@@ -63,12 +63,12 @@ jobs:
6363 NAMESPACE : ' kms-ci-${{ github.actor }}-${{ inputs.pr_number }}'
6464 TKMS_INFRA_CHART_VERSION : ' 0.3.2'
6565 SYNC_SECRETS_CHART_VERSION : ' 0.2.1'
66- KMS_CORE_ENCLAVE_IMAGE_NAME : ' ghcr.io /zama-ai/kms/core-service-enclave'
67- KMS_CORE_IMAGE_NAME : ' ghcr.io /zama-ai/kms/core-service'
68- KMS_CORE_CLIENT_IMAGE_NAME : ' ghcr.io /zama-ai/kms/core-client'
66+ KMS_CORE_ENCLAVE_IMAGE_NAME : ' hub.zama.org/ghcr /zama-ai/kms/core-service-enclave'
67+ KMS_CORE_IMAGE_NAME : ' hub.zama.org/ghcr /zama-ai/kms/core-service'
68+ KMS_CORE_CLIENT_IMAGE_NAME : ' hub.zama.org/ghcr /zama-ai/kms/core-client'
6969 KMS_CORE_IMAGE_TAG : ${{ inputs.image_tag }}
7070 KMS_CORE_CLIENT_IMAGE_TAG : ${{ inputs.image_tag }}
71- IMAGE_REPO : ' ghcr.io /zama-ai/kms'
71+ IMAGE_REPO : ' hub.zama.org/ghcr /zama-ai/kms'
7272 TLS : ' true'
7373 FHE_PARAMS : ' Test'
7474 DEPLOYMENT_TYPE : ${{ inputs.deployment_type }}
@@ -216,6 +216,17 @@ jobs:
216216 kubectl create namespace "${NAMESPACE}"
217217 fi
218218
219+ # ======================================================================
220+ # RBAC: Tailscale group kms-dev-access (same pattern as zws-dev k8s-access)
221+ # ======================================================================
222+ - name : Grant kms-dev-access RBAC on preview namespace
223+ run : |
224+ kubectl create rolebinding kms-dev-binding \
225+ --clusterrole=admin \
226+ --group=kms-dev-access \
227+ -n "${NAMESPACE}" \
228+ --dry-run=client -o yaml | kubectl apply -f -
229+
219230 - name : Checkout Project KMS
220231 uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
221232 with :
@@ -285,7 +296,7 @@ jobs:
285296
286297 :rocket: And launch your tests:
287298 \`\`\`bash
288- cargo nextest run --test ${TEST_NAME} --profile ci --no-fail-fast
299+ cargo nextest run --test ${TEST_NAME} --profile ci --no-fail-fast --features="kind_tests"
289300 \`\`\`
290301
291302 You can connect to the core-client with:
0 commit comments