-
Notifications
You must be signed in to change notification settings - Fork 52
/
kustomization.yaml
49 lines (49 loc) · 1.68 KB
/
kustomization.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
# Copyright 2024 Google LLC
#
# This is “Software” that is licensed under the “General Software” section of
# the Service Specific Terms (https://cloud.google.com/terms/service-terms) for
# usage in accordance with the following “Scope of Use”: This file may only be
# used on an Anthos cluster, including any associated ci/cd use. “Anthos
# cluster” is defined as “A Cluster (of any kind) registered to a fleet project
# where the Anthos API is enabled”.
apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization
resources:
- apparmor.yaml
- capabilities.yaml
- host-namespace.yaml
- host-port.yaml
- host_namespaces_hostnetwork.yaml
- hostpath-volumes.yaml
- hostprocess.yaml
- privileged-containers.yaml
- proc_mount_type.yaml
- require-binauthz.yaml
- require-cos-node-image.yaml
- require-gke-metadata-server-enabled.yaml
- require-ingress.class-gce.yaml
- require-managed-certificates.yaml
- require-namespace-networkpolicy.yaml
- require-seccomp-default.yaml
- require-securitycontext.yaml
- restrict-automountserviceaccounttoken.yaml
- restrict-bind-escalate-impersonate.yaml
- restrict-certificatesigningrequests-approval.yaml
- restrict-cluster-admin-role.yaml
- restrict-creation-with-default-serviceaccount.yaml
- restrict-default-namespace.yaml
- restrict-env-var-secrets.yaml
- restrict-loadbalancer.yaml
- restrict-nodes-proxy.yaml
- restrict-persistent-volume.yaml
- restrict-pods-create.yaml
- restrict-rbac-subjects.yaml
- restrict-role-secrets.yaml
- restrict-role-wildcards.yaml
- restrict-secrets-of-type-basic-auth.yaml
- restrict-serviceaccounts-token.yaml
- restrict-system-masters-group.yaml
- restrict-webhook-config.yaml
- seccomp.yaml
- selinux.yaml
- sysctls.yaml