727277793b
Provisions vault with the policies described in the Nomad Vault integration guide, and drops a configuration file for Nomad vault server configuration with its token. The vault root token is exposed to the E2E runner so that tests can write additional policies to vault.
48 lines
1.1 KiB
HCL
48 lines
1.1 KiB
HCL
output "servers" {
|
|
value = aws_instance.server.*.public_ip
|
|
}
|
|
|
|
output "linux_clients" {
|
|
value = aws_instance.client_linux.*.public_ip
|
|
}
|
|
|
|
output "windows_clients" {
|
|
value = aws_instance.client_windows.*.public_ip
|
|
}
|
|
|
|
output "message" {
|
|
value = <<EOM
|
|
Your cluster has been provisioned! To prepare your environment, run:
|
|
|
|
$(terraform output environment)
|
|
|
|
Then you can run tests from the e2e directory with:
|
|
|
|
go test -v .
|
|
|
|
ssh into servers with:
|
|
|
|
ssh -i keys/${local.random_name}.pem ubuntu@${aws_instance.server[0].public_ip}
|
|
|
|
ssh into clients with:
|
|
|
|
%{for ip in aws_instance.client_linux.*.public_ip~}
|
|
ssh -i keys/${local.random_name}.pem ubuntu@${ip}
|
|
%{endfor~}
|
|
|
|
EOM
|
|
}
|
|
|
|
output "environment" {
|
|
description = "get connection config by running: $(terraform output environment)"
|
|
value = <<EOM
|
|
export NOMAD_ADDR=http://${aws_instance.server[0].public_ip}:4646
|
|
export CONSUL_HTTP_ADDR=http://${aws_instance.server[0].public_ip}:8500
|
|
export VAULT_ADDR=http://${aws_instance.server[0].public_ip}:8200
|
|
export NOMAD_E2E=1
|
|
export NOMAD_TOKEN=${data.local_file.nomad_token.content}
|
|
export VAULT_TOKEN=${data.local_file.vault_token.content}
|
|
|
|
EOM
|
|
}
|