-
Notifications
You must be signed in to change notification settings - Fork 17
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add RBAC permissions for namespaces. #93
Add RBAC permissions for namespaces. #93
Conversation
Hi @epenchev. Thanks for your PR. I'm waiting for a medik8s member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Hi @epenchev thanks for the PR and nice catch ! However I suggest that:
|
Hi, thanks for the review. And this is what happens when you remove only the watch permission.
Yes that's a good point, will correct the PR. |
52cd6c4
to
95ce5fd
Compare
Thanks ! |
Hi @epenchev, we are trying to understand why we didn't run into this issue in our tests. It seems that at least when being installed with Operator Lifecycle Manager (OLM) on Openshift, an additional ClusterRole with rules for reading namespaces (and some other resources) is created automatically. Still figuring out details on why this is, and who is doing it. Just curious, on what kind of cluster are you running, and how do install NHC / SNR? |
Hi thanks for looking into that issue. |
Signed-off-by: Emil Penchev <[email protected]>
95ce5fd
to
1553141
Compare
Thanks I've corrected the PR. |
Ok, thanks for confirming you're not using OLM / not on Openshift, that at least explains the difference 🙂 Just fyi:
|
/ok-to-test |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: epenchev, slintes The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
overriding flaky test lanes, the 4.13 e2e lane passed... /override ci/prow/4.11-openshift-e2e |
@slintes: Overrode contexts on behalf of slintes: ci/prow/4.11-openshift-e2e, ci/prow/4.12-openshift-e2e In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
This fixes errors like the one reported in the logs.
Relevant Jira ticket - ECOPROJECT-1183