Skip to content

Commit b66aa22

Browse files
committed
Fetch all roles
1 parent cf62a96 commit b66aa22

23 files changed

+196
-30
lines changed

gcp_roles_cai.json

Lines changed: 22 additions & 18 deletions
Large diffs are not rendered by default.

roles/backupdr.backupUser

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,8 @@
1313
"backupdr.backupPlanAssociations.triggerBackupForComputeInstance",
1414
"backupdr.backupPlanAssociations.updateForComputeDisk",
1515
"backupdr.backupPlanAssociations.updateForComputeInstance",
16+
"backupdr.backupPlanRevisions.get",
17+
"backupdr.backupPlanRevisions.list",
1618
"backupdr.backupPlans.get",
1719
"backupdr.backupPlans.list",
1820
"backupdr.backupPlans.useForComputeDisk",

roles/backupdr.serviceAgent

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
"description": "Grants the Backup and DR Service access to discover and protect GCP resources.",
33
"etag": "AA==",
44
"includedPermissions": [
5+
"alloydb.operations.get",
56
"cloudsql.instances.get",
67
"compute.addresses.list",
78
"compute.addresses.use",

roles/chronicle.admin

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -161,6 +161,10 @@
161161
"chronicle.instances.report",
162162
"chronicle.instances.update",
163163
"chronicle.instances.verifyNonce",
164+
"chronicle.iocAssociations.batchGet",
165+
"chronicle.iocAssociations.fetchRelatedIocAssociations",
166+
"chronicle.iocAssociations.fetchRelatedThreatCollections",
167+
"chronicle.iocAssociations.get",
164168
"chronicle.iocMatches.get",
165169
"chronicle.iocMatches.list",
166170
"chronicle.iocState.get",
@@ -277,6 +281,10 @@
277281
"chronicle.searchQueries.get",
278282
"chronicle.searchQueries.list",
279283
"chronicle.searchQueries.update",
284+
"chronicle.threatCollections.fetchIocMatchMetadata",
285+
"chronicle.threatCollections.fetchRuleMetadata",
286+
"chronicle.threatCollections.get",
287+
"chronicle.threatCollections.list",
280288
"chronicle.validationErrors.list",
281289
"chronicle.validationReports.get",
282290
"chronicle.watchlists.create",

roles/clouddeploy.developer

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,6 @@
2929
"clouddeploy.operations.list",
3030
"clouddeploy.releases.abandon",
3131
"clouddeploy.releases.create",
32-
"clouddeploy.releases.delete",
3332
"clouddeploy.releases.get",
3433
"clouddeploy.releases.list",
3534
"clouddeploy.rollouts.get",

roles/clouddeploy.operator

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,6 @@
3838
"clouddeploy.operations.list",
3939
"clouddeploy.releases.abandon",
4040
"clouddeploy.releases.create",
41-
"clouddeploy.releases.delete",
4241
"clouddeploy.releases.get",
4342
"clouddeploy.releases.list",
4443
"clouddeploy.rollouts.advance",

roles/compliancescanning.serviceAgent

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28,12 +28,15 @@
2828
"artifactregistry.tags.list",
2929
"artifactregistry.versions.get",
3030
"artifactregistry.versions.list",
31+
"compute.globalOperations.get",
3132
"compute.images.get",
3233
"compute.images.list",
3334
"compute.images.useReadOnly",
3435
"compute.instances.get",
3536
"compute.instances.getGuestAttributes",
3637
"compute.instances.list",
38+
"compute.regionOperations.get",
39+
"compute.zoneOperations.get",
3740
"compute.zones.get",
3841
"compute.zones.list",
3942
"containeranalysis.notes.attachOccurrence",

roles/compute.serviceAgent

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@
1010
"compute.disks.setLabels",
1111
"compute.disks.use",
1212
"compute.disks.useReadOnly",
13+
"compute.globalOperations.get",
1314
"compute.images.useReadOnly",
1415
"compute.instanceGroupManagers.get",
1516
"compute.instanceTemplates.useReadOnly",
@@ -24,10 +25,12 @@
2425
"compute.machineImages.useReadOnly",
2526
"compute.networks.use",
2627
"compute.networks.useExternalIp",
28+
"compute.regionOperations.get",
2729
"compute.resourcePolicies.use",
2830
"compute.snapshots.useReadOnly",
2931
"compute.subnetworks.use",
3032
"compute.subnetworks.useExternalIp",
33+
"compute.zoneOperations.get",
3134
"iam.serviceAccounts.actAs",
3235
"iam.serviceAccounts.getAccessToken",
3336
"iam.serviceAccounts.getOpenIdToken",

roles/datastream.bigqueryWriter

Lines changed: 72 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,72 @@
1+
{
2+
"description": "Permissions needed for datastream to write to BigQuery.",
3+
"etag": "AA==",
4+
"includedPermissions": [
5+
"bigquery.connections.delegate",
6+
"bigquery.connections.get",
7+
"bigquery.datasets.create",
8+
"bigquery.datasets.get",
9+
"bigquery.jobs.create",
10+
"bigquery.jobs.delete",
11+
"bigquery.jobs.get",
12+
"bigquery.jobs.list",
13+
"bigquery.jobs.update",
14+
"bigquery.tables.create",
15+
"bigquery.tables.get",
16+
"bigquery.tables.getData",
17+
"bigquery.tables.list",
18+
"bigquery.tables.update",
19+
"bigquery.tables.updateData",
20+
"datastream.connectionProfiles.create",
21+
"datastream.connectionProfiles.delete",
22+
"datastream.connectionProfiles.destinationTypes",
23+
"datastream.connectionProfiles.discover",
24+
"datastream.connectionProfiles.get",
25+
"datastream.connectionProfiles.getIamPolicy",
26+
"datastream.connectionProfiles.list",
27+
"datastream.connectionProfiles.listEffectiveTags",
28+
"datastream.connectionProfiles.listStaticServiceIps",
29+
"datastream.connectionProfiles.listTagBindings",
30+
"datastream.connectionProfiles.sourceTypes",
31+
"datastream.connectionProfiles.update",
32+
"datastream.locations.fetchStaticIps",
33+
"datastream.locations.get",
34+
"datastream.locations.list",
35+
"datastream.objects.get",
36+
"datastream.objects.list",
37+
"datastream.objects.startBackfillJob",
38+
"datastream.objects.stopBackfillJob",
39+
"datastream.operations.cancel",
40+
"datastream.operations.delete",
41+
"datastream.operations.get",
42+
"datastream.operations.list",
43+
"datastream.privateConnections.create",
44+
"datastream.privateConnections.delete",
45+
"datastream.privateConnections.get",
46+
"datastream.privateConnections.getIamPolicy",
47+
"datastream.privateConnections.list",
48+
"datastream.privateConnections.listEffectiveTags",
49+
"datastream.privateConnections.listTagBindings",
50+
"datastream.routes.create",
51+
"datastream.routes.delete",
52+
"datastream.routes.get",
53+
"datastream.routes.getIamPolicy",
54+
"datastream.routes.list",
55+
"datastream.streams.computeState",
56+
"datastream.streams.create",
57+
"datastream.streams.delete",
58+
"datastream.streams.fetchErrors",
59+
"datastream.streams.get",
60+
"datastream.streams.getIamPolicy",
61+
"datastream.streams.list",
62+
"datastream.streams.listEffectiveTags",
63+
"datastream.streams.listTagBindings",
64+
"datastream.streams.pause",
65+
"datastream.streams.resume",
66+
"datastream.streams.start",
67+
"datastream.streams.update"
68+
],
69+
"name": "roles/datastream.bigqueryWriter",
70+
"stage": "GA",
71+
"title": "Datastream Bigquery Writer"
72+
}

roles/developerconnect.insightsAdmin

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
{
2+
"description": "Admin access to Developer Connect Insights resources.",
3+
"etag": "AA==",
4+
"includedPermissions": [
5+
"developerconnect.locations.get",
6+
"developerconnect.locations.list",
7+
"developerconnect.operations.get",
8+
"developerconnect.operations.list",
9+
"resourcemanager.projects.get",
10+
"resourcemanager.projects.list"
11+
],
12+
"name": "roles/developerconnect.insightsAdmin",
13+
"stage": "BETA",
14+
"title": "Developer Connect Insights Admin"
15+
}

roles/developerconnect.insightsAgent

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
{
2+
"description": "Allow Developer Connect to access SDLC information.",
3+
"etag": "AA==",
4+
"includedPermissions": [
5+
"cloudasset.assets.exportResource",
6+
"cloudasset.assets.listResource",
7+
"cloudasset.assets.searchAllResources",
8+
"cloudasset.feeds.create",
9+
"cloudasset.feeds.get",
10+
"cloudasset.feeds.update",
11+
"containeranalysis.occurrences.get",
12+
"containeranalysis.occurrences.list",
13+
"logging.logEntries.create"
14+
],
15+
"name": "roles/developerconnect.insightsAgent",
16+
"stage": "BETA",
17+
"title": "Developer Connect Insights Config Agent"
18+
}

roles/developerconnect.insightsViewer

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
{
2+
"description": "Readonly access to Developer Connect Insights resources.",
3+
"etag": "AA==",
4+
"includedPermissions": [
5+
"developerconnect.locations.get",
6+
"developerconnect.locations.list",
7+
"developerconnect.operations.get",
8+
"developerconnect.operations.list",
9+
"resourcemanager.projects.get",
10+
"resourcemanager.projects.list"
11+
],
12+
"name": "roles/developerconnect.insightsViewer",
13+
"stage": "BETA",
14+
"title": "Developer Connect Insights Viewer"
15+
}

roles/discoveryengine.user

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,7 @@
1818
"discoveryengine.dataConnectors.checkRefreshToken",
1919
"discoveryengine.dataConnectors.executeAction",
2020
"discoveryengine.dataConnectors.queryAvailableActions",
21+
"discoveryengine.engines.get",
2122
"discoveryengine.notebooks.create",
2223
"discoveryengine.notebooks.list",
2324
"discoveryengine.servingConfigs.answer",

roles/documentai.admin

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,7 @@
44
"includedPermissions": [
55
"documentai.dataLabelingJobs.cancel",
66
"documentai.dataLabelingJobs.create",
7-
"documentai.dataLabelingJobs.delete",
87
"documentai.dataLabelingJobs.list",
9-
"documentai.dataLabelingJobs.update",
108
"documentai.datasetSchemas.get",
119
"documentai.datasetSchemas.update",
1210
"documentai.datasets.createDocuments",
@@ -27,7 +25,6 @@
2725
"documentai.labelerPools.delete",
2826
"documentai.labelerPools.get",
2927
"documentai.labelerPools.list",
30-
"documentai.labelerPools.update",
3128
"documentai.locations.get",
3229
"documentai.locations.list",
3330
"documentai.operations.getLegacy",

roles/documentai.editor

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,7 @@
44
"includedPermissions": [
55
"documentai.dataLabelingJobs.cancel",
66
"documentai.dataLabelingJobs.create",
7-
"documentai.dataLabelingJobs.delete",
87
"documentai.dataLabelingJobs.list",
9-
"documentai.dataLabelingJobs.update",
108
"documentai.datasetSchemas.get",
119
"documentai.datasetSchemas.update",
1210
"documentai.datasets.createDocuments",
@@ -27,7 +25,6 @@
2725
"documentai.labelerPools.delete",
2826
"documentai.labelerPools.get",
2927
"documentai.labelerPools.list",
30-
"documentai.labelerPools.update",
3128
"documentai.locations.get",
3229
"documentai.locations.list",
3330
"documentai.operations.getLegacy",

roles/editor

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1875,6 +1875,10 @@
18751875
"chronicle.instances.permitFederationAccess",
18761876
"chronicle.instances.report",
18771877
"chronicle.instances.verifyNonce",
1878+
"chronicle.iocAssociations.batchGet",
1879+
"chronicle.iocAssociations.fetchRelatedIocAssociations",
1880+
"chronicle.iocAssociations.fetchRelatedThreatCollections",
1881+
"chronicle.iocAssociations.get",
18781882
"chronicle.iocMatches.get",
18791883
"chronicle.iocMatches.list",
18801884
"chronicle.iocState.get",
@@ -1969,6 +1973,10 @@
19691973
"chronicle.searchQueries.get",
19701974
"chronicle.searchQueries.list",
19711975
"chronicle.searchQueries.update",
1976+
"chronicle.threatCollections.fetchIocMatchMetadata",
1977+
"chronicle.threatCollections.fetchRuleMetadata",
1978+
"chronicle.threatCollections.get",
1979+
"chronicle.threatCollections.list",
19721980
"chronicle.watchlists.get",
19731981
"chronicle.watchlists.list",
19741982
"chroniclesm.gcpAssociations.get",
@@ -2283,7 +2291,6 @@
22832291
"clouddeploy.operations.list",
22842292
"clouddeploy.releases.abandon",
22852293
"clouddeploy.releases.create",
2286-
"clouddeploy.releases.delete",
22872294
"clouddeploy.releases.get",
22882295
"clouddeploy.releases.list",
22892296
"clouddeploy.rollouts.advance",
@@ -5619,9 +5626,7 @@
56195626
"dns.responsePolicyRules.update",
56205627
"documentai.dataLabelingJobs.cancel",
56215628
"documentai.dataLabelingJobs.create",
5622-
"documentai.dataLabelingJobs.delete",
56235629
"documentai.dataLabelingJobs.list",
5624-
"documentai.dataLabelingJobs.update",
56255630
"documentai.datasetSchemas.get",
56265631
"documentai.datasetSchemas.update",
56275632
"documentai.datasets.createDocuments",
@@ -5642,7 +5647,6 @@
56425647
"documentai.labelerPools.delete",
56435648
"documentai.labelerPools.get",
56445649
"documentai.labelerPools.list",
5645-
"documentai.labelerPools.update",
56465650
"documentai.locations.get",
56475651
"documentai.locations.list",
56485652
"documentai.operations.getLegacy",
@@ -6595,6 +6599,9 @@
65956599
"iam.principalaccessboundarypolicies.searchPolicyBindings",
65966600
"iam.roles.get",
65976601
"iam.roles.list",
6602+
"iam.serviceAccountApiKeyBindings.create",
6603+
"iam.serviceAccountApiKeyBindings.delete",
6604+
"iam.serviceAccountApiKeyBindings.undelete",
65986605
"iam.serviceAccountKeys.create",
65996606
"iam.serviceAccountKeys.delete",
66006607
"iam.serviceAccountKeys.disable",

roles/iam.securityReviewer

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -434,6 +434,7 @@
434434
"chronicle.ruleExecutionErrors.list",
435435
"chronicle.rules.list",
436436
"chronicle.searchQueries.list",
437+
"chronicle.threatCollections.list",
437438
"chronicle.validationErrors.list",
438439
"chronicle.watchlists.list",
439440
"chroniclesm.gcpAssociations.list",

roles/iam.serviceAccountApiKeyBindingAdmin

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,11 @@
11
{
22
"description": "Create and delete service account API Key bindings",
33
"etag": "AA==",
4+
"includedPermissions": [
5+
"iam.serviceAccountApiKeyBindings.create",
6+
"iam.serviceAccountApiKeyBindings.delete",
7+
"iam.serviceAccountApiKeyBindings.undelete"
8+
],
49
"name": "roles/iam.serviceAccountApiKeyBindingAdmin",
510
"stage": "GA",
611
"title": "Service Account API Key Binding Admin"

roles/multiclusteringress.serviceAgent

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -109,6 +109,7 @@
109109
"compute.globalForwardingRules.setLabels",
110110
"compute.globalForwardingRules.setTarget",
111111
"compute.globalForwardingRules.update",
112+
"compute.globalOperations.get",
112113
"compute.healthChecks.create",
113114
"compute.healthChecks.createTagBinding",
114115
"compute.healthChecks.delete",
@@ -149,6 +150,7 @@
149150
"compute.regionHealthChecks.update",
150151
"compute.regionHealthChecks.use",
151152
"compute.regionHealthChecks.useReadOnly",
153+
"compute.regionOperations.get",
152154
"compute.regionSslCertificates.create",
153155
"compute.regionSslCertificates.createTagBinding",
154156
"compute.regionSslCertificates.delete",
@@ -242,6 +244,7 @@
242244
"compute.urlMaps.update",
243245
"compute.urlMaps.use",
244246
"compute.urlMaps.validate",
247+
"compute.zoneOperations.get",
245248
"container.backendConfigs.create",
246249
"container.backendConfigs.delete",
247250
"container.backendConfigs.get",

roles/observability.analyticsUser

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,9 @@
22
"description": "Grants permissions to use Cloud Observability Analytics.",
33
"etag": "AA==",
44
"includedPermissions": [
5+
"logging.queries.getShared",
6+
"logging.queries.listShared",
7+
"logging.queries.usePrivate",
58
"observability.analyticsViews.create",
69
"observability.analyticsViews.delete",
710
"observability.analyticsViews.get",

roles/securitycenter.controlServiceAgent

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -584,6 +584,8 @@
584584
"compute.instances.list",
585585
"compute.networkEndpointGroups.get",
586586
"compute.projects.get",
587+
"compute.regionOperations.get",
588+
"compute.zoneOperations.get",
587589
"container.clusters.get",
588590
"iam.denypolicies.get",
589591
"iam.denypolicies.list",

roles/securitycenter.securityResponseServiceAgent

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,12 @@
22
"description": "Gives Playbook Runner permissions to execute all Google authored Playbooks. This role will keep evolving as we add more playbooks",
33
"etag": "AA==",
44
"includedPermissions": [
5+
"compute.globalOperations.get",
56
"compute.instances.deleteAccessConfig",
67
"compute.instances.get",
78
"compute.instances.setMetadata",
9+
"compute.regionOperations.get",
10+
"compute.zoneOperations.get",
811
"iam.serviceAccounts.actAs",
912
"pubsub.topics.publish",
1013
"securitycenter.findings.list",

0 commit comments

Comments
 (0)