feat: implement naming convention, deployment automation, and infrastructure updates
- Add comprehensive naming convention (provider-region-resource-env-purpose) - Implement Terraform locals for centralized naming - Update all Terraform resources to use new naming convention - Create deployment automation framework (18 phase scripts) - Add Azure setup scripts (provider registration, quota checks) - Update deployment scripts config with naming functions - Create complete deployment documentation (guide, steps, quick reference) - Add frontend portal implementations (public and internal) - Add UI component library (18 components) - Enhance Entra VerifiedID integration with file utilities - Add API client package for all services - Create comprehensive documentation (naming, deployment, next steps) Infrastructure: - Resource groups, storage accounts with new naming - Terraform configuration updates - Outputs with naming convention examples Deployment: - Automated deployment scripts for all 15 phases - State management and logging - Error handling and validation Documentation: - Naming convention guide and implementation summary - Complete deployment guide (296 steps) - Next steps and quick start guides - Azure prerequisites and setup completion docs Note: ESLint warnings present - will be addressed in follow-up commit
This commit is contained in:
58
scripts/deploy/store-entra-secrets.sh
Executable file
58
scripts/deploy/store-entra-secrets.sh
Executable file
@@ -0,0 +1,58 @@
|
||||
#!/bin/bash
|
||||
#
|
||||
# Store Entra ID secrets in Azure Key Vault
|
||||
# Run this after completing manual Entra ID setup
|
||||
#
|
||||
|
||||
set -euo pipefail
|
||||
|
||||
SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" && pwd)"
|
||||
source "${SCRIPT_DIR}/config.sh"
|
||||
|
||||
log_info "Storing Entra ID secrets in Azure Key Vault..."
|
||||
|
||||
# Prompt for values if not in environment
|
||||
if [ -z "${ENTRA_TENANT_ID:-}" ]; then
|
||||
read -p "Enter Entra Tenant ID: " ENTRA_TENANT_ID
|
||||
fi
|
||||
|
||||
if [ -z "${ENTRA_CLIENT_ID:-}" ]; then
|
||||
read -p "Enter Entra Client ID: " ENTRA_CLIENT_ID
|
||||
fi
|
||||
|
||||
if [ -z "${ENTRA_CLIENT_SECRET:-}" ]; then
|
||||
read -sp "Enter Entra Client Secret: " ENTRA_CLIENT_SECRET
|
||||
echo
|
||||
fi
|
||||
|
||||
if [ -z "${ENTRA_CREDENTIAL_MANIFEST_ID:-}" ]; then
|
||||
read -p "Enter Entra Credential Manifest ID: " ENTRA_CREDENTIAL_MANIFEST_ID
|
||||
fi
|
||||
|
||||
# Store secrets
|
||||
az keyvault secret set \
|
||||
--vault-name "${KEY_VAULT_NAME}" \
|
||||
--name "entra-tenant-id" \
|
||||
--value "${ENTRA_TENANT_ID}" \
|
||||
|| error_exit "Failed to store tenant ID"
|
||||
|
||||
az keyvault secret set \
|
||||
--vault-name "${KEY_VAULT_NAME}" \
|
||||
--name "entra-client-id" \
|
||||
--value "${ENTRA_CLIENT_ID}" \
|
||||
|| error_exit "Failed to store client ID"
|
||||
|
||||
az keyvault secret set \
|
||||
--vault-name "${KEY_VAULT_NAME}" \
|
||||
--name "entra-client-secret" \
|
||||
--value "${ENTRA_CLIENT_SECRET}" \
|
||||
|| error_exit "Failed to store client secret"
|
||||
|
||||
az keyvault secret set \
|
||||
--vault-name "${KEY_VAULT_NAME}" \
|
||||
--name "entra-credential-manifest-id" \
|
||||
--value "${ENTRA_CREDENTIAL_MANIFEST_ID}" \
|
||||
|| error_exit "Failed to store manifest ID"
|
||||
|
||||
log_success "Entra ID secrets stored in Key Vault"
|
||||
|
||||
Reference in New Issue
Block a user