diff --git a/.github/workflows/check-poc-wgcloud-v3.yml b/.github/workflows/check-poc-wgcloud-v3.yml new file mode 100644 index 000000000..0a0eb3122 --- /dev/null +++ b/.github/workflows/check-poc-wgcloud-v3.yml @@ -0,0 +1,23 @@ +name: "Compliance IaaS v4 of poc-wgcloud.osba" + +on: + # Trigger compliance check every day at 4:12 UTC + schedule: + - cron: '12 4 * * *' + # Trigger compliance check after Docker image has been built + workflow_run: + workflows: [Build and publish scs-compliance-check Docker image] + types: + - completed + # Allows you to run this workflow manually from the Actions tab + workflow_dispatch: + +jobs: + check-poc-wgcloud: + uses: ./.github/workflows/scs-compliance-check-with-application-credential.yml + with: + version: v3 + layer: iaas + cloud: "poc-wgcloud" + secret_name: "OS_PASSWORD_POC_WGCLOUD" + secrets: inherit diff --git a/README.md b/README.md index 3c947b379..094308847 100644 --- a/README.md +++ b/README.md @@ -14,9 +14,10 @@ This is a list of clouds that we test on a nightly basis against our `scs-compat | [pluscloud open - prod3](https://www.plusserver.com/en/products/pluscloud-open) | Public cloud for customers | plusserver GmbH | ![GitHub Workflow Status](https://img.shields.io/github/actions/workflow/status/SovereignCloudStack/standards/check-pco-prod3-v2.yml?label=compliant) | [HM](https://health.prod1.plusserver.sovereignit.cloud:3000/d/9ltTEmlnk/openstack-health-monitor2?orgId=1&var-mycloud=plus-prod3) | | [pluscloud open - prod4](https://www.plusserver.com/en/products/pluscloud-open) | Public cloud for customers | plusserver GmbH | ![GitHub Workflow Status](https://img.shields.io/github/actions/workflow/status/SovereignCloudStack/standards/check-pco-prod4-v2.yml?label=compliant) | [HM](https://health.prod1.plusserver.sovereignit.cloud:3000/d/9ltTEmlnk/openstack-health-monitor2?orgId=1&var-mycloud=plus-prod4) | | [Wavestack](https://www.noris.de/wavestack-cloud/) | Public cloud for customers | noris network AG/Wavecon GmbH | ![GitHub Workflow Status](https://img.shields.io/github/actions/workflow/status/SovereignCloudStack/standards/check-wavestack-v3.yml?label=compliant) | [HM](https://health.wavestack1.sovereignit.cloud:3000/) | -| [REGIO.cloud](https://regio.digital) | Public cloud for customers | OSISM GmbH | ![GitHub Workflow Status](https://img.shields.io/github/actions/workflow/status/SovereignCloudStack/standards/check-regio-a-v3.yml?label=compliant) | [HM](https://apimon.services.regio.digital/public-dashboards/17cf094a47404398a5b8e35a4a3968d4?orgId=1&refresh=5m) | +| [REGIO.cloud](https://regio.digital) | Public cloud for customers | OSISM GmbH | ![GitHub Workflow Status](https://img.shields.io/github/actions/workflow/status/SovereignCloudStack/standards/check-regio-a-v3.yml?label=compliant) | broken | | [CNDS](https://cnds.io/) | Public cloud for customers | [artcodix UG](https://artcodix.com/) | ![GitHub Workflow Status](https://img.shields.io/github/actions/workflow/status/SovereignCloudStack/standards/check-artcodix-v3.yml?label=compliant) | [HM](https://ohm.muc.cloud.cnds.io/) | | [aov.cloud](https://aov.de/) | Community cloud for customers | aov IT.Services GmbH | (soon) | [HM](https://health.aov.cloud/) | +| PoC WG-Cloud OSBA | Cloud PoC for FITKO | Cloud&Heat Technologies GmbH | ![GitHub Workflow Status](https://img.shields.io/github/actions/workflow/status/SovereignCloudStack/standards/check-poc-wgcloud-v3.yml?label=compliant) | [HM](https://health.poc-wgcloud.osba.sovereignit.cloud:3000/d/9ltTEmlnk/openstack-health-monitor2?var-mycloud=poc-wgcloud&orgId=1) | ## SCS standards overview diff --git a/Tests/iaas/entropy/entropy-check.py b/Tests/iaas/entropy/entropy-check.py index 42006f20e..ac7aa7771 100755 --- a/Tests/iaas/entropy/entropy-check.py +++ b/Tests/iaas/entropy/entropy-check.py @@ -329,7 +329,7 @@ def create_vm(env, all_flavors, image, server_name=SERVER_NAME): ) server = env.conn.create_server( server_name, image=image, flavor=flavor, key_name=env.keypair.name, network=env.network, - security_groups=[env.sec_group.id], userdata=userdata, wait=True, timeout=360, auto_ip=True, + security_groups=[env.sec_group.id], userdata=userdata, wait=True, timeout=500, auto_ip=True, boot_from_volume=True, terminate_volume=True, volume_size=image.min_disk, ) logger.debug(f"Server '{server_name}' ('{server.id}') has been created")