@@ -40,6 +40,7 @@ func TestOAuthProxyE2E(t *testing.T) {
40
40
routeClient , err := routeclient .NewForConfig (testConfig )
41
41
require .NoError (t , err )
42
42
userClient , err := userclient .NewForConfig (testConfig )
43
+ require .NoError (t , err )
43
44
ns := CreateTestProject (t , kubeClient , projectClient )
44
45
defer func () {
45
46
if len (os .Getenv ("DEBUG_TEST" )) > 0 {
@@ -186,19 +187,11 @@ func TestOAuthProxyE2E(t *testing.T) {
186
187
// expectedErr: "did not reach upstream site",
187
188
// },
188
189
}
189
-
190
- // Get the image from a pod that we know uses oauth-proxy to wrap
191
- // its endpoints with OpenShift auth
192
- // TODO: is there a better way?
193
- alertmanagerPod , err := kubeClient .CoreV1 ().Pods ("openshift-monitoring" ).Get (testCtx , "alertmanager-main-0" , metav1.GetOptions {})
194
- require .NoError (t , err )
195
- var image string
196
- for _ , c := range alertmanagerPod .Spec .Containers {
197
- if c .Name == "alertmanager-proxy" {
198
- image = c .Image
199
- }
200
- }
201
- require .NotEmpty (t , image )
190
+ registry := strings .Split (os .Getenv ("RELEASE_IMAGE_LATEST" ), "/" )[0 ]
191
+ require .NotEmpty (t , registry , "Registry is empty. Check RELEASE_IMAGE_LATEST environment variable." )
192
+ namespace := os .Getenv ("NAMESPACE" )
193
+ require .NotEmpty (t , namespace , "Namespace is empty. Check NAMESPACE environment variable." )
194
+ image := registry + "/" + namespace + "/pipeline:oauth-proxy"
202
195
203
196
// get rid of kubeadmin user to remove the additional step of choosing an idp
204
197
err = kubeClient .CoreV1 ().Secrets ("kube-system" ).Delete (context .TODO (), "kubeadmin" , metav1.DeleteOptions {})
0 commit comments