You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
if [ !-z"${ACCESS_CONTEXT_MANAGER_ID}" ];then sed -i "s=//create_access_context_manager_access_policy=create_access_context_manager_access_policy=" ./envs/shared/terraform.tfvars;fi
310
+
if [ !-z"${ACCESS_CONTEXT_MANAGER_ID}" ];then sed -i'' -e"s=//create_access_context_manager_access_policy=create_access_context_manager_access_policy=" ./envs/shared/terraform.tfvars;fi
311
311
```
312
312
313
313
1. Update the `remote_state_bucket` variable with the backend bucket from step Bootstrap.
@@ -317,7 +317,7 @@ See the shared folder [README.md](../1-org/envs/shared/README.md#inputs) for add
317
317
318
318
echo"remote_state_bucket = ${backend_bucket}"
319
319
320
-
sed -i "s/REMOTE_STATE_BUCKET/${backend_bucket}/" ./envs/shared/terraform.tfvars
320
+
sed -i'' -e"s/REMOTE_STATE_BUCKET/${backend_bucket}/" ./envs/shared/terraform.tfvars
321
321
```
322
322
323
323
1. Check if a Security Command Center Notification with the default name, **scc-notify**, already exists in your organization.
@@ -427,7 +427,7 @@ See any of the envs folder [README.md](../2-environments/envs/production/README.
sed -i "s/REMOTE_STATE_BUCKET/${backend_bucket}/" ./envs/shared/terraform.tfvars
373
+
sed -i'' -e"s/REMOTE_STATE_BUCKET/${backend_bucket}/" ./envs/shared/terraform.tfvars
374
374
375
-
if [ !-z"${ACCESS_CONTEXT_MANAGER_ID}" ];then sed -i "s=//create_access_context_manager_access_policy=create_access_context_manager_access_policy=" ./envs/shared/terraform.tfvars;fi
375
+
if [ !-z"${ACCESS_CONTEXT_MANAGER_ID}" ];then sed -i'' -e"s=//create_access_context_manager_access_policy=create_access_context_manager_access_policy=" ./envs/shared/terraform.tfvars;fi
376
376
```
377
377
378
378
1. Commit changes.
@@ -439,15 +439,15 @@ Here you will configure a VPN Network tunnel to enable connectivity between the
sed -i "s/CICD_PROJECT_ID/${CICD_PROJECT_ID}/" ./Jenkinsfile
556
+
sed -i'' -e"s/CICD_PROJECT_ID/${CICD_PROJECT_ID}/" ./Jenkinsfile
557
557
```
558
558
559
559
1. Rename `common.auto.example.tfvars` to `common.auto.tfvars`, rename `shared.auto.example.tfvars` to `shared.auto.tfvars` and rename `access_context.auto.example.tfvars` to `access_context.auto.tfvars`.
@@ -573,11 +573,11 @@ Here you will configure a VPN Network tunnel to enable connectivity between the
sed -i "s/REMOTE_STATE_BUCKET/${backend_bucket}/" ./common.auto.tfvars
580
+
sed -i'' -e"s/REMOTE_STATE_BUCKET/${backend_bucket}/" ./common.auto.tfvars
581
581
```
582
582
583
583
1. Commit changes.
@@ -592,7 +592,7 @@ Here you will configure a VPN Network tunnel to enable connectivity between the
592
592
1. Also update `backend.tf` with your backend bucket from 0-bootstrap output.
593
593
594
594
```bash
595
-
foriin`find -name 'backend.tf'`;do sed -i "s/UPDATE_ME/${backend_bucket}/"$i;done
595
+
foriin`find .-name 'backend.tf'`;do sed -i'' -e"s/UPDATE_ME/${backend_bucket}/"$i;done
596
596
```
597
597
598
598
1. Use `terraform output` to get the Cloud Build project ID and the networks step Terraform Service Account from 0-bootstrap output. An environment variable `GOOGLE_IMPERSONATE_SERVICE_ACCOUNT` will be set using the Terraform Service Account to enable impersonation.
@@ -698,15 +698,15 @@ Here you will configure a VPN Network tunnel to enable connectivity between the
sed -i "s/CICD_PROJECT_ID/${CICD_PROJECT_ID}/" ./Jenkinsfile
709
+
sed -i'' -e"s/CICD_PROJECT_ID/${CICD_PROJECT_ID}/" ./Jenkinsfile
710
710
```
711
711
712
712
1. Rename `common.auto.example.tfvars` to `common.auto.tfvars`, rename `shared.auto.example.tfvars` to `shared.auto.tfvars` and rename `access_context.auto.example.tfvars` to `access_context.auto.tfvars`.
@@ -726,11 +726,11 @@ Here you will configure a VPN Network tunnel to enable connectivity between the
sed -i "s/REMOTE_STATE_BUCKET/${backend_bucket}/" ./common.auto.tfvars
733
+
sed -i'' -e"s/REMOTE_STATE_BUCKET/${backend_bucket}/" ./common.auto.tfvars
734
734
```
735
735
736
736
1. Commit changes.
@@ -745,7 +745,7 @@ Here you will configure a VPN Network tunnel to enable connectivity between the
745
745
1. Also update `backend.tf` with your backend bucket from 0-bootstrap output.
746
746
747
747
```bash
748
-
foriin`find -name 'backend.tf'`;do sed -i "s/UPDATE_ME/${backend_bucket}/"$i;done
748
+
foriin`find .-name 'backend.tf'`;do sed -i'' -e"s/UPDATE_ME/${backend_bucket}/"$i;done
749
749
```
750
750
751
751
1. Use `terraform output` to get the Cloud Build project ID and the networks step Terraform Service Account from 0-bootstrap output. An environment variable `GOOGLE_IMPERSONATE_SERVICE_ACCOUNT` will be set using the Terraform Service Account to enable impersonation.
@@ -851,15 +851,15 @@ Here you will configure a VPN Network tunnel to enable connectivity between the
sed -i "s/REMOTE_STATE_BUCKET/${backend_bucket}/" ./envs/shared/terraform.tfvars
169
+
sed -i'' -e"s/REMOTE_STATE_BUCKET/${backend_bucket}/" ./envs/shared/terraform.tfvars
170
170
171
-
if [ !-z"${ACCESS_CONTEXT_MANAGER_ID}" ];then sed -i "s=//create_access_context_manager_access_policy=create_access_context_manager_access_policy=" ./envs/shared/terraform.tfvars;fi
171
+
if [ !-z"${ACCESS_CONTEXT_MANAGER_ID}" ];then sed -i'' -e"s=//create_access_context_manager_access_policy=create_access_context_manager_access_policy=" ./envs/shared/terraform.tfvars;fi
172
172
```
173
173
174
174
1. Commit changes.
@@ -248,9 +248,9 @@ Change into the `1-org` folder, copy the Terraform wrapper script, and ensure it
sed -i "s/REMOTE_STATE_BUCKET/${backend_bucket}/" ./envs/shared/terraform.tfvars
251
+
sed -i'' -e"s/REMOTE_STATE_BUCKET/${backend_bucket}/" ./envs/shared/terraform.tfvars
252
252
253
-
if [ !-z"${ACCESS_CONTEXT_MANAGER_ID}" ];then sed -i "s=//create_access_context_manager_access_policy=create_access_context_manager_access_policy=" ./envs/shared/terraform.tfvars;fi
253
+
if [ !-z"${ACCESS_CONTEXT_MANAGER_ID}" ];then sed -i'' -e"s=//create_access_context_manager_access_policy=create_access_context_manager_access_policy=" ./envs/shared/terraform.tfvars;fi
254
254
```
255
255
256
256
You can now deploy your environment (production) using this script.
0 commit comments