[OCPBUGS-15043] fix cronjob failing to detect seccomp issues
What type of PR is this?
bug
What this PR does / why we need it?
- Currently, the cronjob for detecting the seccomp issue can't read the events for a particular pod, causing it to not detect the condition properly
- This pr adds permissions to list, get and watch events for the cronjob
Pre-checks (if applicable):
- [X] Tested latest changes against a cluster
I have no issue with this, and give it a +1, but I want to get more than just my own eyes on this.
[APPROVALNOTIFIER] This PR is APPROVED
This pull-request has been approved by: mjlshen, mrWinston
The full list of commands accepted by this bot can be found here.
The pull request process is described here
- ~~OWNERS~~ [mjlshen]
Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment
@mrWinston: all tests passed!
Full PR test history. Your PR dashboard.
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.