scripts/prepare_project_gae.bash (48 lines of code) (raw):

#!/bin/bash # Copyright 2020 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. GREEN="\e[32m" RED="\e[31m" RESET="\e[0m" PROJECT=${PROJECT} print_usage() { echo -e ${RED?}'Usage: prepare_internal_e2e_test_project [-h] [-p project_id]'${RESET?} echo -e ${RED?}' -h \t show this help usage'${RESET?} echo -e ${RED?}' -p \t GCP project_id to deploy to'${RESET?} } while getopts ':hp:' flag; do case "${flag}" in h) print_usage exit 1 ;; p) PROJECT="${OPTARG}" ;; *) echo -e ${RED?}'Unknown flag: -'${flag}${RESET?} print_usage exit 1 ;; esac done if [[ "${PROJECT}" == "" ]]; then echo -e ${RED?}'Must provide a project via $PROJECT or -p project'${RESET?} print_usage exit 1 fi echo -e ${GREEN?}'Enabling the required APIs.'${RESET?} gcloud services enable --project=${PROJECT?} \ iam.googleapis.com \ healthcare.googleapis.com \ cloudbuild.googleapis.com \ containerregistry.googleapis.com \ appengine.googleapis.com \ appengineflex.googleapis.com \ appenginestandard.googleapis.com # Create a GAE app. gcloud app create --project=${PROJECT?} --region=us-central echo -e ${GREEN?}'Create Service Accounts.'${RESET?} gcloud iam service-accounts create fhiruser --project=${PROJECT?} \ --description="used to access fhir API" \ --display-name="fhiruser" # the default GAE account used to run the smart on fhir proxy. gcloud projects add-iam-policy-binding -q ${PROJECT?} \ --member serviceAccount:${PROJECT?}@appspot.gserviceaccount.com --role roles/iam.serviceAccountTokenCreator gcloud projects add-iam-policy-binding -q ${PROJECT?} \ --member serviceAccount:fhiruser@${PROJECT?}.iam.gserviceaccount.com --role roles/healthcare.datasetViewer gcloud projects add-iam-policy-binding -q ${PROJECT?} \ --member serviceAccount:fhiruser@${PROJECT?}.iam.gserviceaccount.com --role roles/healthcare.datasetAdmin gcloud projects add-iam-policy-binding -q ${PROJECT?} \ --member serviceAccount:fhiruser@${PROJECT?}.iam.gserviceaccount.com --role roles/healthcare.fhirStoreAdmin gcloud projects add-iam-policy-binding -q ${PROJECT?} \ --member serviceAccount:fhiruser@${PROJECT?}.iam.gserviceaccount.com --role roles/healthcare.fhirResourceEditor