From ddd271b6027b13bca02416ec3dda17d3ec7fd5be Mon Sep 17 00:00:00 2001 From: Tiger Date: Fri, 14 Jun 2019 10:18:50 +1000 Subject: Don't use Kubernetes namespaces with no token Whenever we are selecting a namespace to use for a deployment or to query a cluster we want to exclude Kubernetes namespace records that don't have a token set as they will not have the required permissions. However when configuring clusters, we want to use the original namespace record even if it has no token, as a namespace has to be unique on a cluster. --- .../63079-exclude-k8s-namespaces-with-no-service-account-token.yml | 6 ++++++ 1 file changed, 6 insertions(+) create mode 100644 changelogs/unreleased/63079-exclude-k8s-namespaces-with-no-service-account-token.yml (limited to 'changelogs/unreleased') diff --git a/changelogs/unreleased/63079-exclude-k8s-namespaces-with-no-service-account-token.yml b/changelogs/unreleased/63079-exclude-k8s-namespaces-with-no-service-account-token.yml new file mode 100644 index 00000000000..9dc99c8a62f --- /dev/null +++ b/changelogs/unreleased/63079-exclude-k8s-namespaces-with-no-service-account-token.yml @@ -0,0 +1,6 @@ +--- +title: Ensure a Kubernetes namespace is not used for deployments if there is no service + account token associated with it +merge_request: 29643 +author: +type: fixed -- cgit v1.2.1