veyron2: can no longer specify a specific prefix for the ReservedNameDispatcher.

Change-Id: I0dab6578c0147dc60f9b29704e7f56afecbf23bd
diff --git a/profiles/roaming/roaming.go b/profiles/roaming/roaming.go
index a28feea..4aa190f 100644
--- a/profiles/roaming/roaming.go
+++ b/profiles/roaming/roaming.go
@@ -72,7 +72,7 @@
 func (p *profile) Init(rt veyron2.Runtime, publisher *config.Publisher) error {
 	log := rt.Logger()
 
-	rt.ConfigureReservedName("__debug", debug.NewDispatcher(log.LogDir(), sflag.NewAuthorizerOrDie()))
+	rt.ConfigureReservedName(debug.NewDispatcher(log.LogDir(), sflag.NewAuthorizerOrDie()))
 
 	lf := commonFlags.ListenFlags()
 	ListenSpec = ipc.ListenSpec{
diff --git a/profiles/static/static.go b/profiles/static/static.go
index 18b7625..87b1780 100644
--- a/profiles/static/static.go
+++ b/profiles/static/static.go
@@ -58,7 +58,7 @@
 func (p *static) Init(rt veyron2.Runtime, _ *config.Publisher) error {
 	log := rt.Logger()
 
-	rt.ConfigureReservedName("debug", debug.NewDispatcher(log.LogDir(), sflag.NewAuthorizerOrDie()))
+	rt.ConfigureReservedName(debug.NewDispatcher(log.LogDir(), sflag.NewAuthorizerOrDie()))
 
 	lf := commonFlags.ListenFlags()
 	ListenSpec = ipc.ListenSpec{
diff --git a/runtimes/google/ipc/debug_test.go b/runtimes/google/ipc/debug_test.go
index eaa8911..8286463 100644
--- a/runtimes/google/ipc/debug_test.go
+++ b/runtimes/google/ipc/debug_test.go
@@ -36,7 +36,7 @@
 	defer sm.Shutdown()
 	ns := tnaming.NewSimpleNamespace()
 
-	server, err := InternalNewServer(testContext(), sm, ns, options.ReservedNameDispatcher{"__debug", debugDisp}, vc.LocalPrincipal{pserver})
+	server, err := InternalNewServer(testContext(), sm, ns, options.ReservedNameDispatcher{debugDisp}, vc.LocalPrincipal{pserver})
 	if err != nil {
 		t.Fatalf("InternalNewServer failed: %v", err)
 	}
diff --git a/runtimes/google/ipc/server.go b/runtimes/google/ipc/server.go
index be28592..18d8684 100644
--- a/runtimes/google/ipc/server.go
+++ b/runtimes/google/ipc/server.go
@@ -906,7 +906,7 @@
 func (fs *flowServer) lookup(name, method string) (ipc.Invoker, security.Authorizer, string, verror.E) {
 	name = strings.TrimLeft(name, "/")
 	if method == "Glob" && len(name) == 0 {
-		return ipc.ReflectInvoker(&globInvoker{naming.ReservedNamePrefix, fs}), &acceptAllAuthorizer{}, name, nil
+		return ipc.ReflectInvoker(&globInvoker{"__debug", fs}), &acceptAllAuthorizer{}, name, nil
 	}
 	disp := fs.disp
 	if strings.HasPrefix(name, naming.ReservedNamePrefix) {
diff --git a/runtimes/google/rt/ipc.go b/runtimes/google/rt/ipc.go
index 4923176..5c115f8 100644
--- a/runtimes/google/rt/ipc.go
+++ b/runtimes/google/rt/ipc.go
@@ -94,7 +94,7 @@
 	// Add the option that provides the principal to the server.
 	otherOpts = append(otherOpts, vc.LocalPrincipal{rt.principal})
 	if rt.reservedDisp != nil {
-		ropts := options.ReservedNameDispatcher{rt.reservedPrefix, rt.reservedDisp}
+		ropts := options.ReservedNameDispatcher{rt.reservedDisp}
 		otherOpts = append(otherOpts, ropts)
 		otherOpts = append(otherOpts, rt.reservedOpts...)
 	}
diff --git a/runtimes/google/rt/rt.go b/runtimes/google/rt/rt.go
index f766be3..1c81f13 100644
--- a/runtimes/google/rt/rt.go
+++ b/runtimes/google/rt/rt.go
@@ -5,7 +5,6 @@
 	"fmt"
 	"os"
 	"path/filepath"
-	"strings"
 	"sync"
 
 	"veyron.io/veyron/veyron2"
@@ -31,20 +30,19 @@
 type vrt struct {
 	mu sync.Mutex
 
-	profile        veyron2.Profile
-	publisher      *config.Publisher
-	sm             []stream.Manager // GUARDED_BY(mu)
-	ns             naming.Namespace
-	signals        chan os.Signal
-	principal      security.Principal
-	client         ipc.Client
-	mgmt           *mgmtImpl
-	flags          flags.RuntimeFlags
-	reservedDisp   ipc.Dispatcher
-	reservedPrefix string
-	reservedOpts   []ipc.ServerOpt
-	nServers       int  // GUARDED_BY(mu)
-	cleaningUp     bool // GUARDED_BY(mu)
+	profile      veyron2.Profile
+	publisher    *config.Publisher
+	sm           []stream.Manager // GUARDED_BY(mu)
+	ns           naming.Namespace
+	signals      chan os.Signal
+	principal    security.Principal
+	client       ipc.Client
+	mgmt         *mgmtImpl
+	flags        flags.RuntimeFlags
+	reservedDisp ipc.Dispatcher
+	reservedOpts []ipc.ServerOpt
+	nServers     int  // GUARDED_BY(mu)
+	cleaningUp   bool // GUARDED_BY(mu)
 
 	lang    i18n.LangID // Language, from environment variables.
 	program string      // Program name, from os.Args[0].
@@ -145,12 +143,10 @@
 	return rt.profile
 }
 
-func (rt *vrt) ConfigureReservedName(prefix string, server ipc.Dispatcher, opts ...ipc.ServerOpt) {
+func (rt *vrt) ConfigureReservedName(server ipc.Dispatcher, opts ...ipc.ServerOpt) {
 	rt.mu.Lock()
 	defer rt.mu.Unlock()
 	rt.reservedDisp = server
-	prefix = strings.TrimLeft(prefix, "_")
-	rt.reservedPrefix = naming.ReservedNamePrefix + prefix
 	rt.reservedOpts = make([]ipc.ServerOpt, 0, len(opts))
 	copy(rt.reservedOpts, opts)
 }
diff --git a/runtimes/google/testing/mocks/runtime/panic_runtime.go b/runtimes/google/testing/mocks/runtime/panic_runtime.go
index cccc4d7..f5c7c2c 100644
--- a/runtimes/google/testing/mocks/runtime/panic_runtime.go
+++ b/runtimes/google/testing/mocks/runtime/panic_runtime.go
@@ -45,7 +45,7 @@
 func (*PanicRuntime) AdvanceGoal(delta int)         { panic(badRuntime) }
 func (*PanicRuntime) AdvanceProgress(delta int)     { panic(badRuntime) }
 func (*PanicRuntime) TrackTask(chan<- veyron2.Task) { panic(badRuntime) }
-func (*PanicRuntime) ConfigureReservedName(string, ipc.Dispatcher, ...ipc.ServerOpt) {
+func (*PanicRuntime) ConfigureReservedName(ipc.Dispatcher, ...ipc.ServerOpt) {
 	panic(badRuntime)
 }
 func (*PanicRuntime) Cleanup() { panic(badRuntime) }