File tree Expand file tree Collapse file tree 1 file changed +15
-1
lines changed
keps/sig-auth/5018-dra-adminaccess Expand file tree Collapse file tree 1 file changed +15
-1
lines changed Original file line number Diff line number Diff line change @@ -287,9 +287,18 @@ been added to the REST storage layer to only authorize `ResourceClaim` or
287
287
the `kubernetes.io/dra-admin-access` label to only allow it for users with
288
288
additional privileges.
289
289
290
+ The below flowchart starts with `ResourceClaim` creation from
291
+ ` ResourceClaimTemplate` in kube-controller-manager and ends with the node
292
+ operations.
293
+
290
294
` ` ` mermaid
291
295
flowchart TD
292
- A[Admission Request to Create/Update ResourceClaim or ResourceClaimTemplate] --> B{adminAccess: true?}
296
+ AA[Pod needs ResourceClaim for ResourceClaimTemplate] --> AB{adminAccess: true?}
297
+ AB -- No --> A
298
+ AB -- Yes --> AC{feature enabled?}
299
+ AC -- No --> AY[refuse to create ResourceClaim, Pod remains pending]
300
+ AC -- Yes --> A
301
+ A[Request to API server to Create/Update ResourceClaim or ResourceClaimTemplate] --> B{adminAccess: true and feature enabled?}
293
302
B -- No --> E
294
303
B -- Yes --> D[Check Namespace Label]
295
304
D -- Label Present --> E[Request Allowed]
@@ -298,6 +307,11 @@ flowchart TD
298
307
G --> H[Kubernetes Scheduler evaluates ResourceClaim]
299
308
H -- Admin Access Devices --> I[Skip allocation checks; Device is not allocated]
300
309
H -- Standard Claims --> J[Proceed with standard allocation checks]
310
+ J --> K
311
+ I --> K
312
+ K[kubelet asks DRA driver to prepare the ResourceClaim] --> L
313
+ L[DRA driver reads full ResourceClaim] --> M
314
+ M[DRA driver may grant additional permissions for devices with admin access]
301
315
` ` `
302
316
303
317
The `DRAAdminAccess` feature gate controls whether users can set the
You can’t perform that action at this time.
0 commit comments