Skip to content

Commit a2a1817

Browse files
authored
Replace gx-scs by SCS2. (#885)
Signed-off-by: Kurt Garloff <[email protected]>
1 parent 2584f35 commit a2a1817

File tree

10 files changed

+60
-66
lines changed

10 files changed

+60
-66
lines changed

.github/scs-compliance-check/openstack/clouds.yaml

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,10 @@
11
clouds:
2-
gx-scs:
2+
scs2:
3+
auth_type: "v3applicationcredential"
34
auth:
4-
auth_url: https://api.gx-scs.sovereignit.cloud:5000
5-
username: "u500924-svc-standards"
6-
project_id: 3829cc7c8f034fc985f5055a1df6f247
7-
project_name: "p500924-scs-healthmonitor"
8-
user_domain_name: "d500924"
9-
region_name: "RegionOne"
5+
auth_url: https://scs2.api.pco.get-cloud.io:5000
6+
application_credential_id: "f8f301ccf04047589afac62665227edd"
7+
region_name: "scs2"
108
interface: "public"
119
identity_api_version: 3
1210
pco-prod1:
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
1-
name: "Compliance IaaS v4 of gx-scs"
1+
name: "Compliance IaaS v4 of scs2"
22

33
on:
4-
# Trigger compliance check every day at 4:30 UTC
4+
# Trigger compliance check every day at 4:45 UTC
55
schedule:
6-
- cron: '30 4 * * *'
6+
- cron: '45 4 * * *'
77
# Trigger compliance check after Docker image has been built
88
workflow_run:
99
workflows: [Build and publish scs-compliance-check Docker image]
@@ -13,11 +13,11 @@ on:
1313
workflow_dispatch:
1414

1515
jobs:
16-
check-gx-scs:
17-
uses: ./.github/workflows/scs-compliance-check.yml
16+
check-scs2:
17+
uses: ./.github/workflows/scs-compliance-check-with-application-credential.yml
1818
with:
1919
version: v4
2020
layer: iaas
21-
cloud: "gx-scs"
22-
secret_name: "OS_PASSWORD_GXSCS"
21+
cloud: "scs2"
22+
secret_name: "OS_ACSECRET_SCS2"
2323
secrets: inherit
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
1-
name: "Compliance IaaS v3 of gx-scs"
1+
name: "Compliance IaaS v5 of scs2"
22

33
on:
4-
# Trigger compliance check every day at 4:30 UTC
4+
# Trigger compliance check every day at 4:25 UTC
55
schedule:
6-
- cron: '30 4 * * *'
6+
- cron: '25 4 * * *'
77
# Trigger compliance check after Docker image has been built
88
workflow_run:
99
workflows: [Build and publish scs-compliance-check Docker image]
@@ -13,11 +13,11 @@ on:
1313
workflow_dispatch:
1414

1515
jobs:
16-
check-gx-scs:
17-
uses: ./.github/workflows/scs-compliance-check.yml
16+
check-scs2:
17+
uses: ./.github/workflows/scs-compliance-check-with-application-credential.yml
1818
with:
19-
version: v3
19+
version: v5
2020
layer: iaas
21-
cloud: "gx-scs"
22-
secret_name: "OS_PASSWORD_GXSCS"
21+
cloud: "scs2"
22+
secret_name: "OS_ACSECRET_SCS2"
2323
secrets: inherit

.zuul.d/config.yaml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,10 +8,10 @@
88
- scs-check-all
99
periodic-hourly:
1010
jobs:
11-
- scs-check-gx-scs-main
11+
- scs-check-scs2-main
1212
post:
1313
jobs:
14-
- scs-check-gx-scs
14+
- scs-check-scs2
1515
check:
1616
jobs:
1717
- scs-check-adr-syntax
@@ -22,7 +22,7 @@
2222
pre-run: playbooks/pre.yaml
2323
run: playbooks/adr_syntax.yaml
2424
- job:
25-
name: scs-check-gx-scs
25+
name: scs-check-scs2
2626
parent: base
2727
secrets:
2828
- name: clouds_conf
@@ -35,11 +35,11 @@
3535
- playbooks/pre_cloud.yaml
3636
run: playbooks/compliance_check.yaml
3737
- job:
38-
name: scs-check-gx-scs-main
39-
parent: scs-check-gx-scs
38+
name: scs-check-scs2-main
39+
parent: scs-check-scs2
4040
branches: main
4141
- job:
4242
name: scs-check-all
43-
parent: scs-check-gx-scs-main
43+
parent: scs-check-scs2-main
4444
vars:
4545
preset: all

.zuul.d/secure.yaml

Lines changed: 22 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -35,28 +35,6 @@
3535
JWvUvQl33JFC1jzIoQ7Rph6c660fRmz377jwjqx9/+bkHwLozGCP/9XrZVcizefEJM6jD
3636
eHRcpMpjuyFJLyNKnEF1lp58sfVQoJfVHTIvmzS9erVJhU/zjyeDFPsrLFweV7/5QzRvI
3737
lDiXrfj+X40EQvPrkSBJj/BIBYl+RuF8PfYnV4jqaQBwFNNBQoL/hGEotZa5h4=
38-
gx_scs_ac_id: !encrypted/pkcs1-oaep
39-
- uTdKdJXEzdx0pFAOAxR3054IdWqY1Hpjo/HQoNTJrXwT1yKFS2lkXk4LZWfVy2pnkk+I8
40-
T3vpvonxb8hwkZQLZRbauzLmuCrjWpM6u2Nu2aY6bppFkj26t/VZ2/ovFjWmKL2isd7qx
41-
iZPaVcniFLG/nEUeH3Jaq0dnGgoE1k8jRj+ke4tw8gy+KVVy51Ok9g1dq4AtTAtl04KkR
42-
Xcu9O2gFQaN6aikbbr5Nh4tJJAlbybSk0pbPD9e5Kj9aamls7rHLaJCzdh2BBAYfdBejp
43-
iuCcY15cauNiwYCAHVmnz+E0gDA4IfIH224Id8LrlO8xp5r0+hd1nWZw48jjk5ozZLIFv
44-
Ud7DsPoTKs8zhME7tIglbdzVFllc5L3IF5mSpvc5mKfvT8b4bNN5T7fOgpsUYyorpzE0G
45-
5oWNW5dG0YsK+6UkbUGIgHFHOBQbZ1qhthb+QQ7bvFUiMEft6Sbga1p1DXi6P++b8tsCQ
46-
L9e0LdDMqK5vWlbcM1xYbjqhuYYSHwPqqMrAYVc5/rlLIsXJEHEt8s/D4/0rX20VAE/Ii
47-
1CQMRyU7sgVQqaS9YPoVyGFdaL8FoVAbyageQxWSTjFVXZ4EUmrsncOcxAVrVmWOZmIZn
48-
wrZYNjAYSkHWnHIO2gFoC8QtnThb0i4htmRf1Nv2YGWWyUxA32JbIyliS2O57k=
49-
gx_scs_ac_secret: !encrypted/pkcs1-oaep
50-
- QmUbdGH6ZrkVaL7qV8P0lxKn/kvpEREmf8MffxWvQb+zeWs4y2O8A4TNl/tGRjmJzV7Vk
51-
tkte+bdazt7fG665WxKaUI8exkuLYCA3fPPp00/7CyhYDc24bWG/BH0ypEWpjfzInxv3Q
52-
waqjvC4O3tp2oNX9wIicrZuDVfdDywCHgkEdApQpjJZqe0VifjZ4/Arj3m4sCA9yCj3gW
53-
PUa8kDgGheYYqyIETAbKAskcUbRNUrKGkDZBMfYqXSuXLRDbjk4G2RZK74E56s7iZcW51
54-
FLBVFrdfU+EV/haAIkLPacQ05xbtsLJ9tUdmy4gjd2lzA7CQxtZ3Kf6p9lWXk/xvnHvdv
55-
SLvQPsWV1/6WeLaBq+m2ncajWrJW2WyltxEfUF4jYTroM1bw+b4OiYOhSwFDipzyYpTwY
56-
zxFSwfmhHvkwPdeinjK2s04XmDLBGjfYFGvGwMKpEIYC9/hoBNQcSV26k2CKIPMX2Wb+z
57-
TW7x5U3evZ22RResSQrIxZGt1xOvYFVw8KK8n243pL1tk0VtRtlEpNNVLbY7Zm8dUj9mU
58-
ogEUIbRB2NVl904YLtqD1u/jasBYsvdvB7HmcXQmh+8/lybh5ouBP2ZTdSNnPy2tZDTTB
59-
aqdJ+oJYtAwnm+e5fR8ddqvfcEW6eq8D7ouahjNYcbWT7K2ZjWlR2HxrqJJRxs=
6038
cc_rrze_ac_id: !encrypted/pkcs1-oaep
6139
- DUgJ7ozJOzJq1TSmBE6P8RGAW6C+s9LDRbW6mHIbAQlAX3+21d/KgoLk9zEyDdOanK1yd
6240
QaEZJDjURsIAcHJh7vh9w/2Z948XKDybxIOb1tcJGJU1LsEmYoNAQXM5G3+l8Z66Crpgw
@@ -321,3 +299,25 @@
321299
cYBWMsILDfv/7AR2lE+QTCxtL3gqPbjX5h0XlIXS/8p+xuA04pvSA6MWWCOuEUgQyt7i2
322300
6QnUC2DdYiVKGf54pBGuyilsBlH9Hmmcpa3UFrFQhGJjvZ1+M+8shFH3m238UYu72Q57q
323301
JZBtAU3zdwqDrDe5d/EfGSDE9FFLoMvColJpwLeY4zhP3XK6MrDnjwkMGMpsrE=
302+
scs2_ac_id: !encrypted/pkcs1-oaep
303+
- Y8BQv9PqamMnqL72LDSTxIE7qKQUz8pclYYZV2MhBbspuzBzs9/a3dMXyrOL1HyFacGZo
304+
IPYnTG7BnnQLup0iwNoL2DMmsut69c0nLXIId2+hmH2/inW9GmEN12zE70nSG1jhGqAm/
305+
V6q814Ef0O+bnvs8Abr06w2mWDAtbyZeAD7K7UzsQpz1SzyJKidRltQQNuI5cCpPCenkm
306+
5Co9q0df8E3JeLwOa96Y1Xb4bHXmh0sfDTsc2DNGOAE3+wWc2iYMYIvCqrIvYmTUJMX+z
307+
IqGJ3Ca1Py27xl7hOhlwFerJdTZTB1YZ61T5+RAbJ9LzNhP6hzQscArYLJHCMclxH7kI4
308+
SH778FfSPK7nJmkAK8T6D8uFLuJmw7aNhuUPcRTIWrvMic1Pe+y12OJa2mCF3ULiaj+Ct
309+
roCW3hPBVOwQPe1LsgoT2pUbhhA4Gej5vDeGSgcCqwFyZMK+9F4y6ueGeupYgaenSSNSA
310+
oDvjYvE7IAceBqpm06miDNIMHRiHOfKvS7GWmN64axgoFvL8PwpjHmufOg5tvDqAPhNPo
311+
ymNxEuQbPyXz6uEvqkIzXNqJD1Rso9lzDSpmuw0DGYiURINAlJ5+aIKd1I80E5jnYqWDi
312+
AzoVDdcc8rs5dSv5EVUNgHAZbhoGXCrDG4Rle3W7O7OjYRhujWfPvOsZpKshus=
313+
scs2_ac_secret: !encrypted/pkcs1-oaep
314+
- IKyt7UBMh6ByyMYriD1348U14YAeDyshpizDi+JFRKMUTHfGOMt8ymMwvSNjZNl0lDq05
315+
hj+5eihgASkXeKrDVqqB/UV1eB5romShC72AyoeenR33ydfXhpscAW6Ygsx1o1k49FDVa
316+
zc7xe4T6dEcGfuXCELUcC6bl7LiOh4lX8fKUie1liq5l3yonYGgKQ00kLMTd3NkEiIzan
317+
HJF6ezLq2AvJPHBeoa7x0yGUk6IwJGafL++kiYNUqbzYP1MG0JJyMbHP4svM/Fq/IiO6y
318+
HBoLT0zc3owQ3JUxysQ+jDCeltLvwdwEtl7T10+xtSYsOQnsoN+/KTqW3+jrFHEAI0xDc
319+
v3X81xZb9zW6aEQc75Upx0fnDOBHPnGBziHG+4m8YrIkMthJ812v0Xrwi1VH6sFac1lET
320+
dOvR0LsXw1t/N8T7JbmzsJ7TTluN32iegt9mZ0syXHJyNr6DuUs3P6iDoOlRUzv+UzIJP
321+
PHOVS1umROCJJi/5T78EA4ukDdFN/zdEktGauSDqUVRPASodV8Q3qvN6PgskPh1dQgxwB
322+
Po9R1405It3aQtBiXnT+38eKAd1nTJkaRlC03VgbeV+XrjMI1YsMQDAt+YhMKSfys1ZhB
323+
n6Dw+nc3Qi21G/CnY45rFUMLGTzevukKuHeiApf+eX4PdNQ1LPkUGrHdNnqkj8=

Tests/config.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ scopes = [
88
"scs-compatible-iaas",
99
]
1010
subjects = [
11-
"gx-scs",
11+
"scs2",
1212
]
1313

1414

@@ -17,7 +17,7 @@ scopes = [
1717
"scs-compatible-iaas",
1818
]
1919
subjects = [
20-
"gx-scs",
20+
"scs2",
2121
"artcodix",
2222
# currently not reachable from outside: "cc-rrze",
2323
"pco-prod1",

compliance-monitor/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ accounts:
9090
- read_any # can read non-public details of compliance results for any subject
9191
- admin # can cause reload of the bootstrap file, among other things
9292
- approve # can approve non-pass results
93-
- subject: gx-scs
93+
- subject: scs2
9494
api_keys: []
9595
keys: []
9696
```

compliance-monitor/bootstrap.yaml

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -15,13 +15,9 @@ accounts:
1515
public_key_name: "zuul_ci_sign"
1616
roles:
1717
- append_any
18-
- subject: gx-scs
18+
- subject: scs2
1919
delegates:
2020
- zuul_ci
21-
keys:
22-
- public_key: "AAAAC3NzaC1lZDI1NTE5AAAAILufk4C7e0eQQIkmUDK8GB2IoiDjYtv6mx2eE8wZ3VWT"
23-
public_key_type: "ssh-ed25519"
24-
public_key_name: "primary"
2521
- subject: artcodix
2622
delegates:
2723
- zuul_ci

compliance-monitor/templates/overview.md.j2

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,9 +8,9 @@ Version numbers are suffixed by a symbol depending on state: * for _draft_, †
88
{% set iaas = '50393e6f-2ae1-4c5c-a62c-3b75f2abef3f' -%}
99
| Name | Description | Operator | [SCS-compatible IaaS](https://docs.scs.community/standards/scs-compatible-iaas/) | HealthMon |
1010
|-------|--------------|-----------|----------------------|:----------:|
11-
| [gx-scs](https://github.com/SovereignCloudStack/docs/blob/main/community/cloud-resources/plusserver-gx-scs.md) | Dev environment provided for SCS & GAIA-X context | plusserver GmbH |
12-
{#- #} [{{ results | pick('gx-scs', iaas) | summary }}]({{ detail_url('gx-scs', iaas) }}) {# -#}
13-
| [HM](https://health.gx-scs.sovereignit.cloud:3000/) |
11+
| [scs2](https://docs.scs.community/community/cloud-resources/plusserver-gx-scs) | Dev/Test/Demo environment (2nd gen) provided for SCS & GAIA-X context | plusserver GmbH |
12+
{#- #} [{{ results | pick('scs2', iaas) | summary }}]({{ detail_url('scs2', iaas) }}) {# -#}
13+
| [HM](https://health.prod1.plusserver.sovereignit.cloud:3000/d/9ltTEmlnk/openstack-health-monitor2?orgId=1&refresh=5m&var-mycmd=All&var-mymethod=All&var-mywait=All&var-mybench=All&var-mycloud=gx-scs2) |
1414
| [aov.cloud](https://www.aov.de/) | Community cloud for customers | aov IT.Services GmbH |
1515
{#- #} [{{ results | pick('aov-cloud', iaas) | summary }}]({{ detail_url('aov-cloud', iaas) }}) {# -#}
1616
| [HM](https://health.aov.cloud/) |

playbooks/clouds.yaml.j2

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
---
22
clouds:
3-
gx-scs:
3+
scs2:
44
auth:
5-
auth_url: https://api.gx-scs.sovereignit.cloud:5000
6-
application_credential_id: "{{ clouds_conf.gx_scs_ac_id }}"
7-
application_credential_secret: "{{ clouds_conf.gx_scs_ac_secret }}"
8-
region_name: "RegionOne"
5+
auth_url: https://scs2.api.pco.get-cloud.io:5000/
6+
application_credential_id: "{{ clouds_conf.scs2_ac_id }}"
7+
application_credential_secret: "{{ clouds_conf.scs2_ac_secret }}"
8+
region_name: "scs2"
99
interface: "public"
1010
identity_api_version: 3
1111
auth_type: "v3applicationcredential"

0 commit comments

Comments
 (0)