Go to file
Paulo Gomes 8f3ad70765
Merge pull request #128 from rancher/renovate/golang.org-x-crypto-x509roots-fallback-digest
chore(deps): update golang.org/x/crypto/x509roots/fallback digest to 017a1aa
2025-10-23 11:00:01 +01:00
.github chore(deps): update github/codeql-action action to v4.30.9 2025-10-21 04:39:35 +00:00
chart chore(deps): update rancher/kubectl docker tag to v1.34.1 2025-09-16 06:42:54 +00:00
crds
hack chore(deps): update dependency golangci/golangci-lint to v2.5.0 2025-09-23 04:39:05 +00:00
package chore(deps): update registry.suse.com/bci/golang docker tag to v1.25 2025-08-27 06:42:54 +00:00
pkg
tests chore(deps): update rancher/k3s docker tag to v1.34.1 2025-09-23 04:39:17 +00:00
.gitignore
.golangci.yaml
CODEOWNERS
LICENSE
Makefile
README.md
go.mod chore(deps): update golang.org/x/crypto/x509roots/fallback digest to 017a1aa 2025-10-23 04:39:26 +00:00
go.sum chore(deps): update golang.org/x/crypto/x509roots/fallback digest to 017a1aa 2025-10-23 04:39:26 +00:00
main.go

README.md

compliance-operator OpenSSF Scorecard

The compliance-operator enables running Compliance security scans on a Kubernetes cluster and generate compliance reports that can be downloaded. Benchmarks tests and the execution logic lives on rancher/security-scan.

Building

make

Running

  1. Install the custom resource definitions:
  • kubectl apply -f crds/
  1. Install the operator ./bin/compliance-operator

Branches and Releases

General information

The current branch strategy for rancher/compliance-operator is laid out below:

Branch Tag Security-Scan Rancher
main head main branch (head)` main branch (head)
release/v1.0 v1.0.x v0.7.x v2.12.x

Note that it aligns with Rancher Manager releases to maximize compatibility within the ecosystem. This includes k8s dependencies that the Rancher release aims to support, meaning that compliance-operator should use the same k8s minor release that the Rancher release line it aims to support.

Active development takes place against main. Release branches are only used for bug fixes and security-related dependency bumps.

Refer to the Support Compatibility Matrix for official compatibility information.

How future release branches should be generated

Follow these guidelines when releasing new branches:

  1. Name convention to be used: release/v1.x.x.
  2. Update the Branch and Releases table with the new branches and remove the no longer needed branches.

License

Copyright (c) 2025 SUSE LLC.

Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at

http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.