Binary Authorization V1beta1 API - Class Google::Cloud::BinaryAuthorization::V1beta1::AdmissionRule (v0.13.0)

Reference documentation and code samples for the Binary Authorization V1beta1 API class Google::Cloud::BinaryAuthorization::V1beta1::AdmissionRule.

An admission rule specifies either that all container images used in a pod creation request must be attested to by one or more attestors, that all pod creations will be allowed, or that all pod creations will be denied.

Images matching an admission allowlist pattern are exempted from admission rules and will never block a pod creation.

Inherits

  • Object

Extended By

  • Google::Protobuf::MessageExts::ClassMethods

Includes

  • Google::Protobuf::MessageExts

Methods

#enforcement_mode

def enforcement_mode() -> ::Google::Cloud::BinaryAuthorization::V1beta1::AdmissionRule::EnforcementMode
Returns

#enforcement_mode=

def enforcement_mode=(value) -> ::Google::Cloud::BinaryAuthorization::V1beta1::AdmissionRule::EnforcementMode
Parameter
Returns

#evaluation_mode

def evaluation_mode() -> ::Google::Cloud::BinaryAuthorization::V1beta1::AdmissionRule::EvaluationMode
Returns

#evaluation_mode=

def evaluation_mode=(value) -> ::Google::Cloud::BinaryAuthorization::V1beta1::AdmissionRule::EvaluationMode
Parameter
Returns

#require_attestations_by

def require_attestations_by() -> ::Array<::String>
Returns
  • (::Array<::String>) — Optional. The resource names of the attestors that must attest to a container image, in the format projects/*/attestors/*. Each attestor must exist before a policy can reference it. To add an attestor to a policy the principal issuing the policy change request must be able to read the attestor resource.

    Note: this field must be non-empty when the evaluation_mode field specifies REQUIRE_ATTESTATION, otherwise it must be empty.

#require_attestations_by=

def require_attestations_by=(value) -> ::Array<::String>
Parameter
  • value (::Array<::String>) — Optional. The resource names of the attestors that must attest to a container image, in the format projects/*/attestors/*. Each attestor must exist before a policy can reference it. To add an attestor to a policy the principal issuing the policy change request must be able to read the attestor resource.

    Note: this field must be non-empty when the evaluation_mode field specifies REQUIRE_ATTESTATION, otherwise it must be empty.

Returns
  • (::Array<::String>) — Optional. The resource names of the attestors that must attest to a container image, in the format projects/*/attestors/*. Each attestor must exist before a policy can reference it. To add an attestor to a policy the principal issuing the policy change request must be able to read the attestor resource.

    Note: this field must be non-empty when the evaluation_mode field specifies REQUIRE_ATTESTATION, otherwise it must be empty.