Vault Automation 40a70edc03
Add docker based backend to the cloud scenario (#9751) (#10626)
* Add docker based backed

* new line

* Add validation

* Add cloud_docker_vault_cluster

* Unify cloud scenario outputs

* Use min_vault_version consistently across both modules

* random network name for docker

* Add local build for docker

* Use environment instead of backend

* make use of existing modules for docker and k8s

* connect the peers

* formatting

* copyright

* Remove old duplicated code

* use enos local exec

* get version locally

* Dont use local time

* adjust bin path for docker

* use root dockerfile

* get dockerfile to work

* Build docker image from correct binary location

* Fix it... maybe

* Add docker admin token

* whitespace

* formatting and comment cleanup

* formatting

* undo

* Apply suggestion from @ryancragun



* Move build to make

* Default to local

* Revert k8s changes

* Add admint token

* Clean map

* whitespace

* whitespace

* Pull out k8 changes and vault_cluster_raft

* Some cleaning changes

* whitespace

* Naming cleanup

---------

Co-authored-by: Luis (LT) Carbonell <lt.carbonell@hashicorp.com>
Co-authored-by: Ryan Cragun <me@ryan.ec>
2025-11-06 11:59:40 -07:00

38 lines
818 B
HCL

# Copyright IBM Corp. 2016, 2025
# SPDX-License-Identifier: BUSL-1.1
variable "cluster_id" {
description = "The ID of the HCP Vault cluster."
type = string
}
# Docker compatibility variables (accepted but ignored)
variable "vault_root_token" {
description = "Ignored - for Docker compatibility only"
type = string
default = null
sensitive = true
}
variable "vault_address" {
description = "Ignored - for Docker compatibility only"
type = string
default = null
}
resource "hcp_vault_cluster_admin_token" "token" {
cluster_id = var.cluster_id
}
output "created_at" {
value = hcp_vault_cluster_admin_token.token.created_at
}
output "id" {
value = hcp_vault_cluster_admin_token.token.id
}
output "token" {
value = hcp_vault_cluster_admin_token.token.token
}