AdmissionRule

An admission rule specifies either that all container images used in a pod creation request must be attested to by one or more attestors , that all pod creations will be allowed, or that all pod creations will be denied.

Images matching an admission allowlist pattern are exempted from admission rules and will never block a pod creation.

JSON representation
 { 
 "evaluationMode" 
 : 
 enum (  EvaluationMode 
 
) 
 , 
 "requireAttestationsBy" 
 : 
 [ 
 string 
 ] 
 , 
 "enforcementMode" 
 : 
 enum (  EnforcementMode 
 
) 
 } 
Fields
evaluationMode

enum ( EvaluationMode )

Required. How this admission rule will be evaluated.

requireAttestationsBy[]

string

Optional. The resource names of the attestors that must attest to a container image, in the format projects/*/attestors/* . Each attestor must exist before a policy can reference it. To add an attestor to a policy the principal issuing the policy change request must be able to read the attestor resource.

Note: this field must be non-empty when the evaluationMode field specifies REQUIRE_ATTESTATION, otherwise it must be empty.

enforcementMode

enum ( EnforcementMode )

Required. The action when a pod creation is denied by the admission rule.

Create a Mobile Website
View Site in Mobile | Classic
Share by: