You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: keps/sig-auth/5018-dra-adminaccess/README.md
+9-7Lines changed: 9 additions & 7 deletions
Original file line number
Diff line number
Diff line change
@@ -179,9 +179,11 @@ objects as privileged. This feature includes:
179
179
```yaml
180
180
metadata:
181
181
labels:
182
-
resource.k8s.io/admin-access: "true"
182
+
resource.kubernetes.io/admin-access: "true"
183
183
```
184
184
185
+
Note: This label has been updated from `resource.k8s.io/admin-access` while the feature was in alpha in v1.33.
186
+
185
187
Assumptions:
186
188
187
189
- It is not important to subdivide admin access to different types of
@@ -194,7 +196,7 @@ objects as privileged. This feature includes:
194
196
195
197
In the REST storage layer, validate requests to create and update
196
198
`ResourceClaim` or `ResourceClaimTemplate` objects with `adminAccess: true`.
197
-
Only authorize if namespace has the `resource.k8s.io/admin-access: "true"` label.
199
+
Only authorize if namespace has the `resource.kubernetes.io/admin-access: "true"` label.
198
200
199
201
1. Grants privileged access to the requested device:
200
202
@@ -212,7 +214,7 @@ objects as privileged. This feature includes:
212
214
### Workflow
213
215
214
216
1. A cluster administrator labels an admin namespace with
215
-
`resource.k8s.io/admin-access: "true"`.
217
+
`resource.kubernetes.io/admin-access: "true"`.
216
218
217
219
1. Users who are authorized to create `ResourceClaim` or `ResourceClaimTemplate`
218
220
objects in this admin namespace can set `adminAccess: true` field if they
@@ -284,7 +286,7 @@ shouldn't have allowed unrestricted access.
284
286
Starting in Kubernetes 1.33 (when this KEP was introduced), a validation has
285
287
been added to the REST storage layer to only authorize `ResourceClaim` or
286
288
`ResourceClaimTemplate` with `adminAccess: true` requests if their namespace has
287
-
the `resource.k8s.io/admin-access: "true"` label to only allow it for users with
289
+
the `resource.kubernetes.io/admin-access: "true"` label to only allow it for users with
288
290
additional privileges.
289
291
290
292
The below flowchart starts with `ResourceClaim` creation from
@@ -415,7 +417,7 @@ Those tests run in:
415
417
- Additional test cases will be added to `test/integration/scheduler_perf` to
416
418
ensure `ResourceClaim` or `ResourceClaimTemplate` with `adminAccess: true`
417
419
requests are only authorized if their namespace has the
418
-
`resource.k8s.io/admin-access: "true"` label as described in this KEP.
420
+
`resource.kubernetes.io/admin-access: "true"` label as described in this KEP.
419
421
420
422
##### e2e tests
421
423
@@ -436,7 +438,7 @@ was developed as part of the overall DRA development effort. We have extended
436
438
this test driver to enable `DRAAdminAccess` feature gate and added tests to
437
439
ensure `ResourceClaim` or `ResourceClaimTemplate` with `adminAccess: true`
438
440
requests are only authorized if their namespace has the
439
-
`resource.k8s.io/admin-access: "true"` label as described in this KEP.
441
+
`resource.kubernetes.io/admin-access: "true"` label as described in this KEP.
440
442
441
443
Test links:
442
444
@@ -798,7 +800,7 @@ For each of them, fill in the following information by copying the below templat
798
800
To troubleshoot, "kubectl describe" can be used on (in this order) Pod
799
801
and ResourceClaim.
800
802
801
-
- Mitigations: When ResourceClaims or ResourceClaimTemplates the `AdminAccess`
803
+
- Mitigations: When ResourceClaims or ResourceClaimTemplates with the `AdminAccess`
802
804
field don't get created, debugging should focus on the namespace labels. The kube-controller-manager logs should have more information.
803
805
804
806
- Diagnostics: Audit Policy can be created to ensure all create operations on ResourceClaim, ResourceClaimTemplate, and Namespace resources are logged at the metadata level to review successful and denied attempts to set the `AdminAccess`
0 commit comments