8407e1074b
Add our initial Enos integration tests to Vault. The Enos scenario workflow will automatically be run on branches that are created from the `hashicorp/vault` repository. See the README.md in ./enos a full description of how to compose and execute scenarios locally. * Simplify the metadata build workflow jobs * Automatically determine the Go version from go.mod * Add formatting check for Enos integration scenarios * Add Enos smoke and upgrade integration scenarios * Add Consul backend matrix support * Add Ubuntu and RHEL distro support * Add Vault edition support * Add Vault architecture support * Add Vault builder support * Add Vault Shamir and awskms auto-unseal support * Add Raft storage support * Add Raft auto-join voter verification * Add Vault version verification * Add Vault seal verification * Add in-place upgrade support for all variants * Add four scenario variants to CI. These test a maximal distribution of the aforementioned variants with the `linux/amd64` Vault install bundle. Signed-off-by: Ryan Cragun <me@ryan.ec> Co-authored-by: Rebecca Willett <rwillett@hashicorp.com> Co-authored-by: Jaymala <jaymalasinha@gmail.com>
69 lines
1.7 KiB
HCL
69 lines
1.7 KiB
HCL
terraform {
|
|
required_providers {
|
|
enos = {
|
|
source = "app.terraform.io/hashicorp-qti/enos"
|
|
}
|
|
}
|
|
}
|
|
|
|
variable "vault_install_dir" {
|
|
type = string
|
|
description = "The directory where the Vault binary will be installed"
|
|
}
|
|
|
|
variable "vault_instance_count" {
|
|
type = number
|
|
description = "How many vault instances are in the cluster"
|
|
}
|
|
|
|
variable "vault_instances" {
|
|
type = map(object({
|
|
private_ip = string
|
|
public_ip = string
|
|
}))
|
|
description = "The vault cluster instances that were created"
|
|
}
|
|
|
|
variable "vault_root_token" {
|
|
type = string
|
|
description = "The vault root token"
|
|
}
|
|
|
|
variable "vault_autopilot_upgrade_version" {
|
|
type = string
|
|
description = "The directory where the Vault binary will be installed"
|
|
default = null
|
|
}
|
|
|
|
variable "vault_autopilot_upgrade_status" {
|
|
type = string
|
|
description = "The directory where the Vault binary will be installed"
|
|
default = null
|
|
}
|
|
|
|
locals {
|
|
public_ips = {
|
|
for idx in range(var.vault_instance_count) : idx => {
|
|
public_ip = values(var.vault_instances)[idx].public_ip
|
|
private_ip = values(var.vault_instances)[idx].private_ip
|
|
}
|
|
}
|
|
}
|
|
|
|
resource "enos_remote_exec" "smoke-verify-autopilot" {
|
|
for_each = local.public_ips
|
|
|
|
content = templatefile("${path.module}/templates/smoke-verify-autopilot.sh", {
|
|
vault_install_dir = var.vault_install_dir
|
|
vault_token = var.vault_root_token
|
|
vault_autopilot_upgrade_status = var.vault_autopilot_upgrade_status,
|
|
vault_autopilot_upgrade_version = var.vault_autopilot_upgrade_version,
|
|
})
|
|
|
|
transport = {
|
|
ssh = {
|
|
host = each.value.public_ip
|
|
}
|
|
}
|
|
}
|