20
20
# Download the service account key in order to configure the Anthos cluster
21
21
# #############################################################################
22
22
function __setup_service_account__ () {
23
- gcloud iam service-accounts create ${SERVICE_ACCOUNT}
24
- gcloud iam service-accounts keys create bm-gcr.json --iam-account=" ${SERVICE_ACCOUNT} " @" ${PROJECT_ID} " .iam.gserviceaccount.com
25
- if [ " $? " -eq 0 ]
23
+ gcloud iam service-accounts create " ${SERVICE_ACCOUNT} "
24
+ if ! gcloud iam service-accounts keys create bm-gcr.json --iam-account=" ${SERVICE_ACCOUNT} " @" ${PROJECT_ID} " .iam.gserviceaccount.com
26
25
then
27
26
echo " [+] Successfully downloaded key for service account [$SERVICE_ACCOUNT ]"
28
27
else
@@ -80,32 +79,32 @@ cat << EOM
80
79
- roles/opsconfigmonitoring.resourceMetadata.writer
81
80
------------------------------------------------------------------------------
82
81
EOM
83
- gcloud projects add-iam-policy-binding $PROJECT_ID \
82
+ gcloud projects add-iam-policy-binding " $PROJECT_ID " \
84
83
--member=" serviceAccount:${SERVICE_ACCOUNT} @$PROJECT_ID .iam.gserviceaccount.com" \
85
84
--role=" roles/gkehub.connect"
86
85
87
- gcloud projects add-iam-policy-binding $PROJECT_ID \
86
+ gcloud projects add-iam-policy-binding " $PROJECT_ID " \
88
87
--member=" serviceAccount:${SERVICE_ACCOUNT} @$PROJECT_ID .iam.gserviceaccount.com" \
89
88
--role=" roles/gkehub.admin"
90
89
91
- gcloud projects add-iam-policy-binding $PROJECT_ID \
90
+ gcloud projects add-iam-policy-binding " $PROJECT_ID " \
92
91
--member=" serviceAccount:${SERVICE_ACCOUNT} @$PROJECT_ID .iam.gserviceaccount.com" \
93
92
--role=" roles/logging.logWriter"
94
93
95
- gcloud projects add-iam-policy-binding $PROJECT_ID \
94
+ gcloud projects add-iam-policy-binding " $PROJECT_ID " \
96
95
--member=" serviceAccount:${SERVICE_ACCOUNT} @$PROJECT_ID .iam.gserviceaccount.com" \
97
96
--role=" roles/monitoring.metricWriter"
98
97
99
- gcloud projects add-iam-policy-binding $PROJECT_ID \
98
+ gcloud projects add-iam-policy-binding " $PROJECT_ID " \
100
99
--member=" serviceAccount:${SERVICE_ACCOUNT} @$PROJECT_ID .iam.gserviceaccount.com" \
101
100
--role=" roles/monitoring.dashboardEditor"
102
101
103
- gcloud projects add-iam-policy-binding $PROJECT_ID \
102
+ gcloud projects add-iam-policy-binding " $PROJECT_ID " \
104
103
--member=" serviceAccount:${SERVICE_ACCOUNT} @$PROJECT_ID .iam.gserviceaccount.com" \
105
104
--role=" roles/stackdriver.resourceMetadata.writer"
106
105
107
- gcloud projects add-iam-policy-binding $PROJECT_ID \
106
+ gcloud projects add-iam-policy-binding " $PROJECT_ID " \
108
107
--member=" serviceAccount:${SERVICE_ACCOUNT} @$PROJECT_ID .iam.gserviceaccount.com" \
109
108
--role=" roles/opsconfigmonitoring.resourceMetadata.writer"
110
109
111
- # [END anthosbaremetal_resources_abm_setup_gcp]
110
+ # [END anthosbaremetal_resources_abm_setup_gcp]
0 commit comments