feat: implement naming convention, deployment automation, and infrastructure updates
- Add comprehensive naming convention (provider-region-resource-env-purpose) - Implement Terraform locals for centralized naming - Update all Terraform resources to use new naming convention - Create deployment automation framework (18 phase scripts) - Add Azure setup scripts (provider registration, quota checks) - Update deployment scripts config with naming functions - Create complete deployment documentation (guide, steps, quick reference) - Add frontend portal implementations (public and internal) - Add UI component library (18 components) - Enhance Entra VerifiedID integration with file utilities - Add API client package for all services - Create comprehensive documentation (naming, deployment, next steps) Infrastructure: - Resource groups, storage accounts with new naming - Terraform configuration updates - Outputs with naming convention examples Deployment: - Automated deployment scripts for all 15 phases - State management and logging - Error handling and validation Documentation: - Naming convention guide and implementation summary - Complete deployment guide (296 steps) - Next steps and quick start guides - Azure prerequisites and setup completion docs Note: ESLint warnings present - will be addressed in follow-up commit
This commit is contained in:
117
scripts/deploy/phase10-backend-services.sh
Executable file
117
scripts/deploy/phase10-backend-services.sh
Executable file
@@ -0,0 +1,117 @@
|
||||
#!/bin/bash
|
||||
#
|
||||
# Phase 10: Backend Services Deployment
|
||||
# Deploy backend services to Kubernetes
|
||||
#
|
||||
|
||||
set -euo pipefail
|
||||
|
||||
SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" && pwd)"
|
||||
source "${SCRIPT_DIR}/config.sh"
|
||||
|
||||
log_info "=========================================="
|
||||
log_info "Phase 10: Backend Services Deployment"
|
||||
log_info "=========================================="
|
||||
|
||||
# Verify Kubernetes access
|
||||
log_step "10.1 Verifying Kubernetes access..."
|
||||
|
||||
if ! kubectl cluster-info &> /dev/null; then
|
||||
log_info "Getting AKS credentials..."
|
||||
az aks get-credentials --resource-group "${AKS_RESOURCE_GROUP}" \
|
||||
--name "${AKS_NAME}" \
|
||||
--overwrite-existing \
|
||||
|| error_exit "Failed to get AKS credentials"
|
||||
fi
|
||||
|
||||
kubectl cluster-info || error_exit "Kubernetes cluster not accessible"
|
||||
|
||||
# Ensure namespace exists
|
||||
log_step "10.2 Ensuring namespace exists..."
|
||||
|
||||
kubectl create namespace "${NAMESPACE}" --dry-run=client -o yaml | kubectl apply -f - || \
|
||||
log_warning "Namespace may already exist"
|
||||
|
||||
# Deploy External Secrets (if not already deployed)
|
||||
log_step "10.3 Checking External Secrets Operator..."
|
||||
|
||||
if ! kubectl get crd externalsecrets.external-secrets.io &> /dev/null; then
|
||||
log_info "Installing External Secrets Operator..."
|
||||
kubectl apply -f https://external-secrets.io/latest/deploy/ || error_exit "Failed to install External Secrets"
|
||||
|
||||
log_info "Waiting for External Secrets Operator to be ready..."
|
||||
kubectl wait --for=condition=ready pod \
|
||||
-l app.kubernetes.io/name=external-secrets \
|
||||
-n external-secrets-system \
|
||||
--timeout=300s || log_warning "External Secrets Operator not ready yet"
|
||||
else
|
||||
log_success "External Secrets Operator already installed"
|
||||
fi
|
||||
|
||||
# Deploy each service
|
||||
log_step "10.4 Deploying backend services..."
|
||||
|
||||
for service in "${SERVICES[@]}"; do
|
||||
log_info "Deploying ${service} service..."
|
||||
|
||||
# Check if manifests exist
|
||||
SERVICE_DIR="${K8S_DIR}/base/${service}"
|
||||
if [ ! -d "${SERVICE_DIR}" ]; then
|
||||
log_warning "Kubernetes manifests not found for ${service} at ${SERVICE_DIR}"
|
||||
log_info "Skipping ${service} deployment"
|
||||
continue
|
||||
fi
|
||||
|
||||
# Apply manifests
|
||||
kubectl apply -f "${SERVICE_DIR}" -n "${NAMESPACE}" || error_exit "Failed to deploy ${service}"
|
||||
|
||||
# Wait for deployment
|
||||
log_info "Waiting for ${service} deployment..."
|
||||
kubectl wait --for=condition=available \
|
||||
deployment/"${service}" \
|
||||
-n "${NAMESPACE}" \
|
||||
--timeout=300s || log_warning "${service} deployment not ready yet"
|
||||
|
||||
# Verify pods
|
||||
PODS=$(kubectl get pods -l app="${service}" -n "${NAMESPACE}" --no-headers 2>/dev/null | wc -l)
|
||||
if [ "${PODS}" -gt 0 ]; then
|
||||
log_success "${service} deployed (${PODS} pod(s))"
|
||||
|
||||
# Check pod status
|
||||
kubectl get pods -l app="${service}" -n "${NAMESPACE}"
|
||||
else
|
||||
log_warning "${service} pods not found"
|
||||
fi
|
||||
done
|
||||
|
||||
# Verify service endpoints
|
||||
log_step "10.5 Verifying service endpoints..."
|
||||
|
||||
for service in "${SERVICES[@]}"; do
|
||||
if kubectl get svc "${service}" -n "${NAMESPACE}" &> /dev/null; then
|
||||
log_success "Service ${service} endpoint created"
|
||||
|
||||
# Test health endpoint (if accessible)
|
||||
PORT="${SERVICE_PORTS[$service]}"
|
||||
if [ -n "${PORT}" ]; then
|
||||
log_info "Testing ${service} health endpoint on port ${PORT}..."
|
||||
kubectl run test-${service}-health \
|
||||
--image=curlimages/curl \
|
||||
--rm -i --restart=Never \
|
||||
-- curl -f "http://${service}:${PORT}/health" \
|
||||
-n "${NAMESPACE}" 2>/dev/null && \
|
||||
log_success "${service} health check passed" || \
|
||||
log_warning "${service} health check failed or endpoint not ready"
|
||||
fi
|
||||
else
|
||||
log_warning "Service ${service} endpoint not found"
|
||||
fi
|
||||
done
|
||||
|
||||
# Save state
|
||||
save_state "phase10" "complete"
|
||||
|
||||
log_success "=========================================="
|
||||
log_success "Phase 10: Backend Services - COMPLETE"
|
||||
log_success "=========================================="
|
||||
|
||||
Reference in New Issue
Block a user