Skip to content

Commit

Permalink
Merge branch 'main' into dev/sonobuoy-image-build-process
Browse files Browse the repository at this point in the history
  • Loading branch information
tonifinger authored Nov 12, 2024
2 parents 804be5c + bb54f35 commit 1d43d14
Show file tree
Hide file tree
Showing 23 changed files with 669 additions and 398 deletions.
8 changes: 8 additions & 0 deletions .github/scs-compliance-check/openstack/clouds.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -89,6 +89,14 @@ clouds:
auth:
auth_url: https://identity.l1a.cloudandheat.com/v3
application_credential_id: "7ab4e3339ea04255bc131868974cfe63"
scaleup-occ2:
auth_type: v3applicationcredential
auth:
auth_url: https://keystone.occ2.scaleup.cloud
application_credential_id: "5d2eea4e8bf8448092490b4190d4430a"
region_name: "RegionOne"
interface: "public"
identity_api_version: 3
syseleven-dus2:
interface: public
identity_api_verion: 3
Expand Down
23 changes: 23 additions & 0 deletions .github/workflows/check-scaleup-occ2-v4.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,23 @@
name: "Compliance IaaS v4 of scaleup-occ2"

on:
# Trigger compliance check every day at 4:30 UTC
schedule:
- cron: '30 4 * * *'
# Trigger compliance check after Docker image has been built
workflow_run:
workflows: [Build and publish scs-compliance-check Docker image]
types:
- completed
# Allows you to run this workflow manually from the Actions tab
workflow_dispatch:

jobs:
check-scaleup-occ2:
uses: ./.github/workflows/scs-compliance-check-with-application-credential.yml
with:
version: v4
layer: iaas
cloud: scaleup-occ2
secret_name: OS_PASSWORD_SCALEUP_OCC2
secrets: inherit
1 change: 1 addition & 0 deletions .gitignore
Original file line number Diff line number Diff line change
@@ -1,6 +1,7 @@
**/__pycache__/
.venv/
.idea
.sandbox
.DS_Store
node_modules
Tests/kaas/results/
Expand Down
22 changes: 22 additions & 0 deletions .zuul.d/secure.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -233,6 +233,28 @@
VCsXjf0qBBMrzz6HP9z95Bk44fiJ3L/LkA3Iij961dYrQXbZKDrKOiX/QPwrcSrVmjmew
UbPexJFHgvTCqjadoLejSt9cUd9lVzhuzLJ8CS+CcCMbZOno6qathrd2B88riQaPNIGNu
gfkNT9R63ZzKB1qIA2n5RZi7SH9DPIUd0AwLMn2bhp3uok5pNAPP/4/1RkQiCA=
scaleup_occ2_ac_id: !encrypted/pkcs1-oaep
- N2duwkcMdOXw6wF0deE/0BPM1M/URt3eWmrnBJ89VHeCDENGfTfDHcWPYs3wW4rSRCG6t
gqgNuA049OvOhL7rtjNHZ6yIj6xEHH/YdqT4UxjXPS9GFwoJXDtE8rIGjK3KU8GfUgKnG
DLplyyzGzx5j39rJAS628InmC56aip47rO1J4HQE9Ku25Wb06R7ykx+0ZOWr0HXjV/VsV
uwfyL+DPgewbL+4u8/XkcI0FwAM9/KkF/CcYUq5aVMdQS2foatTQW0C2idg+pffSTRaau
VF44rkVfzsCOz4MYAFpLIaL9Zxx1FifaPOd0oi6rEFjGd6vFtFCHk1BRpKmOITLyx3Te5
zVffSkQAsqpn/4er8800bjQzxXvqmQmR0QwPM7dhvRnrNbTSCA/Awm5BPaUgeCZFN3MPN
Mc0XIaEwjuJvDK6fqj5tJrVIs5bxAmqRDj8d76AlJcOdDxHicTHgR3aUG4AKOWkUsskgQ
3xR8lPh31O/HgzG9tq6o/DCPA1O9wyyOyT7KwJAaRASPCA1O80ZAzhZUNUVyut6dYEwaS
QXP4IaEJOxP8EkxR7FDEuO99UFZ7TXQ1CF7ots4wIs5tEpQvcdLnvBjJckp0fNBFTuGMm
FCvhgBK30NC93U4DxQv6xZBhqtvHYjHcTOXvz2fryRJT2teMN+eI+RDdV1Jj8Y=
scaleup_occ2_ac_secret: !encrypted/pkcs1-oaep
- LfUHhslK41JDp3CpslWGGA4bZ3udZh4KnytcXohkdbchb8QVt8eNc4nD0ti0/XS18YKwq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=
syseleven_dus2_ac_id: !encrypted/pkcs1-oaep
- SjwtIvJO7DkLJDmS+T/Z5utFBa22hmPRBd8mzonJHGgURB2W7fmXFreD9NPrLfbt7ujKi
KNqJm8k1Vr1F3Mu+Osr0BWSnq5makwVt2ikBY4qPbL8iyVXsByaT/HNPLCOokqy+REpfu
Expand Down
2 changes: 1 addition & 1 deletion Standards/scs-0102-v1-image-metadata.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
title: SCS Image Metadata Standard
title: SCS Image Metadata
type: Standard
stabilized_at: 2022-10-31
status: Stable
Expand Down
8 changes: 4 additions & 4 deletions Standards/scs-0115-v1-default-rules-for-security-groups.md
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ Administrator (abbr. Admin)

### Default Security Groups, Custom Security Groups and default Security Group Rules

To properly understand the concepts in this standard and avoid ambiguity, is very important to distinguish between the following similar-sounding but different resources in the OpenStack Networking API:
To properly understand the concepts in this standard and avoid ambiguity, it is very important to distinguish between the following similar-sounding but different resources in the OpenStack Networking API:

1. default Security Group
2. custom Security Group
Expand Down Expand Up @@ -59,10 +59,10 @@ Therefore, this standard proposes default Security Group rules that MUST be set

## Design Considerations

Up to the 2023.1 release (antelope) the default Security Group rules are hardcoded in the OpenStack code.
We should not require to change this behavior through code changes in deployments.
Up to the 2023.1 release (Antelope) the default Security Group rules are defined in the OpenStack code.
We should not require changing this behavior through code changes in deployments.

Beginning with the 2023.2 release (bobcat) the default Security Group rules can now be edited by administrators through an API.
Beginning with the 2023.2 release (Bobcat) the default Security Group rules can now be edited by administrators through an API.
All rules that should be present as default in Security Groups have to be configured by admins through this API.

There are two ways to approach a standard for the default rules of Security Groups.
Expand Down
5 changes: 5 additions & 0 deletions Standards/scs-0116-w1-key-manager-implementation-testing.md
Original file line number Diff line number Diff line change
Expand Up @@ -44,6 +44,11 @@ This can be done with a small change in the policy.yaml file. The `creator` has
The check for the presence of a Key Manager is done with a test script, that checks the presence of a Key Manager service in the catalog endpoint of Openstack.
This check can eventually be moved to the checks for the mandatory an supported service/API list, in case of a promotion of the Key Manager to the mandatory list.
### Implementation
The script [`check-for-key-manager.py`](https://github.com/SovereignCloudStack/standards/blob/main/Tests/iaas/key-manager/check-for-key-manager.py)
connects to OpenStack and performs the checks described in this section.

## Manual Tests

It is not possible to check a deployment for a correctly protected Master KEK automatically from the outside.
Expand Down
2 changes: 1 addition & 1 deletion Standards/scs-0118-v1-taxonomy-of-failsafe-levels.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
title: Taxonomy of Failsafe Levels
title: SCS Taxonomy of Failsafe Levels
type: Decision Record
status: Draft
track: IaaS
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
---
title: _End-to-End Encryption between Customer Workloads_
type: Decision Record
status: Proposal
status: Draft
track: IaaS
---

Expand Down
1 change: 1 addition & 0 deletions Tests/config.toml
Original file line number Diff line number Diff line change
Expand Up @@ -26,6 +26,7 @@ subjects = [
"poc-kdo",
"poc-wgcloud",
"regio-a",
"scaleup-occ2",
"syseleven-dus2",
"syseleven-ham1",
"wavestack",
Expand Down
Loading

0 comments on commit 1d43d14

Please sign in to comment.