diff --git a/assets/rancher-compliance-crd/rancher-compliance-crd-107.2.0+up1.2.0-rc.1.tgz b/assets/rancher-compliance-crd/rancher-compliance-crd-107.2.0+up1.2.0-rc.1.tgz new file mode 100644 index 00000000000..36debb67922 Binary files /dev/null and b/assets/rancher-compliance-crd/rancher-compliance-crd-107.2.0+up1.2.0-rc.1.tgz differ diff --git a/assets/rancher-compliance/rancher-compliance-107.2.0+up1.2.0-rc.1.tgz b/assets/rancher-compliance/rancher-compliance-107.2.0+up1.2.0-rc.1.tgz new file mode 100644 index 00000000000..daa571febe3 Binary files /dev/null and b/assets/rancher-compliance/rancher-compliance-107.2.0+up1.2.0-rc.1.tgz differ diff --git a/charts/rancher-compliance-crd/107.2.0+up1.2.0-rc.1/Chart.yaml b/charts/rancher-compliance-crd/107.2.0+up1.2.0-rc.1/Chart.yaml new file mode 100644 index 00000000000..39840f0cb68 --- /dev/null +++ b/charts/rancher-compliance-crd/107.2.0+up1.2.0-rc.1/Chart.yaml @@ -0,0 +1,10 @@ +annotations: + catalog.cattle.io/certified: rancher + catalog.cattle.io/hidden: "true" + catalog.cattle.io/namespace: compliance-operator-system + catalog.cattle.io/release-name: rancher-compliance-crd +apiVersion: v1 +description: Installs the CRDs for rancher-compliance. +name: rancher-compliance-crd +type: application +version: 107.2.0+up1.2.0-rc.1 diff --git a/charts/rancher-compliance-crd/107.2.0+up1.2.0-rc.1/README.md b/charts/rancher-compliance-crd/107.2.0+up1.2.0-rc.1/README.md new file mode 100644 index 00000000000..bac3fb853bf --- /dev/null +++ b/charts/rancher-compliance-crd/107.2.0+up1.2.0-rc.1/README.md @@ -0,0 +1,2 @@ +# rancher-compliance-crd +A Rancher chart that installs the CRDs used by rancher-compliance. diff --git a/charts/rancher-compliance-crd/107.2.0+up1.2.0-rc.1/templates/clusterscan.yaml b/charts/rancher-compliance-crd/107.2.0+up1.2.0-rc.1/templates/clusterscan.yaml new file mode 100644 index 00000000000..f48eb579ce8 --- /dev/null +++ b/charts/rancher-compliance-crd/107.2.0+up1.2.0-rc.1/templates/clusterscan.yaml @@ -0,0 +1,149 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + name: clusterscans.compliance.cattle.io +spec: + group: compliance.cattle.io + names: + kind: ClusterScan + plural: clusterscans + singular: clusterscan + scope: Cluster + versions: + - additionalPrinterColumns: + - jsonPath: .status.lastRunScanProfileName + name: ClusterScanProfile + type: string + - jsonPath: .status.summary.total + name: Total + type: string + - jsonPath: .status.summary.pass + name: Pass + type: string + - jsonPath: .status.summary.fail + name: Fail + type: string + - jsonPath: .status.summary.skip + name: Skip + type: string + - jsonPath: .status.summary.warn + name: Warn + type: string + - jsonPath: .status.summary.notApplicable + name: Not Applicable + type: string + - jsonPath: .status.lastRunTimestamp + name: LastRunTimestamp + type: string + - jsonPath: .spec.scheduledScanConfig.cronSchedule + name: CronSchedule + type: string + name: v1 + schema: + openAPIV3Schema: + properties: + spec: + properties: + scanProfileName: + nullable: true + type: string + scheduledScanConfig: + nullable: true + properties: + cronSchedule: + nullable: true + type: string + retentionCount: + type: integer + scanAlertRule: + nullable: true + properties: + alertOnComplete: + type: boolean + alertOnFailure: + type: boolean + type: object + type: object + scoreWarning: + enum: + - pass + - fail + nullable: true + type: string + type: object + status: + properties: + NextScanAt: + nullable: true + type: string + ScanAlertingRuleName: + nullable: true + type: string + conditions: + items: + properties: + lastTransitionTime: + nullable: true + type: string + lastUpdateTime: + nullable: true + type: string + message: + nullable: true + type: string + reason: + nullable: true + type: string + status: + nullable: true + type: string + type: + nullable: true + type: string + type: object + nullable: true + type: array + display: + nullable: true + properties: + error: + type: boolean + message: + nullable: true + type: string + state: + nullable: true + type: string + transitioning: + type: boolean + type: object + lastRunScanProfileName: + nullable: true + type: string + lastRunTimestamp: + nullable: true + type: string + observedGeneration: + type: integer + summary: + nullable: true + properties: + fail: + type: integer + notApplicable: + type: integer + pass: + type: integer + skip: + type: integer + total: + type: integer + warn: + type: integer + type: object + type: object + type: object + served: true + storage: true + subresources: + status: {} diff --git a/charts/rancher-compliance-crd/107.2.0+up1.2.0-rc.1/templates/clusterscanbenchmark.yaml b/charts/rancher-compliance-crd/107.2.0+up1.2.0-rc.1/templates/clusterscanbenchmark.yaml new file mode 100644 index 00000000000..4b3cab788b9 --- /dev/null +++ b/charts/rancher-compliance-crd/107.2.0+up1.2.0-rc.1/templates/clusterscanbenchmark.yaml @@ -0,0 +1,55 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + name: clusterscanbenchmarks.compliance.cattle.io +spec: + group: compliance.cattle.io + names: + kind: ClusterScanBenchmark + plural: clusterscanbenchmarks + singular: clusterscanbenchmark + scope: Cluster + versions: + - additionalPrinterColumns: + - jsonPath: .spec.clusterProvider + name: ClusterProvider + type: string + - jsonPath: .spec.minKubernetesVersion + name: MinKubernetesVersion + type: string + - jsonPath: .spec.maxKubernetesVersion + name: MaxKubernetesVersion + type: string + - jsonPath: .spec.customBenchmarkConfigMapName + name: customBenchmarkConfigMapName + type: string + - jsonPath: .spec.customBenchmarkConfigMapNamespace + name: customBenchmarkConfigMapNamespace + type: string + name: v1 + schema: + openAPIV3Schema: + properties: + spec: + properties: + clusterProvider: + nullable: true + type: string + customBenchmarkConfigMapName: + nullable: true + type: string + customBenchmarkConfigMapNamespace: + nullable: true + type: string + maxKubernetesVersion: + nullable: true + type: string + minKubernetesVersion: + nullable: true + type: string + type: object + type: object + served: true + storage: true + subresources: + status: {} diff --git a/charts/rancher-compliance-crd/107.2.0+up1.2.0-rc.1/templates/clusterscanprofile.yaml b/charts/rancher-compliance-crd/107.2.0+up1.2.0-rc.1/templates/clusterscanprofile.yaml new file mode 100644 index 00000000000..ccf3667fb1c --- /dev/null +++ b/charts/rancher-compliance-crd/107.2.0+up1.2.0-rc.1/templates/clusterscanprofile.yaml @@ -0,0 +1,37 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + name: clusterscanprofiles.compliance.cattle.io +spec: + group: compliance.cattle.io + names: + kind: ClusterScanProfile + plural: clusterscanprofiles + singular: clusterscanprofile + scope: Cluster + versions: + - additionalPrinterColumns: + - jsonPath: .spec.benchmarkVersion + name: BenchmarkVersion + type: string + name: v1 + schema: + openAPIV3Schema: + properties: + spec: + properties: + benchmarkVersion: + nullable: true + type: string + skipTests: + items: + nullable: true + type: string + nullable: true + type: array + type: object + type: object + served: true + storage: true + subresources: + status: {} diff --git a/charts/rancher-compliance-crd/107.2.0+up1.2.0-rc.1/templates/clusterscanreport.yaml b/charts/rancher-compliance-crd/107.2.0+up1.2.0-rc.1/templates/clusterscanreport.yaml new file mode 100644 index 00000000000..47494ef98f0 --- /dev/null +++ b/charts/rancher-compliance-crd/107.2.0+up1.2.0-rc.1/templates/clusterscanreport.yaml @@ -0,0 +1,40 @@ +apiVersion: apiextensions.k8s.io/v1 +kind: CustomResourceDefinition +metadata: + name: clusterscanreports.compliance.cattle.io +spec: + group: compliance.cattle.io + names: + kind: ClusterScanReport + plural: clusterscanreports + singular: clusterscanreport + scope: Cluster + versions: + - additionalPrinterColumns: + - jsonPath: .spec.lastRunTimestamp + name: LastRunTimestamp + type: string + - jsonPath: .spec.benchmarkVersion + name: BenchmarkVersion + type: string + name: v1 + schema: + openAPIV3Schema: + properties: + spec: + properties: + benchmarkVersion: + nullable: true + type: string + lastRunTimestamp: + nullable: true + type: string + reportJSON: + nullable: true + type: string + type: object + type: object + served: true + storage: true + subresources: + status: {} diff --git a/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/Chart.yaml b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/Chart.yaml new file mode 100644 index 00000000000..ab0690a644b --- /dev/null +++ b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/Chart.yaml @@ -0,0 +1,22 @@ +annotations: + catalog.cattle.io/auto-install: rancher-compliance-crd=match + catalog.cattle.io/certified: rancher + catalog.cattle.io/display-name: Rancher Compliance + catalog.cattle.io/kube-version: '>= 1.31.0-0 < 1.34.0-0' + catalog.cattle.io/namespace: compliance-operator-system + catalog.cattle.io/os: linux + catalog.cattle.io/permits-os: linux,windows + catalog.cattle.io/provides-gvr: compliance.cattle.io.clusterscans/v1 + catalog.cattle.io/rancher-version: '>= 2.12.0-0 < 2.13.0-0' + catalog.cattle.io/release-name: rancher-compliance + catalog.cattle.io/type: cluster-tool + catalog.cattle.io/ui-component: rancher-compliance +apiVersion: v1 +appVersion: v1.2.0-rc.1 +description: The compliance-operator enables running security scans on a kubernetes + cluster +icon: file://assets/logos/rancher-compliance.svg +keywords: +- security +name: rancher-compliance +version: 107.2.0+up1.2.0-rc.1 diff --git a/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/README.md b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/README.md new file mode 100644 index 00000000000..a8a341d6d3c --- /dev/null +++ b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/README.md @@ -0,0 +1,9 @@ +# Rancher Compliance Chart + +The compliance-operator enables running security scans on a kubernetes cluster and generate compliance reports that can be downloaded. + +# Installation + +``` +helm install rancher-compliance ./ --create-namespace -n compliance-operator-system +``` diff --git a/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/app-readme.md b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/app-readme.md new file mode 100644 index 00000000000..1fe8bdffce3 --- /dev/null +++ b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/app-readme.md @@ -0,0 +1,34 @@ + +# Rancher Compliance + +This chart enables security scanning of the cluster using custom benchmark profiles. + +For more information on how to use the feature, refer to our [docs](https://ranchermanager.docs.rancher.com/v2.10/how-to-guides/advanced-user-guides/cis-scan-guides). + +This chart installs the following components: + +- [compliance-operator](https://github.com/rancher/compliance-operator) - The compliance-operator handles launching the [kube-bench](https://github.com/aquasecurity/kube-bench) tool that runs a suite of security scans on the nodes of your Kubernetes cluster. After scans finish, the compliance-operator generates a compliance report that can be downloaded. +- Scans - A scan is a CRD (`ClusterScan`) that defines when to trigger scans on the cluster based on the defined profile. A report is created after the scan is completed. +- Profiles - A profile is a CRD (`ClusterScanProfile`) that defines the configuration for the scan, which is the benchmark versions to use and any specific tests to skip in that benchmark. This chart installs a few default `ClusterScanProfile` custom resources with no skipped tests, which can immediately be used to launch scans. +- Benchmark Versions - A benchmark version is a CRD (`ClusterScanBenchmark`) that defines the benchmark version to run using kube-bench as well as the valid configuration parameters for that benchmark. This chart installs a few default `ClusterScanBenchmark` custom resources. +- Alerting Resources - Rancher's Compliance application lets you run a cluster scan on a schedule, and send alerts when scans finish. + - If you want to enable alerts to be delivered when a cluster scan completes, you need to ensure that [Rancher's Monitoring and Alerting](https://ranchermanager.docs.rancher.com/how-to-guides/advanced-user-guides/monitoring-alerting-guides) application is pre-installed and the [Receivers and Routes](https://ranchermanager.docs.rancher.com/how-to-guides/advanced-user-guides/monitoring-v2-configuration-guides/advanced-configuration/alertmanager) are configured to send out alerts. + - Additionally, you need to set `alerts: true` in the Values YAML while installing or upgrading this chart. + + +## CIS Kubernetes Benchmark support + +kube-bench runs industry standard benchmark tests for Kubernetes. Most of our supported benchmarks are defined in either of the following: + +| Source | Kubernetes Benchmark | kube-bench config | Kubernetes versions | +|--------|---------------------|---------------------|-------------------------| +| CIS | 1.9 | cis-1.9 | 1.27.x | +| CIS | 1.10 | cis-1.10 | ≥ 1.28 | +| CIS | rke2-1.9.0 | rke2-cis-1.9 | rke2 1.27.x | +| CIS | rke2-1.10.0 | rke2-cis-1.10 | ≥ rke2 1.28 | +| CIS | k3s-1.9.0 | k3s-cis-1.9 | k3s 1.27.x | +| CIS | k3s-1.10.0 | k3s-cis-1.10 | ≥ k3s 1.28 | +| CIS | GKE 1.6.0 | gke-1.6.0 | GKE | +| CIS | AKS 1.0.0 | aks-1.0 | AKS | +| CIS | EKS 1.5.0 | eks-1.5.0 | EKS | + diff --git a/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/_helpers.tpl b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/_helpers.tpl new file mode 100644 index 00000000000..b91db383461 --- /dev/null +++ b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/_helpers.tpl @@ -0,0 +1,27 @@ +{{/* Ensure namespace is set the same everywhere */}} +{{- define "app.namespace" -}} + {{- .Release.Namespace | default "compliance-operator-system" -}} +{{- end -}} + +{{- define "system_default_registry" -}} +{{- if .Values.global.cattle.systemDefaultRegistry -}} +{{- printf "%s/" .Values.global.cattle.systemDefaultRegistry -}} +{{- else -}} +{{- "" -}} +{{- end -}} +{{- end -}} + +{{/* +Windows cluster will add default taint for linux nodes, +add below linux tolerations to workloads could be scheduled to those linux nodes +*/}} +{{- define "linux-node-tolerations" -}} +- key: "cattle.io/os" + value: "linux" + effect: "NoSchedule" + operator: "Equal" +{{- end -}} + +{{- define "linux-node-selector" -}} +kubernetes.io/os: linux +{{- end -}} diff --git a/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/alertingrule.yaml b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/alertingrule.yaml new file mode 100644 index 00000000000..393aea298ad --- /dev/null +++ b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/alertingrule.yaml @@ -0,0 +1,14 @@ +{{- if .Values.alerts.enabled -}} +--- +apiVersion: monitoring.coreos.com/v1 +kind: PodMonitor +metadata: + name: rancher-compliance-pod-monitor + namespace: {{ template "app.namespace" . }} +spec: + selector: + matchLabels: + compliance.cattle.io/operator: compliance-operator + podMetricsEndpoints: + - port: metrics +{{- end }} diff --git a/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/benchmark-aks-1.0.yaml b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/benchmark-aks-1.0.yaml new file mode 100644 index 00000000000..cd0cd5b3e3a --- /dev/null +++ b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/benchmark-aks-1.0.yaml @@ -0,0 +1,8 @@ +--- +apiVersion: compliance.cattle.io/v1 +kind: ClusterScanBenchmark +metadata: + name: aks-1.0 +spec: + clusterProvider: aks + minKubernetesVersion: "1.15.0" diff --git a/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/benchmark-cis-1.10.yaml b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/benchmark-cis-1.10.yaml new file mode 100644 index 00000000000..da95e1c39dc --- /dev/null +++ b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/benchmark-cis-1.10.yaml @@ -0,0 +1,9 @@ +--- +apiVersion: compliance.cattle.io/v1 +kind: ClusterScanBenchmark +metadata: + name: cis-1.10 +spec: + clusterProvider: "" + minKubernetesVersion: "1.28.0" + maxKubernetesVersion: "1.28.x" \ No newline at end of file diff --git a/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/benchmark-cis-1.11.yaml b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/benchmark-cis-1.11.yaml new file mode 100644 index 00000000000..bc1ca93cea9 --- /dev/null +++ b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/benchmark-cis-1.11.yaml @@ -0,0 +1,8 @@ +--- +apiVersion: compliance.cattle.io/v1 +kind: ClusterScanBenchmark +metadata: + name: cis-1.11 +spec: + clusterProvider: "" + minKubernetesVersion: "1.29.0" \ No newline at end of file diff --git a/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/benchmark-cis-1.9.yaml b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/benchmark-cis-1.9.yaml new file mode 100644 index 00000000000..e40d3e90224 --- /dev/null +++ b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/benchmark-cis-1.9.yaml @@ -0,0 +1,9 @@ +--- +apiVersion: compliance.cattle.io/v1 +kind: ClusterScanBenchmark +metadata: + name: cis-1.9 +spec: + clusterProvider: "" + minKubernetesVersion: "1.27.0" + maxKubernetesVersion: "1.27.x" diff --git a/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/benchmark-eks-1.5.0.yaml b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/benchmark-eks-1.5.0.yaml new file mode 100644 index 00000000000..0e01489b98e --- /dev/null +++ b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/benchmark-eks-1.5.0.yaml @@ -0,0 +1,8 @@ +--- +apiVersion: compliance.cattle.io/v1 +kind: ClusterScanBenchmark +metadata: + name: eks-1.5.0 +spec: + clusterProvider: eks + minKubernetesVersion: "1.27.0" diff --git a/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/benchmark-gke-1.6.0.yaml b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/benchmark-gke-1.6.0.yaml new file mode 100644 index 00000000000..b60e5121ff4 --- /dev/null +++ b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/benchmark-gke-1.6.0.yaml @@ -0,0 +1,8 @@ +--- +apiVersion: compliance.cattle.io/v1 +kind: ClusterScanBenchmark +metadata: + name: gke-1.6.0 +spec: + clusterProvider: gke + minKubernetesVersion: "1.29.0" diff --git a/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/benchmark-k3s-cis-1.10.yaml b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/benchmark-k3s-cis-1.10.yaml new file mode 100644 index 00000000000..ebe850ff5aa --- /dev/null +++ b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/benchmark-k3s-cis-1.10.yaml @@ -0,0 +1,9 @@ +--- +apiVersion: compliance.cattle.io/v1 +kind: ClusterScanBenchmark +metadata: + name: k3s-cis-1.10 +spec: + clusterProvider: k3s + minKubernetesVersion: "1.28.0" + maxKubernetesVersion: "1.28.x" diff --git a/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/benchmark-k3s-cis-1.11.yaml b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/benchmark-k3s-cis-1.11.yaml new file mode 100644 index 00000000000..1b52dbd4a0a --- /dev/null +++ b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/benchmark-k3s-cis-1.11.yaml @@ -0,0 +1,8 @@ +--- +apiVersion: compliance.cattle.io/v1 +kind: ClusterScanBenchmark +metadata: + name: k3s-cis-1.11 +spec: + clusterProvider: k3s + minKubernetesVersion: "1.29.0" diff --git a/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/benchmark-k3s-cis-1.9.yaml b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/benchmark-k3s-cis-1.9.yaml new file mode 100644 index 00000000000..d56b3748f65 --- /dev/null +++ b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/benchmark-k3s-cis-1.9.yaml @@ -0,0 +1,9 @@ +--- +apiVersion: compliance.cattle.io/v1 +kind: ClusterScanBenchmark +metadata: + name: k3s-cis-1.9 +spec: + clusterProvider: k3s + minKubernetesVersion: "1.27.0" + maxKubernetesVersion: "1.27.x" diff --git a/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/benchmark-rke2-cis-1.10.yaml b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/benchmark-rke2-cis-1.10.yaml new file mode 100644 index 00000000000..1a33650320a --- /dev/null +++ b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/benchmark-rke2-cis-1.10.yaml @@ -0,0 +1,9 @@ +--- +apiVersion: compliance.cattle.io/v1 +kind: ClusterScanBenchmark +metadata: + name: rke2-cis-1.10 +spec: + clusterProvider: rke2 + minKubernetesVersion: "1.28.0" + maxKubernetesVersion: "1.28.x" diff --git a/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/benchmark-rke2-cis-1.11.yaml b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/benchmark-rke2-cis-1.11.yaml new file mode 100644 index 00000000000..8030ea6aaef --- /dev/null +++ b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/benchmark-rke2-cis-1.11.yaml @@ -0,0 +1,8 @@ +--- +apiVersion: compliance.cattle.io/v1 +kind: ClusterScanBenchmark +metadata: + name: rke2-cis-1.11 +spec: + clusterProvider: rke2 + minKubernetesVersion: "1.29.0" diff --git a/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/benchmark-rke2-cis-1.9.yaml b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/benchmark-rke2-cis-1.9.yaml new file mode 100644 index 00000000000..46623dfcf5d --- /dev/null +++ b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/benchmark-rke2-cis-1.9.yaml @@ -0,0 +1,9 @@ +--- +apiVersion: compliance.cattle.io/v1 +kind: ClusterScanBenchmark +metadata: + name: rke2-cis-1.9 +spec: + clusterProvider: rke2 + minKubernetesVersion: "1.27.0" + maxKubernetesVersion: "1.27.x" diff --git a/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/configmap.yaml b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/configmap.yaml new file mode 100644 index 00000000000..b1127d02fde --- /dev/null +++ b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/configmap.yaml @@ -0,0 +1,13 @@ +kind: ConfigMap +apiVersion: v1 +metadata: + name: default-clusterscanprofiles + namespace: {{ template "app.namespace" . }} +data: + # Default ClusterScanProfiles per cluster provider type + rke2: "rke2-cis-1.11-profile" + eks: "eks-profile-1.5.0" + gke: "gke-profile-1.6.0" + aks: "aks-profile" + k3s: "k3s-cis-1.11-profile" + default: "cis-1.11-profile" diff --git a/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/deployment.yaml b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/deployment.yaml new file mode 100644 index 00000000000..f1a35c01baf --- /dev/null +++ b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/deployment.yaml @@ -0,0 +1,61 @@ +apiVersion: apps/v1 +kind: Deployment +metadata: + name: compliance-operator + namespace: {{ template "app.namespace" . }} + labels: + compliance.cattle.io/operator: compliance-operator +spec: + selector: + matchLabels: + compliance.cattle.io/operator: compliance-operator + template: + metadata: + labels: + compliance.cattle.io/operator: compliance-operator + spec: + serviceAccountName: compliance-operator-serviceaccount + containers: + - name: compliance-operator + image: '{{ template "system_default_registry" . }}{{ .Values.image.operator.repository }}:{{ .Values.image.operator.tag }}' + imagePullPolicy: IfNotPresent + ports: + - name: metrics + containerPort: {{ .Values.alerts.metricsPort }} + env: + - name: SECURITY_SCAN_IMAGE + value: {{ template "system_default_registry" . }}{{ .Values.image.securityScan.repository }} + - name: SECURITY_SCAN_IMAGE_TAG + value: {{ .Values.image.securityScan.tag }} + - name: SONOBUOY_IMAGE + value: {{ template "system_default_registry" . }}{{ .Values.image.sonobuoy.repository }} + - name: SONOBUOY_IMAGE_TAG + value: {{ .Values.image.sonobuoy.tag }} + - name: METRICS_PORT + value: '{{ .Values.alerts.metricsPort }}' + - name: ALERTS_SEVERITY + value: {{ .Values.alerts.severity }} + - name: ALERTS_ENABLED + value: {{ .Values.alerts.enabled | default "false" | quote }} + - name: CLUSTER_NAME + value: '{{ .Values.global.cattle.clusterName }}' + - name: OPERATOR_DEBUG + value: '{{ .Values.debug }}' + {{- if .Values.securityScanJob.overrideTolerations }} + - name: SECURITY_SCAN_JOB_TOLERATIONS + value: '{{ .Values.securityScanJob.tolerations | toJson }}' + {{- end }} + resources: + {{- toYaml .Values.resources | nindent 12 }} + nodeSelector: {{ include "linux-node-selector" . | nindent 8 }} +{{- if .Values.nodeSelector }} +{{ toYaml .Values.nodeSelector | indent 8 }} +{{- end }} + tolerations: {{ include "linux-node-tolerations" . | nindent 8 }} +{{- if .Values.tolerations }} +{{ toYaml .Values.tolerations | indent 8 }} +{{- end }} + {{- with .Values.affinity }} + affinity: + {{- toYaml . | nindent 8 }} + {{- end }} diff --git a/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/network_policy_allow_all.yaml b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/network_policy_allow_all.yaml new file mode 100644 index 00000000000..916883df0f8 --- /dev/null +++ b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/network_policy_allow_all.yaml @@ -0,0 +1,15 @@ +--- +apiVersion: networking.k8s.io/v1 +kind: NetworkPolicy +metadata: + name: default-allow-all + namespace: {{ template "app.namespace" . }} +spec: + podSelector: {} + ingress: + - {} + egress: + - {} + policyTypes: + - Ingress + - Egress diff --git a/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/patch_default_serviceaccount.yaml b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/patch_default_serviceaccount.yaml new file mode 100644 index 00000000000..86c4dfb5e77 --- /dev/null +++ b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/patch_default_serviceaccount.yaml @@ -0,0 +1,29 @@ +--- +apiVersion: batch/v1 +kind: Job +metadata: + name: patch-sa + annotations: + "helm.sh/hook": post-install, post-upgrade + "helm.sh/hook-delete-policy": hook-succeeded, before-hook-creation +spec: + template: + spec: + serviceAccountName: compliance-operator-serviceaccount + nodeSelector: {{ include "linux-node-selector" . | nindent 8 }} +{{- if .Values.nodeSelector }} +{{ toYaml .Values.nodeSelector | indent 8 }} +{{- end }} + tolerations: {{ include "linux-node-tolerations" . | nindent 8 }} +{{- if .Values.tolerations }} +{{ toYaml .Values.tolerations | indent 8 }} +{{- end }} + restartPolicy: Never + containers: + - name: sa + image: "{{ template "system_default_registry" . }}{{ .Values.global.kubectl.repository }}:{{ .Values.global.kubectl.tag }}" + imagePullPolicy: {{ .Values.global.imagePullPolicy }} + command: ["kubectl", "patch", "serviceaccount", "default", "-p", "{\"automountServiceAccountToken\": false}"] + args: ["-n", {{ template "app.namespace" . }}] + + backoffLimit: 1 diff --git a/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/rbac.yaml b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/rbac.yaml new file mode 100644 index 00000000000..89f2e6b4fd3 --- /dev/null +++ b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/rbac.yaml @@ -0,0 +1,217 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + labels: + app.kubernetes.io/name: rancher-compliance + app.kubernetes.io/instance: release-name + name: compliance-operator-clusterrole +rules: +- apiGroups: + - "compliance.cattle.io" + resources: + - "*" + verbs: + - "get" + - "list" + - "create" + - "update" + - "watch" + - "patch" + - "delete" +- apiGroups: + - "" + resources: + - "pods" + - "services" + - "configmaps" + - "nodes" + - "serviceaccounts" + verbs: + - "get" + - "list" + - "create" + - "update" + - "watch" + - "patch" +- apiGroups: + - "rbac.authorization.k8s.io" + resources: + - "rolebindings" + - "clusterrolebindings" + - "clusterroles" + - "roles" + verbs: + - "get" + - "list" +- apiGroups: + - "batch" + resources: + - "jobs" + verbs: + - "list" + - "create" + - "patch" + - "update" + - "watch" +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + labels: + app.kubernetes.io/name: rancher-compliance + app.kubernetes.io/instance: release-name + name: compliance-scan +rules: +- apiGroups: + - "" + resources: + - "namespaces" + - "nodes" + - "pods" + - "serviceaccounts" + - "services" + - "replicationcontrollers" + verbs: + - "get" + - "list" + - "watch" +- apiGroups: + - "rbac.authorization.k8s.io" + resources: + - "rolebindings" + - "clusterrolebindings" + - "clusterroles" + - "roles" + verbs: + - "get" + - "list" +- apiGroups: + - "batch" + resources: + - "jobs" + - "cronjobs" + verbs: + - "list" +- apiGroups: + - "apps" + resources: + - "daemonsets" + - "deployments" + - "replicasets" + - "statefulsets" + verbs: + - "list" +- apiGroups: + - "autoscaling" + resources: + - "horizontalpodautoscalers" + verbs: + - "list" +- apiGroups: + - "networking.k8s.io" + resources: + - "networkpolicies" + verbs: + - "get" + - "list" + - "watch" +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: Role +metadata: + name: compliance-operator-role + labels: + app.kubernetes.io/name: rancher-compliance + app.kubernetes.io/instance: release-name + namespace: {{ template "app.namespace" . }} +rules: +- apiGroups: + - "" + resources: + - "services" + verbs: + - "watch" + - "list" + - "get" + - "patch" +- apiGroups: + - "batch" + resources: + - "jobs" + verbs: + - "watch" + - "list" + - "get" + - "delete" +- apiGroups: + - "" + resources: + - "configmaps" + - "pods" + - "secrets" + verbs: + - "*" +- apiGroups: + - "apps" + resources: + - "daemonsets" + verbs: + - "*" +- apiGroups: + - monitoring.coreos.com + resources: + - prometheusrules + verbs: + - create +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + labels: + app.kubernetes.io/name: rancher-compliance + app.kubernetes.io/instance: release-name + name: compliance-operator-clusterrolebinding +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: compliance-operator-clusterrole +subjects: +- kind: ServiceAccount + name: compliance-operator-serviceaccount + namespace: {{ template "app.namespace" . }} +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: compliance-scan + labels: + app.kubernetes.io/name: rancher-compliance + app.kubernetes.io/instance: release-name +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: compliance-scan +subjects: +- kind: ServiceAccount + name: compliance-scan-serviceaccount + namespace: {{ template "app.namespace" . }} +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: RoleBinding +metadata: + labels: + app.kubernetes.io/name: rancher-compliance + app.kubernetes.io/instance: release-name + name: compliance-operator-rolebinding + namespace: {{ template "app.namespace" . }} +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: Role + name: compliance-operator-role +subjects: +- kind: ServiceAccount + name: compliance-scan-serviceaccount + namespace: {{ template "app.namespace" . }} +- kind: ServiceAccount + name: compliance-operator-serviceaccount + namespace: {{ template "app.namespace" . }} diff --git a/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/roles.yaml b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/roles.yaml new file mode 100644 index 00000000000..718d93afffc --- /dev/null +++ b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/roles.yaml @@ -0,0 +1,48 @@ +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: compliance-admin +rules: + - apiGroups: + - compliance.cattle.io + resources: + - clusterscanbenchmarks + - clusterscanprofiles + - clusterscans + - clusterscanreports + verbs: ["create", "update", "delete", "patch","get", "watch", "list"] + - apiGroups: + - catalog.cattle.io + resources: ["apps"] + resourceNames: ["rancher-compliance"] + verbs: ["get", "watch", "list"] + - apiGroups: + - "" + resources: + - configmaps + verbs: ["create", "update", "delete", "patch","get", "watch", "list"] +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: compliance-view +rules: + - apiGroups: + - compliance.cattle.io + resources: + - clusterscanbenchmarks + - clusterscanprofiles + - clusterscans + - clusterscanreports + verbs: ["get", "watch", "list"] + - apiGroups: + - catalog.cattle.io + resources: ["apps"] + resourceNames: ["rancher-compliance"] + verbs: ["get", "watch", "list"] + - apiGroups: + - "" + resources: + - configmaps + verbs: ["get", "watch", "list"] diff --git a/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/scanprofile-cis-1.10.yaml b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/scanprofile-cis-1.10.yaml new file mode 100644 index 00000000000..2d7fada4797 --- /dev/null +++ b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/scanprofile-cis-1.10.yaml @@ -0,0 +1,9 @@ +--- +apiVersion: compliance.cattle.io/v1 +kind: ClusterScanProfile +metadata: + name: cis-1.10-profile + annotations: + clusterscanprofile.compliance.cattle.io/builtin: "true" +spec: + benchmarkVersion: cis-1.10 diff --git a/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/scanprofile-cis-1.11.yaml b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/scanprofile-cis-1.11.yaml new file mode 100644 index 00000000000..8e84e8e84a3 --- /dev/null +++ b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/scanprofile-cis-1.11.yaml @@ -0,0 +1,10 @@ + +--- +apiVersion: compliance.cattle.io/v1 +kind: ClusterScanProfile +metadata: + name: cis-1.11-profile + annotations: + clusterscanprofile.compliance.cattle.io/builtin: "true" +spec: + benchmarkVersion: cis-1.11 \ No newline at end of file diff --git a/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/scanprofile-cis-1.9.yaml b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/scanprofile-cis-1.9.yaml new file mode 100644 index 00000000000..fa2e19cd864 --- /dev/null +++ b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/scanprofile-cis-1.9.yaml @@ -0,0 +1,9 @@ +--- +apiVersion: compliance.cattle.io/v1 +kind: ClusterScanProfile +metadata: + name: cis-1.9-profile + annotations: + clusterscanprofile.compliance.cattle.io/builtin: "true" +spec: + benchmarkVersion: cis-1.9 diff --git a/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/scanprofile-k3s-cis-1.10.yaml b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/scanprofile-k3s-cis-1.10.yaml new file mode 100644 index 00000000000..380be54629a --- /dev/null +++ b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/scanprofile-k3s-cis-1.10.yaml @@ -0,0 +1,9 @@ +--- +apiVersion: compliance.cattle.io/v1 +kind: ClusterScanProfile +metadata: + name: k3s-cis-1.10-profile + annotations: + clusterscanprofile.compliance.cattle.io/builtin: "true" +spec: + benchmarkVersion: k3s-cis-1.10 diff --git a/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/scanprofile-k3s-cis-1.11.yaml b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/scanprofile-k3s-cis-1.11.yaml new file mode 100644 index 00000000000..d3473b4bde1 --- /dev/null +++ b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/scanprofile-k3s-cis-1.11.yaml @@ -0,0 +1,9 @@ +--- +apiVersion: compliance.cattle.io/v1 +kind: ClusterScanProfile +metadata: + name: k3s-cis-1.11-profile + annotations: + clusterscanprofile.compliance.cattle.io/builtin: "true" +spec: + benchmarkVersion: k3s-cis-1.11 diff --git a/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/scanprofile-k3s-cis-1.9.yaml b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/scanprofile-k3s-cis-1.9.yaml new file mode 100644 index 00000000000..7e3e3900cdb --- /dev/null +++ b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/scanprofile-k3s-cis-1.9.yaml @@ -0,0 +1,9 @@ +--- +apiVersion: compliance.cattle.io/v1 +kind: ClusterScanProfile +metadata: + name: k3s-cis-1.9-profile + annotations: + clusterscanprofile.compliance.cattle.io/builtin: "true" +spec: + benchmarkVersion: k3s-cis-1.9 diff --git a/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/scanprofile-rke2-cis-1.10.yaml b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/scanprofile-rke2-cis-1.10.yaml new file mode 100644 index 00000000000..86920e6dc21 --- /dev/null +++ b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/scanprofile-rke2-cis-1.10.yaml @@ -0,0 +1,9 @@ +--- +apiVersion: compliance.cattle.io/v1 +kind: ClusterScanProfile +metadata: + name: rke2-cis-1.10-profile + annotations: + clusterscanprofile.compliance.cattle.io/builtin: "true" +spec: + benchmarkVersion: rke2-cis-1.10 diff --git a/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/scanprofile-rke2-cis-1.11.yaml b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/scanprofile-rke2-cis-1.11.yaml new file mode 100644 index 00000000000..a2583e9e4e4 --- /dev/null +++ b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/scanprofile-rke2-cis-1.11.yaml @@ -0,0 +1,9 @@ +--- +apiVersion: compliance.cattle.io/v1 +kind: ClusterScanProfile +metadata: + name: rke2-cis-1.11-profile + annotations: + clusterscanprofile.compliance.cattle.io/builtin: "true" +spec: + benchmarkVersion: rke2-cis-1.11 diff --git a/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/scanprofile-rke2-cis-1.9.yaml b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/scanprofile-rke2-cis-1.9.yaml new file mode 100644 index 00000000000..47544372cf5 --- /dev/null +++ b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/scanprofile-rke2-cis-1.9.yaml @@ -0,0 +1,9 @@ +--- +apiVersion: compliance.cattle.io/v1 +kind: ClusterScanProfile +metadata: + name: rke2-cis-1.9-profile + annotations: + clusterscanprofile.compliance.cattle.io/builtin: "true" +spec: + benchmarkVersion: rke2-cis-1.9 diff --git a/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/scanprofileaks.yml b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/scanprofileaks.yml new file mode 100644 index 00000000000..8ca1a952daa --- /dev/null +++ b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/scanprofileaks.yml @@ -0,0 +1,9 @@ +--- +apiVersion: compliance.cattle.io/v1 +kind: ClusterScanProfile +metadata: + name: aks-profile + annotations: + clusterscanprofile.compliance.cattle.io/builtin: "true" +spec: + benchmarkVersion: aks-1.0 diff --git a/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/scanprofileeks-1.5.0.yml b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/scanprofileeks-1.5.0.yml new file mode 100644 index 00000000000..da275946cd6 --- /dev/null +++ b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/scanprofileeks-1.5.0.yml @@ -0,0 +1,9 @@ +--- +apiVersion: compliance.cattle.io/v1 +kind: ClusterScanProfile +metadata: + name: eks-profile-1.5.0 + annotations: + clusterscanprofile.compliance.cattle.io/builtin: "true" +spec: + benchmarkVersion: eks-1.5.0 diff --git a/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/scanprofilegke-1.6.0.yml b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/scanprofilegke-1.6.0.yml new file mode 100644 index 00000000000..868cfcf3502 --- /dev/null +++ b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/scanprofilegke-1.6.0.yml @@ -0,0 +1,9 @@ +--- +apiVersion: compliance.cattle.io/v1 +kind: ClusterScanProfile +metadata: + name: gke-profile-1.6.0 + annotations: + clusterscanprofile.compliance.cattle.io/builtin: "true" +spec: + benchmarkVersion: gke-1.6.0 diff --git a/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/serviceaccount.yaml b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/serviceaccount.yaml new file mode 100644 index 00000000000..529753a2b7b --- /dev/null +++ b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/serviceaccount.yaml @@ -0,0 +1,14 @@ +apiVersion: v1 +kind: ServiceAccount +metadata: + namespace: {{ template "app.namespace" . }} + name: compliance-operator-serviceaccount +--- +apiVersion: v1 +kind: ServiceAccount +metadata: + namespace: {{ template "app.namespace" . }} + labels: + app.kubernetes.io/name: rancher-compliance + app.kubernetes.io/instance: release-name + name: compliance-scan-serviceaccount diff --git a/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/validate-install-crd.yaml b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/validate-install-crd.yaml new file mode 100644 index 00000000000..1612a6bae7b --- /dev/null +++ b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/templates/validate-install-crd.yaml @@ -0,0 +1,17 @@ +#{{- if gt (len (lookup "rbac.authorization.k8s.io/v1" "ClusterRole" "" "")) 0 -}} +# {{- $found := dict -}} +# {{- set $found "compliance.cattle.io/v1/ClusterScan" false -}} +# {{- set $found "compliance.cattle.io/v1/ClusterScanBenchmark" false -}} +# {{- set $found "compliance.cattle.io/v1/ClusterScanProfile" false -}} +# {{- set $found "compliance.cattle.io/v1/ClusterScanReport" false -}} +# {{- range .Capabilities.APIVersions -}} +# {{- if hasKey $found (toString .) -}} +# {{- set $found (toString .) true -}} +# {{- end -}} +# {{- end -}} +# {{- range $_, $exists := $found -}} +# {{- if (eq $exists false) -}} +# {{- required "Required CRDs are missing. Please install the corresponding CRD chart before installing this chart." "" -}} +# {{- end -}} +# {{- end -}} +#{{- end -}} \ No newline at end of file diff --git a/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/values.yaml b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/values.yaml new file mode 100644 index 00000000000..fd7df54d7b8 --- /dev/null +++ b/charts/rancher-compliance/107.2.0+up1.2.0-rc.1/values.yaml @@ -0,0 +1,55 @@ +# Default values for rancher-compliance. +# This is a YAML-formatted file. +# Declare variables to be passed into your templates. + +image: + operator: + repository: rancher/compliance-operator + tag: v1.2.0-rc.1 + securityScan: + repository: rancher/security-scan + tag: v0.7.2-rc.2 + sonobuoy: + repository: rancher/mirrored-sonobuoy-sonobuoy + tag: v0.57.3 + +resources: {} + # We usually recommend not to specify default resources and to leave this as a conscious + # choice for the user. This also increases chances charts run on environments with little + # resources, such as Minikube. If you do want to specify resources, uncomment the following + # lines, adjust them as necessary, and remove the curly braces after 'resources:'. + # limits: + # cpu: 100m + # memory: 128Mi + # requests: + # cpu: 100m + # memory: 128Mi + +## Node labels for pod assignment +## Ref: https://kubernetes.io/docs/user-guide/node-selection/ +## +nodeSelector: {} + +## List of node taints to tolerate (requires Kubernetes >= 1.6) +tolerations: [] + +securityScanJob: + overrideTolerations: false + tolerations: [] + +affinity: {} + +global: + cattle: + systemDefaultRegistry: "" + clusterName: "" + kubectl: + repository: rancher/kubectl + tag: v1.33.1 + +alerts: + enabled: false + severity: warning + metricsPort: 8080 + +debug: diff --git a/index.yaml b/index.yaml index 321c9e482b4..a67d8b4efe6 100755 --- a/index.yaml +++ b/index.yaml @@ -20118,6 +20118,32 @@ entries: - assets/rancher-cis-benchmark-crd/rancher-cis-benchmark-crd-2.0.0.tgz version: 2.0.0 rancher-compliance: + - annotations: + catalog.cattle.io/auto-install: rancher-compliance-crd=match + catalog.cattle.io/certified: rancher + catalog.cattle.io/display-name: Rancher Compliance + catalog.cattle.io/kube-version: '>= 1.31.0-0 < 1.34.0-0' + catalog.cattle.io/namespace: compliance-operator-system + catalog.cattle.io/os: linux + catalog.cattle.io/permits-os: linux,windows + catalog.cattle.io/provides-gvr: compliance.cattle.io.clusterscans/v1 + catalog.cattle.io/rancher-version: '>= 2.12.0-0 < 2.13.0-0' + catalog.cattle.io/release-name: rancher-compliance + catalog.cattle.io/type: cluster-tool + catalog.cattle.io/ui-component: rancher-compliance + apiVersion: v1 + appVersion: v1.2.0-rc.1 + created: "2025-10-06T11:02:50.103485108+05:30" + description: The compliance-operator enables running security scans on a kubernetes + cluster + digest: 7aaed6023368460f608e0b08fec063f2748c70c9c16d4731f942f9bc2eac0703 + icon: file://assets/logos/rancher-compliance.svg + keywords: + - security + name: rancher-compliance + urls: + - assets/rancher-compliance/rancher-compliance-107.2.0+up1.2.0-rc.1.tgz + version: 107.2.0+up1.2.0-rc.1 - annotations: catalog.cattle.io/auto-install: rancher-compliance-crd=match catalog.cattle.io/certified: rancher @@ -20171,6 +20197,20 @@ entries: - assets/rancher-compliance/rancher-compliance-107.0.0+up1.0.0.tgz version: 107.0.0+up1.0.0 rancher-compliance-crd: + - annotations: + catalog.cattle.io/certified: rancher + catalog.cattle.io/hidden: "true" + catalog.cattle.io/namespace: compliance-operator-system + catalog.cattle.io/release-name: rancher-compliance-crd + apiVersion: v1 + created: "2025-10-06T11:02:50.104701282+05:30" + description: Installs the CRDs for rancher-compliance. + digest: 13d5f67e7932fe53a40a36e469a81ecb2d70def354a61974d8d57571de29e4ff + name: rancher-compliance-crd + type: application + urls: + - assets/rancher-compliance-crd/rancher-compliance-crd-107.2.0+up1.2.0-rc.1.tgz + version: 107.2.0+up1.2.0-rc.1 - annotations: catalog.cattle.io/certified: rancher catalog.cattle.io/hidden: "true" diff --git a/packages/rancher-compliance/generated-changes/patch/Chart.yaml.patch b/packages/rancher-compliance/generated-changes/patch/Chart.yaml.patch index 927b0744b59..ee38c36e980 100644 --- a/packages/rancher-compliance/generated-changes/patch/Chart.yaml.patch +++ b/packages/rancher-compliance/generated-changes/patch/Chart.yaml.patch @@ -1,7 +1,7 @@ --- charts-original/Chart.yaml +++ charts/Chart.yaml @@ -15,7 +15,7 @@ - appVersion: v1.1.0 + appVersion: v1.2.0-rc.1 description: The compliance-operator enables running security scans on a kubernetes cluster -icon: https://charts.rancher.io/assets/logos/rancher-compliance.svg diff --git a/packages/rancher-compliance/package.yaml b/packages/rancher-compliance/package.yaml index 5133324e07a..4f917c7362d 100644 --- a/packages/rancher-compliance/package.yaml +++ b/packages/rancher-compliance/package.yaml @@ -1,5 +1,5 @@ url: https://github.com/rancher/compliance-operator.git -version: 107.1.0 +version: 107.2.0 chartRepoBranch: release/v1.0 subdirectory: chart additionalCharts: diff --git a/release.yaml b/release.yaml index 2ed30093a61..902367c1138 100644 --- a/release.yaml +++ b/release.yaml @@ -45,6 +45,10 @@ rancher-supportability-review-crd: rancher-turtles: - 107.0.1+up0.24.1 - 107.0.0+up0.24.0 +rancher-compliance: + - 107.2.0+up1.2.0-rc.1 +rancher-compliance-crd: + - 107.2.0+up1.2.0-rc.1 rancher-webhook: - 107.0.2+up0.8.2-rc.4 - 107.0.2+up0.8.2-rc.3