Detect Kubernetes runtime namespace in-cluster#112
Detect Kubernetes runtime namespace in-cluster#112mfreeman451 wants to merge 1 commit intoGoogleCloudPlatform:mainfrom
Conversation
aff781d to
79de838
Compare
PR #112 Review: Detect Kubernetes runtime namespace in-clusterExecutive SummaryThis PR is a medium-risk, multi-concern changeset that bundles the advertised namespace-detection fix with several unrelated cleanups (removing Critical Issues1.
|
79de838 to
53975cd
Compare
|
This branch has been rebuilt on top of current Current branch scope is now only:
So the previous review items about Validation on the narrowed branch:
|
Summary
defaultProblem
Hosted broker operations like
look,logs, and exec-based attach rely on the runtime's default namespace when resolving pod access. In combined in-cluster deployments, hard-defaulting todefaultbreaks those operations whenever Scion is actually deployed into another namespace likescion.Validation
go test ./pkg/runtime -run 'Test(DefaultKubernetesNamespace|NewKubernetesRuntime_UsesDetectedNamespace|KubernetesRuntime_List|KubernetesRuntime_BuildPod_Env)$'