mirror of
https://github.com/hashicorp/vault.git
synced 2025-08-22 07:01:09 +02:00
* Add DR failover scenario to Enos * Update enos/enos-scenario-dr-replication.hcl Co-authored-by: Ryan Cragun <me@ryan.ec> * Update enos/enos-qualities.hcl Co-authored-by: Ryan Cragun <me@ryan.ec> * Update enos/enos-scenario-dr-replication.hcl Co-authored-by: Ryan Cragun <me@ryan.ec> * Update enos/enos-scenario-dr-replication.hcl Co-authored-by: Ryan Cragun <me@ryan.ec> * Update enos/enos-qualities.hcl Co-authored-by: Ryan Cragun <me@ryan.ec> * Update enos/enos-scenario-dr-replication.hcl Co-authored-by: Ryan Cragun <me@ryan.ec> * Update enos/enos-scenario-dr-replication.hcl Co-authored-by: Ryan Cragun <me@ryan.ec> * Update enos/enos-scenario-dr-replication.hcl Co-authored-by: Ryan Cragun <me@ryan.ec> * Update enos/enos-scenario-pr-replication.hcl Co-authored-by: Ryan Cragun <me@ryan.ec> * remove superuser * Update enos/enos-scenario-dr-replication.hcl Co-authored-by: Ryan Cragun <me@ryan.ec> * Update enos/enos-scenario-dr-replication.hcl Co-authored-by: Ryan Cragun <me@ryan.ec> * Update enos/enos-scenario-dr-replication.hcl Co-authored-by: Ryan Cragun <me@ryan.ec> * Update enos/enos-scenario-dr-replication.hcl Co-authored-by: Ryan Cragun <me@ryan.ec> * Update enos/enos-scenario-dr-replication.hcl Co-authored-by: Ryan Cragun <me@ryan.ec> --------- Co-authored-by: Ryan Cragun <me@ryan.ec>
99 lines
2.2 KiB
HCL
99 lines
2.2 KiB
HCL
# Copyright (c) HashiCorp, Inc.
|
|
# SPDX-License-Identifier: BUSL-1.1
|
|
|
|
terraform {
|
|
required_providers {
|
|
enos = {
|
|
source = "registry.terraform.io/hashicorp-forge/enos"
|
|
}
|
|
random = {
|
|
source = "hashicorp/random"
|
|
version = ">= 3.4.3"
|
|
}
|
|
}
|
|
}
|
|
|
|
variable "ip_version" {
|
|
type = number
|
|
description = "The IP version used for the Vault TCP listener"
|
|
|
|
validation {
|
|
condition = contains([4, 6], var.ip_version)
|
|
error_message = "The ip_version must be either 4 or 6"
|
|
}
|
|
}
|
|
|
|
variable "primary_leader_host" {
|
|
type = object({
|
|
ipv6 = string
|
|
private_ip = string
|
|
public_ip = string
|
|
})
|
|
description = "The primary cluster leader host"
|
|
}
|
|
|
|
variable "retry_interval" {
|
|
type = string
|
|
default = "2"
|
|
description = "How long to wait between retries"
|
|
}
|
|
|
|
variable "secondary_public_key" {
|
|
type = string
|
|
description = "The secondary public key"
|
|
}
|
|
|
|
variable "timeout" {
|
|
type = string
|
|
default = "15"
|
|
description = "How many seconds to wait before timing out"
|
|
}
|
|
|
|
variable "vault_addr" {
|
|
type = string
|
|
description = "The local vault API listen address"
|
|
}
|
|
|
|
variable "vault_install_dir" {
|
|
type = string
|
|
description = "The directory where the Vault binary will be installed"
|
|
}
|
|
|
|
variable "vault_root_token" {
|
|
type = string
|
|
description = "The vault root token"
|
|
}
|
|
|
|
locals {
|
|
primary_leader_addr = var.ip_version == 6 ? var.primary_leader_host.ipv6 : var.primary_leader_host.private_ip
|
|
token_id = random_uuid.token_id.id
|
|
secondary_token = enos_remote_exec.fetch_secondary_token.stdout
|
|
}
|
|
|
|
resource "random_uuid" "token_id" {}
|
|
|
|
resource "enos_remote_exec" "fetch_secondary_token" {
|
|
depends_on = [random_uuid.token_id]
|
|
environment = {
|
|
VAULT_ADDR = var.vault_addr
|
|
VAULT_TOKEN = var.vault_root_token
|
|
RETRY_INTERVAL = var.retry_interval
|
|
TIMEOUT_SECONDS = var.timeout
|
|
SECONDARY_PUBLIC_KEY = var.secondary_public_key
|
|
VAULT_INSTALL_DIR = var.vault_install_dir
|
|
}
|
|
|
|
scripts = [abspath("${path.module}/scripts/generate-failover-secondary-token.sh")]
|
|
|
|
|
|
transport = {
|
|
ssh = {
|
|
host = var.primary_leader_host.public_ip
|
|
}
|
|
}
|
|
}
|
|
|
|
output "secondary_token" {
|
|
value = local.secondary_token
|
|
}
|