File tree Expand file tree Collapse file tree 1 file changed +14
-1
lines changed
keps/sig-auth/5018-dra-adminaccess Expand file tree Collapse file tree 1 file changed +14
-1
lines changed Original file line number Diff line number Diff line change @@ -287,6 +287,19 @@ been added to the REST storage layer to only authorize `ResourceClaim` or
287287the `kubernetes.io/dra-admin-access` label to only allow it for users with
288288additional privileges.
289289
290+ ` ` ` mermaid
291+ flowchart TD
292+ A[Admission Request to Create/Update ResourceClaim or ResourceClaimTemplate] --> B{adminAccess: true?}
293+ B -- No --> E
294+ B -- Yes --> D[Check Namespace Label]
295+ D -- Label Present --> E[Request Allowed]
296+ D -- No Label --> F[Request Rejected]
297+ E --> G[Resource Created/Updated]
298+ G --> H[Kubernetes Scheduler evaluates ResourceClaim]
299+ H -- Admin Access Devices --> I[Skip allocation checks; Device is not allocated]
300+ H -- Standard Claims --> J[Proceed with standard allocation checks]
301+ ` ` `
302+
290303The `DRAAdminAccess` feature gate controls whether users can set the
291304` adminAccess` field to true when requesting devices. That is checked in the
292305apiserver. In addition, the scheduler will not allocate claims with admin access
@@ -753,7 +766,7 @@ Will be considered for beta.
753766
754767# # Implementation History
755768
756- - Kubernetes 1.33 : KEP accepted as "provisional" .
769+ - Kubernetes 1.33 : Alpha version of the KEP .
757770
758771# # Drawbacks
759772
You can’t perform that action at this time.
0 commit comments