1
1
# Copyright (c) HashiCorp, Inc.
2
2
# SPDX-License-Identifier: BUSL-1.1
3
3
4
- scenario "e2e_aws_windows" {
4
+ # This scenario creates a complete end-to-end test environment for Boundary to
5
+ # test RDP functionality. It includes a Windows client, a Boundary controller
6
+ # and worker, a domain controller, a member server, and another member server
7
+ # with a worker running on it.
8
+ scenario "e2e_aws_rdp_base" {
5
9
terraform_cli = terraform_cli. default
6
10
terraform = terraform. default
7
11
providers = [
@@ -10,8 +14,11 @@ scenario "e2e_aws_windows" {
10
14
]
11
15
12
16
matrix {
13
- builder = [" local" , " crt" ]
14
- client = [" win10" , " win11" ]
17
+ builder = [" local" , " crt" ]
18
+ client = [" win10" , " win11" ]
19
+ # Windows Server 2016 does not support OpenSSH, but it's relied on for some
20
+ # parts of setup. If 2016 is selected, the member server will be created as
21
+ # 2016, but the domain controller and worker will be 2019.
15
22
rdp_server = [" 2016" , " 2019" , " 2022" , " 2025" ]
16
23
}
17
24
@@ -150,7 +157,7 @@ scenario "e2e_aws_windows" {
150
157
151
158
variables {
152
159
vpc_id = step. create_base_infra . vpc_id
153
- server_version = matrix. rdp_server
160
+ server_version = matrix. rdp_server == " 2016 " ? " 2019 " : matrix . rdp_server
154
161
}
155
162
}
156
163
@@ -233,7 +240,7 @@ scenario "e2e_aws_windows" {
233
240
234
241
variables {
235
242
vpc_id = step. create_base_infra . vpc_id
236
- server_version = matrix. rdp_server
243
+ server_version = matrix. rdp_server == " 2016 " ? " 2019 " : matrix . rdp_server
237
244
boundary_cli_zip_path = step. build_boundary_windows . artifact_path
238
245
kms_key_arn = step. create_base_infra . kms_key_arn
239
246
controller_ip = step. create_boundary_cluster . public_controller_addresses [0 ]
@@ -245,6 +252,7 @@ scenario "e2e_aws_windows" {
245
252
domain_admin_password = step. create_rdp_domain_controller . password
246
253
domain_controller_private_key = step. create_rdp_domain_controller . ssh_private_key
247
254
domain_controller_sec_group_id_list = step. create_rdp_domain_controller . security_group_id_list
255
+ aws_region = var. aws_region
248
256
}
249
257
}
250
258
@@ -303,6 +311,9 @@ scenario "e2e_aws_windows" {
303
311
client_username = step. create_windows_client . test_username
304
312
client_password = step. create_windows_client . test_password
305
313
client_test_dir = step. create_windows_client . test_dir
314
+ vault_addr_public = step. create_vault_cluster . instance_public_ips_ipv4 [0 ]
315
+ vault_addr_private = step. create_vault_cluster . instance_private_ips [0 ]
316
+ vault_root_token = step. create_vault_cluster . vault_root_token
306
317
}
307
318
}
308
319
@@ -389,4 +400,4 @@ scenario "e2e_aws_windows" {
389
400
output "windows_worker_private_ip" {
390
401
value = step. create_windows_worker . private_ip
391
402
}
392
- }
403
+ }
0 commit comments