Skip to content

Commit

Permalink
Fetch all roles
Browse files Browse the repository at this point in the history
  • Loading branch information
bgeesaman committed Oct 11, 2024
1 parent 06f43d2 commit ece6230
Show file tree
Hide file tree
Showing 37 changed files with 304 additions and 90 deletions.
72 changes: 36 additions & 36 deletions gcp_roles_cai.json

Large diffs are not rendered by default.

2 changes: 1 addition & 1 deletion roles/backupdr.backupvaultAccessor
Original file line number Diff line number Diff line change
Expand Up @@ -23,6 +23,6 @@
"backupdr.operations.list"
],
"name": "roles/backupdr.backupvaultAccessor",
"stage": "BETA",
"stage": "GA",
"title": "Backup and DR Backup Vault Accessor"
}
2 changes: 1 addition & 1 deletion roles/backupdr.backupvaultViewer
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,6 @@
"backupdr.operations.list"
],
"name": "roles/backupdr.backupvaultViewer",
"stage": "BETA",
"stage": "GA",
"title": "Backup and DR Backup Vault Viewer"
}
2 changes: 2 additions & 0 deletions roles/cloudcontrolspartner.admin
Original file line number Diff line number Diff line change
Expand Up @@ -3,6 +3,8 @@
"etag": "AA==",
"includedPermissions": [
"cloudcontrolspartner.accessapprovalrequests.list",
"cloudcontrolspartner.customers.create",
"cloudcontrolspartner.customers.delete",
"cloudcontrolspartner.customers.get",
"cloudcontrolspartner.customers.list",
"cloudcontrolspartner.ekmconnections.get",
Expand Down
2 changes: 1 addition & 1 deletion roles/cloudcontrolspartner.supportCaseServiceAgent
Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,6 @@
"cloudsupport.techCases.get"
],
"name": "roles/cloudcontrolspartner.supportCaseServiceAgent",
"stage": "ALPHA",
"stage": "GA",
"title": "Cloud Controls Partner Support Case Service Agent"
}
30 changes: 30 additions & 0 deletions roles/cloudfunctions.admin
Original file line number Diff line number Diff line change
Expand Up @@ -37,16 +37,46 @@
"eventarc.channels.setIamPolicy",
"eventarc.channels.undelete",
"eventarc.channels.update",
"eventarc.enrollments.create",
"eventarc.enrollments.delete",
"eventarc.enrollments.get",
"eventarc.enrollments.getIamPolicy",
"eventarc.enrollments.list",
"eventarc.enrollments.setIamPolicy",
"eventarc.enrollments.update",
"eventarc.events.receiveAuditLogWritten",
"eventarc.events.receiveEvent",
"eventarc.googleApiSources.create",
"eventarc.googleApiSources.delete",
"eventarc.googleApiSources.get",
"eventarc.googleApiSources.getIamPolicy",
"eventarc.googleApiSources.list",
"eventarc.googleApiSources.setIamPolicy",
"eventarc.googleApiSources.update",
"eventarc.googleChannelConfigs.get",
"eventarc.googleChannelConfigs.update",
"eventarc.locations.get",
"eventarc.locations.list",
"eventarc.messageBuses.create",
"eventarc.messageBuses.delete",
"eventarc.messageBuses.get",
"eventarc.messageBuses.getIamPolicy",
"eventarc.messageBuses.list",
"eventarc.messageBuses.publish",
"eventarc.messageBuses.setIamPolicy",
"eventarc.messageBuses.update",
"eventarc.messageBuses.use",
"eventarc.operations.cancel",
"eventarc.operations.delete",
"eventarc.operations.get",
"eventarc.operations.list",
"eventarc.pipelines.create",
"eventarc.pipelines.delete",
"eventarc.pipelines.get",
"eventarc.pipelines.getIamPolicy",
"eventarc.pipelines.list",
"eventarc.pipelines.setIamPolicy",
"eventarc.pipelines.update",
"eventarc.providers.get",
"eventarc.providers.list",
"eventarc.triggers.create",
Expand Down
1 change: 0 additions & 1 deletion roles/cloudmigration.inframanager
Original file line number Diff line number Diff line change
Expand Up @@ -53,7 +53,6 @@
"compute.licenseCodes.get",
"compute.licenseCodes.list",
"compute.licenseCodes.update",
"compute.licenseCodes.use",
"compute.licenses.get",
"compute.licenses.list",
"compute.machineTypes.get",
Expand Down
3 changes: 0 additions & 3 deletions roles/cloudtpu.serviceAgent
Original file line number Diff line number Diff line change
Expand Up @@ -335,7 +335,6 @@
"compute.licenseCodes.list",
"compute.licenseCodes.setIamPolicy",
"compute.licenseCodes.update",
"compute.licenseCodes.use",
"compute.licenses.create",
"compute.licenses.delete",
"compute.licenses.get",
Expand Down Expand Up @@ -369,11 +368,9 @@
"compute.networkEndpointGroups.deleteTagBinding",
"compute.networkEndpointGroups.detachNetworkEndpoints",
"compute.networkEndpointGroups.get",
"compute.networkEndpointGroups.getIamPolicy",
"compute.networkEndpointGroups.list",
"compute.networkEndpointGroups.listEffectiveTags",
"compute.networkEndpointGroups.listTagBindings",
"compute.networkEndpointGroups.setIamPolicy",
"compute.networkEndpointGroups.use",
"compute.networks.access",
"compute.networks.addPeering",
Expand Down
5 changes: 0 additions & 5 deletions roles/compute.admin
Original file line number Diff line number Diff line change
Expand Up @@ -364,7 +364,6 @@
"compute.licenseCodes.list",
"compute.licenseCodes.setIamPolicy",
"compute.licenseCodes.update",
"compute.licenseCodes.use",
"compute.licenses.create",
"compute.licenses.delete",
"compute.licenses.get",
Expand Down Expand Up @@ -403,11 +402,9 @@
"compute.networkEndpointGroups.deleteTagBinding",
"compute.networkEndpointGroups.detachNetworkEndpoints",
"compute.networkEndpointGroups.get",
"compute.networkEndpointGroups.getIamPolicy",
"compute.networkEndpointGroups.list",
"compute.networkEndpointGroups.listEffectiveTags",
"compute.networkEndpointGroups.listTagBindings",
"compute.networkEndpointGroups.setIamPolicy",
"compute.networkEndpointGroups.use",
"compute.networks.access",
"compute.networks.addPeering",
Expand Down Expand Up @@ -676,13 +673,11 @@
"compute.securityPolicies.delete",
"compute.securityPolicies.deleteTagBinding",
"compute.securityPolicies.get",
"compute.securityPolicies.getIamPolicy",
"compute.securityPolicies.list",
"compute.securityPolicies.listEffectiveTags",
"compute.securityPolicies.listTagBindings",
"compute.securityPolicies.move",
"compute.securityPolicies.removeAssociation",
"compute.securityPolicies.setIamPolicy",
"compute.securityPolicies.setLabels",
"compute.securityPolicies.update",
"compute.securityPolicies.use",
Expand Down
2 changes: 0 additions & 2 deletions roles/compute.instanceAdmin
Original file line number Diff line number Diff line change
Expand Up @@ -157,11 +157,9 @@
"compute.networkEndpointGroups.deleteTagBinding",
"compute.networkEndpointGroups.detachNetworkEndpoints",
"compute.networkEndpointGroups.get",
"compute.networkEndpointGroups.getIamPolicy",
"compute.networkEndpointGroups.list",
"compute.networkEndpointGroups.listEffectiveTags",
"compute.networkEndpointGroups.listTagBindings",
"compute.networkEndpointGroups.setIamPolicy",
"compute.networkEndpointGroups.use",
"compute.networks.get",
"compute.networks.list",
Expand Down
3 changes: 0 additions & 3 deletions roles/compute.instanceAdmin.v1
Original file line number Diff line number Diff line change
Expand Up @@ -222,7 +222,6 @@
"compute.licenseCodes.list",
"compute.licenseCodes.setIamPolicy",
"compute.licenseCodes.update",
"compute.licenseCodes.use",
"compute.licenses.create",
"compute.licenses.delete",
"compute.licenses.get",
Expand All @@ -249,11 +248,9 @@
"compute.networkEndpointGroups.deleteTagBinding",
"compute.networkEndpointGroups.detachNetworkEndpoints",
"compute.networkEndpointGroups.get",
"compute.networkEndpointGroups.getIamPolicy",
"compute.networkEndpointGroups.list",
"compute.networkEndpointGroups.listEffectiveTags",
"compute.networkEndpointGroups.listTagBindings",
"compute.networkEndpointGroups.setIamPolicy",
"compute.networkEndpointGroups.use",
"compute.networks.get",
"compute.networks.list",
Expand Down
2 changes: 0 additions & 2 deletions roles/compute.loadBalancerAdmin
Original file line number Diff line number Diff line change
Expand Up @@ -167,11 +167,9 @@
"compute.networkEndpointGroups.deleteTagBinding",
"compute.networkEndpointGroups.detachNetworkEndpoints",
"compute.networkEndpointGroups.get",
"compute.networkEndpointGroups.getIamPolicy",
"compute.networkEndpointGroups.list",
"compute.networkEndpointGroups.listEffectiveTags",
"compute.networkEndpointGroups.listTagBindings",
"compute.networkEndpointGroups.setIamPolicy",
"compute.networkEndpointGroups.use",
"compute.networks.get",
"compute.networks.list",
Expand Down
2 changes: 0 additions & 2 deletions roles/compute.securityAdmin
Original file line number Diff line number Diff line change
Expand Up @@ -120,13 +120,11 @@
"compute.securityPolicies.delete",
"compute.securityPolicies.deleteTagBinding",
"compute.securityPolicies.get",
"compute.securityPolicies.getIamPolicy",
"compute.securityPolicies.list",
"compute.securityPolicies.listEffectiveTags",
"compute.securityPolicies.listTagBindings",
"compute.securityPolicies.move",
"compute.securityPolicies.removeAssociation",
"compute.securityPolicies.setIamPolicy",
"compute.securityPolicies.setLabels",
"compute.securityPolicies.update",
"compute.securityPolicies.use",
Expand Down
2 changes: 0 additions & 2 deletions roles/compute.viewer
Original file line number Diff line number Diff line change
Expand Up @@ -143,7 +143,6 @@
"compute.networkEdgeSecurityServices.get",
"compute.networkEdgeSecurityServices.list",
"compute.networkEndpointGroups.get",
"compute.networkEndpointGroups.getIamPolicy",
"compute.networkEndpointGroups.list",
"compute.networkEndpointGroups.listEffectiveTags",
"compute.networkEndpointGroups.listTagBindings",
Expand Down Expand Up @@ -248,7 +247,6 @@
"compute.routes.listEffectiveTags",
"compute.routes.listTagBindings",
"compute.securityPolicies.get",
"compute.securityPolicies.getIamPolicy",
"compute.securityPolicies.list",
"compute.securityPolicies.listEffectiveTags",
"compute.securityPolicies.listTagBindings",
Expand Down
2 changes: 1 addition & 1 deletion roles/container.cloudKmsKeyUser
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,6 @@
"resourcemanager.projects.get"
],
"name": "roles/container.cloudKmsKeyUser",
"stage": "ALPHA",
"stage": "GA",
"title": "Kubernetes Engine KMS Crypto Key User"
}
6 changes: 3 additions & 3 deletions roles/dataflow.serviceAgent
Original file line number Diff line number Diff line change
Expand Up @@ -447,7 +447,6 @@
"compute.licenseCodes.list",
"compute.licenseCodes.setIamPolicy",
"compute.licenseCodes.update",
"compute.licenseCodes.use",
"compute.licenses.create",
"compute.licenses.delete",
"compute.licenses.get",
Expand Down Expand Up @@ -481,11 +480,9 @@
"compute.networkEndpointGroups.deleteTagBinding",
"compute.networkEndpointGroups.detachNetworkEndpoints",
"compute.networkEndpointGroups.get",
"compute.networkEndpointGroups.getIamPolicy",
"compute.networkEndpointGroups.list",
"compute.networkEndpointGroups.listEffectiveTags",
"compute.networkEndpointGroups.listTagBindings",
"compute.networkEndpointGroups.setIamPolicy",
"compute.networkEndpointGroups.use",
"compute.networks.access",
"compute.networks.addPeering",
Expand Down Expand Up @@ -945,6 +942,7 @@
"dataform.workspaces.setIamPolicy",
"dataform.workspaces.writeFile",
"dataplex.projects.search",
"dns.networks.targetWithPeeringZone",
"firebase.projects.get",
"iam.serviceAccounts.actAs",
"iam.serviceAccounts.get",
Expand Down Expand Up @@ -999,6 +997,8 @@
"logging.sinks.get",
"logging.sinks.list",
"logging.sinks.update",
"logging.sqlAlerts.create",
"logging.sqlAlerts.update",
"logging.views.create",
"logging.views.delete",
"logging.views.get",
Expand Down
2 changes: 0 additions & 2 deletions roles/dataprep.serviceAgent
Original file line number Diff line number Diff line change
Expand Up @@ -200,7 +200,6 @@
"compute.networkEdgeSecurityServices.get",
"compute.networkEdgeSecurityServices.list",
"compute.networkEndpointGroups.get",
"compute.networkEndpointGroups.getIamPolicy",
"compute.networkEndpointGroups.list",
"compute.networkEndpointGroups.listEffectiveTags",
"compute.networkEndpointGroups.listTagBindings",
Expand Down Expand Up @@ -305,7 +304,6 @@
"compute.routes.listEffectiveTags",
"compute.routes.listTagBindings",
"compute.securityPolicies.get",
"compute.securityPolicies.getIamPolicy",
"compute.securityPolicies.list",
"compute.securityPolicies.listEffectiveTags",
"compute.securityPolicies.listTagBindings",
Expand Down
2 changes: 1 addition & 1 deletion roles/dataprocrm.nodeServiceAgent
Original file line number Diff line number Diff line change
Expand Up @@ -15,6 +15,6 @@
"monitoring.timeSeries.create"
],
"name": "roles/dataprocrm.nodeServiceAgent",
"stage": "ALPHA",
"stage": "GA",
"title": "Dataproc Resource Manager Node Service Agent"
}
30 changes: 30 additions & 0 deletions roles/eventarc.admin
Original file line number Diff line number Diff line change
Expand Up @@ -19,16 +19,46 @@
"eventarc.channels.setIamPolicy",
"eventarc.channels.undelete",
"eventarc.channels.update",
"eventarc.enrollments.create",
"eventarc.enrollments.delete",
"eventarc.enrollments.get",
"eventarc.enrollments.getIamPolicy",
"eventarc.enrollments.list",
"eventarc.enrollments.setIamPolicy",
"eventarc.enrollments.update",
"eventarc.events.receiveAuditLogWritten",
"eventarc.events.receiveEvent",
"eventarc.googleApiSources.create",
"eventarc.googleApiSources.delete",
"eventarc.googleApiSources.get",
"eventarc.googleApiSources.getIamPolicy",
"eventarc.googleApiSources.list",
"eventarc.googleApiSources.setIamPolicy",
"eventarc.googleApiSources.update",
"eventarc.googleChannelConfigs.get",
"eventarc.googleChannelConfigs.update",
"eventarc.locations.get",
"eventarc.locations.list",
"eventarc.messageBuses.create",
"eventarc.messageBuses.delete",
"eventarc.messageBuses.get",
"eventarc.messageBuses.getIamPolicy",
"eventarc.messageBuses.list",
"eventarc.messageBuses.publish",
"eventarc.messageBuses.setIamPolicy",
"eventarc.messageBuses.update",
"eventarc.messageBuses.use",
"eventarc.operations.cancel",
"eventarc.operations.delete",
"eventarc.operations.get",
"eventarc.operations.list",
"eventarc.pipelines.create",
"eventarc.pipelines.delete",
"eventarc.pipelines.get",
"eventarc.pipelines.getIamPolicy",
"eventarc.pipelines.list",
"eventarc.pipelines.setIamPolicy",
"eventarc.pipelines.update",
"eventarc.providers.get",
"eventarc.providers.list",
"eventarc.triggers.create",
Expand Down
12 changes: 11 additions & 1 deletion roles/eventarc.messageBusAdmin
Original file line number Diff line number Diff line change
@@ -1,7 +1,17 @@
{
"description": "Full control over Message Buses resources.",
"etag": "AA==",
"includedPermissions": [
"eventarc.messageBuses.create",
"eventarc.messageBuses.delete",
"eventarc.messageBuses.get",
"eventarc.messageBuses.getIamPolicy",
"eventarc.messageBuses.list",
"eventarc.messageBuses.publish",
"eventarc.messageBuses.update",
"eventarc.messageBuses.use"
],
"name": "roles/eventarc.messageBusAdmin",
"stage": "ALPHA",
"stage": "BETA",
"title": "Eventarc Message Bus Admin"
}
1 change: 1 addition & 0 deletions roles/eventarc.serviceAgent
Original file line number Diff line number Diff line change
Expand Up @@ -26,6 +26,7 @@
"container.services.list",
"dns.networks.targetWithPeeringZone",
"eventarc.channels.publish",
"eventarc.messageBuses.publish",
"eventarc.operations.get",
"iam.serviceAccounts.actAs",
"iam.serviceAccounts.getAccessToken",
Expand Down
13 changes: 13 additions & 0 deletions roles/eventarc.viewer
Original file line number Diff line number Diff line change
Expand Up @@ -8,11 +8,24 @@
"eventarc.channels.get",
"eventarc.channels.getIamPolicy",
"eventarc.channels.list",
"eventarc.enrollments.get",
"eventarc.enrollments.getIamPolicy",
"eventarc.enrollments.list",
"eventarc.googleApiSources.get",
"eventarc.googleApiSources.getIamPolicy",
"eventarc.googleApiSources.list",
"eventarc.googleChannelConfigs.get",
"eventarc.locations.get",
"eventarc.locations.list",
"eventarc.messageBuses.get",
"eventarc.messageBuses.getIamPolicy",
"eventarc.messageBuses.list",
"eventarc.messageBuses.use",
"eventarc.operations.get",
"eventarc.operations.list",
"eventarc.pipelines.get",
"eventarc.pipelines.getIamPolicy",
"eventarc.pipelines.list",
"eventarc.providers.get",
"eventarc.providers.list",
"eventarc.triggers.get",
Expand Down
Loading

0 comments on commit ece6230

Please sign in to comment.