File tree 1 file changed +13
-0
lines changed
keps/sig-auth/5018-dra-adminaccess
1 file changed +13
-0
lines changed Original file line number Diff line number Diff line change @@ -287,6 +287,19 @@ been added to the REST storage layer to only authorize `ResourceClaim` or
287
287
the `kubernetes.io/dra-admin-access` label to only allow it for users with
288
288
additional privileges.
289
289
290
+ ` ` ` mermaid
291
+ flowchart TD
292
+ A[Admission Request to Create/Update ResourceClaim or ResourceClaimTemplate] --> B{adminAccess: true?}
293
+ B -- No --> E
294
+ B -- Yes --> D[Check Namespace Label]
295
+ D -- Label Present --> E[Request Allowed]
296
+ D -- No Label --> F[Request Rejected]
297
+ E --> G[Resource Created/Updated]
298
+ G --> H[Kubernetes Scheduler evaluates ResourceClaim]
299
+ H -- Admin Access Devices --> I[Skip allocation checks; Device is not allocated]
300
+ H -- Standard Claims --> J[Proceed with standard allocation checks]
301
+ ` ` `
302
+
290
303
The `DRAAdminAccess` feature gate controls whether users can set the
291
304
` adminAccess` field to true when requesting devices. That is checked in the
292
305
apiserver. In addition, the scheduler will not allocate claims with admin access
You can’t perform that action at this time.
0 commit comments