@@ -179,7 +179,7 @@ objects as privileged. This feature includes:
179
179
` ` ` yaml
180
180
metadata :
181
181
labels :
182
- kubernetes. io/dra- admin-access : " true"
182
+ resource.k8s. io/admin-access : " true"
183
183
` ` `
184
184
185
185
Assumptions:
@@ -194,7 +194,7 @@ objects as privileged. This feature includes:
194
194
195
195
In the REST storage layer, validate requests to create and update
196
196
` ResourceClaim` or `ResourceClaimTemplate` objects with `adminAccess: true`.
197
- Only authorize if namespace has the `kubernetes. io/dra- admin-access` label.
197
+ Only authorize if namespace has the `resource.k8s. io/admin-access : " true " ` label.
198
198
199
199
1. Grants privileged access to the requested device:
200
200
@@ -212,7 +212,7 @@ objects as privileged. This feature includes:
212
212
# ## Workflow
213
213
214
214
1. A cluster administrator labels an admin namespace with
215
- ` kubernetes. io/dra- admin-access` .
215
+ `resource.k8s. io/admin-access : " true " ` .
216
216
217
217
1. Users who are authorized to create ` ResourceClaim` or `ResourceClaimTemplate`
218
218
objects in this admin namespace can set `adminAccess : true` field if they
@@ -284,7 +284,7 @@ shouldn't have allowed unrestricted access.
284
284
Starting in Kubernetes 1.33 (when this KEP was introduced), a validation has
285
285
been added to the REST storage layer to only authorize `ResourceClaim` or
286
286
`ResourceClaimTemplate` with `adminAccess : true` requests if their namespace has
287
- the `kubernetes. io/dra- admin-access` label to only allow it for users with
287
+ the `resource.k8s. io/admin-access : " true " ` label to only allow it for users with
288
288
additional privileges.
289
289
290
290
The below flowchart starts with ` ResourceClaim` creation from
@@ -401,7 +401,7 @@ https://storage.googleapis.com/k8s-triage/index.html
401
401
402
402
The scheduler plugin and resource claim controller are covered by the workloads
403
403
in
404
- https://github.com/kubernetes/kubernetes/blob/master/test/test/ integration/scheduler_perf/dra/performance-config.yaml
404
+ https://github.com/kubernetes/kubernetes/blob/master/test/integration/scheduler_perf/dra/performance-config.yaml
405
405
406
406
Those tests run in :
407
407
@@ -415,7 +415,7 @@ Those tests run in:
415
415
- Additional test cases will be added to `test/integration/scheduler_perf` to
416
416
ensure `ResourceClaim` or `ResourceClaimTemplate` with `adminAccess : true`
417
417
requests are only authorized if their namespace has the
418
- ` kubernetes. io/dra- admin-access` label as described in this KEP.
418
+ `resource.k8s. io/admin-access : " true " ` label as described in this KEP.
419
419
420
420
##### e2e tests
421
421
@@ -436,7 +436,7 @@ was developed as part of the overall DRA development effort. We have extended
436
436
this test driver to enable ` DRAAdminAccess` feature gate and added tests to
437
437
ensure `ResourceClaim` or `ResourceClaimTemplate` with `adminAccess : true`
438
438
requests are only authorized if their namespace has the
439
- ` kubernetes. io/dra- admin-access` label as described in this KEP.
439
+ `resource.k8s. io/admin-access : " true " ` label as described in this KEP.
440
440
441
441
Test links:
442
442
0 commit comments