-
Notifications
You must be signed in to change notification settings - Fork 23
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Other] Evaluate SCS-compliance of Yaook with respect to IaaS standards beyond SCS-compatible IaaS v4 #718
Comments
110 is a DR, not new |
Do we plan to stabilize this draft in the near future? |
It is stable. |
I see, it is a Decision Record not a standard. My fault ;-) |
Conformance with Volume Type StandardThe Volume Type standard currently does NOT REQUIRE any changes, it only RECOMMENDS it. Recommended volume types
Both recommendations can be fulfilled with having one volume type, that has e.g. replicated ceph storage and an encryption type. (So a single volume type would be enough to fulfill all recommendations.) How to fulfill the recommendations?Volume Type with ReplicationThere are several options to fulfill this: 1. Ceph used as backend 2. other backends are used 3. OpenStack replication is configured
In Addition to all these Options the description of the Volume Type has to be adjusted:
Volume Type with EncryptionThis will require the following
Does Yaook fulfill this?
Setting descriptions on volume types is still possible when the the volume type is already in use (volumes with this type exist). |
Conformance with Default Rules for Security Groups StandardThe standard just requires the following default rules for security groups, which ALL are the provided when installing OpenStack without adjustment. So this standard just state, that no life-cycle management system should touch these rules (and operators should neither).
This is most likely already be satisfied with yaook. The only thing left to do:
|
Conformance with Key Manager StandardRight now all part of this standard are only recommendations. So every tool will right now fulfill this standard. To also fulfill recommendations, the following things must be considered: 1. There SHOULD be a key manager
2. The Master KEK SHOULD NOT be written in plain text in the barbican.conf file This can be achieved at this point of time through using any other plugin than the simple crypto plugin. Right now yaook seems to use the simple crypto plugin. See here. Yaook should support integration for other plugins, too. |
To allow everyone involved in this ticket to run the conformance tests against a Yaook cluster, I created projects and accounts for @fraugabel, @josephineSei and @markus-hentsch on our SCS Yaook PoC deployment. |
thanks @martinmo works for me: i will start with writing the test for the security group rules scs-0115-v1: Default Rules for Security Groups |
@fraugabel I don't know, if you know: We write tests for the standards already when writing them. Here is the test for the default security group rules: https://github.com/SovereignCloudStack/standards/blob/main/Tests/iaas/security-groups/default-security-group-rules.py |
How could she (and I, for that matter)? The standard only states what the test should do. It doesn't reference any test. |
@fraugabel then you can test the existing test script and please update the standard |
i find it a bit inconsistent that the argument for the os cloud in the default-security-group-rules test differs from the argument of the overall complience test:
whereas the argument in the complience tests would be:
|
@fraugabel this is by design. I can explain when I'm back |
Keep in mind that the main script is agnostic of OpenStack. It can be used to call all manner of test scripts |
@mbuechse i just stumbled across that and wondered whether there is an agreement on argument namings like |
@fraugabel You're right. It's a rather common transformation between cli arguments and variable names: |
@mbuechse i am on it, the |
@fraugabel and I had a discussion about the Default Security Group Rules Test. We found something very important: The API I use to test the Default Security Group Rules is pretty new. In the 2023.2 release it was added: "A new API which allows a cloud administrator to define their own set of security group rules added automatically to every new default and/or custom security group created for projects." But Yaook as it is used for the test case in Leipzig does not yet support this or newer releases. Up until then we discussed adding backwards-compatibility to the Test. Such like: if the new API does not exist, we will fall back to 1. creating a new security group, 2. checking that there only exist 2 rules allowing all egress traffic in this groups and 3. delete the security group afterwards. |
backwards-compatibility to the Test is added and tested on Yaook in Leipzig: creating a new security group initializes automaticallly two egress rules (IPv4 and IPv6) but no ingress rule, this information can be successfully requested and confirmed by the test. |
SCS-compliance of Yaook concerning the Key-Manager-Standard failed, for users with the 'member' role, are not authorized to use the Key-Manager.
|
Just chiming in here to add some context: this is expected for OpenStack releases earlier than the upcoming 2024.2 ("Dalmatian") release in conjunction with Yaook. The upcoming release will default For any current Barbican releases, this is not the case and Barbican will still ship its own custom roles1.
Approach no. 2 is easily implemented in Yaook by adjusting the kind: BarbicanDeployment
...
spec:
...
policy:
"admin": "role:admin"
"creator": "role:member" Footnotes |
This indeed should be standard in yaook, to be able to use Barbican as a normal user (those usually have only the member role). At least until the new secure RBAC will be enabled by default - which seems to not be the case even in 2024.2, when I look at @markus-hentsch comments in the role standard |
SCS-compatible IaaS v4 includes the following standards:
Beyond that, the new standards were defined and may be part of SCS-compatible IaaS v5. We have to evaluate if [FitKo Poc] and C&H SCS test cluster is SCS-compliant with respect to the following new IaaS standards:
The text was updated successfully, but these errors were encountered: