Updates the blocking rule for at-risk images.
Debugging
Authorization information
The following table shows the authorization information corresponding to the API. The authorization information can be used in the Action
policy element to grant a RAM user or RAM role the permissions to call this API operation. Description:
- Operation: the value that you can use in the Action element to specify the operation on a resource.
- Access level: the access level of each operation. The levels are read, write, and list.
- Resource type: the type of the resource on which you can authorize the RAM user or the RAM role to perform the operation. Take note of the following items:
- The required resource types are displayed in bold characters.
- If the permissions cannot be granted at the resource level,
All Resources
is used in the Resource type column of the operation.
- Condition Key: the condition key that is defined by the cloud service.
- Associated operation: other operations that the RAM user or the RAM role must have permissions to perform to complete the operation. To complete the operation, the RAM user or the RAM role must have the permissions to perform the associated operations.
Operation | Access level | Resource type | Condition key | Associated operation |
---|---|---|---|---|
yundun-sas:UpdateOpaStrategyNew | update | *All Resources * |
| none |
Request parameters
Parameter | Type | Required | Description | Example |
---|---|---|---|---|
StrategyId | long | No | The ID of the rule. Note
You can call the ListOpaClusterStrategyNew operation to query the ID.
| 1003 |
StrategyTemplateId | long | No | The ID of the rule template. Note
You can call the GetOpaStrategyTemplateSummary operation to query the ID of the rule template.
| 109 |
ClusterId | string | No | The cluster ID. Note
This parameter is deprecated. You can use the Scopes parameter to specify a scope in which cluster parameters take effect.
| c870ec78ecbcb41d2a35c679823ef**** |
StrategyName | string | No | The rule name. | test |
Description | string | No | The rule description. | 4566 |
ClusterName | string | No | The cluster name. Note
This parameter is deprecated.
| docker-law |
UnScanedImage | boolean | No | Specifies whether the rule supports unscanned images. Valid values:
| true |
MaliciousImage | boolean | No | Specifies whether the rule supports malicious Internet images. Valid values:
| true |
ImageName | array | No | The image names. | |
ImageName | string | No | The image name. Note
You can call the GetOpaClusterImageList operation to query the image name.
| muximux:latest |
Label | array | No | The image tags. | |
Label | string | No | The image tag. Note
You can call the GetOpaClusterLabelList operation to query the image tag.
| alertmanager:main |
RuleAction | integer | No | The action that is performed when the rule is hit. Valid values:
| 1 |
WhiteList | array | No | The whitelists. | |
WhiteList | string | No | The name of the image that is added to the whitelist. | repo-016 |
AlarmDetail | object | No | The risks that you want to detect by using the rule. | |
Baseline | object | No | The baseline risks. | |
RiskLevel | array | No | The risk levels. | |
RiskLevel | string | No | The risk level. Valid values:
| medium |
Item | array<object> | No | The baseline check items. | |
Item | object | No | ||
Id | string | No | The ID of the baseline check item. Note
You can call the GetOpaClusterBaseLineList operation to query the ID.
| hc.image.checklist.identify.hc_exploit_couchdb_linux.item |
Name | string | No | The name of the baseline check item. Note
You can call the GetOpaClusterBaseLineList operation to query the name.
| passwd |
Vul | object | No | The vulnerability risks. | |
RiskLevel | array | No | The risk levels. | |
RiskLevel | string | No | The risk level. Valid values:
| high |
Item | array<object> | No | The vulnerabilities. | |
Item | object | No | ||
Id | string | No | The ID of the vulnerability. Note
You can call the DescribeVulListPage operation to query the ID.
| CVE-2023-36034 |
Name | string | No | The name of the vulnerability. Note
You can call the DescribeVulListPage operation to query the name.
| oval:com.redhat.rhsa:def:20227002 |
RiskClass | array<object> | No | Risk type of vulnerability. | |
Item | object | No | ||
Id | string | No | The ID of the vulnerability types. Valid values:
| cve |
Name | string | No | The name of the vulnerability. Valid values:
| system vulnerability |
MaliciousFile | object | No | The malicious sample risks. | |
RiskLevel | array | No | The risk levels. | |
RiskLevel | string | No | The risk level. Valid values:
| medium |
Item | array<object> | No | The malicious samples. | |
Item | object | No | ||
Id | string | No | The ID of the malicious sample. Note
You can call the DescribeMatchedMaliciousNames operation to query the ID.
| 65201 |
Name | string | No | The name of the malicious sample. Note
You can call the DescribeMatchedMaliciousNames operation to query the name.
| abnormal binary file |
SensitiveFile | object | No | The configuration of sensitive file. | |
RiskLevel | array | No | The risk levels. | |
RiskLevel | string | No | The risk level. Valid values:
| high |
Item | array<object> | No | The configuration of sensitive file. | |
Item | object | No | ||
Id | string | No | The ID of the sensitive files. Note
You can call the GetSensitiveDefineRuleConfig operation to query the ID of the malicious sample.
| key |
Name | string | No | The name of the sensitive files. Note
You can call the GetSensitiveDefineRuleConfig operation to query the ID of the malicious sample.
| name |
BuildRisk | object | No | The configuration of image build risk. | |
RiskLevel | array | No | The risk levels. | |
RiskLevel | string | No | The risk level. Valid values:
| high |
Item | array<object> | No | The configuration of image build risk. | |
Item | object | No | ||
Id | string | No | The ID of the image build risk. Note
You can call the ListImageBuildRiskItem operation to query the ID of the malicious sample.
| key |
Name | string | No | The name of the image build risk. Note
You can call the ListImageBuildRiskItem operation to query the ID of the malicious sample.
| name |
Scopes | array<object> | No | The application scope. | |
Scope | object | No | ||
ClusterId | string | No | The cluster ID. Note
You can call the DescribeGroupedContainerInstances operation to query the cluster ID.
| cdcb56a931c** |
AllNamespace | integer | No | Specifies whether all namespaces are included. Valid values:
| 1 |
NamespaceList | array | No | The namespaces. Note
This parameter is valid only when the AllNamespace parameter is set to 0.
| |
NamespaceList | string | No | The namespaces. | m1 |
AckPolicyInstanceId | string | No | The ID of the cluster node to which the rule is applied. Note
You can call the GetOpaStrategyDetailNew operation to query the ID of the cluster node to which the rule is applied.
| ack-1 |
Response parameters
Examples
Sample success responses
JSON
format
{
"Success": true,
"Code": "200",
"Message": "success",
"RequestId": "F75B5FF5-DCB2-59CE-8978-08510707A9E6",
"HttpStatusCode": 200,
"Data": [
"['c8d**7614df1bf']"
]
}
Error codes
HTTP status code | Error code | Error message | Description |
---|---|---|---|
403 | NoPermission | caller has no permission | You are not authorized to do this operation. |
500 | ServerError | ServerError | - |
For a list of error codes, visit the Service error codes.
Change history
Change time | Summary of changes | Operation |
---|---|---|
2023-12-22 | The Error code has changed | View Change Details |