GNU bug report logs -
#59797
30.0.50; [wishlist] Using namespaces in Tramp's kubernetes integration
Previous Next
Reported by: Michael Albinus <michael.albinus <at> gmx.de>
Date: Sat, 3 Dec 2022 09:21:01 UTC
Severity: wishlist
Found in version 30.0.50
Fixed in version 31.1
Done: Michael Albinus <michael.albinus <at> gmx.de>
Bug is archived. No further changes may be made.
Full log
Message #14 received at 59797 <at> debbugs.gnu.org (full text, mbox):
Hi Michael,
On 05/12/2022 16:54 +0100, Michael Albinus wrote:
>> My motivation behind adding limited k8s support to Tramp was to be able
>> to login into pod. A service is a more high-level abstraction, you
>> cannot log into service, as there're some particular pods behind it.
>> From my limited knowledge and experience of k8s, listing pods in the
>> current namespace is ok. We could add more scenarios when the need
>> arises.
>
> I don't speak about services in general. I speak about pods.
>
> Imagine, you have "pod1" in your current context, and "pod2" in another
> namespace, call it "another-namespace".
>
> "kubectl get pods" shows you "pod1". "kubectl get pods --namespace
> another-namespace" shows you "pod2".
>
> "kubectl exec pod1 -it -- /bin/sh" access pod1 in your current
> context. This is what we use when we access via remote file name syntax
> "/kubernetes:pod1:".
>
> pod2 is not accessible in your current context. But you could apply
> "kubectl exec pod2 -it --namespace another-namespace -- /bin/sh". This
> is what I mean with remote-file name syntax "/kubernetes:pod1.another-namespace:".
>
> Is this possible?
Maybe, and there's "get pods -A" which lists all pods. This will be
limited to current "context" in k8s meaning (covering all namespaces in
it). I could look into this in detail in few weeks, if you'd like me
to. It's quite a busy time at work now :-)
Filipp
This bug report was last modified 302 days ago.
Previous Next
GNU bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson.