms.keyRings.get","cloudkms.keyRings.getIamPolicy","cloudkms.keyRings.list","cloudkms.keyRings.listEffectiveTags","cloudkms.keyRings.listTagBindings","cloudkms.keyRings.setIamPolicy","cloudkms.locations.get","cloudkms.locations.list","cloudkms.locations.optOutKeyDeletionMsa","cloudkms.operations.get","cloudkms.projects.showEffectiveAutokeyConfig","resourcemanager.projects.get"],"name":"roles/cloudkms.admin","stage":"GA","title":"Cloud KMS Admin","asset_type":"iam.googleapis.com/ExportedIAMRole"} -{"description":"Enables management of AutokeyConfig.","etag":"AA==","includedPermissions":["cloudkms.autokeyConfigs.get","cloudkms.autokeyConfigs.update","cloudkms.projects.showEffectiveAutokeyConfig"],"name":"roles/cloudkms.autokeyAdmin","stage":"GA","title":"Cloud KMS Autokey Admin","asset_type":"iam.googleapis.com/ExportedIAMRole"} -{"description":"Grants ability to use KeyHandle resources.","etag":"AA==","includedPermissions":["cloudkms.keyHandles.create","cloudkms.keyHandles.get","cloudkms.keyHandles.list","cloudkms.operations.get","cloudkms.projects.showEffectiveAutokeyConfig"],"name":"roles/cloudkms.autokeyUser","stage":"BETA","title":"Cloud KMS Autokey User","asset_type":"iam.googleapis.com/ExportedIAMRole"} +{"description":"Enables management of AutokeyConfig.","etag":"AA==","includedPermissions":["cloudkms.autokeyConfigs.get","cloudkms.autokeyConfigs.update","cloudkms.projects.showEffectiveAutokeyConfig"],"name":"roles/cloudkms.autokeyAdmin","stage":"BETA","title":"Cloud KMS Autokey Admin","asset_type":"iam.googleapis.com/ExportedIAMRole"} +{"description":"Grants ability to use KeyHandle resources.","etag":"AA==","includedPermissions":["cloudkms.keyHandles.create","cloudkms.keyHandles.get","cloudkms.keyHandles.list","cloudkms.operations.get","cloudkms.projects.showEffectiveAutokeyConfig"],"name":"roles/cloudkms.autokeyUser","stage":"GA","title":"Cloud KMS Autokey User","asset_type":"iam.googleapis.com/ExportedIAMRole"} {"description":"Enables Decrypt operations","etag":"AA==","includedPermissions":["cloudkms.cryptoKeyVersions.useToDecrypt","cloudkms.locations.get","cloudkms.locations.list","resourcemanager.projects.get"],"name":"roles/cloudkms.cryptoKeyDecrypter","stage":"GA","title":"Cloud KMS CryptoKey Decrypter","asset_type":"iam.googleapis.com/ExportedIAMRole"} {"description":"Enables Decrypt operations via other GCP services","etag":"AA==","includedPermissions":["cloudkms.cryptoKeyVersions.useToDecryptViaDelegation","cloudkms.locations.get","cloudkms.locations.list","resourcemanager.projects.get","resourcemanager.projects.list"],"name":"roles/cloudkms.cryptoKeyDecrypterViaDelegation","stage":"GA","title":"Cloud KMS CryptoKey Decrypter Via Delegation","asset_type":"iam.googleapis.com/ExportedIAMRole"} {"description":"Enables Encrypt operations","etag":"AA==","includedPermissions":["cloudkms.cryptoKeyVersions.useToEncrypt","cloudkms.locations.get","cloudkms.locations.list","resourcemanager.projects.get"],"name":"roles/cloudkms.cryptoKeyEncrypter","stage":"GA","title":"Cloud KMS CryptoKey Encrypter","asset_type":"iam.googleapis.com/ExportedIAMRole"} diff --git a/roles/cloudkms.autokeyAdmin b/roles/cloudkms.autokeyAdmin index 584cba4a..09e60f88 100644 --- a/roles/cloudkms.autokeyAdmin +++ b/roles/cloudkms.autokeyAdmin @@ -7,6 +7,6 @@ "cloudkms.projects.showEffectiveAutokeyConfig" ], "name": "roles/cloudkms.autokeyAdmin", - "stage": "GA", + "stage": "BETA", "title": "Cloud KMS Autokey Admin" } diff --git a/roles/cloudkms.autokeyUser b/roles/cloudkms.autokeyUser index 642f3ee3..552941cc 100644 --- a/roles/cloudkms.autokeyUser +++ b/roles/cloudkms.autokeyUser @@ -9,6 +9,6 @@ "cloudkms.projects.showEffectiveAutokeyConfig" ], "name": "roles/cloudkms.autokeyUser", - "stage": "BETA", + "stage": "GA", "title": "Cloud KMS Autokey User" }