File tree 1 file changed +14
-1
lines changed
keps/sig-auth/5018-dra-adminaccess
1 file changed +14
-1
lines changed Original file line number Diff line number Diff line change @@ -287,6 +287,19 @@ been added to the REST storage layer to only authorize `ResourceClaim` or
287
287
the `kubernetes.io/dra-admin-access` label to only allow it for users with
288
288
additional privileges.
289
289
290
+ ` ` ` mermaid
291
+ flowchart TD
292
+ A[Admission Request to Create/Update ResourceClaim or ResourceClaimTemplate] --> B{adminAccess: true?}
293
+ B -- No --> E
294
+ B -- Yes --> D[Check Namespace Label]
295
+ D -- Label Present --> E[Request Allowed]
296
+ D -- No Label --> F[Request Rejected]
297
+ E --> G[Resource Created/Updated]
298
+ G --> H[Kubernetes Scheduler evaluates ResourceClaim]
299
+ H -- Admin Access Devices --> I[Skip allocation checks; Device is not allocated]
300
+ H -- Standard Claims --> J[Proceed with standard allocation checks]
301
+ ` ` `
302
+
290
303
The `DRAAdminAccess` feature gate controls whether users can set the
291
304
` adminAccess` field to true when requesting devices. That is checked in the
292
305
apiserver. In addition, the scheduler will not allocate claims with admin access
@@ -753,7 +766,7 @@ Will be considered for beta.
753
766
754
767
# # Implementation History
755
768
756
- - Kubernetes 1.33 : KEP accepted as "provisional" .
769
+ - Kubernetes 1.33 : Alpha version of the KEP .
757
770
758
771
# # Drawbacks
759
772
You can’t perform that action at this time.
0 commit comments