blob: 818e103b200b383a87673f1f31144c65bdb823c5 [file] [log] [blame]
# Creates the service account used by the power-controller server, and export a key for
# it into the kubernetes cluster as a secret.
# Afterwards, the steps on are
# needed to hook the service account up to swarming (don't need task-scheduling
# permissions, just viewing ones).
set -e -x
source ../kube/
source ../bash/
# New service account we will create.
cd /tmp/ramdisk
gcloud --project=${PROJECT_ID} iam service-accounts create "${SA_NAME}" --display-name="Service account for Skia Power Controller"
gcloud beta iam service-accounts keys create ${SA_NAME}.json --iam-account="${SA_NAME}@${PROJECT_SUBDOMAIN}"
kubectl create secret generic "${SA_NAME}" --from-file=key.json=${SA_NAME}.json
cd -