mirror of https://github.com/docker/docs.git
Update admission-controllers.md
This commit is contained in:
parent
08f75af4fa
commit
52b85594a5
|
|
@ -30,16 +30,16 @@ correctly removed from UCP's Node scheduling authorization backend.
|
|||
- Simplifies creation of `RoleBindings` and `ClusterRoleBindings` resources by
|
||||
automatically converting user, organization, and team Subject names into
|
||||
their corresponding unique identifiers.
|
||||
- Prevents users from deleting the builtin `cluster-admin` `ClusterRole` or
|
||||
- Prevents users from deleting the built-in `cluster-admin` `ClusterRole` or
|
||||
`ClusterRoleBinding` resources.
|
||||
- Prevents under-privileged users from creating or updating `PersistintVolume`
|
||||
resources with host paths.
|
||||
- Works in conjunction with the builtin `PodSecurityPolicies` admission
|
||||
- Works in conjunction with the built-in `PodSecurityPolicies` admission
|
||||
controller to prevent under-privileged users from creating `Pods` with
|
||||
privileged options.
|
||||
- **CheckImageSigning**
|
||||
Enforces UCP's Docker Content Trust policy which, if enabled, requires that all
|
||||
Pods use container images which have been digitally signed by trusted and
|
||||
pods use container images which have been digitally signed by trusted and
|
||||
authorized users which are members of one or more teams in UCP.
|
||||
- **UCPNodeSelector**
|
||||
Adds a `com.docker.ucp.orchestrator.kubernetes:*` toleration to pods in the
|
||||
|
|
@ -50,6 +50,6 @@ not run on swarm-only nodes, which UCP taints with
|
|||
affinity to prevent pods from running on manager nodes depending on UCP's
|
||||
settings.
|
||||
|
||||
**Note:** you cannot enable or disable your own admission controllers. For more information about why, see [Supportability of custom kubernetes flags in universal control plane](https://success.docker.com/article/supportability-of-custom-kubernetes-flags-in-universal-control-plane)
|
||||
**Note:** you cannot enable or disable your own admission controllers. For more information, see [Supportability of custom kubernetes flags in universal control plane](https://success.docker.com/article/supportability-of-custom-kubernetes-flags-in-universal-control-plane)
|
||||
|
||||
For more information about pod security policies in Docker, see [Pod security policies](/ee/ucp/kubernetes/pod-security-policies.md).
|
||||
For more information about pod security policies in Docker, see [Pod security policies](/ee/ucp/kubernetes/pod-security-policies.md).
|
||||
|
|
|
|||
Loading…
Reference in New Issue