Google Cloud Native is in preview. Google Cloud Classic is fully supported.
Google Cloud Native v0.32.0 published on Wednesday, Nov 29, 2023 by Pulumi
google-native.binaryauthorization/v1.getPolicy
Explore with Pulumi AI
Google Cloud Native is in preview. Google Cloud Classic is fully supported.
Google Cloud Native v0.32.0 published on Wednesday, Nov 29, 2023 by Pulumi
Gets a platform policy. Returns NOT_FOUND if the policy doesn’t exist.
Using getPolicy
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getPolicy(args: GetPolicyArgs, opts?: InvokeOptions): Promise<GetPolicyResult>
function getPolicyOutput(args: GetPolicyOutputArgs, opts?: InvokeOptions): Output<GetPolicyResult>def get_policy(platform_id: Optional[str] = None,
               policy_id: Optional[str] = None,
               project: Optional[str] = None,
               opts: Optional[InvokeOptions] = None) -> GetPolicyResult
def get_policy_output(platform_id: Optional[pulumi.Input[str]] = None,
               policy_id: Optional[pulumi.Input[str]] = None,
               project: Optional[pulumi.Input[str]] = None,
               opts: Optional[InvokeOptions] = None) -> Output[GetPolicyResult]func LookupPolicy(ctx *Context, args *LookupPolicyArgs, opts ...InvokeOption) (*LookupPolicyResult, error)
func LookupPolicyOutput(ctx *Context, args *LookupPolicyOutputArgs, opts ...InvokeOption) LookupPolicyResultOutput> Note: This function is named LookupPolicy in the Go SDK.
public static class GetPolicy 
{
    public static Task<GetPolicyResult> InvokeAsync(GetPolicyArgs args, InvokeOptions? opts = null)
    public static Output<GetPolicyResult> Invoke(GetPolicyInvokeArgs args, InvokeOptions? opts = null)
}public static CompletableFuture<GetPolicyResult> getPolicy(GetPolicyArgs args, InvokeOptions options)
public static Output<GetPolicyResult> getPolicy(GetPolicyArgs args, InvokeOptions options)
fn::invoke:
  function: google-native:binaryauthorization/v1:getPolicy
  arguments:
    # arguments dictionaryThe following arguments are supported:
- PlatformId string
- PolicyId string
- Project string
- PlatformId string
- PolicyId string
- Project string
- platformId String
- policyId String
- project String
- platformId string
- policyId string
- project string
- platform_id str
- policy_id str
- project str
- platformId String
- policyId String
- project String
getPolicy Result
The following output properties are available:
- Description string
- Optional. A description comment about the policy.
- GkePolicy Pulumi.Google Native. Binary Authorization. V1. Outputs. Gke Policy Response 
- Optional. GKE platform-specific policy.
- Name string
- The relative resource name of the Binary Authorization platform policy, in the form of projects/*/platforms/*/policies/*.
- UpdateTime string
- Time when the policy was last updated.
- Description string
- Optional. A description comment about the policy.
- GkePolicy GkePolicy Response 
- Optional. GKE platform-specific policy.
- Name string
- The relative resource name of the Binary Authorization platform policy, in the form of projects/*/platforms/*/policies/*.
- UpdateTime string
- Time when the policy was last updated.
- description String
- Optional. A description comment about the policy.
- gkePolicy GkePolicy Response 
- Optional. GKE platform-specific policy.
- name String
- The relative resource name of the Binary Authorization platform policy, in the form of projects/*/platforms/*/policies/*.
- updateTime String
- Time when the policy was last updated.
- description string
- Optional. A description comment about the policy.
- gkePolicy GkePolicy Response 
- Optional. GKE platform-specific policy.
- name string
- The relative resource name of the Binary Authorization platform policy, in the form of projects/*/platforms/*/policies/*.
- updateTime string
- Time when the policy was last updated.
- description str
- Optional. A description comment about the policy.
- gke_policy GkePolicy Response 
- Optional. GKE platform-specific policy.
- name str
- The relative resource name of the Binary Authorization platform policy, in the form of projects/*/platforms/*/policies/*.
- update_time str
- Time when the policy was last updated.
- description String
- Optional. A description comment about the policy.
- gkePolicy Property Map
- Optional. GKE platform-specific policy.
- name String
- The relative resource name of the Binary Authorization platform policy, in the form of projects/*/platforms/*/policies/*.
- updateTime String
- Time when the policy was last updated.
Supporting Types
AttestationAuthenticatorResponse  
- DisplayName string
- Optional. A user-provided name for this AttestationAuthenticator. This field has no effect on the policy evaluation behavior except to improve readability of messages in evaluation results.
- PkixPublic Pulumi.Key Set Google Native. Binary Authorization. V1. Inputs. Pkix Public Key Set Response 
- Optional. A set of raw PKIX SubjectPublicKeyInfo format public keys. If any public key in the set validates the attestation signature, then the signature is considered authenticated (i.e. any one key is sufficient to authenticate).
- DisplayName string
- Optional. A user-provided name for this AttestationAuthenticator. This field has no effect on the policy evaluation behavior except to improve readability of messages in evaluation results.
- PkixPublic PkixKey Set Public Key Set Response 
- Optional. A set of raw PKIX SubjectPublicKeyInfo format public keys. If any public key in the set validates the attestation signature, then the signature is considered authenticated (i.e. any one key is sufficient to authenticate).
- displayName String
- Optional. A user-provided name for this AttestationAuthenticator. This field has no effect on the policy evaluation behavior except to improve readability of messages in evaluation results.
- pkixPublic PkixKey Set Public Key Set Response 
- Optional. A set of raw PKIX SubjectPublicKeyInfo format public keys. If any public key in the set validates the attestation signature, then the signature is considered authenticated (i.e. any one key is sufficient to authenticate).
- displayName string
- Optional. A user-provided name for this AttestationAuthenticator. This field has no effect on the policy evaluation behavior except to improve readability of messages in evaluation results.
- pkixPublic PkixKey Set Public Key Set Response 
- Optional. A set of raw PKIX SubjectPublicKeyInfo format public keys. If any public key in the set validates the attestation signature, then the signature is considered authenticated (i.e. any one key is sufficient to authenticate).
- display_name str
- Optional. A user-provided name for this AttestationAuthenticator. This field has no effect on the policy evaluation behavior except to improve readability of messages in evaluation results.
- pkix_public_ Pkixkey_ set Public Key Set Response 
- Optional. A set of raw PKIX SubjectPublicKeyInfo format public keys. If any public key in the set validates the attestation signature, then the signature is considered authenticated (i.e. any one key is sufficient to authenticate).
- displayName String
- Optional. A user-provided name for this AttestationAuthenticator. This field has no effect on the policy evaluation behavior except to improve readability of messages in evaluation results.
- pkixPublic Property MapKey Set 
- Optional. A set of raw PKIX SubjectPublicKeyInfo format public keys. If any public key in the set validates the attestation signature, then the signature is considered authenticated (i.e. any one key is sufficient to authenticate).
AttestationSourceResponse  
- ContainerAnalysis List<string>Attestation Projects 
- The IDs of the GCP projects storing the SLSA attestations as Container Analysis Occurrences.
- ContainerAnalysis []stringAttestation Projects 
- The IDs of the GCP projects storing the SLSA attestations as Container Analysis Occurrences.
- containerAnalysis List<String>Attestation Projects 
- The IDs of the GCP projects storing the SLSA attestations as Container Analysis Occurrences.
- containerAnalysis string[]Attestation Projects 
- The IDs of the GCP projects storing the SLSA attestations as Container Analysis Occurrences.
- container_analysis_ Sequence[str]attestation_ projects 
- The IDs of the GCP projects storing the SLSA attestations as Container Analysis Occurrences.
- containerAnalysis List<String>Attestation Projects 
- The IDs of the GCP projects storing the SLSA attestations as Container Analysis Occurrences.
CheckResponse 
- AlwaysDeny bool
- Optional. A special-case check that always denies. Note that this still only applies when the scope of the CheckSetapplies and the image isn't exempted by an image allowlist. This check is primarily useful for testing, or to set the default behavior for all unmatched scopes to "deny".
- DisplayName string
- Optional. A user-provided name for this check. This field has no effect on the policy evaluation behavior except to improve readability of messages in evaluation results.
- ImageAllowlist Pulumi.Google Native. Binary Authorization. V1. Inputs. Image Allowlist Response 
- Optional. Images exempted from this check. If any of the patterns match the image url, the check will not be evaluated.
- ImageFreshness Pulumi.Check Google Native. Binary Authorization. V1. Inputs. Image Freshness Check Response 
- Optional. Require that an image is no older than a configured expiration time. Image age is determined by its upload time.
- SimpleSigning Pulumi.Attestation Check Google Native. Binary Authorization. V1. Inputs. Simple Signing Attestation Check Response 
- Optional. Require a SimpleSigning-type attestation for every image in the deployment.
- SlsaCheck Pulumi.Google Native. Binary Authorization. V1. Inputs. Slsa Check Response 
- Optional. Require that an image was built by a trusted builder (such as Google Cloud Build), meets requirements for Supply chain Levels for Software Artifacts (SLSA), and was built from a trusted source code repostitory.
- TrustedDirectory Pulumi.Check Google Native. Binary Authorization. V1. Inputs. Trusted Directory Check Response 
- Optional. Require that an image lives in a trusted directory.
- VulnerabilityCheck Pulumi.Google Native. Binary Authorization. V1. Inputs. Vulnerability Check Response 
- Optional. Require that an image does not contain vulnerabilities that violate the configured rules, such as based on severity levels.
- AlwaysDeny bool
- Optional. A special-case check that always denies. Note that this still only applies when the scope of the CheckSetapplies and the image isn't exempted by an image allowlist. This check is primarily useful for testing, or to set the default behavior for all unmatched scopes to "deny".
- DisplayName string
- Optional. A user-provided name for this check. This field has no effect on the policy evaluation behavior except to improve readability of messages in evaluation results.
- ImageAllowlist ImageAllowlist Response 
- Optional. Images exempted from this check. If any of the patterns match the image url, the check will not be evaluated.
- ImageFreshness ImageCheck Freshness Check Response 
- Optional. Require that an image is no older than a configured expiration time. Image age is determined by its upload time.
- SimpleSigning SimpleAttestation Check Signing Attestation Check Response 
- Optional. Require a SimpleSigning-type attestation for every image in the deployment.
- SlsaCheck SlsaCheck Response 
- Optional. Require that an image was built by a trusted builder (such as Google Cloud Build), meets requirements for Supply chain Levels for Software Artifacts (SLSA), and was built from a trusted source code repostitory.
- TrustedDirectory TrustedCheck Directory Check Response 
- Optional. Require that an image lives in a trusted directory.
- VulnerabilityCheck VulnerabilityCheck Response 
- Optional. Require that an image does not contain vulnerabilities that violate the configured rules, such as based on severity levels.
- alwaysDeny Boolean
- Optional. A special-case check that always denies. Note that this still only applies when the scope of the CheckSetapplies and the image isn't exempted by an image allowlist. This check is primarily useful for testing, or to set the default behavior for all unmatched scopes to "deny".
- displayName String
- Optional. A user-provided name for this check. This field has no effect on the policy evaluation behavior except to improve readability of messages in evaluation results.
- imageAllowlist ImageAllowlist Response 
- Optional. Images exempted from this check. If any of the patterns match the image url, the check will not be evaluated.
- imageFreshness ImageCheck Freshness Check Response 
- Optional. Require that an image is no older than a configured expiration time. Image age is determined by its upload time.
- simpleSigning SimpleAttestation Check Signing Attestation Check Response 
- Optional. Require a SimpleSigning-type attestation for every image in the deployment.
- slsaCheck SlsaCheck Response 
- Optional. Require that an image was built by a trusted builder (such as Google Cloud Build), meets requirements for Supply chain Levels for Software Artifacts (SLSA), and was built from a trusted source code repostitory.
- trustedDirectory TrustedCheck Directory Check Response 
- Optional. Require that an image lives in a trusted directory.
- vulnerabilityCheck VulnerabilityCheck Response 
- Optional. Require that an image does not contain vulnerabilities that violate the configured rules, such as based on severity levels.
- alwaysDeny boolean
- Optional. A special-case check that always denies. Note that this still only applies when the scope of the CheckSetapplies and the image isn't exempted by an image allowlist. This check is primarily useful for testing, or to set the default behavior for all unmatched scopes to "deny".
- displayName string
- Optional. A user-provided name for this check. This field has no effect on the policy evaluation behavior except to improve readability of messages in evaluation results.
- imageAllowlist ImageAllowlist Response 
- Optional. Images exempted from this check. If any of the patterns match the image url, the check will not be evaluated.
- imageFreshness ImageCheck Freshness Check Response 
- Optional. Require that an image is no older than a configured expiration time. Image age is determined by its upload time.
- simpleSigning SimpleAttestation Check Signing Attestation Check Response 
- Optional. Require a SimpleSigning-type attestation for every image in the deployment.
- slsaCheck SlsaCheck Response 
- Optional. Require that an image was built by a trusted builder (such as Google Cloud Build), meets requirements for Supply chain Levels for Software Artifacts (SLSA), and was built from a trusted source code repostitory.
- trustedDirectory TrustedCheck Directory Check Response 
- Optional. Require that an image lives in a trusted directory.
- vulnerabilityCheck VulnerabilityCheck Response 
- Optional. Require that an image does not contain vulnerabilities that violate the configured rules, such as based on severity levels.
- always_deny bool
- Optional. A special-case check that always denies. Note that this still only applies when the scope of the CheckSetapplies and the image isn't exempted by an image allowlist. This check is primarily useful for testing, or to set the default behavior for all unmatched scopes to "deny".
- display_name str
- Optional. A user-provided name for this check. This field has no effect on the policy evaluation behavior except to improve readability of messages in evaluation results.
- image_allowlist ImageAllowlist Response 
- Optional. Images exempted from this check. If any of the patterns match the image url, the check will not be evaluated.
- image_freshness_ Imagecheck Freshness Check Response 
- Optional. Require that an image is no older than a configured expiration time. Image age is determined by its upload time.
- simple_signing_ Simpleattestation_ check Signing Attestation Check Response 
- Optional. Require a SimpleSigning-type attestation for every image in the deployment.
- slsa_check SlsaCheck Response 
- Optional. Require that an image was built by a trusted builder (such as Google Cloud Build), meets requirements for Supply chain Levels for Software Artifacts (SLSA), and was built from a trusted source code repostitory.
- trusted_directory_ Trustedcheck Directory Check Response 
- Optional. Require that an image lives in a trusted directory.
- vulnerability_check VulnerabilityCheck Response 
- Optional. Require that an image does not contain vulnerabilities that violate the configured rules, such as based on severity levels.
- alwaysDeny Boolean
- Optional. A special-case check that always denies. Note that this still only applies when the scope of the CheckSetapplies and the image isn't exempted by an image allowlist. This check is primarily useful for testing, or to set the default behavior for all unmatched scopes to "deny".
- displayName String
- Optional. A user-provided name for this check. This field has no effect on the policy evaluation behavior except to improve readability of messages in evaluation results.
- imageAllowlist Property Map
- Optional. Images exempted from this check. If any of the patterns match the image url, the check will not be evaluated.
- imageFreshness Property MapCheck 
- Optional. Require that an image is no older than a configured expiration time. Image age is determined by its upload time.
- simpleSigning Property MapAttestation Check 
- Optional. Require a SimpleSigning-type attestation for every image in the deployment.
- slsaCheck Property Map
- Optional. Require that an image was built by a trusted builder (such as Google Cloud Build), meets requirements for Supply chain Levels for Software Artifacts (SLSA), and was built from a trusted source code repostitory.
- trustedDirectory Property MapCheck 
- Optional. Require that an image lives in a trusted directory.
- vulnerabilityCheck Property Map
- Optional. Require that an image does not contain vulnerabilities that violate the configured rules, such as based on severity levels.
CheckSetResponse  
- Checks
List<Pulumi.Google Native. Binary Authorization. V1. Inputs. Check Response> 
- Optional. The checks to apply. The ultimate result of evaluating the check set will be "allow" if and only if every check in checksevaluates to "allow". Ifchecksis empty, the default behavior is "always allow".
- DisplayName string
- Optional. A user-provided name for this CheckSet. This field has no effect on the policy evaluation behavior except to improve readability of messages in evaluation results.
- ImageAllowlist Pulumi.Google Native. Binary Authorization. V1. Inputs. Image Allowlist Response 
- Optional. Images exempted from this CheckSet. If any of the patterns match the image being evaluated, no checks in theCheckSetwill be evaluated.
- Scope
Pulumi.Google Native. Binary Authorization. V1. Inputs. Scope Response 
- Optional. The scope to which this CheckSetapplies. If unset or an empty string (the default), applies to all namespaces and service accounts. See theScopemessage documentation for details on scoping rules.
- Checks
[]CheckResponse 
- Optional. The checks to apply. The ultimate result of evaluating the check set will be "allow" if and only if every check in checksevaluates to "allow". Ifchecksis empty, the default behavior is "always allow".
- DisplayName string
- Optional. A user-provided name for this CheckSet. This field has no effect on the policy evaluation behavior except to improve readability of messages in evaluation results.
- ImageAllowlist ImageAllowlist Response 
- Optional. Images exempted from this CheckSet. If any of the patterns match the image being evaluated, no checks in theCheckSetwill be evaluated.
- Scope
ScopeResponse 
- Optional. The scope to which this CheckSetapplies. If unset or an empty string (the default), applies to all namespaces and service accounts. See theScopemessage documentation for details on scoping rules.
- checks
List<CheckResponse> 
- Optional. The checks to apply. The ultimate result of evaluating the check set will be "allow" if and only if every check in checksevaluates to "allow". Ifchecksis empty, the default behavior is "always allow".
- displayName String
- Optional. A user-provided name for this CheckSet. This field has no effect on the policy evaluation behavior except to improve readability of messages in evaluation results.
- imageAllowlist ImageAllowlist Response 
- Optional. Images exempted from this CheckSet. If any of the patterns match the image being evaluated, no checks in theCheckSetwill be evaluated.
- scope
ScopeResponse 
- Optional. The scope to which this CheckSetapplies. If unset or an empty string (the default), applies to all namespaces and service accounts. See theScopemessage documentation for details on scoping rules.
- checks
CheckResponse[] 
- Optional. The checks to apply. The ultimate result of evaluating the check set will be "allow" if and only if every check in checksevaluates to "allow". Ifchecksis empty, the default behavior is "always allow".
- displayName string
- Optional. A user-provided name for this CheckSet. This field has no effect on the policy evaluation behavior except to improve readability of messages in evaluation results.
- imageAllowlist ImageAllowlist Response 
- Optional. Images exempted from this CheckSet. If any of the patterns match the image being evaluated, no checks in theCheckSetwill be evaluated.
- scope
ScopeResponse 
- Optional. The scope to which this CheckSetapplies. If unset or an empty string (the default), applies to all namespaces and service accounts. See theScopemessage documentation for details on scoping rules.
- checks
Sequence[CheckResponse] 
- Optional. The checks to apply. The ultimate result of evaluating the check set will be "allow" if and only if every check in checksevaluates to "allow". Ifchecksis empty, the default behavior is "always allow".
- display_name str
- Optional. A user-provided name for this CheckSet. This field has no effect on the policy evaluation behavior except to improve readability of messages in evaluation results.
- image_allowlist ImageAllowlist Response 
- Optional. Images exempted from this CheckSet. If any of the patterns match the image being evaluated, no checks in theCheckSetwill be evaluated.
- scope
ScopeResponse 
- Optional. The scope to which this CheckSetapplies. If unset or an empty string (the default), applies to all namespaces and service accounts. See theScopemessage documentation for details on scoping rules.
- checks List<Property Map>
- Optional. The checks to apply. The ultimate result of evaluating the check set will be "allow" if and only if every check in checksevaluates to "allow". Ifchecksis empty, the default behavior is "always allow".
- displayName String
- Optional. A user-provided name for this CheckSet. This field has no effect on the policy evaluation behavior except to improve readability of messages in evaluation results.
- imageAllowlist Property Map
- Optional. Images exempted from this CheckSet. If any of the patterns match the image being evaluated, no checks in theCheckSetwill be evaluated.
- scope Property Map
- Optional. The scope to which this CheckSetapplies. If unset or an empty string (the default), applies to all namespaces and service accounts. See theScopemessage documentation for details on scoping rules.
GkePolicyResponse  
- CheckSets List<Pulumi.Google Native. Binary Authorization. V1. Inputs. Check Set Response> 
- Optional. The CheckSetobjects to apply, scoped by namespace or namespace and service account. Exactly oneCheckSetwill be evaluated for a given Pod (unless the list is empty, in which case the behavior is "always allow"). If multipleCheckSetobjects have scopes that match the namespace and service account of the Pod being evaluated, only theCheckSetwith the MOST SPECIFIC scope will match.CheckSetobjects must be listed in order of decreasing specificity, i.e. if a scope matches a given service account (which must include the namespace), it must come before aCheckSetwith a scope matching just that namespace. This property is enforced by server-side validation. The purpose of this restriction is to ensure that if more than oneCheckSetmatches a given Pod, theCheckSetthat will be evaluated will always be the first in the list to match (because if any other matches, it must be less specific). Ifcheck_setsis empty, the default behavior is to allow all images. Ifcheck_setsis non-empty, the lastcheck_setsentry must always be aCheckSetwith no scope set, i.e. a catchall to handle any situation not caught by the precedingCheckSetobjects.
- ImageAllowlist Pulumi.Google Native. Binary Authorization. V1. Inputs. Image Allowlist Response 
- Optional. Images exempted from this policy. If any of the patterns match the image being evaluated, the rest of the policy will not be evaluated.
- CheckSets []CheckSet Response 
- Optional. The CheckSetobjects to apply, scoped by namespace or namespace and service account. Exactly oneCheckSetwill be evaluated for a given Pod (unless the list is empty, in which case the behavior is "always allow"). If multipleCheckSetobjects have scopes that match the namespace and service account of the Pod being evaluated, only theCheckSetwith the MOST SPECIFIC scope will match.CheckSetobjects must be listed in order of decreasing specificity, i.e. if a scope matches a given service account (which must include the namespace), it must come before aCheckSetwith a scope matching just that namespace. This property is enforced by server-side validation. The purpose of this restriction is to ensure that if more than oneCheckSetmatches a given Pod, theCheckSetthat will be evaluated will always be the first in the list to match (because if any other matches, it must be less specific). Ifcheck_setsis empty, the default behavior is to allow all images. Ifcheck_setsis non-empty, the lastcheck_setsentry must always be aCheckSetwith no scope set, i.e. a catchall to handle any situation not caught by the precedingCheckSetobjects.
- ImageAllowlist ImageAllowlist Response 
- Optional. Images exempted from this policy. If any of the patterns match the image being evaluated, the rest of the policy will not be evaluated.
- checkSets List<CheckSet Response> 
- Optional. The CheckSetobjects to apply, scoped by namespace or namespace and service account. Exactly oneCheckSetwill be evaluated for a given Pod (unless the list is empty, in which case the behavior is "always allow"). If multipleCheckSetobjects have scopes that match the namespace and service account of the Pod being evaluated, only theCheckSetwith the MOST SPECIFIC scope will match.CheckSetobjects must be listed in order of decreasing specificity, i.e. if a scope matches a given service account (which must include the namespace), it must come before aCheckSetwith a scope matching just that namespace. This property is enforced by server-side validation. The purpose of this restriction is to ensure that if more than oneCheckSetmatches a given Pod, theCheckSetthat will be evaluated will always be the first in the list to match (because if any other matches, it must be less specific). Ifcheck_setsis empty, the default behavior is to allow all images. Ifcheck_setsis non-empty, the lastcheck_setsentry must always be aCheckSetwith no scope set, i.e. a catchall to handle any situation not caught by the precedingCheckSetobjects.
- imageAllowlist ImageAllowlist Response 
- Optional. Images exempted from this policy. If any of the patterns match the image being evaluated, the rest of the policy will not be evaluated.
- checkSets CheckSet Response[] 
- Optional. The CheckSetobjects to apply, scoped by namespace or namespace and service account. Exactly oneCheckSetwill be evaluated for a given Pod (unless the list is empty, in which case the behavior is "always allow"). If multipleCheckSetobjects have scopes that match the namespace and service account of the Pod being evaluated, only theCheckSetwith the MOST SPECIFIC scope will match.CheckSetobjects must be listed in order of decreasing specificity, i.e. if a scope matches a given service account (which must include the namespace), it must come before aCheckSetwith a scope matching just that namespace. This property is enforced by server-side validation. The purpose of this restriction is to ensure that if more than oneCheckSetmatches a given Pod, theCheckSetthat will be evaluated will always be the first in the list to match (because if any other matches, it must be less specific). Ifcheck_setsis empty, the default behavior is to allow all images. Ifcheck_setsis non-empty, the lastcheck_setsentry must always be aCheckSetwith no scope set, i.e. a catchall to handle any situation not caught by the precedingCheckSetobjects.
- imageAllowlist ImageAllowlist Response 
- Optional. Images exempted from this policy. If any of the patterns match the image being evaluated, the rest of the policy will not be evaluated.
- check_sets Sequence[CheckSet Response] 
- Optional. The CheckSetobjects to apply, scoped by namespace or namespace and service account. Exactly oneCheckSetwill be evaluated for a given Pod (unless the list is empty, in which case the behavior is "always allow"). If multipleCheckSetobjects have scopes that match the namespace and service account of the Pod being evaluated, only theCheckSetwith the MOST SPECIFIC scope will match.CheckSetobjects must be listed in order of decreasing specificity, i.e. if a scope matches a given service account (which must include the namespace), it must come before aCheckSetwith a scope matching just that namespace. This property is enforced by server-side validation. The purpose of this restriction is to ensure that if more than oneCheckSetmatches a given Pod, theCheckSetthat will be evaluated will always be the first in the list to match (because if any other matches, it must be less specific). Ifcheck_setsis empty, the default behavior is to allow all images. Ifcheck_setsis non-empty, the lastcheck_setsentry must always be aCheckSetwith no scope set, i.e. a catchall to handle any situation not caught by the precedingCheckSetobjects.
- image_allowlist ImageAllowlist Response 
- Optional. Images exempted from this policy. If any of the patterns match the image being evaluated, the rest of the policy will not be evaluated.
- checkSets List<Property Map>
- Optional. The CheckSetobjects to apply, scoped by namespace or namespace and service account. Exactly oneCheckSetwill be evaluated for a given Pod (unless the list is empty, in which case the behavior is "always allow"). If multipleCheckSetobjects have scopes that match the namespace and service account of the Pod being evaluated, only theCheckSetwith the MOST SPECIFIC scope will match.CheckSetobjects must be listed in order of decreasing specificity, i.e. if a scope matches a given service account (which must include the namespace), it must come before aCheckSetwith a scope matching just that namespace. This property is enforced by server-side validation. The purpose of this restriction is to ensure that if more than oneCheckSetmatches a given Pod, theCheckSetthat will be evaluated will always be the first in the list to match (because if any other matches, it must be less specific). Ifcheck_setsis empty, the default behavior is to allow all images. Ifcheck_setsis non-empty, the lastcheck_setsentry must always be aCheckSetwith no scope set, i.e. a catchall to handle any situation not caught by the precedingCheckSetobjects.
- imageAllowlist Property Map
- Optional. Images exempted from this policy. If any of the patterns match the image being evaluated, the rest of the policy will not be evaluated.
ImageAllowlistResponse  
- AllowPattern List<string>
- A disjunction of image patterns to allow. If any of these patterns match, then the image is considered exempted by this allowlist.
- AllowPattern []string
- A disjunction of image patterns to allow. If any of these patterns match, then the image is considered exempted by this allowlist.
- allowPattern List<String>
- A disjunction of image patterns to allow. If any of these patterns match, then the image is considered exempted by this allowlist.
- allowPattern string[]
- A disjunction of image patterns to allow. If any of these patterns match, then the image is considered exempted by this allowlist.
- allow_pattern Sequence[str]
- A disjunction of image patterns to allow. If any of these patterns match, then the image is considered exempted by this allowlist.
- allowPattern List<String>
- A disjunction of image patterns to allow. If any of these patterns match, then the image is considered exempted by this allowlist.
ImageFreshnessCheckResponse   
- MaxUpload intAge Days 
- The max number of days that is allowed since the image was uploaded. Must be greater than zero.
- MaxUpload intAge Days 
- The max number of days that is allowed since the image was uploaded. Must be greater than zero.
- maxUpload IntegerAge Days 
- The max number of days that is allowed since the image was uploaded. Must be greater than zero.
- maxUpload numberAge Days 
- The max number of days that is allowed since the image was uploaded. Must be greater than zero.
- max_upload_ intage_ days 
- The max number of days that is allowed since the image was uploaded. Must be greater than zero.
- maxUpload NumberAge Days 
- The max number of days that is allowed since the image was uploaded. Must be greater than zero.
PkixPublicKeyResponse   
- KeyId string
- Optional. The ID of this public key. Signatures verified by Binary Authorization must include the ID of the public key that can be used to verify them, and that ID must match the contents of this field exactly. This may be explicitly provided by the caller, but it MUST be a valid RFC3986 URI. If key_idis left blank and thisPkixPublicKeyis not used in the context of a wrapper (see next paragraph), a default key ID will be computed based on the digest of the DER encoding of the public key. If thisPkixPublicKeyis used in the context of a wrapper that has its own notion of key ID (e.g.AttestorPublicKey), then this field can either: * Match that value exactly. * Or be left blank, in which case it behaves exactly as though it is equal to that wrapper value.
- PublicKey stringPem 
- A PEM-encoded public key, as described in https://tools.ietf.org/html/rfc7468#section-13
- SignatureAlgorithm string
- The signature algorithm used to verify a message against a signature using this key. These signature algorithm must match the structure and any object identifiers encoded in public_key_pem(i.e. this algorithm must match that of the public key).
- KeyId string
- Optional. The ID of this public key. Signatures verified by Binary Authorization must include the ID of the public key that can be used to verify them, and that ID must match the contents of this field exactly. This may be explicitly provided by the caller, but it MUST be a valid RFC3986 URI. If key_idis left blank and thisPkixPublicKeyis not used in the context of a wrapper (see next paragraph), a default key ID will be computed based on the digest of the DER encoding of the public key. If thisPkixPublicKeyis used in the context of a wrapper that has its own notion of key ID (e.g.AttestorPublicKey), then this field can either: * Match that value exactly. * Or be left blank, in which case it behaves exactly as though it is equal to that wrapper value.
- PublicKey stringPem 
- A PEM-encoded public key, as described in https://tools.ietf.org/html/rfc7468#section-13
- SignatureAlgorithm string
- The signature algorithm used to verify a message against a signature using this key. These signature algorithm must match the structure and any object identifiers encoded in public_key_pem(i.e. this algorithm must match that of the public key).
- keyId String
- Optional. The ID of this public key. Signatures verified by Binary Authorization must include the ID of the public key that can be used to verify them, and that ID must match the contents of this field exactly. This may be explicitly provided by the caller, but it MUST be a valid RFC3986 URI. If key_idis left blank and thisPkixPublicKeyis not used in the context of a wrapper (see next paragraph), a default key ID will be computed based on the digest of the DER encoding of the public key. If thisPkixPublicKeyis used in the context of a wrapper that has its own notion of key ID (e.g.AttestorPublicKey), then this field can either: * Match that value exactly. * Or be left blank, in which case it behaves exactly as though it is equal to that wrapper value.
- publicKey StringPem 
- A PEM-encoded public key, as described in https://tools.ietf.org/html/rfc7468#section-13
- signatureAlgorithm String
- The signature algorithm used to verify a message against a signature using this key. These signature algorithm must match the structure and any object identifiers encoded in public_key_pem(i.e. this algorithm must match that of the public key).
- keyId string
- Optional. The ID of this public key. Signatures verified by Binary Authorization must include the ID of the public key that can be used to verify them, and that ID must match the contents of this field exactly. This may be explicitly provided by the caller, but it MUST be a valid RFC3986 URI. If key_idis left blank and thisPkixPublicKeyis not used in the context of a wrapper (see next paragraph), a default key ID will be computed based on the digest of the DER encoding of the public key. If thisPkixPublicKeyis used in the context of a wrapper that has its own notion of key ID (e.g.AttestorPublicKey), then this field can either: * Match that value exactly. * Or be left blank, in which case it behaves exactly as though it is equal to that wrapper value.
- publicKey stringPem 
- A PEM-encoded public key, as described in https://tools.ietf.org/html/rfc7468#section-13
- signatureAlgorithm string
- The signature algorithm used to verify a message against a signature using this key. These signature algorithm must match the structure and any object identifiers encoded in public_key_pem(i.e. this algorithm must match that of the public key).
- key_id str
- Optional. The ID of this public key. Signatures verified by Binary Authorization must include the ID of the public key that can be used to verify them, and that ID must match the contents of this field exactly. This may be explicitly provided by the caller, but it MUST be a valid RFC3986 URI. If key_idis left blank and thisPkixPublicKeyis not used in the context of a wrapper (see next paragraph), a default key ID will be computed based on the digest of the DER encoding of the public key. If thisPkixPublicKeyis used in the context of a wrapper that has its own notion of key ID (e.g.AttestorPublicKey), then this field can either: * Match that value exactly. * Or be left blank, in which case it behaves exactly as though it is equal to that wrapper value.
- public_key_ strpem 
- A PEM-encoded public key, as described in https://tools.ietf.org/html/rfc7468#section-13
- signature_algorithm str
- The signature algorithm used to verify a message against a signature using this key. These signature algorithm must match the structure and any object identifiers encoded in public_key_pem(i.e. this algorithm must match that of the public key).
- keyId String
- Optional. The ID of this public key. Signatures verified by Binary Authorization must include the ID of the public key that can be used to verify them, and that ID must match the contents of this field exactly. This may be explicitly provided by the caller, but it MUST be a valid RFC3986 URI. If key_idis left blank and thisPkixPublicKeyis not used in the context of a wrapper (see next paragraph), a default key ID will be computed based on the digest of the DER encoding of the public key. If thisPkixPublicKeyis used in the context of a wrapper that has its own notion of key ID (e.g.AttestorPublicKey), then this field can either: * Match that value exactly. * Or be left blank, in which case it behaves exactly as though it is equal to that wrapper value.
- publicKey StringPem 
- A PEM-encoded public key, as described in https://tools.ietf.org/html/rfc7468#section-13
- signatureAlgorithm String
- The signature algorithm used to verify a message against a signature using this key. These signature algorithm must match the structure and any object identifiers encoded in public_key_pem(i.e. this algorithm must match that of the public key).
PkixPublicKeySetResponse    
- PkixPublic List<Pulumi.Keys Google Native. Binary Authorization. V1. Inputs. Pkix Public Key Response> 
- pkix_public_keysmust have at least one entry.
- PkixPublic []PkixKeys Public Key Response 
- pkix_public_keysmust have at least one entry.
- pkixPublic List<PkixKeys Public Key Response> 
- pkix_public_keysmust have at least one entry.
- pkixPublic PkixKeys Public Key Response[] 
- pkix_public_keysmust have at least one entry.
- pkix_public_ Sequence[Pkixkeys Public Key Response] 
- pkix_public_keysmust have at least one entry.
- pkixPublic List<Property Map>Keys 
- pkix_public_keysmust have at least one entry.
ScopeResponse 
- KubernetesNamespace string
- Optional. Matches all Kubernetes service accounts in the provided namespace, unless a more specific kubernetes_service_accountscope already matched.
- KubernetesService stringAccount 
- Optional. Matches a single Kubernetes service account, e.g. my-namespace:my-service-account.kubernetes_service_accountscope is always more specific thankubernetes_namespacescope for the same namespace.
- KubernetesNamespace string
- Optional. Matches all Kubernetes service accounts in the provided namespace, unless a more specific kubernetes_service_accountscope already matched.
- KubernetesService stringAccount 
- Optional. Matches a single Kubernetes service account, e.g. my-namespace:my-service-account.kubernetes_service_accountscope is always more specific thankubernetes_namespacescope for the same namespace.
- kubernetesNamespace String
- Optional. Matches all Kubernetes service accounts in the provided namespace, unless a more specific kubernetes_service_accountscope already matched.
- kubernetesService StringAccount 
- Optional. Matches a single Kubernetes service account, e.g. my-namespace:my-service-account.kubernetes_service_accountscope is always more specific thankubernetes_namespacescope for the same namespace.
- kubernetesNamespace string
- Optional. Matches all Kubernetes service accounts in the provided namespace, unless a more specific kubernetes_service_accountscope already matched.
- kubernetesService stringAccount 
- Optional. Matches a single Kubernetes service account, e.g. my-namespace:my-service-account.kubernetes_service_accountscope is always more specific thankubernetes_namespacescope for the same namespace.
- kubernetes_namespace str
- Optional. Matches all Kubernetes service accounts in the provided namespace, unless a more specific kubernetes_service_accountscope already matched.
- kubernetes_service_ straccount 
- Optional. Matches a single Kubernetes service account, e.g. my-namespace:my-service-account.kubernetes_service_accountscope is always more specific thankubernetes_namespacescope for the same namespace.
- kubernetesNamespace String
- Optional. Matches all Kubernetes service accounts in the provided namespace, unless a more specific kubernetes_service_accountscope already matched.
- kubernetesService StringAccount 
- Optional. Matches a single Kubernetes service account, e.g. my-namespace:my-service-account.kubernetes_service_accountscope is always more specific thankubernetes_namespacescope for the same namespace.
SimpleSigningAttestationCheckResponse    
- AttestationAuthenticators List<Pulumi.Google Native. Binary Authorization. V1. Inputs. Attestation Authenticator Response> 
- The authenticators required by this check to verify an attestation. Typically this is one or more PKIX public keys for signature verification. Only one authenticator needs to consider an attestation verified in order for an attestation to be considered fully authenticated. In otherwords, this list of authenticators is an "OR" of the authenticator results. At least one authenticator is required.
- ContainerAnalysis List<string>Attestation Projects 
- Optional. The projects where attestations are stored as Container Analysis Occurrences. Only one attestation needs to successfully verify an image for this check to pass, so a single verified attestation found in any of container_analysis_attestation_projectsis sufficient for the check to pass. When fetching Occurrences from Container Analysis, only 'AttestationOccurrence' kinds are considered. In the future, additional Occurrence kinds may be added to the query.
- AttestationAuthenticators []AttestationAuthenticator Response 
- The authenticators required by this check to verify an attestation. Typically this is one or more PKIX public keys for signature verification. Only one authenticator needs to consider an attestation verified in order for an attestation to be considered fully authenticated. In otherwords, this list of authenticators is an "OR" of the authenticator results. At least one authenticator is required.
- ContainerAnalysis []stringAttestation Projects 
- Optional. The projects where attestations are stored as Container Analysis Occurrences. Only one attestation needs to successfully verify an image for this check to pass, so a single verified attestation found in any of container_analysis_attestation_projectsis sufficient for the check to pass. When fetching Occurrences from Container Analysis, only 'AttestationOccurrence' kinds are considered. In the future, additional Occurrence kinds may be added to the query.
- attestationAuthenticators List<AttestationAuthenticator Response> 
- The authenticators required by this check to verify an attestation. Typically this is one or more PKIX public keys for signature verification. Only one authenticator needs to consider an attestation verified in order for an attestation to be considered fully authenticated. In otherwords, this list of authenticators is an "OR" of the authenticator results. At least one authenticator is required.
- containerAnalysis List<String>Attestation Projects 
- Optional. The projects where attestations are stored as Container Analysis Occurrences. Only one attestation needs to successfully verify an image for this check to pass, so a single verified attestation found in any of container_analysis_attestation_projectsis sufficient for the check to pass. When fetching Occurrences from Container Analysis, only 'AttestationOccurrence' kinds are considered. In the future, additional Occurrence kinds may be added to the query.
- attestationAuthenticators AttestationAuthenticator Response[] 
- The authenticators required by this check to verify an attestation. Typically this is one or more PKIX public keys for signature verification. Only one authenticator needs to consider an attestation verified in order for an attestation to be considered fully authenticated. In otherwords, this list of authenticators is an "OR" of the authenticator results. At least one authenticator is required.
- containerAnalysis string[]Attestation Projects 
- Optional. The projects where attestations are stored as Container Analysis Occurrences. Only one attestation needs to successfully verify an image for this check to pass, so a single verified attestation found in any of container_analysis_attestation_projectsis sufficient for the check to pass. When fetching Occurrences from Container Analysis, only 'AttestationOccurrence' kinds are considered. In the future, additional Occurrence kinds may be added to the query.
- attestation_authenticators Sequence[AttestationAuthenticator Response] 
- The authenticators required by this check to verify an attestation. Typically this is one or more PKIX public keys for signature verification. Only one authenticator needs to consider an attestation verified in order for an attestation to be considered fully authenticated. In otherwords, this list of authenticators is an "OR" of the authenticator results. At least one authenticator is required.
- container_analysis_ Sequence[str]attestation_ projects 
- Optional. The projects where attestations are stored as Container Analysis Occurrences. Only one attestation needs to successfully verify an image for this check to pass, so a single verified attestation found in any of container_analysis_attestation_projectsis sufficient for the check to pass. When fetching Occurrences from Container Analysis, only 'AttestationOccurrence' kinds are considered. In the future, additional Occurrence kinds may be added to the query.
- attestationAuthenticators List<Property Map>
- The authenticators required by this check to verify an attestation. Typically this is one or more PKIX public keys for signature verification. Only one authenticator needs to consider an attestation verified in order for an attestation to be considered fully authenticated. In otherwords, this list of authenticators is an "OR" of the authenticator results. At least one authenticator is required.
- containerAnalysis List<String>Attestation Projects 
- Optional. The projects where attestations are stored as Container Analysis Occurrences. Only one attestation needs to successfully verify an image for this check to pass, so a single verified attestation found in any of container_analysis_attestation_projectsis sufficient for the check to pass. When fetching Occurrences from Container Analysis, only 'AttestationOccurrence' kinds are considered. In the future, additional Occurrence kinds may be added to the query.
SlsaCheckResponse  
- Rules
List<Pulumi.Google Native. Binary Authorization. V1. Inputs. Verification Rule Response> 
- Specifies a list of verification rules for the SLSA attestations. An image is considered compliant with the SlsaCheck if any of the rules are satisfied.
- Rules
[]VerificationRule Response 
- Specifies a list of verification rules for the SLSA attestations. An image is considered compliant with the SlsaCheck if any of the rules are satisfied.
- rules
List<VerificationRule Response> 
- Specifies a list of verification rules for the SLSA attestations. An image is considered compliant with the SlsaCheck if any of the rules are satisfied.
- rules
VerificationRule Response[] 
- Specifies a list of verification rules for the SLSA attestations. An image is considered compliant with the SlsaCheck if any of the rules are satisfied.
- rules
Sequence[VerificationRule Response] 
- Specifies a list of verification rules for the SLSA attestations. An image is considered compliant with the SlsaCheck if any of the rules are satisfied.
- rules List<Property Map>
- Specifies a list of verification rules for the SLSA attestations. An image is considered compliant with the SlsaCheck if any of the rules are satisfied.
TrustedDirectoryCheckResponse   
- TrustedDir List<string>Patterns 
- List of trusted directory patterns. A pattern is in the form "registry/path/to/directory". The registry domain part is defined as two or more dot-separated words, e.g., us.pkg.dev, orgcr.io. Additionally,*can be used in three ways as wildcards: 1. leading*to match varying prefixes in registry subdomain (useful for location prefixes); 2. trailing*after registry/ to match varying endings; 3. trailing**after registry/ to match "/" as well. For example: --gcr.io/my-project/my-repois valid to match a single directory --*-docker.pkg.dev/my-project/my-repoor*.gcr.io/my-projectare valid to match varying prefixes --gcr.io/my-project/*will match all direct directories inmy-project--gcr.io/my-project/**would match all directories inmy-project--gcr.i*is not allowed since the registry is not completely specified --sub*domain.gcr.io/nginxis not valid because only leading*or trailing*are allowed. --*pkg.dev/my-project/my-repois not valid because leading*can only match subdomain --**-docker.pkg.devis not valid because one leading*is allowed, and that it cannot match/
- TrustedDir []stringPatterns 
- List of trusted directory patterns. A pattern is in the form "registry/path/to/directory". The registry domain part is defined as two or more dot-separated words, e.g., us.pkg.dev, orgcr.io. Additionally,*can be used in three ways as wildcards: 1. leading*to match varying prefixes in registry subdomain (useful for location prefixes); 2. trailing*after registry/ to match varying endings; 3. trailing**after registry/ to match "/" as well. For example: --gcr.io/my-project/my-repois valid to match a single directory --*-docker.pkg.dev/my-project/my-repoor*.gcr.io/my-projectare valid to match varying prefixes --gcr.io/my-project/*will match all direct directories inmy-project--gcr.io/my-project/**would match all directories inmy-project--gcr.i*is not allowed since the registry is not completely specified --sub*domain.gcr.io/nginxis not valid because only leading*or trailing*are allowed. --*pkg.dev/my-project/my-repois not valid because leading*can only match subdomain --**-docker.pkg.devis not valid because one leading*is allowed, and that it cannot match/
- trustedDir List<String>Patterns 
- List of trusted directory patterns. A pattern is in the form "registry/path/to/directory". The registry domain part is defined as two or more dot-separated words, e.g., us.pkg.dev, orgcr.io. Additionally,*can be used in three ways as wildcards: 1. leading*to match varying prefixes in registry subdomain (useful for location prefixes); 2. trailing*after registry/ to match varying endings; 3. trailing**after registry/ to match "/" as well. For example: --gcr.io/my-project/my-repois valid to match a single directory --*-docker.pkg.dev/my-project/my-repoor*.gcr.io/my-projectare valid to match varying prefixes --gcr.io/my-project/*will match all direct directories inmy-project--gcr.io/my-project/**would match all directories inmy-project--gcr.i*is not allowed since the registry is not completely specified --sub*domain.gcr.io/nginxis not valid because only leading*or trailing*are allowed. --*pkg.dev/my-project/my-repois not valid because leading*can only match subdomain --**-docker.pkg.devis not valid because one leading*is allowed, and that it cannot match/
- trustedDir string[]Patterns 
- List of trusted directory patterns. A pattern is in the form "registry/path/to/directory". The registry domain part is defined as two or more dot-separated words, e.g., us.pkg.dev, orgcr.io. Additionally,*can be used in three ways as wildcards: 1. leading*to match varying prefixes in registry subdomain (useful for location prefixes); 2. trailing*after registry/ to match varying endings; 3. trailing**after registry/ to match "/" as well. For example: --gcr.io/my-project/my-repois valid to match a single directory --*-docker.pkg.dev/my-project/my-repoor*.gcr.io/my-projectare valid to match varying prefixes --gcr.io/my-project/*will match all direct directories inmy-project--gcr.io/my-project/**would match all directories inmy-project--gcr.i*is not allowed since the registry is not completely specified --sub*domain.gcr.io/nginxis not valid because only leading*or trailing*are allowed. --*pkg.dev/my-project/my-repois not valid because leading*can only match subdomain --**-docker.pkg.devis not valid because one leading*is allowed, and that it cannot match/
- trusted_dir_ Sequence[str]patterns 
- List of trusted directory patterns. A pattern is in the form "registry/path/to/directory". The registry domain part is defined as two or more dot-separated words, e.g., us.pkg.dev, orgcr.io. Additionally,*can be used in three ways as wildcards: 1. leading*to match varying prefixes in registry subdomain (useful for location prefixes); 2. trailing*after registry/ to match varying endings; 3. trailing**after registry/ to match "/" as well. For example: --gcr.io/my-project/my-repois valid to match a single directory --*-docker.pkg.dev/my-project/my-repoor*.gcr.io/my-projectare valid to match varying prefixes --gcr.io/my-project/*will match all direct directories inmy-project--gcr.io/my-project/**would match all directories inmy-project--gcr.i*is not allowed since the registry is not completely specified --sub*domain.gcr.io/nginxis not valid because only leading*or trailing*are allowed. --*pkg.dev/my-project/my-repois not valid because leading*can only match subdomain --**-docker.pkg.devis not valid because one leading*is allowed, and that it cannot match/
- trustedDir List<String>Patterns 
- List of trusted directory patterns. A pattern is in the form "registry/path/to/directory". The registry domain part is defined as two or more dot-separated words, e.g., us.pkg.dev, orgcr.io. Additionally,*can be used in three ways as wildcards: 1. leading*to match varying prefixes in registry subdomain (useful for location prefixes); 2. trailing*after registry/ to match varying endings; 3. trailing**after registry/ to match "/" as well. For example: --gcr.io/my-project/my-repois valid to match a single directory --*-docker.pkg.dev/my-project/my-repoor*.gcr.io/my-projectare valid to match varying prefixes --gcr.io/my-project/*will match all direct directories inmy-project--gcr.io/my-project/**would match all directories inmy-project--gcr.i*is not allowed since the registry is not completely specified --sub*domain.gcr.io/nginxis not valid because only leading*or trailing*are allowed. --*pkg.dev/my-project/my-repois not valid because leading*can only match subdomain --**-docker.pkg.devis not valid because one leading*is allowed, and that it cannot match/
VerificationRuleResponse  
- AttestationSource Pulumi.Google Native. Binary Authorization. V1. Inputs. Attestation Source Response 
- Specifies where to fetch the provenances attestations generated by the builder (group).
- ConfigBased boolBuild Required 
- If true, require the image to be built from a top-level configuration. trusted_source_repo_patternsspecifies the repositories containing this configuration.
- TrustedBuilder string
- Each verification rule is used for evaluation against provenances generated by a specific builder (group). For some of the builders, such as the Google Cloud Build, users don't need to explicitly specify their roots of trust in the policy since the evaluation service can automatically fetch them based on the builder (group).
- TrustedSource List<string>Repo Patterns 
- List of trusted source code repository URL patterns. These patterns match the full repository URL without its scheme (e.g. https://). The patterns must not include schemes. For example, the patternsource.cloud.google.com/my-project/my-repo-namematches the following URLs: -source.cloud.google.com/my-project/my-repo-name-git+ssh://source.cloud.google.com/my-project/my-repo-name-https://source.cloud.google.com/my-project/my-repo-nameA pattern matches a URL either exactly or with*wildcards.*can be used in only two ways: 1. trailing*after hosturi/ to match varying endings; 2. trailing**after hosturi/ to match/as well.*and**can only be used as wildcards and can only occur at the end of the pattern after a/. (So it's not possible to match a URL that contains literal*.) For example: -github.com/my-project/my-repois valid to match a single repo -github.com/my-project/*will match all direct repos inmy-project-github.com/**matches all repos in GitHub
- AttestationSource AttestationSource Response 
- Specifies where to fetch the provenances attestations generated by the builder (group).
- ConfigBased boolBuild Required 
- If true, require the image to be built from a top-level configuration. trusted_source_repo_patternsspecifies the repositories containing this configuration.
- TrustedBuilder string
- Each verification rule is used for evaluation against provenances generated by a specific builder (group). For some of the builders, such as the Google Cloud Build, users don't need to explicitly specify their roots of trust in the policy since the evaluation service can automatically fetch them based on the builder (group).
- TrustedSource []stringRepo Patterns 
- List of trusted source code repository URL patterns. These patterns match the full repository URL without its scheme (e.g. https://). The patterns must not include schemes. For example, the patternsource.cloud.google.com/my-project/my-repo-namematches the following URLs: -source.cloud.google.com/my-project/my-repo-name-git+ssh://source.cloud.google.com/my-project/my-repo-name-https://source.cloud.google.com/my-project/my-repo-nameA pattern matches a URL either exactly or with*wildcards.*can be used in only two ways: 1. trailing*after hosturi/ to match varying endings; 2. trailing**after hosturi/ to match/as well.*and**can only be used as wildcards and can only occur at the end of the pattern after a/. (So it's not possible to match a URL that contains literal*.) For example: -github.com/my-project/my-repois valid to match a single repo -github.com/my-project/*will match all direct repos inmy-project-github.com/**matches all repos in GitHub
- attestationSource AttestationSource Response 
- Specifies where to fetch the provenances attestations generated by the builder (group).
- configBased BooleanBuild Required 
- If true, require the image to be built from a top-level configuration. trusted_source_repo_patternsspecifies the repositories containing this configuration.
- trustedBuilder String
- Each verification rule is used for evaluation against provenances generated by a specific builder (group). For some of the builders, such as the Google Cloud Build, users don't need to explicitly specify their roots of trust in the policy since the evaluation service can automatically fetch them based on the builder (group).
- trustedSource List<String>Repo Patterns 
- List of trusted source code repository URL patterns. These patterns match the full repository URL without its scheme (e.g. https://). The patterns must not include schemes. For example, the patternsource.cloud.google.com/my-project/my-repo-namematches the following URLs: -source.cloud.google.com/my-project/my-repo-name-git+ssh://source.cloud.google.com/my-project/my-repo-name-https://source.cloud.google.com/my-project/my-repo-nameA pattern matches a URL either exactly or with*wildcards.*can be used in only two ways: 1. trailing*after hosturi/ to match varying endings; 2. trailing**after hosturi/ to match/as well.*and**can only be used as wildcards and can only occur at the end of the pattern after a/. (So it's not possible to match a URL that contains literal*.) For example: -github.com/my-project/my-repois valid to match a single repo -github.com/my-project/*will match all direct repos inmy-project-github.com/**matches all repos in GitHub
- attestationSource AttestationSource Response 
- Specifies where to fetch the provenances attestations generated by the builder (group).
- configBased booleanBuild Required 
- If true, require the image to be built from a top-level configuration. trusted_source_repo_patternsspecifies the repositories containing this configuration.
- trustedBuilder string
- Each verification rule is used for evaluation against provenances generated by a specific builder (group). For some of the builders, such as the Google Cloud Build, users don't need to explicitly specify their roots of trust in the policy since the evaluation service can automatically fetch them based on the builder (group).
- trustedSource string[]Repo Patterns 
- List of trusted source code repository URL patterns. These patterns match the full repository URL without its scheme (e.g. https://). The patterns must not include schemes. For example, the patternsource.cloud.google.com/my-project/my-repo-namematches the following URLs: -source.cloud.google.com/my-project/my-repo-name-git+ssh://source.cloud.google.com/my-project/my-repo-name-https://source.cloud.google.com/my-project/my-repo-nameA pattern matches a URL either exactly or with*wildcards.*can be used in only two ways: 1. trailing*after hosturi/ to match varying endings; 2. trailing**after hosturi/ to match/as well.*and**can only be used as wildcards and can only occur at the end of the pattern after a/. (So it's not possible to match a URL that contains literal*.) For example: -github.com/my-project/my-repois valid to match a single repo -github.com/my-project/*will match all direct repos inmy-project-github.com/**matches all repos in GitHub
- attestation_source AttestationSource Response 
- Specifies where to fetch the provenances attestations generated by the builder (group).
- config_based_ boolbuild_ required 
- If true, require the image to be built from a top-level configuration. trusted_source_repo_patternsspecifies the repositories containing this configuration.
- trusted_builder str
- Each verification rule is used for evaluation against provenances generated by a specific builder (group). For some of the builders, such as the Google Cloud Build, users don't need to explicitly specify their roots of trust in the policy since the evaluation service can automatically fetch them based on the builder (group).
- trusted_source_ Sequence[str]repo_ patterns 
- List of trusted source code repository URL patterns. These patterns match the full repository URL without its scheme (e.g. https://). The patterns must not include schemes. For example, the patternsource.cloud.google.com/my-project/my-repo-namematches the following URLs: -source.cloud.google.com/my-project/my-repo-name-git+ssh://source.cloud.google.com/my-project/my-repo-name-https://source.cloud.google.com/my-project/my-repo-nameA pattern matches a URL either exactly or with*wildcards.*can be used in only two ways: 1. trailing*after hosturi/ to match varying endings; 2. trailing**after hosturi/ to match/as well.*and**can only be used as wildcards and can only occur at the end of the pattern after a/. (So it's not possible to match a URL that contains literal*.) For example: -github.com/my-project/my-repois valid to match a single repo -github.com/my-project/*will match all direct repos inmy-project-github.com/**matches all repos in GitHub
- attestationSource Property Map
- Specifies where to fetch the provenances attestations generated by the builder (group).
- configBased BooleanBuild Required 
- If true, require the image to be built from a top-level configuration. trusted_source_repo_patternsspecifies the repositories containing this configuration.
- trustedBuilder String
- Each verification rule is used for evaluation against provenances generated by a specific builder (group). For some of the builders, such as the Google Cloud Build, users don't need to explicitly specify their roots of trust in the policy since the evaluation service can automatically fetch them based on the builder (group).
- trustedSource List<String>Repo Patterns 
- List of trusted source code repository URL patterns. These patterns match the full repository URL without its scheme (e.g. https://). The patterns must not include schemes. For example, the patternsource.cloud.google.com/my-project/my-repo-namematches the following URLs: -source.cloud.google.com/my-project/my-repo-name-git+ssh://source.cloud.google.com/my-project/my-repo-name-https://source.cloud.google.com/my-project/my-repo-nameA pattern matches a URL either exactly or with*wildcards.*can be used in only two ways: 1. trailing*after hosturi/ to match varying endings; 2. trailing**after hosturi/ to match/as well.*and**can only be used as wildcards and can only occur at the end of the pattern after a/. (So it's not possible to match a URL that contains literal*.) For example: -github.com/my-project/my-repois valid to match a single repo -github.com/my-project/*will match all direct repos inmy-project-github.com/**matches all repos in GitHub
VulnerabilityCheckResponse  
- AllowedCves List<string>
- Optional. A list of specific CVEs to ignore even if the vulnerability level violates maximumUnfixableSeverityormaximumFixableSeverity. CVEs are listed in the format of Container Analysis note id. For example: - CVE-2021-20305 - CVE-2020-10543 The CVEs are applicable regardless of note provider project, e.g., an entry ofCVE-2021-20305will allow vulnerabilities with a note name of eitherprojects/goog-vulnz/notes/CVE-2021-20305orprojects/CUSTOM-PROJECT/notes/CVE-2021-20305.
- BlockedCves List<string>
- Optional. A list of specific CVEs to always raise warnings about even if the vulnerability level meets maximumUnfixableSeverityormaximumFixableSeverity. CVEs are listed in the format of Container Analysis note id. For example: - CVE-2021-20305 - CVE-2020-10543 The CVEs are applicable regardless of note provider project, e.g., an entry ofCVE-2021-20305will block vulnerabilities with a note name of eitherprojects/goog-vulnz/notes/CVE-2021-20305orprojects/CUSTOM-PROJECT/notes/CVE-2021-20305.
- ContainerAnalysis List<string>Vulnerability Projects 
- Optional. The projects where vulnerabilities are stored as Container Analysis Occurrences. Each project is expressed in the resource format of projects/[PROJECT_ID], e.g.,projects/my-gcp-project. An attempt will be made for each project to fetch vulnerabilities, and all valid vulnerabilities will be used to check against the vulnerability policy. If no valid scan is found in all projects configured here, an error will be returned for the check.
- MaximumFixable stringSeverity 
- The threshold for severity for which a fix is currently available. This field is required and must be set.
- MaximumUnfixable stringSeverity 
- The threshold for severity for which a fix isn't currently available. This field is required and must be set.
- AllowedCves []string
- Optional. A list of specific CVEs to ignore even if the vulnerability level violates maximumUnfixableSeverityormaximumFixableSeverity. CVEs are listed in the format of Container Analysis note id. For example: - CVE-2021-20305 - CVE-2020-10543 The CVEs are applicable regardless of note provider project, e.g., an entry ofCVE-2021-20305will allow vulnerabilities with a note name of eitherprojects/goog-vulnz/notes/CVE-2021-20305orprojects/CUSTOM-PROJECT/notes/CVE-2021-20305.
- BlockedCves []string
- Optional. A list of specific CVEs to always raise warnings about even if the vulnerability level meets maximumUnfixableSeverityormaximumFixableSeverity. CVEs are listed in the format of Container Analysis note id. For example: - CVE-2021-20305 - CVE-2020-10543 The CVEs are applicable regardless of note provider project, e.g., an entry ofCVE-2021-20305will block vulnerabilities with a note name of eitherprojects/goog-vulnz/notes/CVE-2021-20305orprojects/CUSTOM-PROJECT/notes/CVE-2021-20305.
- ContainerAnalysis []stringVulnerability Projects 
- Optional. The projects where vulnerabilities are stored as Container Analysis Occurrences. Each project is expressed in the resource format of projects/[PROJECT_ID], e.g.,projects/my-gcp-project. An attempt will be made for each project to fetch vulnerabilities, and all valid vulnerabilities will be used to check against the vulnerability policy. If no valid scan is found in all projects configured here, an error will be returned for the check.
- MaximumFixable stringSeverity 
- The threshold for severity for which a fix is currently available. This field is required and must be set.
- MaximumUnfixable stringSeverity 
- The threshold for severity for which a fix isn't currently available. This field is required and must be set.
- allowedCves List<String>
- Optional. A list of specific CVEs to ignore even if the vulnerability level violates maximumUnfixableSeverityormaximumFixableSeverity. CVEs are listed in the format of Container Analysis note id. For example: - CVE-2021-20305 - CVE-2020-10543 The CVEs are applicable regardless of note provider project, e.g., an entry ofCVE-2021-20305will allow vulnerabilities with a note name of eitherprojects/goog-vulnz/notes/CVE-2021-20305orprojects/CUSTOM-PROJECT/notes/CVE-2021-20305.
- blockedCves List<String>
- Optional. A list of specific CVEs to always raise warnings about even if the vulnerability level meets maximumUnfixableSeverityormaximumFixableSeverity. CVEs are listed in the format of Container Analysis note id. For example: - CVE-2021-20305 - CVE-2020-10543 The CVEs are applicable regardless of note provider project, e.g., an entry ofCVE-2021-20305will block vulnerabilities with a note name of eitherprojects/goog-vulnz/notes/CVE-2021-20305orprojects/CUSTOM-PROJECT/notes/CVE-2021-20305.
- containerAnalysis List<String>Vulnerability Projects 
- Optional. The projects where vulnerabilities are stored as Container Analysis Occurrences. Each project is expressed in the resource format of projects/[PROJECT_ID], e.g.,projects/my-gcp-project. An attempt will be made for each project to fetch vulnerabilities, and all valid vulnerabilities will be used to check against the vulnerability policy. If no valid scan is found in all projects configured here, an error will be returned for the check.
- maximumFixable StringSeverity 
- The threshold for severity for which a fix is currently available. This field is required and must be set.
- maximumUnfixable StringSeverity 
- The threshold for severity for which a fix isn't currently available. This field is required and must be set.
- allowedCves string[]
- Optional. A list of specific CVEs to ignore even if the vulnerability level violates maximumUnfixableSeverityormaximumFixableSeverity. CVEs are listed in the format of Container Analysis note id. For example: - CVE-2021-20305 - CVE-2020-10543 The CVEs are applicable regardless of note provider project, e.g., an entry ofCVE-2021-20305will allow vulnerabilities with a note name of eitherprojects/goog-vulnz/notes/CVE-2021-20305orprojects/CUSTOM-PROJECT/notes/CVE-2021-20305.
- blockedCves string[]
- Optional. A list of specific CVEs to always raise warnings about even if the vulnerability level meets maximumUnfixableSeverityormaximumFixableSeverity. CVEs are listed in the format of Container Analysis note id. For example: - CVE-2021-20305 - CVE-2020-10543 The CVEs are applicable regardless of note provider project, e.g., an entry ofCVE-2021-20305will block vulnerabilities with a note name of eitherprojects/goog-vulnz/notes/CVE-2021-20305orprojects/CUSTOM-PROJECT/notes/CVE-2021-20305.
- containerAnalysis string[]Vulnerability Projects 
- Optional. The projects where vulnerabilities are stored as Container Analysis Occurrences. Each project is expressed in the resource format of projects/[PROJECT_ID], e.g.,projects/my-gcp-project. An attempt will be made for each project to fetch vulnerabilities, and all valid vulnerabilities will be used to check against the vulnerability policy. If no valid scan is found in all projects configured here, an error will be returned for the check.
- maximumFixable stringSeverity 
- The threshold for severity for which a fix is currently available. This field is required and must be set.
- maximumUnfixable stringSeverity 
- The threshold for severity for which a fix isn't currently available. This field is required and must be set.
- allowed_cves Sequence[str]
- Optional. A list of specific CVEs to ignore even if the vulnerability level violates maximumUnfixableSeverityormaximumFixableSeverity. CVEs are listed in the format of Container Analysis note id. For example: - CVE-2021-20305 - CVE-2020-10543 The CVEs are applicable regardless of note provider project, e.g., an entry ofCVE-2021-20305will allow vulnerabilities with a note name of eitherprojects/goog-vulnz/notes/CVE-2021-20305orprojects/CUSTOM-PROJECT/notes/CVE-2021-20305.
- blocked_cves Sequence[str]
- Optional. A list of specific CVEs to always raise warnings about even if the vulnerability level meets maximumUnfixableSeverityormaximumFixableSeverity. CVEs are listed in the format of Container Analysis note id. For example: - CVE-2021-20305 - CVE-2020-10543 The CVEs are applicable regardless of note provider project, e.g., an entry ofCVE-2021-20305will block vulnerabilities with a note name of eitherprojects/goog-vulnz/notes/CVE-2021-20305orprojects/CUSTOM-PROJECT/notes/CVE-2021-20305.
- container_analysis_ Sequence[str]vulnerability_ projects 
- Optional. The projects where vulnerabilities are stored as Container Analysis Occurrences. Each project is expressed in the resource format of projects/[PROJECT_ID], e.g.,projects/my-gcp-project. An attempt will be made for each project to fetch vulnerabilities, and all valid vulnerabilities will be used to check against the vulnerability policy. If no valid scan is found in all projects configured here, an error will be returned for the check.
- maximum_fixable_ strseverity 
- The threshold for severity for which a fix is currently available. This field is required and must be set.
- maximum_unfixable_ strseverity 
- The threshold for severity for which a fix isn't currently available. This field is required and must be set.
- allowedCves List<String>
- Optional. A list of specific CVEs to ignore even if the vulnerability level violates maximumUnfixableSeverityormaximumFixableSeverity. CVEs are listed in the format of Container Analysis note id. For example: - CVE-2021-20305 - CVE-2020-10543 The CVEs are applicable regardless of note provider project, e.g., an entry ofCVE-2021-20305will allow vulnerabilities with a note name of eitherprojects/goog-vulnz/notes/CVE-2021-20305orprojects/CUSTOM-PROJECT/notes/CVE-2021-20305.
- blockedCves List<String>
- Optional. A list of specific CVEs to always raise warnings about even if the vulnerability level meets maximumUnfixableSeverityormaximumFixableSeverity. CVEs are listed in the format of Container Analysis note id. For example: - CVE-2021-20305 - CVE-2020-10543 The CVEs are applicable regardless of note provider project, e.g., an entry ofCVE-2021-20305will block vulnerabilities with a note name of eitherprojects/goog-vulnz/notes/CVE-2021-20305orprojects/CUSTOM-PROJECT/notes/CVE-2021-20305.
- containerAnalysis List<String>Vulnerability Projects 
- Optional. The projects where vulnerabilities are stored as Container Analysis Occurrences. Each project is expressed in the resource format of projects/[PROJECT_ID], e.g.,projects/my-gcp-project. An attempt will be made for each project to fetch vulnerabilities, and all valid vulnerabilities will be used to check against the vulnerability policy. If no valid scan is found in all projects configured here, an error will be returned for the check.
- maximumFixable StringSeverity 
- The threshold for severity for which a fix is currently available. This field is required and must be set.
- maximumUnfixable StringSeverity 
- The threshold for severity for which a fix isn't currently available. This field is required and must be set.
Package Details
- Repository
- Google Cloud Native pulumi/pulumi-google-native
- License
- Apache-2.0
Google Cloud Native is in preview. Google Cloud Classic is fully supported.
Google Cloud Native v0.32.0 published on Wednesday, Nov 29, 2023 by Pulumi