727277793b
Provisions vault with the policies described in the Nomad Vault integration guide, and drops a configuration file for Nomad vault server configuration with its token. The vault root token is exposed to the E2E runner so that tests can write additional policies to vault.
26 lines
729 B
Bash
Executable file
26 lines
729 B
Bash
Executable file
#!/bin/bash
|
|
|
|
DIR="$( cd "$( dirname "${BASH_SOURCE[0]}" )" >/dev/null 2>&1 && pwd )"
|
|
|
|
while true :
|
|
do
|
|
ROOT_TOKEN=$(nomad acl bootstrap | awk '/Secret ID/{print $4}')
|
|
if [ ! -z $ROOT_TOKEN ]; then break; fi
|
|
sleep 5
|
|
done
|
|
set -e
|
|
|
|
export NOMAD_TOKEN="$ROOT_TOKEN"
|
|
|
|
mkdir -p ../keys
|
|
echo $NOMAD_TOKEN > "${DIR}/../keys/nomad_root_token"
|
|
|
|
# Our default policy after bootstrapping will be full-access. Without
|
|
# further policy, we only test that we're hitting the ACL code
|
|
# Tests can set their own ACL policy using the management token so
|
|
# long as they clean up the ACLs afterwards.
|
|
nomad acl policy apply \
|
|
-description "Anonymous policy (full-access)" \
|
|
anonymous \
|
|
"${DIR}/anonymous.nomad_policy.hcl"
|