The management interface for Binary Authorization, a service that provides policy-based deployment validation and control for images deployed to Google Kubernetes Engine (GKE), Anthos Service Mesh, Anthos Clusters, and Cloud Run.
To call this service, we recommend that you use the Google-provided client libraries. If your application needs to use your own libraries to call this service, use the following information when you make the API requests.
Discovery documentA Discovery Document is a machine-readable specification for describing and consuming REST APIs. It is used to build client libraries, IDE plugins, and other tools that interact with Google APIs. One service may provide multiple discovery documents. This service provides the following discovery documents:
A service endpoint is a base URL that specifies the network address of an API service. One service might have multiple service endpoints. This service has the following service endpoint and all URIs below are relative to this service endpoint:
https://binaryauthorization.googleapis.com
getPolicy
GET /v1beta1/{name=projects/*/policy}
policy
specifies the attestors
that must attest to a container image, before the project is allowed to deploy that image. updatePolicy
PUT /v1beta1/{policy.name=projects/*/policy}
policy
, and returns a copy of the new policy
. REST Resource: v1beta1.projects.attestors Methods create
POST /v1beta1/{parent=projects/*}/attestors
attestor
, and returns a copy of the new attestor
. delete
DELETE /v1beta1/{name=projects/*/attestors/*}
attestor
. get
GET /v1beta1/{name=projects/*/attestors/*}
attestor
. getIamPolicy
GET /v1beta1/{resource=projects/*/attestors/*}:getIamPolicy
list
GET /v1beta1/{parent=projects/*}/attestors
attestors
. setIamPolicy
POST /v1beta1/{resource=projects/*/attestors/*}:setIamPolicy
testIamPermissions
POST /v1beta1/{resource=projects/*/attestors/*}:testIamPermissions
update
PUT /v1beta1/{attestor.name=projects/*/attestors/*}
attestor
. validateAttestationOccurrence
POST /v1beta1/{attestor=projects/*/attestors/*}:validateAttestationOccurrence
Attestation
for the given image URI was signed by the given Attestor
REST Resource: v1beta1.projects.policy Methods getIamPolicy
GET /v1beta1/{resource=projects/*/policy}:getIamPolicy
setIamPolicy
POST /v1beta1/{resource=projects/*/policy}:setIamPolicy
testIamPermissions
POST /v1beta1/{resource=projects/*/policy}:testIamPermissions
getPolicy
GET /v1beta1/{name=locations/*/policy}
create
POST /v1alpha2/{parent=projects/*}/attestors
attestor
, and returns a copy of the new attestor
. delete
DELETE /v1alpha2/{name=projects/*/attestors/*}
attestor
. get
GET /v1alpha2/{name=projects/*/attestors/*}
attestor
. getIamPolicy
GET /v1alpha2/{resource=projects/*/attestors/*}:getIamPolicy
list
GET /v1alpha2/{parent=projects/*}/attestors
attestors
. setIamPolicy
POST /v1alpha2/{resource=projects/*/attestors/*}:setIamPolicy
testIamPermissions
POST /v1alpha2/{resource=projects/*/attestors/*}:testIamPermissions
update
PUT /v1alpha2/{attestor.name=projects/*/attestors/*}
attestor
. validateAttestationOccurrence
POST /v1alpha2/{attestor=projects/*/attestors/*}:validateAttestationOccurrence
Attestation
for the given image URI was signed by the given Attestor
REST Resource: v1alpha2.projects.attestors.attestations Methods testIamPermissions
POST /v1alpha2/{resource=projects/*/attestors/*/attestations/*}:testIamPermissions
getIamPolicy
GET /v1alpha2/{resource=projects/*/continuousValidationConfig}:getIamPolicy
setIamPolicy
POST /v1alpha2/{resource=projects/*/continuousValidationConfig}:setIamPolicy
testIamPermissions
POST /v1alpha2/{resource=projects/*/continuousValidationConfig}:testIamPermissions
getIamPolicy
GET /v1alpha2/{resource=projects/*/policy}:getIamPolicy
setIamPolicy
POST /v1alpha2/{resource=projects/*/policy}:setIamPolicy
testIamPermissions
POST /v1alpha2/{resource=projects/*/policy}:testIamPermissions
getPolicy
GET /v1alpha2/{name=locations/*/policy}
getPolicy
GET /v1/{name=projects/*/policy}
policy
specifies the attestors
that must attest to a container image, before the project is allowed to deploy that image. updatePolicy
PUT /v1/{policy.name=projects/*/policy}
policy
, and returns a copy of the new policy
. REST Resource: v1.projects.attestors Methods create
POST /v1/{parent=projects/*}/attestors
attestor
, and returns a copy of the new attestor
. delete
DELETE /v1/{name=projects/*/attestors/*}
attestor
. get
GET /v1/{name=projects/*/attestors/*}
attestor
. getIamPolicy
GET /v1/{resource=projects/*/attestors/*}:getIamPolicy
list
GET /v1/{parent=projects/*}/attestors
attestors
. setIamPolicy
POST /v1/{resource=projects/*/attestors/*}:setIamPolicy
testIamPermissions
POST /v1/{resource=projects/*/attestors/*}:testIamPermissions
update
PUT /v1/{attestor.name=projects/*/attestors/*}
attestor
. validateAttestationOccurrence
POST /v1/{attestor=projects/*/attestors/*}:validateAttestationOccurrence
Attestation
for the given image URI was signed by the given Attestor
REST Resource: v1.projects.platforms.gke.policies Methods evaluate
POST /v1/{name=projects/*/platforms/gke/policies/*}:evaluate
platform policy
. REST Resource: v1.projects.platforms.policies REST Resource: v1.projects.policy Methods getIamPolicy
GET /v1/{resource=projects/*/policy}:getIamPolicy
setIamPolicy
POST /v1/{resource=projects/*/policy}:setIamPolicy
testIamPermissions
POST /v1/{resource=projects/*/policy}:testIamPermissions
getPolicy
GET /v1/{name=locations/*/policy}
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4