-
Notifications
You must be signed in to change notification settings - Fork 1.1k
/
gcp_iam_serviceaccount_members.sh
executable file
·60 lines (48 loc) · 1.5 KB
/
gcp_iam_serviceaccount_members.sh
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
#!/usr/bin/env bash
# vim:ts=4:sts=4:sw=4:et
#
# Author: Hari Sekhon
# Date: 2021-06-01 15:51:14 +0100 (Tue, 01 Jun 2021)
#
# https://github.com/HariSekhon/DevOps-Bash-tools
#
# License: see accompanying Hari Sekhon LICENSE file
#
# If you're using my code you're welcome to connect with me on LinkedIn and optionally send me feedback to help steer this or other code I publish
#
# https://www.linkedin.com/in/HariSekhon
#
set -euo pipefail
[ -n "${DEBUG:-}" ] && set -x
srcdir="$(cd "$(dirname "${BASH_SOURCE[0]}")" && pwd)"
# shellcheck disable=SC1090,SC1091
. "$srcdir/lib/utils.sh"
# shellcheck disable=SC2034,SC2154
usage_description="
Lists GCP service account members eg. to find GKE Workload Identity integrations
Output:
<service_account> <role> <member>
eg.
jenkins-agent@MyProject.iam.gserviceaccount.com roles/iam.workloadIdentityUser serviceAccount:MyProject.svc.id.goog[jenkins/jenkins-agent]
"
# used by usage() in lib/utils.sh
# shellcheck disable=SC2034
usage_args="[<project_id>]"
help_usage "$@"
if [ $# -eq 1 ]; then
export CLOUDSDK_CORE_PROJECT="$1"
elif [ $# -eq 0 ]; then
:
else
usage
fi
serviceaccounts="$(gcloud iam service-accounts list --format='value(name.basename())')"
for serviceaccount in $serviceaccounts; do
gcloud iam service-accounts get-iam-policy "$serviceaccount" --format json |
jq -r "
.bindings[]? |
{ \"role\": .role, \"member\": .members[] } |
[ \"$serviceaccount\", .role, .member ] |
@tsv
"
done