Skip to content

Commit e7ac723

Browse files
authored
Merge branch 'main' into dependabot/go_modules/Tests/kaas/kaas-sonobuoy-tests/go_modules-985326579b
2 parents 46edefc + 4b4ce03 commit e7ac723

File tree

83 files changed

+3227
-2467
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

83 files changed

+3227
-2467
lines changed

.github/workflows/build-docker.yml

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,11 @@ name: Build and publish scs-compliance-check Docker image
33
'on':
44
# Allows you to run this workflow manually from the Actions tab
55
workflow_dispatch:
6+
push:
7+
branches:
8+
- main
9+
paths:
10+
- 'Tests/**'
611

712
env:
813
REGISTRY: ghcr.io
@@ -31,6 +36,10 @@ jobs:
3136
uses: docker/metadata-action@v5
3237
with:
3338
images: ${{ env.REGISTRY }}/${{ github.repository_owner }}/${{ env.IMAGE_NAME }}
39+
tags: |
40+
type=raw,value=latest
41+
type=ref,event=branch
42+
type=sha
3443
3544
- name: Build and push Docker image
3645
uses: docker/build-push-action@v5

.zuul.d/secure.yaml

Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -79,6 +79,50 @@
7979
o9slrGAyL7g3zdjNlUJA04U33SNCvaCxL8fac6JZ15vrqeW4g4AB4+rx7fYKAnOVg2FOL
8080
5jMOKsiGgfLvz1KZ9c6Q1ThfeCQzG9waWJnyCx2R2tEtyQ17hIW6Rzo1RzmQkUyvLN9TJ
8181
CLSZCUoR+2Ut+ZlpDi3vVushWWLXyjj8ojblTO/zqlbQ1A+7d/C+5x2mrh2T/0=
82+
cnds_ro_ac_id: !encrypted/pkcs1-oaep
83+
- l2IMEJwkw8xqgzKvCkPgGVzoBNiMrj/+oNfq3dvFyLU8f/AJ8XDMsmaeNBj/hSGY6O3ar
84+
Qs8ckn6BUTD253Ft8izsvv7E535KN/o5IhN7f+juKri1jVus/XLkrx3t3exHL1piSy0y/
85+
y5k1FGpEclmzyEdtaCorEOQraXRCLAOmyYba6aCt5YhPVJkOjv8Aupy7Y/tSHXdsFKgZt
86+
fJItALWehZVbYtl4WHpmrPwV0uW8mKo/T41o2aJDJ3a2BRodqVvTNSZb9YNnLyBkxW+Kc
87+
w1AAk9E2U+tinWxFAJQAE42JZIesv6F9SoJhl9ViYsENjNtwdpndrrF1j2BmmiqJ1kVwp
88+
y4UHnheNUBsIXe2RUnRq2z0m0rQ/kyQQSTluUV0QGnb34a3GuMqPCsiAAbFRuL6Ax8zXu
89+
UoQ+C6BCNXJJzyjbJC9CLILqHLqZUCkYimiBf4+GmoDEANNi5FUZgtwK0p9TJN/7KvLJ0
90+
h+73PtoCnVrnsYcaEu+tJO3Jfm43tilTRixTtVbWL1F+dgnBCdh3dFHm3l16npEMxpyR9
91+
2P6BKyeROBAwaBURc3UhtqZjwMc+YmYLGXRDjd/DKyLHJ0j27ONWCtQHbRzJZjxfvrMfC
92+
dyowl8wOxpgd3EiUDDufncD7JmKBcyJRQOvTTGJz6T3cP8h9b65103faoyVRo0=
93+
cnds_ro_ac_secret: !encrypted/pkcs1-oaep
94+
- KvlXdw4RIkzHwaZPeeI+lhycJboSRBh7DJ/43Q0sNP9o1vkJG72pSv8w2HhycZU95SU6g
95+
k0B5uMwIHpXiQnmjgA4f8lLMkI6ppA5FLL5F3LwsVIlfUI1x8aM8Zl+LyVHSZJ/0kP3l7
96+
QTEJ6DDNVdI6xftCkKQiABUCMYwgbZsU3c3rJeF/RAuCUtrs/gRv+2F4/es7UWaafYvQa
97+
gqx4nC7LGn+7q1UH4BIbwVQdjH8f7H1SSEkz4t1goNqgVMqqv24hNF/KMRRGfZ/Zv9zPt
98+
B+uczjb4Jc6zwJL/zF+sZc1pIt9zn/RijJTYv0BX+ldfMiOflST/FlXcMZqULXHnyQLK/
99+
iqaJcTfI7fv1OCUtpNc0n6dJhK8piU//1JQ3Yanov0QTdEo4OTRxirGxIobzJfFl+hf+8
100+
D5b1ZKqkPhoTGP/vjl1XzvV2QuJ+ZX6P9GWKJr4r/9b2RuwywD71fUbXqmEva3/THY2Sg
101+
gY6QHocYpATL46iLkv97QANNUxTdxL7hQjdl/tf3TAHjCclmxdWhBJdvCJN/1xCM6EgVp
102+
NykBYxJ+kxSmkcFCSdUM8Td75bA/UzkPCdix1reJMdEAxTE9fC55XQ/liTLlGquQDnZty
103+
VLDH7x3ZJcxZsvqKR6vNbYYzJvDPTBYpHrhD7kx3ubyO9KX+SzZ+Dfhe9M8T8U=
104+
focis_ac_id: !encrypted/pkcs1-oaep
105+
- KB/tDE/a07eU+xtwor1iLxhvRdA/6bgkZn2aCPvkYtKKoVmT6sXpfRl1t319WqZRIRkoh
106+
GK0d9KMJkVT+Q5sbZiSxMD24yMBvwaImIBG6OCzxjyklqal1SOt6CLx4q/uGoGl7QrPOM
107+
WcRoluG1FCoDeUewgaZ50TQD0TQ8YGxuhRZi6s8KldDrYVkB/9HBUmwNhgd2LhExmNbtR
108+
rRwV7nTJgy3bPDZzJHrKUBk04ZCP1gYRWB4DamsSDV1K+BxeiuxtL6QaoYqZPPWqNoCf3
109+
XL6zHCFWKXZM2gkkgZF0/MG8F0vUVILSL9ObF0/Ueozyxzs1oss3zfET2bR3WNNasP2+D
110+
NueSiYzurLlVcX0XmqSdcHwiNolc3sfnUAL1uHeRP/KNhRpe3P4nBIkAp+Z5OUw616YdG
111+
63CRWs/X/TdshOiMaScGwHGwytaSincar/7e8HM4EbHN5Gg8t1+/Qs2MopuPLyPcH8ogo
112+
YbdI4KBz6CcfrNdtut9XlmNLT91emT9ayC+XDqBypksHXHcypuqoOHMQUdjSPtXDLsI//
113+
dsSRxDL+4TtWaVovPAxaLGsiVohsoCEdAxBmYxbkA2DNYdOMf6glu7O4wMtEIjaBdzdfP
114+
CKfkOiwdCjtq++Ofn/C+3zI+2H+58TosQdCXcYIGmyKw5WSN7/sCosWDUtcsq4=
115+
focis_ac_secret: !encrypted/pkcs1-oaep
116+
- E8fpHXVmMa7ptAndyV8fqgC6tmGL9qmtpI10q1Yh6Qo0iIt09HNl8aZLtupmavTqYJg+D
117+
7BI3ziTG4PNfc6MK0rvsQE/jGCf/XGW7yyfrmcvok+8mwD7foya5gEDLvbxFuIUopdTEt
118+
Wk+5qLHNv87fKtQVGoda1qZXQ2ZjEw3sLv5eENLEft+u3XZnPLMVJ3p9ZGK0mvBcIfAlk
119+
qPpSigJhZSaKC0ndZsiWvIaD9lkKYVqcIs8BjVj0tH3DM9yxVT1Ky59aERWc4vKYnZTkN
120+
JxdLCVhWttT77qSXWZm1SE+GhqmmZRRh4xsnDWW7MMZ48OG36VOZOvOpk34sIzQ6+n/I4
121+
zL+bxnPw2vjF6PKbUWD2p8LFbiZbJ7VR4N0656MI3WOzkjMC3+CKIAm8jwJS94SNsGShA
122+
KRnp4y6eyZqWV+oJngIaIjz0wAQc/iocWaq7eiZBAjyrPAJjmOYgcHzkV/ryoZx+rLFi5
123+
ZxVGDNNZEUA4dAYW6o+aK6GG7yIAE57MoyIPToFBMngnvk2ao2Vyd2f+JL//6IjF4C/V9
124+
UjBCh4LVOwxibUQcm8m3hPmnnLTGF1cAKJTyfbP+gdYnYLjCAXBG2z/CubYAQUGV+eSwk
125+
a/d4ptd1S9331Cao1VeWUAI5vI28oyO/KIPrKpEBn0LmJwcLn9qEI6O1V6YvhA=
82126
poc_wgcloud_ac_id: !encrypted/pkcs1-oaep
83127
- dQIs3NJt1CpP1925+b9QjjwonqjmiuCl1ewxw160yIEHQ/qyQiwutJbsg4IYS9XKhKc2X
84128
GumOOpLY7+/uNRR5pZmEfOdlGnPoJvVhYtCqHBFy7xQ6NLHKFxCT8zHM9ppSl1Hjc2G2F

CODEOWNERS

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
* @mbuechse @depressiveRobot @fkr @garloff
2+
3+
/compliance-monitor/ @mbuechse @depressiveRobot
4+
5+
/Tests/ @mbuechse @depressiveRobot
6+
7+
# Members of the Project Board are the owners of the Community
8+
# Governance - see:
9+
# https://docs.scs.community/community/governance/project-board
10+
/Community-Governance/ @fkr @matofeder @garloff @jschoone @berendt
11+
Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
# Nominees 2026 Project Board
2+
3+
For the term 2025-12 - 2026-12 the following people are nominated / have nominated themselves:
4+
5+
| Name, Firstname | Github Handle | E-Mail |
6+
| ------------------- | -------------- | ----------------------------------- |
7+
| | | |

README.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,3 +27,8 @@ Testsuite and tools for SCS standards, see [Tests/README.md](https://github.com/
2727
### Drafts
2828

2929
Old Design-Docs folder with existing Architectural Decision Records (ADRs). This directory is currently in the process of being consolidated and cleaned up. See [cleanup step-1](https://github.com/SovereignCloudStack/standards/blob/main/Standards/scs-0002-v1-standards-docs-org.md#suggested-cleanup-step-1) and [open questions](https://github.com/SovereignCloudStack/standards/blob/main/Standards/scs-0002-v1-standards-docs-org.md#open-questions).
30+
31+
## License
32+
33+
The documents in this repository are licensed under CC-BY-SA-4.0 (Attribution-ShareAlike 4.0).
34+
The bundled software, scripts, test-cases are licensed under AGPLv3 (GNU AFFERO GENERAL PUBLIC LICENSE Version 3). The corresponding directories carry the LICENSE files accordingly.

Standards/scs-0001-v1-sovereign-cloud-standards.md

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ embedded in the markdown header.
107107
| Field name | Requirement | Description |
108108
| --------------- | -------------------------------------------------------------------------- | ------------------------------------------------------------------------------------- |
109109
| `type` | REQUIRED | one of `Procedural`, `Standard`, `Decision Record`, or `Supplement` |
110-
| `status` | REQUIRED | one of `Draft`, `Stable`, `Deprecated`, or `Rejected` |
110+
| `status` | REQUIRED precisely when `type` is not `Supplement` | one of `Draft`, `Stable`, `Deprecated`, or `Rejected` |
111111
| `track` | REQUIRED | one of `Global`, `IaaS`, `KaaS`, `IAM`, `Ops` |
112112
| `supplements` | REQUIRED precisely when `type` is `Supplement` | list of documents that are extended by this document (e.g., multiple major versions) |
113113
| `deprecated_at` | REQUIRED if `status` is `Deprecated` | ISO formatted date indicating the date after which the deprecation is in effect |
@@ -193,7 +193,9 @@ In case there is little or no activity in some team, the SIG Standardization/Cer
193193
can take decisions on behalf of such a team. The SIG will seek alignment with the Project
194194
Board for decisions with large impact to ensure we have the wanted broad alignment.
195195

196-
Supplements may be kept in Draft state, because they are not authoritative.
196+
From this perspective,
197+
Supplements are perpetually kept in phase Draft, because they are not authoritative,
198+
and this phase is not recorded in the document (i.e., no `status` field).
197199

198200
### Proposal phase
199201

@@ -223,8 +225,9 @@ for a Supplement of `scs-0100-v3-flavor-naming.md`,
223225
the file name might be `scs-0100-w1-flavor-naming-implementation-testing.md` (note the `w1`!).
224226

225227
The metadata MUST indicate the intended `track` and `type` of the document,
226-
and the `status` MUST be set to `Draft`;
227-
for a Supplement, the `supplements` field MUST be set
228+
and the `status` MUST be set to `Draft`,
229+
except for a Supplement;
230+
where, instead, the `supplements` field MUST be set
228231
to a list of documents (usually containing one element).
229232

230233
Upon acceptance by the group of people identified by the `track`,
@@ -285,6 +288,8 @@ Changes to the documents are gated through pull requests.
285288

286289
Once the document is deemed ready for production use,
287290
its `status` is changed to `Stable`.
291+
Additionally, the field `stabilized_at` MUST be added and set to a date after which the document is
292+
to be considered stable.
288293

289294
If the document in question is a `Standard`
290295
(and if applicable),

Standards/scs-0004-v1-achieving-certification.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -22,17 +22,17 @@ As operator, I want to obtain a certificate with the scope SCS-compatible IaaS o
2222

2323
1. Each certificate issued pertains to a given combination of subject (i.e., cloud environment), scope (such as _SCS-compatible IaaS_), and version of that scope. The certificate is only valid for that combination and for the time frame that ends when the scope expires, or for six months if the expiration date for the scope is not yet fixed.
2424

25-
2. The operator MUST ensure that the official [SCS compliance test suite](https://github.com/SovereignCloudStack/standards/tree/main/Tests) (which does not require admin privileges) is run at regular intervals and the resulting reports transmitted to the [SCS compliance monitor](https://github.com/SovereignCloudStack/standards/tree/main/compliance-monitor).
25+
2. The operator MUST ensure that the official [SCS compliance test suite](https://github.com/SovereignCloudStack/standards/tree/main/Tests) (which does not require admin privileges) is run at regular intervals and that all tests pass. The operator MUST submit the resulting reports to the [SCS compliance monitor](https://github.com/SovereignCloudStack/standards/tree/main/compliance-monitor).
2626

2727
For public clouds, the SCS certification assessment body can take on this task provided that suitable access to test subject is supplied.
2828

2929
The test suite is partitioned according to resource usage; the required test intervals depend on this classification:
3030

31-
- _light_: at least nightly,
31+
- _light_: at least daily,
3232
- _medium_: at least weekly,
3333
- _heavy_: at least monthly.
3434

35-
3. If the desired certificate requires manual checks, then the operator MUST offer the SCS project suitable documentation. Manual checks MUST be repeated once every quarter. In addition, the SCS certification assessment body reserves the right to occasionally verify documentation on premises.
35+
3. If the desired certificate requires manual checks, then the operator MUST offer suitable documentation to the SCS certification assessment body. The operator MUST ensure that these checks are repeated once every quarter. In addition, the SCS certification assessment body reserves the right to occasionally verify documentation on premises.
3636

3737
4. Details on the standards achieved, as well as the current state and the history of all test and check results of the past 18 months will be displayed on a public webpage (henceforth, _certificate status page_) owned by SCS.
3838

@@ -44,7 +44,7 @@ As operator, I want to obtain a certificate with the scope SCS-compatible IaaS o
4444

4545
7. If the certificate is to be revoked for any reason, it will be included in a publicly available Certificate Revocation List (CRL), maintained by the SCS certification assessment body. This fact will also be reflected in the certificate status page.
4646

47-
8. If any of the automated tests or manual checks fail after the certificate has been issued, the certificate is not immediately revoked. Rather, the automated tests MUST pass 99.x % of the runs, and the operator SHALL be notified at the second failed attempt in a row at the latest. In case a manual check fails, it has to be repeated at a date to be negotiated with the SCS certification assessment body. It MAY NOT fail more than two times in a row.
47+
8. If any of the automated tests or manual checks fail after the certificate has been issued, the certificate is not immediately revoked. Rather, the operator SHALL be notified automatically. The operator MUST then fix the issue and ensure that the automated tests run successfully again as quickly as possible. In case a manual check fails, it has to be repeated at a date to be negotiated with the SCS certification assessment body.
4848

4949
## Design Considerations
5050

Standards/scs-0004-w1-achieving-certification-implementation.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,6 @@
22
title: "Implementation hints for achieving SCS-compatible certification"
33
type: Supplement
44
track: Global
5-
status: Draft
65
supplements:
76
- scs-0004-v1-achieving-certification.md
87
---
@@ -20,12 +19,12 @@ that lets their applications run in a reliable way.
2019
The SCS certification process typically consists of a few simple steps:
2120

2221
1. Running the SCS compliance test suite and adjusting the infrastructure until it passes.
23-
2. Any additional declarations (for non-testable aspects) are written and passed to the SCS certification body.
22+
2. Any additional declarations (for non-testable aspects) are written and passed to the SCS certification assessment body.
2423
3. The operator must be a member ("shaper" or "advisor" level) of the Forum SCS-Standards in the
2524
OSB Alliance (a non-profit) and pay the respective membership fees. Alternatively fees can
2625
be paid without becoming a member.
2726
4. The cloud can be listed on the SCS pages as *SCS-compatible* with a compatibility status that is
28-
updated on a daily basis. SCS then tests the infrastructure on a daily basis.
27+
updated regularly. The infrastructure is then tested on a regular basis.
2928

3029
The precise rules that govern how certificates are issued or withdrawn are defined in the
3130
[SCS standard 0004](scs-0004-v1-achieving-certification.md).
@@ -59,8 +58,8 @@ criteria. In case of doubt, audits can be performed.
5958
The SCS brand belongs to the Open Source Business Alliance e.V. (OSBA), an non-profit organization and
6059
association for the Open Source Industry in Germany. After the completion of the funded SCS project
6160
in the OSBA on 2024-12-31, the OSBA sets up the Forum SCS-Standards
62-
which performs the work to evolve the SCS standards, develops the tests and perform the certification
63-
process and thus becomes the SCS certification body.
61+
which performs the work to evolve the SCS standards, develops the tests and performs the certification
62+
process and thus becomes the SCS certification assessment body.
6463

6564
Members of the OSBA can become also member of the Forum SCS-Standards for an additional membership
6665
fee, providing the financial resources for the Forum SCS-Standards to do its work. Membership in the
@@ -75,7 +74,7 @@ can become officially certified.
7574

7675
The SCS team will add the cloud to the [list of certified clouds](https://docs.scs.community/standards/certification/overview)
7776
on the SCS docs page. This can be used to prove to customers that the cloud is SCS compliant.
78-
Note that for public clouds, there will be a nightly job that tests the cloud for compliance, which will be
77+
Note that for public clouds, there will be a regular job that tests the cloud for compliance, which will be
7978
triggered by SCS infrastructure (zuul). For this, access to a tenant on the cloud needs
8079
to be provided free of charge. (This only requires very low quota, one VM is created for a minute
8180
in one of the tests.)
@@ -106,7 +105,7 @@ Once your cloud is listed in the
106105
[list of certified clouds](https://docs.scs.community/standards/certification/overview)
107106
which is fed by the
108107
[compliance manager](https://compliance.sovereignit.cloud/page/table), it
109-
will enjoy the nightly tests. These might fail for a number of reasons:
108+
will enjoy the regular tests. These might fail for a number of reasons:
110109

111110
* There is a new version of the SCS standards in effect and you need to adjust things.
112111
* Your cloud was unreachable or otherwise had intermittent issues.
@@ -128,6 +127,6 @@ as it may be easier to focus on just the one failing aspect of your infrastructu
128127

129128
Your cloud will show up as failing in the compliance manager after tests start
130129
failing; this is not the same as a revoked certification, though. For clouds that have been
131-
compliant before, it is highly recommended to work with the SCS certification body
130+
compliant before, it is highly recommended to work with the SCS certification assessment body
132131
upon such failures to determine a way back into compliance that avoids certification
133132
revocation.

Standards/scs-0007-v1-certification-integrators.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,8 @@
11
---
22
title: Certification of integrators
33
type: Procedural
4-
status: Draft
4+
status: Stable
5+
stabilized_at: 2025-08-01
56
track: Global
67
description: |
78
SCS-0007 defines the process and rules on how SCS integrators are certified.
@@ -14,6 +15,8 @@ For this purpose, two essential criteria are defined that must be fulfilled. In
1415

1516
## Motivation
1617

18+
As an integrator, I want to obtain a certificate with the scope of _Certified SCS IaaS Integrator_ or _Certified of SCS KaaS Integrator_ in order to prove sufficient technical knowledge and experience to provide technical support for SCS.
19+
1720
## Regulations
1821

1922
The certificates are awarded for the period of one year.

Standards/scs-0007-w1-certification-integrators-implementation-notes.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,6 @@
22
title: "Implementation hints for achieving Certified SCS Integrator"
33
type: Supplement
44
track: Global
5-
status: Draft
65
supplements:
76
- scs-0007-v1-certification-integrators.md
87
---

0 commit comments

Comments
 (0)