scripts/prepare_project_gke.bash (65 lines of code) (raw):

#!/bin/bash # Copyright 2020 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. GREEN="\e[32m" RED="\e[31m" RESET="\e[0m" PROJECT=${PROJECT} print_usage() { echo -e ${RED?}'Usage: prepare_internal_e2e_test_project [-h] [-p project_id]'${RESET?} echo -e ${RED?}' -h \t show this help usage'${RESET?} echo -e ${RED?}' -p \t GCP project_id to deploy to'${RESET?} } while getopts ':hp:' flag; do case "${flag}" in h) print_usage exit 1 ;; p) PROJECT="${OPTARG}" ;; *) echo -e ${RED?}'Unknown flag: -'${flag}${RESET?} print_usage exit 1 ;; esac done if [[ "${PROJECT}" == "" ]]; then echo -e ${RED?}'Must provide a project via $PROJECT or -p project'${RESET?} print_usage exit 1 fi echo -e ${GREEN?}'Enabling the required APIs.'${RESET?} gcloud services enable --project=${PROJECT?} \ iam.googleapis.com \ healthcare.googleapis.com \ cloudbuild.googleapis.com \ containerregistry.googleapis.com \ container.googleapis.com \ compute.googleapis.com echo -e ${GREEN?}'Create Service Accounts.'${RESET?} gcloud iam service-accounts create sofuser --project=${PROJECT?} \ --description="used to run smart on fhir proxy" \ --display-name="sofuser" gcloud iam service-accounts create fhiruser --project=${PROJECT?} \ --description="used to access fhir API" \ --display-name="fhiruser" gcloud projects add-iam-policy-binding -q ${PROJECT?} \ --member serviceAccount:sofuser@${PROJECT?}.iam.gserviceaccount.com --role roles/monitoring.metricWriter gcloud projects add-iam-policy-binding -q ${PROJECT?} \ --member serviceAccount:sofuser@${PROJECT?}.iam.gserviceaccount.com --role roles/monitoring.viewer gcloud projects add-iam-policy-binding -q ${PROJECT?} \ --member serviceAccount:sofuser@${PROJECT?}.iam.gserviceaccount.com --role roles/logging.logWriter gcloud projects add-iam-policy-binding -q ${PROJECT?} \ --member serviceAccount:sofuser@${PROJECT?}.iam.gserviceaccount.com --role roles/storage.objectViewer gcloud projects add-iam-policy-binding -q ${PROJECT?} \ --member serviceAccount:sofuser@${PROJECT?}.iam.gserviceaccount.com --role roles/iam.serviceAccountTokenCreator gcloud projects add-iam-policy-binding -q ${PROJECT?} \ --member serviceAccount:fhiruser@${PROJECT?}.iam.gserviceaccount.com --role roles/healthcare.datasetViewer gcloud projects add-iam-policy-binding -q ${PROJECT?} \ --member serviceAccount:fhiruser@${PROJECT?}.iam.gserviceaccount.com --role roles/healthcare.datasetAdmin gcloud projects add-iam-policy-binding -q ${PROJECT?} \ --member serviceAccount:fhiruser@${PROJECT?}.iam.gserviceaccount.com --role roles/healthcare.fhirStoreAdmin gcloud projects add-iam-policy-binding -q ${PROJECT?} \ --member serviceAccount:fhiruser@${PROJECT?}.iam.gserviceaccount.com --role roles/healthcare.fhirResourceEditor echo -e ${GREEN?}'Reserve a static external IP address'${RESET?} gcloud compute addresses create static --global --ip-version=IPV4 --project=${PROJECT?} echo -e ${GREEN?}'Create GKE cluster'${RESET?} gcloud container clusters create sof \ --project=${PROJECT?} \ --service-account=sofuser@${PROJECT?}.iam.gserviceaccount.com \ --zone us-central1-a echo -e ${GREEN?}"Done. You will need to run 'gcloud container clusters get-credentials sof --zone us-central1-a --project=${PROJECT?}' to fetch credentials for kubectl"${RESET?}