kolla-ansible/tests/test-hashicorp-vault-passwo...

69 lines
2.0 KiB
Bash
Executable File

#!/bin/bash
set -o xtrace
set -o errexit
export PYTHONUNBUFFERED=1
function install_vault {
if [[ "debian" == $BASE_DISTRO ]]; then
curl -fsSL https://apt.releases.hashicorp.com/gpg | sudo apt-key add -
sudo apt-add-repository "deb [arch=amd64] https://apt.releases.hashicorp.com $(lsb_release -cs) main"
sudo apt-get update -y && sudo apt-get install -y vault jq
else
sudo dnf install -y yum-utils
sudo dnf config-manager --add-repo https://rpm.releases.hashicorp.com/RHEL/hashicorp.repo
sudo dnf install -y vault jq
fi
}
function start_vault {
nohup vault server --dev &
# Give Vault some time to warm up
sleep 10
}
function test_vault {
TOKEN=$(vault token create -address 'http://127.0.0.1:8200' -format json | jq '.auth.client_token' --raw-output)
echo "${TOKEN}" | vault login -address 'http://127.0.0.1:8200' -
vault kv put -address 'http://127.0.0.1:8200' secret/foo data=bar
}
function test_writepwd {
TOKEN=$(vault token create -address 'http://127.0.0.1:8200' -format json | jq '.auth.client_token' --raw-output)
kolla-writepwd \
--passwords /etc/kolla/passwords.yml \
--vault-addr 'http://127.0.0.1:8200' \
--vault-token ${TOKEN} \
--vault-mount-point secret
}
function test_readpwd {
TOKEN=$(vault token create -address 'http://127.0.0.1:8200' -format json | jq '.auth.client_token' --raw-output)
cp etc/kolla/passwords.yml /tmp/passwords-hashicorp-vault.yml
kolla-readpwd \
--passwords /tmp/passwords-hashicorp-vault.yml \
--vault-addr 'http://127.0.0.1:8200' \
--vault-token ${TOKEN} \
--vault-mount-point secret
}
function teardown {
pkill vault
}
function test_hashicorp_vault_passwords {
echo "Setting up development Vault server..."
install_vault
start_vault
test_vault
echo "Write passwords to Hashicorp Vault..."
test_writepwd
echo "Read passwords from Hashicorp Vault..."
test_readpwd
echo "Cleaning up..."
teardown
}
test_hashicorp_vault_passwords