Skip to content

Commit

Permalink
Update SAR data
Browse files Browse the repository at this point in the history
  • Loading branch information
Ian Mckay [bot] committed Feb 25, 2024
1 parent a1c23ee commit b0194bc
Show file tree
Hide file tree
Showing 18 changed files with 10,458 additions and 10,023 deletions.
8 changes: 8 additions & 0 deletions aws/historic_counts.json
Original file line number Diff line number Diff line change
Expand Up @@ -5455,6 +5455,10 @@
{
"count": 14968,
"date": "2024-02-24T14:08:00"
},
{
"count": 14968,
"date": "2024-02-25T14:10:02"
}
],
"iam": [
Expand Down Expand Up @@ -9517,6 +9521,10 @@
{
"count": 16300,
"date": "2024-02-24T14:08:00"
},
{
"count": 16300,
"date": "2024-02-25T14:10:02"
}
]
}
1,092 changes: 546 additions & 546 deletions azure/built-in-roles-raw.json

Large diffs are not rendered by default.

18,031 changes: 9,201 additions & 8,830 deletions azure/built-in-roles.json

Large diffs are not rendered by default.

1,000 changes: 464 additions & 536 deletions azure/provider-operations.json

Large diffs are not rendered by default.

15 changes: 15 additions & 0 deletions gcp/map.json
Original file line number Diff line number Diff line change
Expand Up @@ -10724,6 +10724,21 @@
}
]
},
"binaryauthorization.projects.platforms.gke.policies.evaluate": {
"permissions": [
{
"discoveryMethodologies": [
"restcrawlv1"
],
"lowConfidence": true,
"name": "binaryauthorization.platformPolicies.evaluatePolicy",
"parameterFormat": "platform policy",
"parameterName": "name",
"parameterType": "path",
"resourceType": "name"
}
]
},
"binaryauthorization.projects.platforms.policies.create": {
"permissions": [
{
Expand Down
5 changes: 0 additions & 5 deletions gcp/methods_ext.json
Original file line number Diff line number Diff line change
Expand Up @@ -21816,11 +21816,6 @@
"description": "The ID to use for the PipelineJob, which will become the final component of the PipelineJob name. If not provided, an ID will be automatically generated. This value should be less than 128 characters, and valid characters are `/a-z-/`.",
"location": "query",
"type": "string"
},
"preflightValidations": {
"description": "Optional. Whether to do component level validations before job creation. Currently we only support Google First Party Component/Pipelines.",
"location": "query",
"type": "boolean"
}
},
"resourceType": "pipelineJobs",
Expand Down
4 changes: 4 additions & 0 deletions gcp/predefined_roles.json
Original file line number Diff line number Diff line change
Expand Up @@ -811,6 +811,7 @@
{
"description": "Grants Audit Manager Service Agent access to various list/get rpcs of products to perform an audit.",
"etag": "AA==",
"has_undocumented": true,
"name": "roles/auditmanager.serviceAgent",
"stage": "GA",
"title": "Audit Manager Auditing Service Agent"
Expand Down Expand Up @@ -2573,6 +2574,7 @@
"etag": "AA==",
"has_undocumented": true,
"name": "roles/cloudsql.schemaViewer",
"stage": "GA",
"title": "Cloud SQL Schema Viewer"
},
{
Expand Down Expand Up @@ -8056,6 +8058,7 @@
{
"description": "Gives privileged access manager service account access to modify IAM policies on GCP organizations",
"etag": "AA==",
"has_undocumented": true,
"name": "roles/privilegedaccessmanager.organizationServiceAgent",
"stage": "GA",
"title": "Privileged Access Manager Organization Service Agent"
Expand Down Expand Up @@ -8716,6 +8719,7 @@
"etag": "AA==",
"has_undocumented": true,
"name": "roles/recommender.recentChangeConfigAdmin",
"stage": "GA",
"title": "RecentChange RecommenderConfig Admin"
},
{
Expand Down
Loading

0 comments on commit b0194bc

Please sign in to comment.