mirror of
				https://github.com/optim-enterprises-bv/vault.git
				synced 2025-10-30 18:17:55 +00:00 
			
		
		
		
	 78e0656b55
			
		
	
	78e0656b55
	
	
	
		
			
			Add our initial Enos integration tests to Vault. The Enos scenario workflow will automatically be run on branches that are created from the `hashicorp/vault` repository. See the README.md in ./enos a full description of how to compose and execute scenarios locally. * Simplify the metadata build workflow jobs * Automatically determine the Go version from go.mod * Add formatting check for Enos integration scenarios * Add Enos smoke and upgrade integration scenarios * Add Consul backend matrix support * Add Ubuntu and RHEL distro support * Add Vault edition support * Add Vault architecture support * Add Vault builder support * Add Vault Shamir and awskms auto-unseal support * Add Raft storage support * Add Raft auto-join voter verification * Add Vault version verification * Add Vault seal verification * Add in-place upgrade support for all variants * Add four scenario variants to CI. These test a maximal distribution of the aforementioned variants with the `linux/amd64` Vault install bundle. Signed-off-by: Ryan Cragun <me@ryan.ec> Co-authored-by: Rebecca Willett <rwillett@hashicorp.com> Co-authored-by: Jaymala <jaymalasinha@gmail.com>
		
			
				
	
	
		
			112 lines
		
	
	
		
			2.8 KiB
		
	
	
	
		
			HCL
		
	
	
	
	
	
			
		
		
	
	
			112 lines
		
	
	
		
			2.8 KiB
		
	
	
	
		
			HCL
		
	
	
	
	
	
| variable "aws_region" {
 | |
|   description = "The AWS region where we'll create infrastructure"
 | |
|   type        = string
 | |
|   default     = "us-west-1"
 | |
| }
 | |
| 
 | |
| variable "aws_ssh_keypair_name" {
 | |
|   description = "The AWS keypair to use for SSH"
 | |
|   type        = string
 | |
|   default     = "enos-ci-ssh-key"
 | |
| }
 | |
| 
 | |
| variable "aws_ssh_private_key_path" {
 | |
|   description = "The path to the AWS keypair private key"
 | |
|   type        = string
 | |
|   default     = "./support/private_key.pem"
 | |
| }
 | |
| 
 | |
| variable "backend_edition" {
 | |
|   description = "The backend release edition if applicable"
 | |
|   type        = string
 | |
|   default     = "oss"
 | |
| }
 | |
| 
 | |
| variable "backend_instance_type" {
 | |
|   description = "The instance type to use for the Vault backend"
 | |
|   type        = string
 | |
|   default     = "t3.small"
 | |
| }
 | |
| 
 | |
| variable "backend_license_path" {
 | |
|   description = "The license for the backend if applicable (Consul Enterprise)"
 | |
|   type        = string
 | |
|   default     = null
 | |
| }
 | |
| 
 | |
| variable "project_name" {
 | |
|   description = "The description of the project"
 | |
|   type        = string
 | |
|   default     = "vault-enos-integration"
 | |
| }
 | |
| 
 | |
| variable "tags" {
 | |
|   description = "Tags that will be applied to infrastructure resources that support tagging"
 | |
|   type        = map(string)
 | |
|   default     = null
 | |
| }
 | |
| 
 | |
| variable "terraform_plugin_cache_dir" {
 | |
|   description = "The directory to cache Terraform modules and providers"
 | |
|   type        = string
 | |
|   default     = null
 | |
| }
 | |
| 
 | |
| variable "tfc_api_token" {
 | |
|   description = "The Terraform Cloud QTI Organization API token."
 | |
|   type        = string
 | |
| }
 | |
| 
 | |
| variable "vault_autopilot_initial_release" {
 | |
|   description = "The Vault release to deploy before upgrading with autopilot"
 | |
|   default = {
 | |
|     edition = "ent"
 | |
|     version = "1.11.0"
 | |
|   }
 | |
| }
 | |
| 
 | |
| variable "vault_bundle_path" {
 | |
|   description = "Path to CRT generated or local vault.zip bundle"
 | |
|   type        = string
 | |
|   default     = "/tmp/vault.zip"
 | |
| }
 | |
| 
 | |
| variable "vault_install_dir" {
 | |
|   type        = string
 | |
|   description = "The directory where the vault binary will be installed"
 | |
|   default     = "/opt/vault/bin"
 | |
| }
 | |
| 
 | |
| variable "vault_instance_type" {
 | |
|   description = "The instance type to use for the Vault backend"
 | |
|   type        = string
 | |
|   default     = null
 | |
| }
 | |
| 
 | |
| variable "vault_instance_count" {
 | |
|   description = "How many instances to create for the Vault cluster"
 | |
|   type        = number
 | |
|   default     = 3
 | |
| }
 | |
| 
 | |
| variable "vault_license_path" {
 | |
|   description = "The path to a valid Vault enterprise edition license. This is only required for non-oss editions"
 | |
|   type        = string
 | |
|   default     = null
 | |
| }
 | |
| 
 | |
| variable "vault_local_build_tags" {
 | |
|   description = "The build tags to pass to the Go compiler for builder:local variants"
 | |
|   type        = list(string)
 | |
|   default     = null
 | |
| }
 | |
| 
 | |
| variable "vault_upgrade_initial_release" {
 | |
|   description = "The Vault release to deploy before upgrading"
 | |
|   default = {
 | |
|     edition = "oss"
 | |
|     // vault 1.10.5 has a known issue with retry_join.
 | |
|     version = "1.10.4"
 | |
|   }
 | |
| }
 |