@@ -255,7 +255,7 @@ func TestUsers(t *testing.T) {
255
255
username : "prometheus-user-workload" ,
256
256
userGroups : []string {"cluster-admins" , "system:authenticated" , "system:authenticated:oauth" },
257
257
operation : admissionv1 .Create ,
258
- shouldBeAllowed : false ,
258
+ shouldBeAllowed : true ,
259
259
},
260
260
{
261
261
testID : "regular-user-can-create-prometheusrule-in-openshift-user-workload-monitoring" ,
@@ -264,7 +264,7 @@ func TestUsers(t *testing.T) {
264
264
username : "prometheus-user-workload" ,
265
265
userGroups : []string {"cluster-admins" , "system:authenticated" , "system:authenticated:oauth" },
266
266
operation : admissionv1 .Delete ,
267
- shouldBeAllowed : false ,
267
+ shouldBeAllowed : true ,
268
268
},
269
269
{
270
270
testID : "serviceaccount-in-managed-namespaces-can-create-prometheusrule-in-openshift-user-workload-monitoring" ,
@@ -273,7 +273,7 @@ func TestUsers(t *testing.T) {
273
273
username : "prometheus-user-workload" ,
274
274
userGroups : []string {"cluster-admins" , "system:authenticated" , "system:authenticated:oauth" },
275
275
operation : admissionv1 .Update ,
276
- shouldBeAllowed : false ,
276
+ shouldBeAllowed : true ,
277
277
},
278
278
{
279
279
testID : "serviceaccount-in-managed-namespaces-can-create-prometheusrule-in-redhat-rhoam-observability" ,
0 commit comments