diff --git a/package-lock.json b/package-lock.json index 6b1bfd3..e9388f8 100644 --- a/package-lock.json +++ b/package-lock.json @@ -1,12 +1,12 @@ { "name": "gcp-iam-completions", - "version": "1.1.37", + "version": "1.1.38", "lockfileVersion": 3, "requires": true, "packages": { "": { "name": "gcp-iam-completions", - "version": "1.1.37", + "version": "1.1.38", "license": "MIT", "dependencies": { "googleapis": "^123.0.0" diff --git a/package.json b/package.json index dad42c2..378f4cf 100644 --- a/package.json +++ b/package.json @@ -8,7 +8,7 @@ "email": "patrick.dougherty.0208@gmail.com" }, "license": "MIT", - "version": "1.1.37", + "version": "1.1.38", "bugs": "https://github.com/patrickdoc/vscode-gcp-iam-completions/issues", "repository": { "type": "git", diff --git a/src/google/data/roles.json b/src/google/data/roles.json index 3b708c3..6042235 100644 --- a/src/google/data/roles.json +++ b/src/google/data/roles.json @@ -6764,6 +6764,7 @@ "resourcemanager.projects.get", "resourcemanager.projects.getIamPolicy", "resourcemanager.projects.list", + "secretmanager.secrets.list", "serviceusage.quotas.get", "serviceusage.services.get", "serviceusage.services.list", @@ -7459,6 +7460,15 @@ "stage": "GA", "etag": "AA==" }, + { + "name": "roles/backupdr.mangementServerAccessor", + "title": "Backup and DR Management Server Accessor", + "description": "Grants the Backup and DR management server access role to Backup Appliances.", + "includedPermissions": [ + "backupdr.managementServers.createConnection" + ], + "etag": "AA==" + }, { "name": "roles/backupdr.mountUser", "title": "Backup and DR Mount User", @@ -9044,6 +9054,8 @@ "bigquery.tables.getData", "bigquery.tables.getIamPolicy", "bigquery.tables.list", + "bigquery.tables.listEffectiveTags", + "bigquery.tables.listTagBindings", "bigquery.tables.replicateData", "bigquery.tables.restoreSnapshot", "bigquery.tables.setCategory", @@ -9255,6 +9267,8 @@ "bigquery.tables.getData", "bigquery.tables.getIamPolicy", "bigquery.tables.list", + "bigquery.tables.listEffectiveTags", + "bigquery.tables.listTagBindings", "bigquery.tables.replicateData", "bigquery.tables.restoreSnapshot", "bigquery.tables.setCategory", @@ -9561,6 +9575,8 @@ "bigquery.tables.getData", "bigquery.tables.getIamPolicy", "bigquery.tables.list", + "bigquery.tables.listEffectiveTags", + "bigquery.tables.listTagBindings", "bigquery.tables.replicateData", "bigquery.tables.restoreSnapshot", "bigquery.tables.setCategory", @@ -11728,6 +11744,28 @@ "stage": "BETA", "etag": "AA==" }, + { + "name": "roles/cloudaicompanion.serviceAgent", + "title": "Cloud AI Companion Service Agent", + "description": "Gives Cloud AI Companion components the proper permissions to function.", + "includedPermissions": [ + "cloudbuild.connections.get", + "cloudbuild.repositories.accessReadToken", + "cloudbuild.repositories.fetchGitRefs", + "cloudbuild.repositories.get", + "cloudbuild.repositories.list", + "developerconnect.connections.get", + "developerconnect.gitRepositoryLinks.fetchGitRefs", + "developerconnect.gitRepositoryLinks.fetchReadToken", + "developerconnect.gitRepositoryLinks.get", + "developerconnect.gitRepositoryLinks.list", + "logging.logEntries.create", + "logging.logEntries.route", + "serviceusage.services.use" + ], + "stage": "GA", + "etag": "AA==" + }, { "name": "roles/cloudaicompanion.user", "title": "Cloud AI Companion User", @@ -17659,6 +17697,8 @@ "networkservices.operations.delete", "networkservices.operations.get", "networkservices.operations.list", + "networkservices.route_views.get", + "networkservices.route_views.list", "networkservices.serviceBindings.create", "networkservices.serviceBindings.delete", "networkservices.serviceBindings.get", @@ -20091,6 +20131,8 @@ "networkservices.operations.delete", "networkservices.operations.get", "networkservices.operations.list", + "networkservices.route_views.get", + "networkservices.route_views.list", "networkservices.serviceBindings.create", "networkservices.serviceBindings.delete", "networkservices.serviceBindings.get", @@ -23751,6 +23793,8 @@ "networkservices.operations.delete", "networkservices.operations.get", "networkservices.operations.list", + "networkservices.route_views.get", + "networkservices.route_views.list", "networkservices.serviceBindings.create", "networkservices.serviceBindings.delete", "networkservices.serviceBindings.get", @@ -23946,6 +23990,8 @@ "networkservices.meshes.use", "networkservices.operations.get", "networkservices.operations.list", + "networkservices.route_views.get", + "networkservices.route_views.list", "networkservices.serviceBindings.get", "networkservices.serviceBindings.list", "networkservices.serviceLbPolicies.get", @@ -24214,6 +24260,8 @@ "networkservices.meshes.list", "networkservices.operations.get", "networkservices.operations.list", + "networkservices.route_views.get", + "networkservices.route_views.list", "networkservices.serviceBindings.get", "networkservices.serviceBindings.list", "networkservices.serviceLbPolicies.get", @@ -25393,6 +25441,48 @@ "stage": "BETA", "etag": "AA==" }, + { + "name": "roles/configdelivery.serviceAgent", + "title": "Config Delivery Service Agent", + "description": "Gives the Config Delivery service account permission to manage resources ", + "includedPermissions": [ + "artifactregistry.dockerimages.get", + "artifactregistry.dockerimages.list", + "artifactregistry.projectsettings.get", + "artifactregistry.repositories.create", + "artifactregistry.repositories.downloadArtifacts", + "artifactregistry.repositories.get", + "artifactregistry.repositories.getIamPolicy", + "artifactregistry.repositories.list", + "artifactregistry.repositories.listEffectiveTags", + "artifactregistry.repositories.listTagBindings", + "artifactregistry.repositories.setIamPolicy", + "artifactregistry.repositories.uploadArtifacts", + "artifactregistry.tags.create", + "artifactregistry.tags.delete", + "artifactregistry.tags.get", + "artifactregistry.tags.list", + "artifactregistry.tags.update", + "artifactregistry.versions.delete", + "artifactregistry.versions.get", + "artifactregistry.versions.list", + "cloudbuild.builds.create", + "cloudbuild.builds.get", + "cloudbuild.builds.list", + "cloudbuild.builds.update", + "container.customResourceDefinitions.get", + "container.customResourceDefinitions.list", + "container.serviceAccounts.get", + "container.serviceAccounts.list", + "container.thirdPartyObjects.create", + "container.thirdPartyObjects.delete", + "container.thirdPartyObjects.get", + "container.thirdPartyObjects.list", + "container.thirdPartyObjects.update", + "iam.serviceAccounts.actAs" + ], + "etag": "AA==" + }, { "name": "roles/connectors.admin", "title": "Connector Admin", @@ -28556,6 +28646,8 @@ "networkservices.operations.delete", "networkservices.operations.get", "networkservices.operations.list", + "networkservices.route_views.get", + "networkservices.route_views.list", "networkservices.serviceBindings.create", "networkservices.serviceBindings.delete", "networkservices.serviceBindings.get", @@ -30169,6 +30261,8 @@ "bigquery.tables.getData", "bigquery.tables.getIamPolicy", "bigquery.tables.list", + "bigquery.tables.listEffectiveTags", + "bigquery.tables.listTagBindings", "bigquery.tables.replicateData", "bigquery.tables.restoreSnapshot", "bigquery.tables.setCategory", @@ -31234,6 +31328,8 @@ "networkservices.operations.delete", "networkservices.operations.get", "networkservices.operations.list", + "networkservices.route_views.get", + "networkservices.route_views.list", "networkservices.serviceBindings.create", "networkservices.serviceBindings.delete", "networkservices.serviceBindings.get", @@ -31976,6 +32072,8 @@ "bigquery.tables.getData", "bigquery.tables.getIamPolicy", "bigquery.tables.list", + "bigquery.tables.listEffectiveTags", + "bigquery.tables.listTagBindings", "bigquery.tables.replicateData", "bigquery.tables.restoreSnapshot", "bigquery.tables.setCategory", @@ -32362,6 +32460,8 @@ "networkservices.meshes.list", "networkservices.operations.get", "networkservices.operations.list", + "networkservices.route_views.get", + "networkservices.route_views.list", "networkservices.serviceBindings.get", "networkservices.serviceBindings.list", "networkservices.serviceLbPolicies.get", @@ -33800,6 +33900,8 @@ "bigquery.tables.getData", "bigquery.tables.getIamPolicy", "bigquery.tables.list", + "bigquery.tables.listEffectiveTags", + "bigquery.tables.listTagBindings", "bigquery.tables.replicateData", "bigquery.tables.restoreSnapshot", "bigquery.tables.setCategory", @@ -34746,6 +34848,7 @@ "logging.queries.list", "logging.queries.listShared", "logging.queries.update", + "logging.queries.usePrivate", "logging.sinks.get", "logging.sinks.list", "logging.usage.get", @@ -35030,6 +35133,7 @@ "dataproc.nodeGroups.get", "dataproc.nodeGroups.update", "dataproc.operations.cancel", + "dataproc.sessionTemplates.get", "dataproc.sessions.create", "dataproc.sessions.delete", "dataproc.sessions.get", @@ -39545,6 +39649,8 @@ "bigquery.tables.getData", "bigquery.tables.getIamPolicy", "bigquery.tables.list", + "bigquery.tables.listEffectiveTags", + "bigquery.tables.listTagBindings", "bigquery.tables.replicateData", "bigquery.tables.restoreSnapshot", "bigquery.tables.setCategory", @@ -41906,6 +42012,8 @@ "bigquery.tables.createSnapshot", "bigquery.tables.deleteIndex", "bigquery.tables.getIamPolicy", + "bigquery.tables.listEffectiveTags", + "bigquery.tables.listTagBindings", "bigquery.tables.replicateData", "bigquery.tables.restoreSnapshot", "bigquery.transfers.get", @@ -46444,6 +46552,7 @@ "logging.queries.list", "logging.queries.listShared", "logging.queries.update", + "logging.queries.usePrivate", "logging.settings.get", "logging.settings.update", "logging.sinks.get", @@ -48148,6 +48257,8 @@ "securitycentermanagement.securityCenterServices.get", "securitycentermanagement.securityCenterServices.list", "securitycentermanagement.securityCommandCenter.activate", + "securitycentermanagement.securityCommandCenter.checkActivationOperation", + "securitycentermanagement.securityCommandCenter.checkEligibility", "securitycentermanagement.securityCommandCenter.generateServiceAccounts", "securitycentermanagement.securityCommandCenter.get", "securitycentermanagement.securityCommandCenter.update", @@ -49428,6 +49539,7 @@ "container.services.list", "dns.networks.targetWithPeeringZone", "eventarc.channels.publish", + "eventarc.operations.get", "iam.serviceAccounts.actAs", "iam.serviceAccounts.getAccessToken", "iam.serviceAccounts.getOpenIdToken", @@ -54400,6 +54512,7 @@ "includedPermissions": [ "gkehub.gateway.get", "gkehub.memberships.get", + "monitoring.timeSeries.list", "resourcemanager.projects.get", "resourcemanager.projects.list", "serviceusage.services.get" @@ -54444,6 +54557,11 @@ "gkehub.features.list", "gkehub.fleet.create", "gkehub.fleet.get", + "gkehub.gateway.delete", + "gkehub.gateway.get", + "gkehub.gateway.patch", + "gkehub.gateway.post", + "gkehub.gateway.put", "gkehub.locations.get", "gkehub.locations.list", "gkehub.memberships.create", @@ -55815,18 +55933,21 @@ "name": "roles/iam.principalAccessBoundaryAdmin", "title": "Principal Access Boundary Policy Admin", "description": "Principal Access Boundary admin role, with permissions to read and modify principal access boundary policies and view associated policy bindings", + "stage": "BETA", "etag": "AA==" }, { "name": "roles/iam.principalAccessBoundaryUser", "title": "Principal Access Boundary Policy User", "description": "Principal Access Boundary Policies user role, with permissions to view, principal access boundary policies and bind and unbind principal access boundary policies to targets", + "stage": "BETA", "etag": "AA==" }, { "name": "roles/iam.principalAccessBoundaryViewer", "title": "Principal Access Boundary Policy Viewer", "description": "Principal Access Boundary Reviewer role, with permissions to read principal access boundary policies and view associated policy bindings", + "stage": "BETA", "etag": "AA==" }, { @@ -62942,6 +63063,7 @@ "logging.queries.share", "logging.queries.update", "logging.queries.updateShared", + "logging.queries.usePrivate", "logging.settings.get", "logging.settings.update", "logging.sinks.create", @@ -63093,6 +63215,7 @@ "logging.queries.list", "logging.queries.listShared", "logging.queries.update", + "logging.queries.usePrivate", "logging.sinks.get", "logging.sinks.list", "logging.usage.get", @@ -63158,6 +63281,7 @@ "logging.queries.list", "logging.queries.listShared", "logging.queries.update", + "logging.queries.usePrivate", "logging.sinks.get", "logging.sinks.list", "logging.usage.get", @@ -66185,6 +66309,11 @@ "description": "Gives the Multi-cluster metering service agent access to CloudPlatform resources.", "includedPermissions": [ "gkehub.features.get", + "gkehub.gateway.delete", + "gkehub.gateway.get", + "gkehub.gateway.patch", + "gkehub.gateway.post", + "gkehub.gateway.put", "gkehub.locations.get", "gkehub.locations.list", "gkehub.memberships.get", @@ -71662,6 +71791,8 @@ "bigquery.tables.deleteSnapshot", "bigquery.tables.deleteTagBinding", "bigquery.tables.getIamPolicy", + "bigquery.tables.listEffectiveTags", + "bigquery.tables.listTagBindings", "bigquery.tables.replicateData", "bigquery.tables.restoreSnapshot", "bigquery.tables.setIamPolicy", @@ -77153,6 +77284,7 @@ "logging.queries.share", "logging.queries.update", "logging.queries.updateShared", + "logging.queries.usePrivate", "logging.settings.get", "logging.settings.update", "logging.sinks.create", @@ -78966,6 +79098,8 @@ "securitycentermanagement.securityCenterServices.list", "securitycentermanagement.securityCenterServices.update", "securitycentermanagement.securityCommandCenter.activate", + "securitycentermanagement.securityCommandCenter.checkActivationOperation", + "securitycentermanagement.securityCommandCenter.checkEligibility", "securitycentermanagement.securityCommandCenter.generateServiceAccounts", "securitycentermanagement.securityCommandCenter.get", "securitycentermanagement.securityCommandCenter.update", @@ -83308,6 +83442,8 @@ "bigquery.datasets.listTagBindings", "bigquery.tables.createTagBinding", "bigquery.tables.deleteTagBinding", + "bigquery.tables.listEffectiveTags", + "bigquery.tables.listTagBindings", "bigtable.authorizedViews.createTagBinding", "bigtable.authorizedViews.deleteTagBinding", "bigtable.authorizedViews.listEffectiveTags", @@ -83576,6 +83712,8 @@ "artifactregistry.repositories.listTagBindings", "bigquery.datasets.listEffectiveTags", "bigquery.datasets.listTagBindings", + "bigquery.tables.listEffectiveTags", + "bigquery.tables.listTagBindings", "bigtable.authorizedViews.listEffectiveTags", "bigtable.authorizedViews.listTagBindings", "bigtable.instances.listEffectiveTags", @@ -84845,6 +84983,7 @@ "routeoptimization.operations.create", "routeoptimization.operations.get" ], + "stage": "GA", "etag": "AA==" }, { @@ -84870,6 +85009,7 @@ "resourcemanager.projects.list", "routeoptimization.operations.get" ], + "stage": "GA", "etag": "AA==" }, { @@ -85100,6 +85240,257 @@ "stage": "GA", "etag": "AA==" }, + { + "name": "roles/run.sourceDeveloper", + "title": "Cloud Run Source Developer", + "description": "Deploy and manage Cloud Run source deployed resources.", + "includedPermissions": [ + "artifactregistry.repositories.create", + "artifactregistry.repositories.get", + "artifactregistry.repositories.list", + "cloudbuild.builds.create", + "cloudbuild.builds.get", + "cloudbuild.builds.list", + "cloudbuild.builds.update", + "cloudbuild.operations.get", + "cloudbuild.operations.list", + "eventarc.channelConnections.create", + "eventarc.channelConnections.delete", + "eventarc.channelConnections.get", + "eventarc.channelConnections.getIamPolicy", + "eventarc.channelConnections.list", + "eventarc.channelConnections.publish", + "eventarc.channels.attach", + "eventarc.channels.create", + "eventarc.channels.delete", + "eventarc.channels.get", + "eventarc.channels.getIamPolicy", + "eventarc.channels.list", + "eventarc.channels.publish", + "eventarc.channels.undelete", + "eventarc.channels.update", + "eventarc.googleChannelConfigs.get", + "eventarc.googleChannelConfigs.update", + "eventarc.locations.get", + "eventarc.locations.list", + "eventarc.operations.cancel", + "eventarc.operations.delete", + "eventarc.operations.get", + "eventarc.operations.list", + "eventarc.providers.get", + "eventarc.providers.list", + "eventarc.triggers.create", + "eventarc.triggers.delete", + "eventarc.triggers.get", + "eventarc.triggers.getIamPolicy", + "eventarc.triggers.list", + "eventarc.triggers.undelete", + "eventarc.triggers.update", + "orgpolicy.policy.get", + "pubsub.schemas.attach", + "pubsub.schemas.commit", + "pubsub.schemas.create", + "pubsub.schemas.delete", + "pubsub.schemas.get", + "pubsub.schemas.list", + "pubsub.schemas.listRevisions", + "pubsub.schemas.rollback", + "pubsub.schemas.validate", + "pubsub.snapshots.create", + "pubsub.snapshots.delete", + "pubsub.snapshots.get", + "pubsub.snapshots.list", + "pubsub.snapshots.seek", + "pubsub.snapshots.update", + "pubsub.subscriptions.consume", + "pubsub.subscriptions.create", + "pubsub.subscriptions.delete", + "pubsub.subscriptions.get", + "pubsub.subscriptions.list", + "pubsub.subscriptions.update", + "pubsub.topics.attachSubscription", + "pubsub.topics.create", + "pubsub.topics.delete", + "pubsub.topics.detachSubscription", + "pubsub.topics.get", + "pubsub.topics.list", + "pubsub.topics.publish", + "pubsub.topics.update", + "pubsub.topics.updateTag", + "recommender.locations.get", + "recommender.locations.list", + "recommender.runServiceCostInsights.get", + "recommender.runServiceCostInsights.list", + "recommender.runServiceCostInsights.update", + "recommender.runServiceCostRecommendations.get", + "recommender.runServiceCostRecommendations.list", + "recommender.runServiceCostRecommendations.update", + "recommender.runServiceIdentityInsights.get", + "recommender.runServiceIdentityInsights.list", + "recommender.runServiceIdentityInsights.update", + "recommender.runServiceIdentityRecommendations.get", + "recommender.runServiceIdentityRecommendations.list", + "recommender.runServiceIdentityRecommendations.update", + "recommender.runServicePerformanceInsights.get", + "recommender.runServicePerformanceInsights.list", + "recommender.runServicePerformanceInsights.update", + "recommender.runServicePerformanceRecommendations.get", + "recommender.runServicePerformanceRecommendations.list", + "recommender.runServicePerformanceRecommendations.update", + "recommender.runServiceSecurityInsights.get", + "recommender.runServiceSecurityInsights.list", + "recommender.runServiceSecurityInsights.update", + "recommender.runServiceSecurityRecommendations.get", + "recommender.runServiceSecurityRecommendations.list", + "recommender.runServiceSecurityRecommendations.update", + "remotebuildexecution.blobs.get", + "resourcemanager.projects.get", + "resourcemanager.projects.list", + "run.configurations.get", + "run.configurations.list", + "run.executions.cancel", + "run.executions.delete", + "run.executions.get", + "run.executions.list", + "run.jobs.create", + "run.jobs.delete", + "run.jobs.get", + "run.jobs.getIamPolicy", + "run.jobs.list", + "run.jobs.listEffectiveTags", + "run.jobs.listTagBindings", + "run.jobs.run", + "run.jobs.runWithOverrides", + "run.jobs.update", + "run.locations.list", + "run.operations.delete", + "run.operations.get", + "run.operations.list", + "run.revisions.delete", + "run.revisions.get", + "run.revisions.list", + "run.routes.get", + "run.routes.invoke", + "run.routes.list", + "run.services.create", + "run.services.delete", + "run.services.get", + "run.services.getIamPolicy", + "run.services.list", + "run.services.listEffectiveTags", + "run.services.listTagBindings", + "run.services.update", + "run.tasks.get", + "run.tasks.list", + "serviceusage.quotas.get", + "serviceusage.services.get", + "serviceusage.services.list", + "storage.buckets.create", + "storage.buckets.get", + "storage.buckets.list", + "storage.managedFolders.create", + "storage.managedFolders.get", + "storage.managedFolders.list", + "storage.multipartUploads.abort", + "storage.multipartUploads.create", + "storage.multipartUploads.listParts", + "storage.objects.create", + "storage.objects.get", + "storage.objects.list" + ], + "etag": "AA==" + }, + { + "name": "roles/run.sourceViewer", + "title": "Cloud Run Source Viewer", + "description": "View Cloud Run source deployed resources.", + "includedPermissions": [ + "artifactregistry.repositories.get", + "artifactregistry.repositories.list", + "cloudbuild.builds.get", + "cloudbuild.builds.list", + "cloudbuild.operations.get", + "cloudbuild.operations.list", + "eventarc.channelConnections.get", + "eventarc.channelConnections.getIamPolicy", + "eventarc.channelConnections.list", + "eventarc.channels.get", + "eventarc.channels.getIamPolicy", + "eventarc.channels.list", + "eventarc.googleChannelConfigs.get", + "eventarc.locations.get", + "eventarc.locations.list", + "eventarc.operations.get", + "eventarc.operations.list", + "eventarc.providers.get", + "eventarc.providers.list", + "eventarc.triggers.get", + "eventarc.triggers.getIamPolicy", + "eventarc.triggers.list", + "pubsub.schemas.get", + "pubsub.schemas.list", + "pubsub.schemas.listRevisions", + "pubsub.schemas.validate", + "pubsub.snapshots.get", + "pubsub.snapshots.list", + "pubsub.subscriptions.get", + "pubsub.subscriptions.list", + "pubsub.topics.get", + "pubsub.topics.list", + "recommender.locations.get", + "recommender.locations.list", + "recommender.runServiceCostInsights.get", + "recommender.runServiceCostInsights.list", + "recommender.runServiceCostRecommendations.get", + "recommender.runServiceCostRecommendations.list", + "recommender.runServiceIdentityInsights.get", + "recommender.runServiceIdentityInsights.list", + "recommender.runServiceIdentityRecommendations.get", + "recommender.runServiceIdentityRecommendations.list", + "recommender.runServicePerformanceInsights.get", + "recommender.runServicePerformanceInsights.list", + "recommender.runServicePerformanceRecommendations.get", + "recommender.runServicePerformanceRecommendations.list", + "recommender.runServiceSecurityInsights.get", + "recommender.runServiceSecurityInsights.list", + "recommender.runServiceSecurityRecommendations.get", + "recommender.runServiceSecurityRecommendations.list", + "remotebuildexecution.blobs.get", + "resourcemanager.projects.get", + "resourcemanager.projects.list", + "run.configurations.get", + "run.configurations.list", + "run.executions.get", + "run.executions.list", + "run.jobs.get", + "run.jobs.getIamPolicy", + "run.jobs.list", + "run.jobs.listEffectiveTags", + "run.jobs.listTagBindings", + "run.locations.list", + "run.operations.get", + "run.operations.list", + "run.revisions.get", + "run.revisions.list", + "run.routes.get", + "run.routes.list", + "run.services.get", + "run.services.getIamPolicy", + "run.services.list", + "run.services.listEffectiveTags", + "run.services.listTagBindings", + "run.tasks.get", + "run.tasks.list", + "serviceusage.quotas.get", + "serviceusage.services.get", + "serviceusage.services.list", + "storage.managedFolders.get", + "storage.managedFolders.list", + "storage.objects.get", + "storage.objects.list" + ], + "etag": "AA==" + }, { "name": "roles/run.viewer", "title": "Cloud Run Viewer", @@ -85921,6 +86312,8 @@ "securitycentermanagement.securityCenterServices.list", "securitycentermanagement.securityCenterServices.update", "securitycentermanagement.securityCommandCenter.activate", + "securitycentermanagement.securityCommandCenter.checkActivationOperation", + "securitycentermanagement.securityCommandCenter.checkEligibility", "securitycentermanagement.securityCommandCenter.generateServiceAccounts", "securitycentermanagement.securityCommandCenter.get", "securitycentermanagement.securityCommandCenter.update", @@ -88566,6 +88959,8 @@ "securitycentermanagement.securityCenterServices.list", "securitycentermanagement.securityCenterServices.update", "securitycentermanagement.securityCommandCenter.activate", + "securitycentermanagement.securityCommandCenter.checkActivationOperation", + "securitycentermanagement.securityCommandCenter.checkEligibility", "securitycentermanagement.securityCommandCenter.generateServiceAccounts", "securitycentermanagement.securityCommandCenter.get", "securitycentermanagement.securityCommandCenter.update", @@ -88655,6 +89050,8 @@ "securitycentermanagement.securityCenterServices.list", "securitycentermanagement.securityCenterServices.update", "securitycentermanagement.securityCommandCenter.activate", + "securitycentermanagement.securityCommandCenter.checkActivationOperation", + "securitycentermanagement.securityCommandCenter.checkEligibility", "securitycentermanagement.securityCommandCenter.generateServiceAccounts", "securitycentermanagement.securityCommandCenter.get", "securitycentermanagement.securityCommandCenter.update", @@ -88818,6 +89215,8 @@ "securitycentermanagement.securityCenterServices.list", "securitycentermanagement.securityCenterServices.update", "securitycentermanagement.securityCommandCenter.activate", + "securitycentermanagement.securityCommandCenter.checkActivationOperation", + "securitycentermanagement.securityCommandCenter.checkEligibility", "securitycentermanagement.securityCommandCenter.generateServiceAccounts", "securitycentermanagement.securityCommandCenter.get", "securitycentermanagement.securityCommandCenter.update", @@ -88938,6 +89337,7 @@ "securitycentermanagement.securityCenterServices.list", "securitycentermanagement.securityCenterServices.update" ], + "stage": "GA", "etag": "AA==" }, { @@ -88948,6 +89348,7 @@ "securitycentermanagement.securityCenterServices.get", "securitycentermanagement.securityCenterServices.list" ], + "stage": "GA", "etag": "AA==" }, { @@ -88978,6 +89379,8 @@ "securitycentermanagement.securityCenterServices.list", "securitycentermanagement.securityCenterServices.update", "securitycentermanagement.securityCommandCenter.activate", + "securitycentermanagement.securityCommandCenter.checkActivationOperation", + "securitycentermanagement.securityCommandCenter.checkEligibility", "securitycentermanagement.securityCommandCenter.generateServiceAccounts", "securitycentermanagement.securityCommandCenter.get", "securitycentermanagement.securityCommandCenter.update", @@ -91162,6 +91565,7 @@ "logging.queries.list", "logging.queries.listShared", "logging.queries.update", + "logging.queries.usePrivate", "logging.sinks.get", "logging.sinks.list", "logging.usage.get", @@ -91294,6 +91698,7 @@ "logging.queries.list", "logging.queries.listShared", "logging.queries.update", + "logging.queries.usePrivate", "logging.sinks.get", "logging.sinks.list", "logging.usage.get", @@ -91341,6 +91746,7 @@ "logging.queries.list", "logging.queries.listShared", "logging.queries.update", + "logging.queries.usePrivate", "logging.sinks.get", "logging.sinks.list", "logging.usage.get", @@ -92445,6 +92851,8 @@ "bigquery.savedqueries.list", "bigquery.tables.createSnapshot", "bigquery.tables.getIamPolicy", + "bigquery.tables.listEffectiveTags", + "bigquery.tables.listTagBindings", "bigquery.tables.replicateData", "bigquery.transfers.get", "bigquerymigration.locations.get", @@ -92654,7 +93062,6 @@ "chronicle.legacies.legacyStreamDetectionAlerts", "chronicle.legacies.legacyTestRuleStreaming", "chronicle.logs.get", - "chronicle.logs.import", "chronicle.logs.list", "chronicle.messages.get", "chronicle.messages.list", @@ -94697,6 +95104,7 @@ "logging.queries.list", "logging.queries.listShared", "logging.queries.update", + "logging.queries.usePrivate", "logging.settings.get", "logging.sinks.get", "logging.sinks.list", @@ -95605,6 +96013,8 @@ "securitycentermanagement.locations.list", "securitycentermanagement.securityCenterServices.get", "securitycentermanagement.securityCenterServices.list", + "securitycentermanagement.securityCommandCenter.checkActivationOperation", + "securitycentermanagement.securityCommandCenter.checkEligibility", "securitycentermanagement.securityCommandCenter.get", "securitycentermanagement.securityHealthAnalyticsCustomModules.get", "securitycentermanagement.securityHealthAnalyticsCustomModules.list",