-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathgc_gke.sh
executable file
·38 lines (29 loc) · 3.25 KB
/
gc_gke.sh
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
#!/bin/bash
set -euo pipefail
###################################################################################################
#
# WARNING: this command is experimental and the generated script should be executed at the users own risk. We use this
# generated command on the Jenkins X project itself but it has not been tested on other clusters.
#
###################################################################################################
# Project usecasedev
# No firewalls found for deletion
gcloud compute disks delete --zone=us-central1-b --quiet gke-dev-gkeuscen1-00ef-pvc-c417ff9d-48c0-11ea-b6b9-42010a80017b --project usecasedev || true
gcloud compute disks delete --zone=us-central1-b --quiet gke-dev-gkeuscen1-00ef-pvc-ca9e9601-48c0-11ea-b6b9-42010a80017b --project usecasedev || true
# No addresses found for deletion
gcloud iam service-accounts delete [email protected] --quiet --project usecasedev || true
gcloud iam service-accounts delete [email protected] --quiet --project usecasedev || true
gcloud iam service-accounts delete [email protected] --quiet --project usecasedev || true
gcloud iam service-accounts delete [email protected] --quiet --project usecasedev || true
gcloud iam service-accounts delete [email protected] --quiet --project usecasedev || true
gcloud projects remove-iam-policy-binding usecasedev --member=serviceAccount:[email protected] --role=roles/cloudkms.admin --quiet
gcloud projects remove-iam-policy-binding usecasedev --member=serviceAccount:[email protected] --role=roles/cloudkms.cryptoKeyEncrypterDecrypter --quiet
gcloud projects remove-iam-policy-binding usecasedev --member=serviceAccount:[email protected] --role=roles/dns.admin --quiet
gcloud projects remove-iam-policy-binding usecasedev --member=serviceAccount:[email protected] --role=roles/dns.admin --quiet
gcloud projects remove-iam-policy-binding usecasedev --member=serviceAccount:[email protected] --role=roles/storage.admin --quiet
gcloud projects remove-iam-policy-binding usecasedev --member=serviceAccount:[email protected] --role=roles/storage.admin --quiet
gcloud projects remove-iam-policy-binding usecasedev --member=serviceAccount:[email protected] --role=roles/storage.objectAdmin --quiet
gcloud projects remove-iam-policy-binding usecasedev --member=serviceAccount:[email protected] --role=roles/storage.objectAdmin --quiet
gcloud projects remove-iam-policy-binding usecasedev --member=serviceAccount:[email protected] --role=roles/storage.objectAdmin --quiet
gcloud projects remove-iam-policy-binding usecasedev --member=serviceAccount:[email protected] --role=roles/storage.objectCreator --quiet
gcloud projects remove-iam-policy-binding usecasedev --member=serviceAccount:[email protected] --role=roles/storage.objectCreator --quiet