forked from sous-chefs/hashicorp-vault
-
Notifications
You must be signed in to change notification settings - Fork 0
/
.kitchen.dokken.yml
80 lines (75 loc) · 1.87 KB
/
.kitchen.dokken.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
driver:
name: dokken
chef_version: latest
privileged: true
transport:
name: dokken
provisioner:
name: dokken
verifier:
name: inspec
root_path: /opt/verifier
platforms:
- name: centos-7
driver:
image: dokken/centos-7
pid_one_command: /usr/lib/systemd/systemd
attributes:
poise-service:
vault:
provider: systemd
- name: centos-6
driver:
image: dokken/centos-6
pid_one_command: /sbin/init
- name: ubuntu-18.04
driver:
image: dokken/ubuntu-18.04
pid_one_command: /bin/systemd
attributes:
poise-service:
vault:
provider: systemd
- name: ubuntu-16.04
driver:
image: dokken/ubuntu-16.04
pid_one_command: /bin/systemd
attributes:
poise-service:
vault:
provider: systemd
- name: ubuntu-14.04
driver:
image: dokken/ubuntu-14.04
pid_one_command: /sbin/init
attributes:
poise-service:
vault:
provider: upstart
suites:
- name: default
provisioner:
policyfile: test/fixtures/policies/default.rb
attributes:
hashicorp-vault:
config:
ui: true
disable_performance_standby: true
# the seal options, if set, will cause Vault fail to start b/c test kithen doesn't
# have the HSM (hardware security module) to support this. You need to setup you HSM w/ the
# proper keys to this to work
#
# The purpose of this test is to make sure the configs are set as expected.
- name: seal_options
provisioner:
policyfile: test/fixtures/policies/default.rb
attributes:
hashicorp-vault:
config:
seal_type: awskms
seal_options:
region: us-west-2
kms_key_id: my-kms-id
includes:
# only need do one test as the config generation code is the same for all distros
- ubuntu-16.04