@@ -92,14 +92,14 @@ Image Builder will use the [user-identity](https://docs.microsoft.com/azure/acti
92
92
93
93
``` bash
94
94
# create user assigned identity for image builder to access the storage account where the script is located
95
- idenityName =aibBuiUserId$( date +' %s' )
96
- az identity create -g $sigResourceGroup -n $idenityName
95
+ identityName =aibBuiUserId$( date +' %s' )
96
+ az identity create -g $sigResourceGroup -n $identityName
97
97
98
98
# get identity id
99
- imgBuilderCliId=$( az identity show -g $sigResourceGroup -n $idenityName | grep " clientId" | cut -c16- | tr -d ' ",' )
99
+ imgBuilderCliId=$( az identity show -g $sigResourceGroup -n $identityName | grep " clientId" | cut -c16- | tr -d ' ",' )
100
100
101
101
# get the user identity URI, needed for the template
102
- imgBuilderId=/subscriptions/$subscriptionID /resourcegroups/$sigResourceGroup /providers/Microsoft.ManagedIdentity/userAssignedIdentities/$idenityName
102
+ imgBuilderId=/subscriptions/$subscriptionID /resourcegroups/$sigResourceGroup /providers/Microsoft.ManagedIdentity/userAssignedIdentities/$identityName
103
103
104
104
# this command will download a Azure Role Definition template, and update the template with the parameters specified earlier.
105
105
curl https://raw.githubusercontent.com/danielsollondon/azvmimagebuilder/master/solutions/12_Creating_AIB_Security_Roles/aibRoleImageCreation.json -o aibRoleImageCreation.json
@@ -117,7 +117,7 @@ az role definition create --role-definition ./aibRoleImageCreation.json
117
117
# grant role definition to the user assigned identity
118
118
az role assignment create \
119
119
--assignee $imgBuilderCliId \
120
- --role $imageRoleDefName \
120
+ --role " $imageRoleDefName " \
121
121
--scope /subscriptions/$subscriptionID /resourceGroups/$sigResourceGroup
122
122
```
123
123
0 commit comments