60 lines
1.6 KiB
HCL
60 lines
1.6 KiB
HCL
# Copyright (c) HashiCorp, Inc.
|
|
# SPDX-License-Identifier: MPL-2.0
|
|
|
|
output "servers" {
|
|
value = aws_instance.server.*.public_ip
|
|
}
|
|
|
|
output "linux_clients" {
|
|
value = aws_instance.client_ubuntu_jammy_amd64.*.public_ip
|
|
}
|
|
|
|
output "windows_clients" {
|
|
value = aws_instance.client_windows_2016_amd64.*.public_ip
|
|
}
|
|
|
|
output "message" {
|
|
value = <<EOM
|
|
Your cluster has been provisioned! To prepare your environment, run:
|
|
|
|
$(terraform output --raw environment)
|
|
|
|
Then you can run tests from the e2e directory with:
|
|
|
|
go test -v .
|
|
|
|
ssh into servers with:
|
|
|
|
%{for ip in aws_instance.server.*.public_ip~}
|
|
ssh -i keys/${local.random_name}.pem ubuntu@${ip}
|
|
%{endfor~}
|
|
|
|
ssh into clients with:
|
|
|
|
%{for ip in aws_instance.client_ubuntu_jammy_amd64.*.public_ip~}
|
|
ssh -i keys/${local.random_name}.pem ubuntu@${ip}
|
|
%{endfor~}
|
|
%{for ip in aws_instance.client_windows_2016_amd64.*.public_ip~}
|
|
ssh -i keys/${local.random_name}.pem Administrator@${ip}
|
|
%{endfor~}
|
|
|
|
EOM
|
|
}
|
|
|
|
# Note: Consul and Vault environment needs to be set in test
|
|
# environment before the Terraform run, so we don't have that output
|
|
# here
|
|
output "environment" {
|
|
description = "get connection config by running: $(terraform output environment)"
|
|
sensitive = true
|
|
value = <<EOM
|
|
export NOMAD_ADDR=https://${aws_instance.server[0].public_ip}:4646
|
|
export NOMAD_CACERT=${abspath(path.root)}/keys/tls_ca.crt
|
|
export NOMAD_CLIENT_CERT=${abspath(path.root)}/keys/tls_api_client.crt
|
|
export NOMAD_CLIENT_KEY=${abspath(path.root)}/keys/tls_api_client.key
|
|
export NOMAD_TOKEN=${data.local_file.nomad_token.content}
|
|
export NOMAD_E2E=1
|
|
|
|
EOM
|
|
}
|