|
|
|
|
@ -184,6 +184,12 @@ func (c *SDConfig) UnmarshalYAML(unmarshal func(interface{}) error) error { |
|
|
|
|
if c.APIServer.URL == nil && !reflect.DeepEqual(c.HTTPClientConfig, config.DefaultHTTPClientConfig) { |
|
|
|
|
return errors.Errorf("to use custom HTTP client configuration please provide the 'api_server' URL explicitly") |
|
|
|
|
} |
|
|
|
|
if c.APIServer.URL != nil && c.NamespaceDiscovery.IncludeOwnNamespace { |
|
|
|
|
return errors.Errorf("cannot use 'api_server' and 'namespaces.own_namespace' simultaneously") |
|
|
|
|
} |
|
|
|
|
if c.KubeConfig != "" && c.NamespaceDiscovery.IncludeOwnNamespace { |
|
|
|
|
return errors.Errorf("cannot use 'kubeconfig_file' and 'namespaces.own_namespace' simultaneously") |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
foundSelectorRoles := make(map[Role]struct{}) |
|
|
|
|
allowedSelectors := map[Role][]string{ |
|
|
|
|
@ -293,11 +299,16 @@ func New(l log.Logger, conf *SDConfig) (*Discovery, error) { |
|
|
|
|
return nil, err |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
ownNamespaceContents, err := ioutil.ReadFile("/var/run/secrets/kubernetes.io/serviceaccount/namespace") |
|
|
|
|
if err != nil { |
|
|
|
|
return nil, fmt.Errorf("could not determine the pod's namespace: %w", err) |
|
|
|
|
if conf.NamespaceDiscovery.IncludeOwnNamespace { |
|
|
|
|
ownNamespaceContents, err := ioutil.ReadFile("/var/run/secrets/kubernetes.io/serviceaccount/namespace") |
|
|
|
|
if err != nil { |
|
|
|
|
return nil, fmt.Errorf("could not determine the pod's namespace: %w", err) |
|
|
|
|
} |
|
|
|
|
if len(ownNamespaceContents) == 0 { |
|
|
|
|
return nil, errors.New("could not read own namespace name (empty file)") |
|
|
|
|
} |
|
|
|
|
ownNamespace = string(ownNamespaceContents) |
|
|
|
|
} |
|
|
|
|
ownNamespace = string(ownNamespaceContents) |
|
|
|
|
|
|
|
|
|
level.Info(l).Log("msg", "Using pod service account via in-cluster config") |
|
|
|
|
} else { |
|
|
|
|
|