Skip to content

Commit

Permalink
Fetch all roles
Browse files Browse the repository at this point in the history
  • Loading branch information
bgeesaman committed Jan 31, 2025
1 parent 65cfa54 commit d99bed8
Show file tree
Hide file tree
Showing 39 changed files with 159 additions and 43 deletions.
73 changes: 38 additions & 35 deletions gcp_roles_cai.json

Large diffs are not rendered by default.

2 changes: 2 additions & 0 deletions roles/aiplatform.admin
Original file line number Diff line number Diff line change
Expand Up @@ -137,7 +137,9 @@
"aiplatform.featureGroups.create",
"aiplatform.featureGroups.delete",
"aiplatform.featureGroups.get",
"aiplatform.featureGroups.getIamPolicy",
"aiplatform.featureGroups.list",
"aiplatform.featureGroups.setIamPolicy",
"aiplatform.featureGroups.update",
"aiplatform.featureOnlineStores.create",
"aiplatform.featureOnlineStores.delete",
Expand Down
2 changes: 2 additions & 0 deletions roles/aiplatform.featurestoreAdmin
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,9 @@
"aiplatform.featureGroups.create",
"aiplatform.featureGroups.delete",
"aiplatform.featureGroups.get",
"aiplatform.featureGroups.getIamPolicy",
"aiplatform.featureGroups.list",
"aiplatform.featureGroups.setIamPolicy",
"aiplatform.featureGroups.update",
"aiplatform.featureOnlineStores.create",
"aiplatform.featureOnlineStores.delete",
Expand Down
19 changes: 19 additions & 0 deletions roles/appmetadata.workspaceMarketplaceAppConfigurationAdmin
Original file line number Diff line number Diff line change
@@ -0,0 +1,19 @@
{
"description": "Workspace Marketplace App Configuration Admin",
"etag": "AA==",
"includedPermissions": [
"chat.bots.get",
"clientauthconfig.clients.create",
"gsuiteaddons.deployments.create",
"gsuiteaddons.deployments.delete",
"gsuiteaddons.deployments.list",
"gsuiteaddons.deployments.update",
"resourcemanager.projects.get",
"serviceusage.services.get",
"workspacemarketplace.appConfiguration.update",
"workspacemarketplace.appConfiguration.view"
],
"name": "roles/appmetadata.workspaceMarketplaceAppConfigurationAdmin",
"stage": "BETA",
"title": "Workspace Marketplace App Configuration Admin"
}
1 change: 1 addition & 0 deletions roles/backupdr.backupConfigViewer
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,7 @@
"description": "Provides read access to resource backup config. Resource backup config has the metadata of a Google Cloud resource that can be backed up, along with its backup configurations.",
"etag": "AA==",
"includedPermissions": [
"backupdr.locations.list",
"backupdr.resourceBackupConfigs.get",
"backupdr.resourceBackupConfigs.list"
],
Expand Down
1 change: 1 addition & 0 deletions roles/cloudaicompanion.user
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,7 @@
"cloudaicompanion.entitlements.get",
"cloudaicompanion.instances.completeCode",
"cloudaicompanion.instances.completeTask",
"cloudaicompanion.instances.exportMetrics",
"cloudaicompanion.instances.generateCode",
"cloudaicompanion.instances.generateText",
"cloudaicompanion.licenses.selfAssign",
Expand Down
1 change: 1 addition & 0 deletions roles/composer.serviceAgent
Original file line number Diff line number Diff line change
Expand Up @@ -1786,6 +1786,7 @@
"storage.buckets.list",
"storage.buckets.listEffectiveTags",
"storage.buckets.listTagBindings",
"storage.buckets.relocate",
"storage.buckets.restore",
"storage.buckets.setIamPolicy",
"storage.buckets.setIpFilter",
Expand Down
2 changes: 2 additions & 0 deletions roles/datafusion.serviceAgent
Original file line number Diff line number Diff line change
Expand Up @@ -434,6 +434,7 @@
"dns.networks.bindPrivateDNSZone",
"dns.networks.targetWithPeeringZone",
"firebase.projects.get",
"logging.logEntries.create",
"monitoring.metricDescriptors.create",
"monitoring.metricDescriptors.get",
"monitoring.metricDescriptors.list",
Expand Down Expand Up @@ -587,6 +588,7 @@
"storage.buckets.list",
"storage.buckets.listEffectiveTags",
"storage.buckets.listTagBindings",
"storage.buckets.relocate",
"storage.buckets.restore",
"storage.buckets.setIamPolicy",
"storage.buckets.setIpFilter",
Expand Down
1 change: 1 addition & 0 deletions roles/datapipelines.serviceAgent
Original file line number Diff line number Diff line change
Expand Up @@ -87,6 +87,7 @@
"storage.buckets.list",
"storage.buckets.listEffectiveTags",
"storage.buckets.listTagBindings",
"storage.buckets.relocate",
"storage.buckets.restore",
"storage.buckets.setIamPolicy",
"storage.buckets.setIpFilter",
Expand Down
1 change: 1 addition & 0 deletions roles/dataplex.serviceAgent
Original file line number Diff line number Diff line change
Expand Up @@ -249,6 +249,7 @@
"storage.buckets.list",
"storage.buckets.listEffectiveTags",
"storage.buckets.listTagBindings",
"storage.buckets.relocate",
"storage.buckets.restore",
"storage.buckets.setIamPolicy",
"storage.buckets.setIpFilter",
Expand Down
3 changes: 1 addition & 2 deletions roles/dataproc.serviceAgent
Original file line number Diff line number Diff line change
Expand Up @@ -338,9 +338,7 @@
"resourcemanager.hierarchyNodes.listEffectiveTags",
"resourcemanager.projects.get",
"resourcemanager.projects.list",
"servicemanagement.services.bind",
"serviceusage.quotas.get",
"serviceusage.services.enable",
"serviceusage.services.get",
"serviceusage.services.list",
"serviceusage.services.use",
Expand All @@ -366,6 +364,7 @@
"storage.buckets.list",
"storage.buckets.listEffectiveTags",
"storage.buckets.listTagBindings",
"storage.buckets.relocate",
"storage.buckets.restore",
"storage.buckets.setIamPolicy",
"storage.buckets.setIpFilter",
Expand Down
1 change: 1 addition & 0 deletions roles/datastream.serviceAgent
Original file line number Diff line number Diff line change
Expand Up @@ -3,6 +3,7 @@
"etag": "AA==",
"includedPermissions": [
"bigquery.connections.delegate",
"bigquery.connections.get",
"bigquery.datasets.create",
"bigquery.datasets.get",
"bigquery.jobs.create",
Expand Down
2 changes: 1 addition & 1 deletion roles/discoveryengine.notebookEditor
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,6 @@
"description": "Grants read and write access to a Cloud NotebookLM Notebook.",
"etag": "AA==",
"name": "roles/discoveryengine.notebookEditor",
"stage": "ALPHA",
"stage": "BETA",
"title": "Cloud NotebookLM Notebook Editor"
}
4 changes: 2 additions & 2 deletions roles/discoveryengine.notebookLmOwner
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,6 @@
"resourcemanager.projects.list"
],
"name": "roles/discoveryengine.notebookLmOwner",
"stage": "ALPHA",
"title": "Cloud NotebookLM Owner"
"stage": "BETA",
"title": "Cloud NotebookLM Admin"
}
2 changes: 1 addition & 1 deletion roles/discoveryengine.notebookLmUser
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,6 @@
"resourcemanager.projects.list"
],
"name": "roles/discoveryengine.notebookLmUser",
"stage": "ALPHA",
"stage": "BETA",
"title": "Cloud NotebookLM User"
}
2 changes: 1 addition & 1 deletion roles/discoveryengine.notebookOwner
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,6 @@
"description": "Grants full access to a Cloud NotebookLM Notebook.",
"etag": "AA==",
"name": "roles/discoveryengine.notebookOwner",
"stage": "ALPHA",
"stage": "BETA",
"title": "Cloud NotebookLM Notebook Owner"
}
2 changes: 1 addition & 1 deletion roles/discoveryengine.notebookViewer
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,6 @@
"description": "Grants read-only access to a Cloud NotebookLM Notebook.",
"etag": "AA==",
"name": "roles/discoveryengine.notebookViewer",
"stage": "ALPHA",
"stage": "BETA",
"title": "Cloud NotebookLM Notebook Viewer"
}
4 changes: 4 additions & 0 deletions roles/editor
Original file line number Diff line number Diff line change
Expand Up @@ -180,6 +180,7 @@
"aiplatform.featureGroups.create",
"aiplatform.featureGroups.delete",
"aiplatform.featureGroups.get",
"aiplatform.featureGroups.getIamPolicy",
"aiplatform.featureGroups.list",
"aiplatform.featureGroups.update",
"aiplatform.featureOnlineStores.create",
Expand Down Expand Up @@ -1881,6 +1882,7 @@
"cloudaicompanion.entitlements.get",
"cloudaicompanion.instances.completeCode",
"cloudaicompanion.instances.completeTask",
"cloudaicompanion.instances.exportMetrics",
"cloudaicompanion.instances.generateCode",
"cloudaicompanion.instances.generateText",
"cloudaicompanion.licenses.selfAssign",
Expand Down Expand Up @@ -9149,6 +9151,8 @@
"workloadmanager.operations.list",
"workloadmanager.results.list",
"workloadmanager.rules.list",
"workspacemarketplace.appConfiguration.update",
"workspacemarketplace.appConfiguration.view",
"workstations.operations.get",
"workstations.workstationClusters.create",
"workstations.workstationClusters.delete",
Expand Down
1 change: 1 addition & 0 deletions roles/firebase.admin
Original file line number Diff line number Diff line change
Expand Up @@ -543,6 +543,7 @@
"storage.buckets.list",
"storage.buckets.listEffectiveTags",
"storage.buckets.listTagBindings",
"storage.buckets.relocate",
"storage.buckets.restore",
"storage.buckets.setIamPolicy",
"storage.buckets.setIpFilter",
Expand Down
1 change: 1 addition & 0 deletions roles/firebase.developAdmin
Original file line number Diff line number Diff line change
Expand Up @@ -447,6 +447,7 @@
"storage.buckets.list",
"storage.buckets.listEffectiveTags",
"storage.buckets.listTagBindings",
"storage.buckets.relocate",
"storage.buckets.restore",
"storage.buckets.setIamPolicy",
"storage.buckets.setIpFilter",
Expand Down
2 changes: 2 additions & 0 deletions roles/iam.securityAdmin
Original file line number Diff line number Diff line change
Expand Up @@ -38,7 +38,9 @@
"aiplatform.entityTypes.setIamPolicy",
"aiplatform.executions.list",
"aiplatform.extensions.list",
"aiplatform.featureGroups.getIamPolicy",
"aiplatform.featureGroups.list",
"aiplatform.featureGroups.setIamPolicy",
"aiplatform.featureOnlineStores.getIamPolicy",
"aiplatform.featureOnlineStores.list",
"aiplatform.featureOnlineStores.setIamPolicy",
Expand Down
1 change: 1 addition & 0 deletions roles/iam.securityReviewer
Original file line number Diff line number Diff line change
Expand Up @@ -35,6 +35,7 @@
"aiplatform.entityTypes.list",
"aiplatform.executions.list",
"aiplatform.extensions.list",
"aiplatform.featureGroups.getIamPolicy",
"aiplatform.featureGroups.list",
"aiplatform.featureOnlineStores.getIamPolicy",
"aiplatform.featureOnlineStores.list",
Expand Down
1 change: 1 addition & 0 deletions roles/managedkafka.admin
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,7 @@
"description": "Full access to Managed Kafka resources.",
"etag": "AA==",
"includedPermissions": [
"cloudasset.assets.searchAllResources",
"managedkafka.clusters.connect",
"managedkafka.clusters.create",
"managedkafka.clusters.delete",
Expand Down
1 change: 1 addition & 0 deletions roles/managedkafka.client
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,7 @@
"description": "Provides access to connect to the Kafka servers in a cluster, i.e. provides Kafka data plane access. Intended for, e.g., producers and consumers.",
"etag": "AA==",
"includedPermissions": [
"cloudasset.assets.searchAllResources",
"managedkafka.clusters.connect",
"managedkafka.clusters.get",
"managedkafka.clusters.list",
Expand Down
1 change: 1 addition & 0 deletions roles/managedkafka.clusterEditor
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,7 @@
"description": "Provides read and write access to Kafka clusters. Intended for, e.g., IT Departments that provision Kafka clusters, but need not be able to read or modify topics or consumer groups.",
"etag": "AA==",
"includedPermissions": [
"cloudasset.assets.searchAllResources",
"managedkafka.clusters.create",
"managedkafka.clusters.delete",
"managedkafka.clusters.get",
Expand Down
1 change: 1 addition & 0 deletions roles/managedkafka.consumerGroupEditor
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,7 @@
"description": "Provides read and write access to consumer group metadata. Intended for, e.g., developers who configure consumer groups.",
"etag": "AA==",
"includedPermissions": [
"cloudasset.assets.searchAllResources",
"managedkafka.clusters.get",
"managedkafka.clusters.list",
"managedkafka.consumerGroups.delete",
Expand Down
1 change: 1 addition & 0 deletions roles/managedkafka.topicEditor
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,7 @@
"description": "Provides read and write access to topic metadata. Intended for, e.g., developers who configure topics.",
"etag": "AA==",
"includedPermissions": [
"cloudasset.assets.searchAllResources",
"managedkafka.clusters.get",
"managedkafka.clusters.list",
"managedkafka.consumerGroups.get",
Expand Down
1 change: 1 addition & 0 deletions roles/managedkafka.viewer
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,7 @@
"description": "Readonly access to Managed Kafka resources.",
"etag": "AA==",
"includedPermissions": [
"cloudasset.assets.searchAllResources",
"managedkafka.clusters.get",
"managedkafka.clusters.list",
"managedkafka.consumerGroups.get",
Expand Down
1 change: 1 addition & 0 deletions roles/ml.serviceAgent
Original file line number Diff line number Diff line change
Expand Up @@ -91,6 +91,7 @@
"storage.buckets.list",
"storage.buckets.listEffectiveTags",
"storage.buckets.listTagBindings",
"storage.buckets.relocate",
"storage.buckets.restore",
"storage.buckets.setIamPolicy",
"storage.buckets.setIpFilter",
Expand Down
6 changes: 6 additions & 0 deletions roles/oauthconfig.editor
Original file line number Diff line number Diff line change
Expand Up @@ -16,6 +16,12 @@
"clientauthconfig.clients.listWithSecrets",
"clientauthconfig.clients.undelete",
"clientauthconfig.clients.update",
"firebase.clients.create",
"firebase.clients.get",
"firebase.clients.list",
"firebase.clients.update",
"firebaseappcheck.resourcePolicies.get",
"firebaseappcheck.resourcePolicies.update",
"oauthconfig.clientpolicy.get",
"oauthconfig.testusers.get",
"oauthconfig.testusers.update",
Expand Down
3 changes: 3 additions & 0 deletions roles/oauthconfig.viewer
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,9 @@
"clientauthconfig.brands.list",
"clientauthconfig.clients.get",
"clientauthconfig.clients.list",
"firebase.clients.get",
"firebase.clients.list",
"firebaseappcheck.resourcePolicies.get",
"oauthconfig.clientpolicy.get",
"oauthconfig.testusers.get",
"oauthconfig.verification.get"
Expand Down
15 changes: 15 additions & 0 deletions roles/owner
Original file line number Diff line number Diff line change
Expand Up @@ -188,7 +188,9 @@
"aiplatform.featureGroups.create",
"aiplatform.featureGroups.delete",
"aiplatform.featureGroups.get",
"aiplatform.featureGroups.getIamPolicy",
"aiplatform.featureGroups.list",
"aiplatform.featureGroups.setIamPolicy",
"aiplatform.featureGroups.update",
"aiplatform.featureOnlineStores.create",
"aiplatform.featureOnlineStores.delete",
Expand Down Expand Up @@ -2036,6 +2038,7 @@
"cloudaicompanion.entitlements.get",
"cloudaicompanion.instances.completeCode",
"cloudaicompanion.instances.completeTask",
"cloudaicompanion.instances.exportMetrics",
"cloudaicompanion.instances.generateCode",
"cloudaicompanion.instances.generateText",
"cloudaicompanion.licenses.selfAssign",
Expand Down Expand Up @@ -9168,6 +9171,16 @@
"retail.experiments.loadExperimentLookerDashboard",
"retail.experiments.queryTrafficMetrics",
"retail.experiments.update",
"retail.merchantControls.approverDelete",
"retail.merchantControls.approverGet",
"retail.merchantControls.approverList",
"retail.merchantControls.approverUpdate",
"retail.merchantControls.creatorCreate",
"retail.merchantControls.creatorDelete",
"retail.merchantControls.creatorGet",
"retail.merchantControls.creatorList",
"retail.merchantControls.creatorSubmit",
"retail.merchantControls.creatorUpdate",
"retail.models.create",
"retail.models.delete",
"retail.models.get",
Expand Down Expand Up @@ -10392,6 +10405,8 @@
"workloadmanager.operations.list",
"workloadmanager.results.list",
"workloadmanager.rules.list",
"workspacemarketplace.appConfiguration.update",
"workspacemarketplace.appConfiguration.view",
"workstations.operations.get",
"workstations.workstationClusters.create",
"workstations.workstationClusters.createTagBinding",
Expand Down
19 changes: 19 additions & 0 deletions roles/retail.merchantApprover
Original file line number Diff line number Diff line change
@@ -0,0 +1,19 @@
{
"description": "Grants access and approval rights to MerchantControls in the merchant console.",
"etag": "AA==",
"includedPermissions": [
"retail.merchantControls.approverDelete",
"retail.merchantControls.approverGet",
"retail.merchantControls.approverList",
"retail.merchantControls.approverUpdate",
"retail.merchantControls.creatorCreate",
"retail.merchantControls.creatorDelete",
"retail.merchantControls.creatorGet",
"retail.merchantControls.creatorList",
"retail.merchantControls.creatorSubmit",
"retail.merchantControls.creatorUpdate"
],
"name": "roles/retail.merchantApprover",
"stage": "BETA",
"title": "Retail Merchant Approver"
}
15 changes: 15 additions & 0 deletions roles/retail.merchantCreator
Original file line number Diff line number Diff line change
@@ -0,0 +1,15 @@
{
"description": "Grants access to own MerchantControls in the merchant console.",
"etag": "AA==",
"includedPermissions": [
"retail.merchantControls.creatorCreate",
"retail.merchantControls.creatorDelete",
"retail.merchantControls.creatorGet",
"retail.merchantControls.creatorList",
"retail.merchantControls.creatorSubmit",
"retail.merchantControls.creatorUpdate"
],
"name": "roles/retail.merchantCreator",
"stage": "BETA",
"title": "Retail Merchant Creator"
}
2 changes: 2 additions & 0 deletions roles/securitycenter.controlServiceAgent
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,8 @@
"description": "Security Center Control service agent can monitor and configure GCP resources and import security findings.",
"etag": "AA==",
"includedPermissions": [
"accesscontextmanager.gcpUserAccessBindings.get",
"accesscontextmanager.gcpUserAccessBindings.list",
"bigquery.datasets.get",
"binaryauthorization.policy.get",
"cloudasset.assets.analyzeIamPolicy",
Expand Down
2 changes: 2 additions & 0 deletions roles/securitycenter.serviceAgent
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,8 @@
"description": "Security Center service agent can scan GCP resources and import security scans.",
"etag": "AA==",
"includedPermissions": [
"accesscontextmanager.gcpUserAccessBindings.get",
"accesscontextmanager.gcpUserAccessBindings.list",
"bigquery.datasets.get",
"binaryauthorization.policy.get",
"cloudasset.assets.analyzeIamPolicy",
Expand Down
Loading

0 comments on commit d99bed8

Please sign in to comment.