This is an automated email from the ASF dual-hosted git repository. astefanutti pushed a commit to branch release-1.7.x in repository https://gitbox.apache.org/repos/asf/camel-k.git
commit e77205e2225d664c96115765e84424c926665d49 Author: Antonin Stefanutti <[email protected]> AuthorDate: Mon Jan 10 10:54:42 2022 +0100 chore(e2e): Add extra RBAC permissions for the HTTP proxy tests --- .github/workflows/openshift.yml | 28 ++++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) diff --git a/.github/workflows/openshift.yml b/.github/workflows/openshift.yml index f416e73..d012e62 100644 --- a/.github/workflows/openshift.yml +++ b/.github/workflows/openshift.yml @@ -203,6 +203,34 @@ jobs: apiGroup: rbac.authorization.k8s.io EOF + # Grant read permission on the Kubernetes Service to the default developer user + # Required by the HTTP proxy tests + cat <<EOF | oc apply -f - + kind: ClusterRole + apiVersion: rbac.authorization.k8s.io/v1 + metadata: + name: camel-k-test:kubernetes-service + rules: + - apiGroups: [""] + resources: ["services"] + verbs: ["get"] + resourceNames: ["kubernetes"] + EOF + cat <<EOF | oc apply -f - + kind: RoleBinding + apiVersion: rbac.authorization.k8s.io/v1 + metadata: + namespace: default + name: camel-k-test:kubernetes-service + subjects: + - kind: User + name: developer + roleRef: + kind: ClusterRole + name: camel-k-test:kubernetes-service + apiGroup: rbac.authorization.k8s.io + EOF + # Login as normal user oc login -u developer
