@@ -25,7 +25,6 @@ import (
25
25
. "github.com/onsi/gomega"
26
26
appsv1 "k8s.io/api/apps/v1"
27
27
corev1 "k8s.io/api/core/v1"
28
- rbacv1 "k8s.io/api/rbac/v1"
29
28
"k8s.io/apimachinery/pkg/api/meta"
30
29
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
31
30
"k8s.io/apimachinery/pkg/labels"
@@ -924,32 +923,6 @@ var _ = Describe("Starting CatalogSource e2e tests", func() {
924
923
Expect (registryPods ).ShouldNot (BeNil (), "nil registry pods" )
925
924
Expect (registryPods .Items ).To (HaveLen (1 ), "unexpected number of registry pods found" )
926
925
927
- By ("Granting the ServiceAccount used by the registry pod permissions to pull from the internal registry" )
928
- roleBinding := & rbacv1.RoleBinding {
929
- ObjectMeta : metav1.ObjectMeta {
930
- Namespace : generatedNamespace .GetName (),
931
- GenerateName : "registry-v1-viewer-" ,
932
- },
933
- Subjects : []rbacv1.Subject {
934
- {
935
- Kind : "ServiceAccount" ,
936
- Name : registryPods .Items [0 ].Spec .ServiceAccountName ,
937
- APIGroup : "" ,
938
- },
939
- },
940
- RoleRef : rbacv1.RoleRef {
941
- Kind : "ClusterRole" ,
942
- Name : "registry-viewer" ,
943
- APIGroup : "rbac.authorization.k8s.io" ,
944
- },
945
- }
946
- _ , err = c .CreateRoleBinding (roleBinding )
947
- Expect (err ).ToNot (HaveOccurred (), "error granting registry-viewer permissions" )
948
- defer func () {
949
- err := c .DeleteRoleBinding (roleBinding .GetNamespace (), roleBinding .GetName (), & metav1.DeleteOptions {})
950
- Expect (err ).ShouldNot (HaveOccurred ())
951
- }()
952
-
953
926
By ("Create a Subscription for package" )
954
927
subscriptionName := genName ("sub-" )
955
928
cleanupSubscription := createSubscriptionForCatalog (crc , source .GetNamespace (), subscriptionName , source .GetName (), packageName , channelName , "" , v1alpha1 .ApprovalAutomatic )
0 commit comments