mirror of https://github.com/docker/docs.git
Update admission-controllers.md
This commit is contained in:
parent
08f75af4fa
commit
52b85594a5
|
|
@ -30,16 +30,16 @@ correctly removed from UCP's Node scheduling authorization backend.
|
||||||
- Simplifies creation of `RoleBindings` and `ClusterRoleBindings` resources by
|
- Simplifies creation of `RoleBindings` and `ClusterRoleBindings` resources by
|
||||||
automatically converting user, organization, and team Subject names into
|
automatically converting user, organization, and team Subject names into
|
||||||
their corresponding unique identifiers.
|
their corresponding unique identifiers.
|
||||||
- Prevents users from deleting the builtin `cluster-admin` `ClusterRole` or
|
- Prevents users from deleting the built-in `cluster-admin` `ClusterRole` or
|
||||||
`ClusterRoleBinding` resources.
|
`ClusterRoleBinding` resources.
|
||||||
- Prevents under-privileged users from creating or updating `PersistintVolume`
|
- Prevents under-privileged users from creating or updating `PersistintVolume`
|
||||||
resources with host paths.
|
resources with host paths.
|
||||||
- Works in conjunction with the builtin `PodSecurityPolicies` admission
|
- Works in conjunction with the built-in `PodSecurityPolicies` admission
|
||||||
controller to prevent under-privileged users from creating `Pods` with
|
controller to prevent under-privileged users from creating `Pods` with
|
||||||
privileged options.
|
privileged options.
|
||||||
- **CheckImageSigning**
|
- **CheckImageSigning**
|
||||||
Enforces UCP's Docker Content Trust policy which, if enabled, requires that all
|
Enforces UCP's Docker Content Trust policy which, if enabled, requires that all
|
||||||
Pods use container images which have been digitally signed by trusted and
|
pods use container images which have been digitally signed by trusted and
|
||||||
authorized users which are members of one or more teams in UCP.
|
authorized users which are members of one or more teams in UCP.
|
||||||
- **UCPNodeSelector**
|
- **UCPNodeSelector**
|
||||||
Adds a `com.docker.ucp.orchestrator.kubernetes:*` toleration to pods in the
|
Adds a `com.docker.ucp.orchestrator.kubernetes:*` toleration to pods in the
|
||||||
|
|
@ -50,6 +50,6 @@ not run on swarm-only nodes, which UCP taints with
|
||||||
affinity to prevent pods from running on manager nodes depending on UCP's
|
affinity to prevent pods from running on manager nodes depending on UCP's
|
||||||
settings.
|
settings.
|
||||||
|
|
||||||
**Note:** you cannot enable or disable your own admission controllers. For more information about why, see [Supportability of custom kubernetes flags in universal control plane](https://success.docker.com/article/supportability-of-custom-kubernetes-flags-in-universal-control-plane)
|
**Note:** you cannot enable or disable your own admission controllers. For more information, see [Supportability of custom kubernetes flags in universal control plane](https://success.docker.com/article/supportability-of-custom-kubernetes-flags-in-universal-control-plane)
|
||||||
|
|
||||||
For more information about pod security policies in Docker, see [Pod security policies](/ee/ucp/kubernetes/pod-security-policies.md).
|
For more information about pod security policies in Docker, see [Pod security policies](/ee/ucp/kubernetes/pod-security-policies.md).
|
||||||
Loading…
Reference in New Issue