-
Notifications
You must be signed in to change notification settings - Fork 73
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[ACM-15724] Observability - RBAC - Verify only cluster-manager-admin role can deploy MCO CR #1912
base: main
Are you sure you want to change the base?
Conversation
Signed-off-by: Coleen Iona Quadros <[email protected]>
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: coleenquadros The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/retest |
Signed-off-by: Coleen Iona Quadros <[email protected]>
/test test-e2e |
1 similar comment
/test test-e2e |
Signed-off-by: Coleen Iona Quadros <[email protected]>
/test test-e2e |
Signed-off-by: Coleen Iona Quadros <[email protected]>
/retest |
Signed-off-by: Coleen Iona Quadros <[email protected]>
/test pr-image-mirror-rbac-query-proxy |
/retest |
Signed-off-by: Coleen Iona Quadros <[email protected]>
Signed-off-by: Coleen Iona Quadros <[email protected]>
|
PR needs rebase. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
https://issues.redhat.com/browse/ACM-15724
This test is only going to check the policy to be able to delete MCO resource with the users respective clusterrole bindings instead of actually deploying or trying to delete MCO and waiting for the deployment to come up to reduce e2e run time