File tree Expand file tree Collapse file tree 1 file changed +3
-7
lines changed
keps/sig-node/5018-dra-adminaccess Expand file tree Collapse file tree 1 file changed +3
-7
lines changed Original file line number Diff line number Diff line change @@ -255,9 +255,9 @@ restrictions when preparing the device.
255
255
In Kubernetes 1.31 (before this KEP was introduced), an example validating
256
256
admission policy
257
257
[was provided](https://github.com/kubernetes/kubernetes/blob/4aeaf1e99e82da8334c0d6dddd848a194cd44b4f/test/e2e/dra/test-driver/deploy/example/admin-access-policy.yaml#L1-L11)
258
- which restricts access to this option. It is the responsibility of cluster
259
- admins to ensure that such a policy is installed if the cluster shouldn't allow
260
- unrestricted access.
258
+ which restricted access to this option. It was formerly the responsibility of
259
+ cluster admins to ensure that such a policy was installed if the cluster
260
+ shouldn't have allowed unrestricted access.
261
261
262
262
Starting in Kubernetes 1.33 (when this KEP was introduced), a validation has
263
263
been added to the REST storage layer to only authorize `ResourceClaim` or
@@ -283,10 +283,6 @@ admin namespace label.
283
283
284
284
# ## Kube-controller-manager Changes
285
285
286
- In pkg/controller/resourceclaim/controller.go, process `ResourceClaim` in
287
- ` syncClaim` function to check for the `adminAccess` field and the feature gate
288
- enablement to ensure the field can be set.
289
-
290
286
// TODO : what part of claim.Status.Allocation should be updated? e.g.
291
287
AdminAccess is part of `DeviceRequestAllocationResult` but need to set it for
292
288
each device?
You can’t perform that action at this time.
0 commit comments