Detect Kubernetes runtime namespace in-cluster#112
Detect Kubernetes runtime namespace in-cluster#112ptone merged 2 commits intoGoogleCloudPlatform:mainfrom
Conversation
aff781d to
79de838
Compare
PR #112 Review: Detect Kubernetes runtime namespace in-clusterExecutive SummaryThis PR is a medium-risk, multi-concern changeset that bundles the advertised namespace-detection fix with several unrelated cleanups (removing Critical Issues1.
|
79de838 to
53975cd
Compare
|
This branch has been rebuilt on top of current Current branch scope is now only:
So the previous review items about Validation on the narrowed branch:
|
Replace NewSimpleClientset() with NewClientset() to match the rest of the test file and satisfy the staticcheck SA1019 deprecation lint.
Summary
defaultProblem
Hosted broker operations like
look,logs, and exec-based attach rely on the runtime's default namespace when resolving pod access. In combined in-cluster deployments, hard-defaulting todefaultbreaks those operations whenever Scion is actually deployed into another namespace likescion.Validation
go test ./pkg/runtime -run 'Test(DefaultKubernetesNamespace|NewKubernetesRuntime_UsesDetectedNamespace|KubernetesRuntime_List|KubernetesRuntime_BuildPod_Env)$'