# Google Cloud Artifact Registry Module This module simplifies the creation of a Binary Authorization policy, attestors and attestor IAM bindings. ## Example ### Binary Authorization ```hcl module "binauthz" { source = "./fabric/modules/binauthz" project_id = "my_project" global_policy_evaluation_mode = "DISABLE" default_admission_rule = { evaluation_mode = "ALWAYS_DENY" enforcement_mode = "ENFORCED_BLOCK_AND_AUDIT_LOG" attestors = null } cluster_admission_rules = { "europe-west1-c.cluster" = { evaluation_mode = "REQUIRE_ATTESTATION" enforcement_mode = "ENFORCED_BLOCK_AND_AUDIT_LOG" attestors = ["test"] } } attestors_config = { "test" : { note_reference = null pgp_public_keys = [ < ## Variables | name | description | type | required | default | |---|---|:---:|:---:|:---:| | [project_id](variables.tf#L68) | Project ID. | string | ✓ | | | [admission_whitelist_patterns](variables.tf#L17) | An image name pattern to allowlist. | list(string) | | null | | [attestors_config](variables.tf#L23) | Attestors configuration. | map(object({…})) | | null | | [cluster_admission_rules](variables.tf#L38) | Admission rules. | map(object({…})) | | null | | [default_admission_rule](variables.tf#L48) | Default admission rule. | object({…}) | | {…} | | [global_policy_evaluation_mode](variables.tf#L62) | Global policy evaluation mode. | string | | null | ## Outputs | name | description | sensitive | |---|---|:---:| | [attestors](outputs.tf#L17) | Attestors. | | | [id](outputs.tf#L25) | Fully qualified Binary Authorization policy ID. | | | [notes](outputs.tf#L30) | Notes. | |