Skip to content

Commit 6d2d56e

Browse files
committed
Merge remote-tracking branch 'origin/main' into rholling-SCS-docs
2 parents e62815b + c96a0be commit 6d2d56e

File tree

17 files changed

+425
-597
lines changed

17 files changed

+425
-597
lines changed

.gitignore

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,13 @@
11
# Content Dependencies from docs.package.json
22
/repo_to_be_edited_
33
/docs/02-iaas/components
4+
/docs/02-iaas/guides
5+
/docs/02-iaas/guides/configuration-guides
6+
/docs/02-iaas/guides/deploy-guide
7+
/docs/02-iaas/guides/operations-guide
8+
/docs/02-iaas/guides/troubleshooting-guides
9+
/docs/02-iaas/guides/upgrade-guides
10+
/docs/02-iaas/guides/index.md
411
/docs/02-iaas/deployment-examples/cloud-in-a-box
512
/docs/02-iaas/deployment-examples/testbed
613
/docs/03-container/components

README.docs.md

Lines changed: 0 additions & 1 deletion
This file was deleted.

README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@
33
## Licenses
44

55
The content of this repository is published under multiple licenses.
6-
All files within `docs` are licensed under [CC-BY-SA 4.0](LICENSE-DOCS).
7-
All source code is licensed under the [MIT](LICENSE-CODE) license.
6+
All documentation content files within `docs, dev-docs, standards and community` are licensed under [CC-BY-SA 4.0](LICENSE-DOCS).
7+
All source code of this documentation page is licensed under the [MIT](LICENSE-CODE) license.
88

99
## Overview
1010

dev-docs/operations/iam/identity-federation-in-scs.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,13 +13,15 @@ to achieve that goal. To simplify connecting the different parts of SCS
1313
to customer owned IAM solutions, SCS deploys Keycloak as central Identity
1414
Provider (IdP) service.
1515

16+
Currently this is deployed automatically only in the [osism/testbed](https://docs.scs.community/docs/iaas/guides/deploy-guide/examples/testbed/),
17+
which provides [its own documentation for authentication with OIDC](https://docs.scs.community/docs/iaas/guides/deploy-guide/examples/testbed#authentication-with-oidc).
18+
1619
The following sections describe how this is done.
1720

1821
## 1. IaaS / OpenStack
1922

2023
To provide Infrastrucure as a Service SCS builds upon
21-
OpenStack. See the `openstack-federation-via-oidc` document
22-
in [the iam section of this documentation](https://docs-staging.scs.community/docs/iam/)
24+
OpenStack. See section [OpenStack Federation via OpenID-Connect](https://docs.scs.community/dev-docs/operations/iam/openstack-federation-via-oidc)
2325
for more details on identity federation for OpenStack.
2426

2527
## 2. CaaS

dev-docs/operations/operations/zuul-ci-cd-quickstart-user-guide.md

Lines changed: 48 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -279,13 +279,15 @@ For this purpose Zuul creates its own public/private key pair for each project.
279279
public key to create secrets. But only Zuul will be able to decrypt these values. To avoid the user
280280
to be responsible for the correct encryption there is an zuul-client tool that will do this for you.
281281

282-
Example:
282+
Example (reading from stdin and writing to stdout):
283283

284284
```bash
285-
zuul-client --zuul-url ZUUL_URL encrypt --tenant TENANT --project ORGANIZATION/PROJECT --infile creds.yaml --outfile clouds.yaml.enc
285+
zuul-client --zuul-url ZUUL_URL encrypt --tenant SCS --project SovereignCloudStack/REPO
286286
```
287287

288-
The content may look like this:
288+
Add `--infile INFILE` or `--outfile OUTFILE` if you prefer to work with files directly.
289+
290+
The output might look like this:
289291

290292
```yaml
291293
- secret:
@@ -307,6 +309,22 @@ The content may look like this:
307309
You may use this content or the file to provide it as a secret. You just have to update the `<name>` and the
308310
`<fieldname>` part.
309311

312+
The secret name has to be unique across all projects. Because of this, we have a naming convention in the
313+
`SovereignCloudStack` organisation that ensures that a secret has a unique name.
314+
315+
Our convention is as follows. There is only one secret per Zuul configuration per project (for exceptions,
316+
see below). This secret always has a name in the form
317+
`SECRET_REPOSITORY_NAME`. For instance, if a secret in the `SovereignCloudStack/k8s-cluster-api-provider`
318+
repository is
319+
to be used, it is given the name `SECRET_K8S_CLUSTER_API_PROVIDER`. The name of the repository is
320+
always written in capital letters. A dash is replaced with an underscore. Any number of values
321+
(`<fieldname>: !encrypted/pkcs1-oaep`) can then be assigned to this one secret.
322+
323+
In certain cases, it can be undesireable to expose all secret information to all jobs in a project.
324+
Then additional secrets may be used, whose names have to be formed by appending an underscore and some
325+
upper-case prefix to the name of the primary secret. For instance, we might use the
326+
name `SECRET_REPOSITORY_NAME_FOOBAR`.
327+
310328
Official documentation:
311329

312330
1. [Secrets documentation](https://zuul-ci.org/docs/zuul/latest/config/secret.html#secret)
@@ -320,30 +338,47 @@ For a basic but working example the following content may be written into a `zuu
320338
# zuul.yaml content
321339
---
322340
- secret:
323-
name: mySecret
341+
name: SECRET_REPOSITORY_NAME
324342
data:
325-
secretValue: !encrypted/pkcs1-oaep
326-
- <ENCYPTED_DATA>
343+
secretValue1: !encrypted/pkcs1-oaep
344+
- <ENCRYPTED_DATA>
345+
secretValue2: !encrypted/pkcs1-oaep
346+
- <ENCRYPTED_DATA>
347+
secretValue3: !encrypted/pkcs1-oaep
348+
- <ENCRYPTED_DATA>
327349
328350
- job:
329351
name: myFirstTestJob
330352
parent: base
331353
secrets:
332-
- name: secretName # The name of the secret that is used within "playbooks/testPlaybook.yaml"
333-
secret: mySecret
354+
- name: secretName # The name of the secret that is used within "playbooks/testPlaybook.yaml"
355+
secret: SECRET_REPOSITORY_NAME
334356
run: playbooks/testPlaybook.yaml
335357
358+
- job:
359+
name: mySecondTestJob
360+
parent: base
361+
run: playbooks/testPlaybookTwo.yaml
362+
336363
- project:
337-
check:
364+
tag:
338365
jobs:
339366
- myFirstTestJob
367+
check:
368+
jobs:
369+
- mySecondTestJob
340370
```
341371

342-
This will run you job `myFirstTestJob` when ever the `check` pipeline is triggered.
343-
Within SCS this pipeline is always triggered if you open, change or reopen a pull request.
344-
The `check` pipeline can also be triggered manually if you write a comment on an already
372+
This will run the job `myFirstTestJob` whenever the `tag` pipeline is triggered, and
373+
`mySecondTestJob` whenever `check` is triggered.
374+
375+
Within SCS the `check` pipeline is always triggered if you open, change or reopen a pull request.
376+
This pipeline can also be triggered manually if you write a comment on an already
345377
existing pull request and place the string `recheck` in it.
346378

379+
Recall that the first test job cannot run on the same pipeline because it uses a secret.
380+
The `tag` pipeline is run whenever a new tag is created.
381+
347382
The path to you playbook is always the full path within the repository. The playbook
348383
contains the tasks you actually want to run on all or a specific subset of nodes.
349384
Example playbook:
@@ -354,5 +389,5 @@ Example playbook:
354389
- hosts: all
355390
tasks:
356391
- debug:
357-
msg: 'Debug print my secrets! {{ secretName.secretValue }}' # do not do this as it will expose your secrets
392+
msg: 'Debug print my secrets! {{ secretName.secretValue1 }}' # do not do this as it will expose your secrets
358393
```

docs.package.json

Lines changed: 4 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -7,13 +7,7 @@
77
},
88
{
99
"repo": "osism/osism.github.io",
10-
"source": "docs/guides/operations-guide/openstack/image-manager.md",
11-
"target": "docs/02-iaas/components",
12-
"label": ""
13-
},
14-
{
15-
"repo": "osism/osism.github.io",
16-
"source": "docs/guides/operations-guide/openstack/flavor-manager.md",
10+
"source": "docs/guides/operations-guide/openstack/day2-operations/*",
1711
"target": "docs/02-iaas/components",
1812
"label": ""
1913
},
@@ -37,8 +31,8 @@
3731
},
3832
{
3933
"repo": "osism/osism.github.io",
40-
"source": "docs/advanced-guides",
41-
"target": "docs/02-iaas/deployment-examples",
42-
"label": "cloud-in-a-box"
34+
"source": "docs/guides",
35+
"target": "docs/02-iaas/",
36+
"label": ""
4337
}
4438
]

docs/02-iaas/guides/guide1.md

Lines changed: 0 additions & 3 deletions
This file was deleted.

docs/08-faq/index.mdx

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ A standardized environment promotes interoperability, reduces vendor lock-in, an
1818

1919
## Where can I find the SCS standards?
2020

21-
The SCS standards are available on the standards pages within our documentation page. [Find them here](https://docs.scs.community/standards/)
21+
The SCS standards are available on the standards pages within our documentation page. [Find them here](https://docs.scs.community/standards)
2222

2323
## How is the SCS different from other cloud environments (e.g. AWS, Azure,...)?
2424

@@ -46,7 +46,7 @@ IaaS stands for Infrastructure as a Service, providing virtualized computing res
4646

4747
## How is the IaaS layer structured?
4848

49-
IaaS typically comprises virtual machines, storage, and network resources, all offered as scalable services. [Find the architecture here](#)
49+
IaaS typically comprises virtual machines, storage, and network resources, all offered as scalable services. [Find the architecture here](https://doc.scs.community/docs/category/iaas-layer)
5050

5151
## What does CaaS mean? (Container Layer)
5252

@@ -56,27 +56,27 @@ CaaS refers to Container as a Service, where providers offer container orchestra
5656

5757
**As a user**:
5858

59-
- Existing SCS Clouds: Explore and test on any of the cloud providers offering SCS. [Choose one from here](#)
59+
- Existing SCS Clouds: Explore and test on any of the cloud providers offering SCS. [Choose one from here](https://doc.scs.community/standards/certification/overview#compliant-cloud-environments)
6060

6161
**As a Cloud Service Provider**:
6262

63-
- **Cloud in a Box**: Start with our pre-packaged solutions. [Link to Ciab](#)
64-
- **Testbed**: Use the SCS test environment to experiment. [Link to Testbed/deployment example](#)
63+
- **Cloud in a Box**: Start with our pre-packaged solutions. [Link to Ciab](https://doc.scs.community/docs/iaas/deployment-examples/cloud-in-a-box/advanced-guides/cloud-in-a-box)
64+
- **Testbed**: Use the SCS test environment to experiment. [Link to Testbed/deployment example](https://doc.scs.community/docs/iaas/deployment-examples/cloud-in-a-box/advanced-guides/testbed)
6565

6666
## I want to use an SCS Cloud! How do I get started?
6767

6868
**As a user**:
6969

70-
- Browse our [list of providers](#) and choose one that fits your needs.
70+
- Browse our [list of providers](https://doc.scs.community/standards/certification/overview#compliant-cloud-environments) and choose one that fits your needs.
7171

7272
**As a Cloud Service Provider**:
7373

74-
- Adopt SCS standards and utilize our [resources and tools](#) to integrate them.
74+
- Adopt SCS standards and utilize our [resources and tools](https://doc.scs.community/docs/category/components) to integrate them.
7575

7676
## I want to use the SCS in my company and build my own cloud! Where do I start?
7777

78-
Start by understanding SCS standards and then move on to the reference implementation. [Link to guide](#).
78+
Start by understanding SCS standards and then move on to the reference implementation. [Link to guide](https://doc.scs.community/standards/)).
7979

8080
## I have a technical problem. Where can I find help?
8181

82-
Refer to our support section or check our community channels for assistance. [Link to community](#).
82+
Refer to our support section or check our community channels for assistance. [Link to community](https://doc.scs.community/community).

0 commit comments

Comments
 (0)