Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
8 changes: 4 additions & 4 deletions chart/Chart.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -2,21 +2,21 @@ annotations:
catalog.cattle.io/auto-install: rancher-cis-benchmark-crd=match
catalog.cattle.io/certified: rancher
catalog.cattle.io/display-name: CIS Benchmark
catalog.cattle.io/kube-version: '>= 1.27.0-0 < 1.31.0-0'
catalog.cattle.io/kube-version: '>= 1.27.0-0 < 1.32.0-0'
catalog.cattle.io/namespace: cis-operator-system
catalog.cattle.io/os: linux
catalog.cattle.io/permits-os: linux,windows
catalog.cattle.io/provides-gvr: cis.cattle.io.clusterscans/v1
catalog.cattle.io/rancher-version: '>= 2.9.0-0 < 2.10.0-0'
catalog.cattle.io/rancher-version: '>= 2.10.0-0 < 2.11.0-0'
catalog.cattle.io/release-name: rancher-cis-benchmark
catalog.cattle.io/type: cluster-tool
catalog.cattle.io/ui-component: rancher-cis-benchmark
apiVersion: v1
appVersion: v6.1.0-rc1
appVersion: v7.0.0-rc.1
description: The cis-operator enables running CIS benchmark security scans on a kubernetes
cluster
icon: https://charts.rancher.io/assets/logos/cis-kube-bench.svg
keywords:
- security
name: rancher-cis-benchmark
version: 6.1.0-rc1
version: 7.0.0-rc.1
2 changes: 1 addition & 1 deletion chart/README.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# Rancher CIS Benchmark Chart

The cis-operator enables running CIS benchmark security scans on a Kubernetes cluster and generate compliance reports that can be downloaded.
The cis-operator enables running CIS benchmark security scans on a kubernetes cluster and generate compliance reports that can be downloaded.

# Installation

Expand Down
7 changes: 0 additions & 7 deletions chart/app-readme.md
Original file line number Diff line number Diff line change
Expand Up @@ -18,18 +18,11 @@ This chart installs the following components:

| Source | Kubernetes distribution | scan profile | Kubernetes versions |
|--------|-------------------------|--------------------------------------------------------------------------------------------------------------------|---------------------|
| CIS | any | [cis-1.7](https://github.com/rancher/security-scan/tree/master/package/cfg/cis-1.7) | v1.25 |
| CIS | any | [cis-1.8](https://github.com/rancher/security-scan/tree/master/package/cfg/cis-1.8) | v1.26+ |
| CIS | rke | [rke-cis-1.7-permissive](https://github.com/rancher/security-scan/tree/master/package/cfg/rke-cis-1.7-permissive) | rke1-v1.25 |
| CIS | rke | [rke-cis-1.7-hardened](https://github.com/rancher/security-scan/tree/master/package/cfg/rke-cis-1.7-hardened) | rke1-v1.25 |
| CIS | rke | [rke-cis-1.8-permissive](https://github.com/rancher/security-scan/tree/master/package/cfg/rke-cis-1.8-permissive) | rke1-v1.26+ |
| CIS | rke | [rke-cis-1.8-hardened](https://github.com/rancher/security-scan/tree/master/package/cfg/rke-cis-1.8-hardened) | rke1-v1.26+ |
| CIS | rke2 | [rke2-cis-1.7-permissive](https://github.com/rancher/security-scan/tree/master/package/cfg/rke2-cis-1.7-permissive)| rke2-v1.25 |
| CIS | rke2 | [rke2-cis-1.7-hardened](https://github.com/rancher/security-scan/tree/master/package/cfg/rke2-cis-1.7-hardened) | rke2-v1.25 |
| CIS | rke2 | [rke2-cis-1.8-permissive](https://github.com/rancher/security-scan/tree/master/package/cfg/rke2-cis-1.8-permissive)| rke2-v1.26+ |
| CIS | rke2 | [rke2-cis-1.8-hardened](https://github.com/rancher/security-scan/tree/master/package/cfg/rke2-cis-1.8-hardened) | rke2-v1.26+ |
| CIS | k3s | [k3s-cis-1.7-permissive](https://github.com/rancher/security-scan/tree/master/package/cfg/k3s-cis-1.7-permissive) | k3s-v1.25 |
| CIS | k3s | [k3s-cis-1.7-hardened](https://github.com/rancher/security-scan/tree/master/package/cfg/k3s-cis-1.7-hardened) | k3s-v1.25 |
| CIS | k3s | [k3s-cis-1.8-permissive](https://github.com/rancher/security-scan/tree/master/package/cfg/k3s-cis-1.8-permissive) | k3s-v1.26+ |
| CIS | k3s | [k3s-cis-1.8-hardened](https://github.com/rancher/security-scan/tree/master/package/cfg/k3s-cis-1.8-hardened) | k3s-v1.26+ |
| CIS | eks | eks-1.2.0 | eks |
Expand Down
8 changes: 0 additions & 8 deletions chart/templates/benchmark-cis-1.5.yaml

This file was deleted.

9 changes: 0 additions & 9 deletions chart/templates/benchmark-cis-1.7.yaml

This file was deleted.

8 changes: 0 additions & 8 deletions chart/templates/benchmark-eks-1.0.yaml

This file was deleted.

8 changes: 0 additions & 8 deletions chart/templates/benchmark-gke-1.0.yaml

This file was deleted.

9 changes: 0 additions & 9 deletions chart/templates/benchmark-k3s-cis-1.7-hardened.yaml

This file was deleted.

9 changes: 0 additions & 9 deletions chart/templates/benchmark-k3s-cis-1.7-permissive.yaml

This file was deleted.

8 changes: 0 additions & 8 deletions chart/templates/benchmark-rke-cis-1.5-hardened.yaml

This file was deleted.

8 changes: 0 additions & 8 deletions chart/templates/benchmark-rke-cis-1.5-permissive.yaml

This file was deleted.

9 changes: 0 additions & 9 deletions chart/templates/benchmark-rke-cis-1.7-hardened.yaml

This file was deleted.

9 changes: 0 additions & 9 deletions chart/templates/benchmark-rke-cis-1.7-permissive.yaml

This file was deleted.

9 changes: 0 additions & 9 deletions chart/templates/benchmark-rke2-cis-1.7-hardened.yaml

This file was deleted.

9 changes: 0 additions & 9 deletions chart/templates/benchmark-rke2-cis-1.7-permissive.yaml

This file was deleted.

9 changes: 0 additions & 9 deletions chart/templates/scanprofile-cis-1.5.yml

This file was deleted.

9 changes: 0 additions & 9 deletions chart/templates/scanprofile-cis-1.7.yaml

This file was deleted.

9 changes: 0 additions & 9 deletions chart/templates/scanprofile-k3s-cis-1.7-hardened.yml

This file was deleted.

9 changes: 0 additions & 9 deletions chart/templates/scanprofile-k3s-cis-1.7-permissive.yml

This file was deleted.

9 changes: 0 additions & 9 deletions chart/templates/scanprofile-rke-1.7-hardened.yaml

This file was deleted.

9 changes: 0 additions & 9 deletions chart/templates/scanprofile-rke-1.7-permissive.yaml

This file was deleted.

11 changes: 0 additions & 11 deletions chart/templates/scanprofile-rke-custom.yml

This file was deleted.

9 changes: 0 additions & 9 deletions chart/templates/scanprofile-rke-hardened.yml

This file was deleted.

9 changes: 0 additions & 9 deletions chart/templates/scanprofile-rke-permissive.yml

This file was deleted.

9 changes: 0 additions & 9 deletions chart/templates/scanprofile-rke2-cis-1.7-hardened.yml

This file was deleted.

9 changes: 0 additions & 9 deletions chart/templates/scanprofile-rke2-cis-1.7-permissive.yml

This file was deleted.

17 changes: 17 additions & 0 deletions chart/templates/validate-install-crd.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
#{{- if gt (len (lookup "rbac.authorization.k8s.io/v1" "ClusterRole" "" "")) 0 -}}
# {{- $found := dict -}}
# {{- set $found "cis.cattle.io/v1/ClusterScan" false -}}
# {{- set $found "cis.cattle.io/v1/ClusterScanBenchmark" false -}}
# {{- set $found "cis.cattle.io/v1/ClusterScanProfile" false -}}
# {{- set $found "cis.cattle.io/v1/ClusterScanReport" false -}}
# {{- range .Capabilities.APIVersions -}}
# {{- if hasKey $found (toString .) -}}
# {{- set $found (toString .) true -}}
# {{- end -}}
# {{- end -}}
# {{- range $_, $exists := $found -}}
# {{- if (eq $exists false) -}}
# {{- required "Required CRDs are missing. Please install the corresponding CRD chart before installing this chart." "" -}}
# {{- end -}}
# {{- end -}}
#{{- end -}}
8 changes: 4 additions & 4 deletions chart/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -5,13 +5,13 @@
image:
cisoperator:
repository: rancher/cis-operator
tag: v1.0.14-rc4
tag: v1.0.16-rc.1
securityScan:
repository: rancher/security-scan
tag: v0.2.17-rc8
tag: v0.2.18-rc.1
sonobuoy:
repository: rancher/mirrored-sonobuoy-sonobuoy
tag: v0.57.1
tag: v0.57.2

resources: {}
# We usually recommend not to specify default resources and to leave this as a conscious
Expand Down Expand Up @@ -45,7 +45,7 @@ global:
clusterName: ""
kubectl:
repository: rancher/kubectl
tag: v1.29.7
tag: v1.30.5

alerts:
enabled: false
Expand Down