This PR adds Azure environment bootstrap using Terraform. The output of the Terraform gives developers everything they need to configure the secrets engine and run acceptance tests. See the readme updates for what resources are created.
Example usage:
# Set up Azure resources
make setup-env
# Source TF output
source ./bootstrap/terraform/local_environment_setup.sh
# Run acceptance tests
make testacc
# Configure Vault with the plugin
make configure
# Tear down Azure resources
make teardown-env
Acceptance test output using credentials provided by the TF config:
$ make testacc
==> Checking that code complies with gofmt requirements...
go generate
VAULT_ACC=1 go test -tags='vault-plugin-secrets-azure' $(go list ./... | grep -v /vendor/) -timeout 45m
ok github.com/hashicorp/vault-plugin-secrets-azure 79.245s
? github.com/hashicorp/vault-plugin-secrets-azure/api [no test files]
? github.com/hashicorp/vault-plugin-secrets-azure/cmd/vault-plugin-secrets-azure [no test files]
Contributor Checklist
[x] Add relevant docs to upstream Vault repository, or sufficient reasoning why docs won’t be added yet
Overview
This PR adds Azure environment bootstrap using Terraform. The output of the Terraform gives developers everything they need to configure the secrets engine and run acceptance tests. See the readme updates for what resources are created.
Example usage:
Acceptance test output using credentials provided by the TF config:
Contributor Checklist