@@ -361,8 +361,9 @@ responsibilities across resources. The resources involved are:
361
361
362
362
![ Relatinships between policy resources] ( erd.png )
363
363
364
- This allows for a N: N relationship between policy definitions and the configuration of those policies. This separation has already been
365
- demonstrated successfully by multiple policy frameworks (see the survey further down in this KEP). It has a few key properties:
364
+ This separation has already been demonstrated successfully by multiple policy
365
+ frameworks (see the survey further down in this KEP). It has a few key
366
+ properties:
366
367
367
368
- Reduces total amount of resource data needed to manage policies:
368
369
- Params can be shared across multiple policies instead of copied. Multiple
@@ -474,6 +475,7 @@ spec:
474
475
- key: environment,
475
476
operator: NotIn,
476
477
values: ["test"]
478
+ mode: Enabled
477
479
` ` `
478
480
479
481
` ` ` yaml
@@ -500,6 +502,7 @@ spec:
500
502
namespaceSelectors:
501
503
- key: environment,
502
504
operator: Exists
505
+ mode: Enabled
503
506
` ` `
504
507
505
508
With this binding, the test and global policy bindings overlap. Resources
@@ -1018,7 +1021,7 @@ spec:
1018
1021
- expression: "object.spec.replicas < 100"
1019
1022
singletonBinding:
1020
1023
matchResources: ...
1021
- enablement : Enabled
1024
+ mode : Enabled
1022
1025
` ` `
1023
1026
1024
1027
Note that :
@@ -1532,8 +1535,8 @@ functions like `labelSelector.match()`.
1532
1535
# ### Use Case: Fine grained control of enforcement
1533
1536
1534
1537
Policy author wishes to define a policy where the cluster administrator is able
1535
- to configure if the policy is enforced by a deny or if it is only ever used to
1536
- emit a warning .
1538
+ to configure how a policy is enforced by defining a series of progressively
1539
+ stricter levels .
1537
1540
1538
1541
Multiple copies of the same expression can be used, each guarded by a params
1539
1542
check :
0 commit comments