Add Oracle Aggregator and CCIP Integration
- Introduced Aggregator.sol for Chainlink-compatible oracle functionality, including round-based updates and access control. - Added OracleWithCCIP.sol to extend Aggregator with CCIP cross-chain messaging capabilities. - Created .gitmodules to include OpenZeppelin contracts as a submodule. - Developed a comprehensive deployment guide in NEXT_STEPS_COMPLETE_GUIDE.md for Phase 2 and smart contract deployment. - Implemented Vite configuration for the orchestration portal, supporting both Vue and React frameworks. - Added server-side logic for the Multi-Cloud Orchestration Portal, including API endpoints for environment management and monitoring. - Created scripts for resource import and usage validation across non-US regions. - Added tests for CCIP error handling and integration to ensure robust functionality. - Included various new files and directories for the orchestration portal and deployment scripts.
This commit is contained in:
60
scripts/deployment/deploy-keyvaults-only.sh
Executable file
60
scripts/deployment/deploy-keyvaults-only.sh
Executable file
@@ -0,0 +1,60 @@
|
||||
#!/usr/bin/env bash
|
||||
|
||||
set -e
|
||||
|
||||
SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" && pwd)"
|
||||
source "$SCRIPT_DIR/../lib/init.sh"
|
||||
PROJECT_ROOT="$(cd "$SCRIPT_DIR/../.." && pwd)"
|
||||
TERRAFORM_DIR="$PROJECT_ROOT/terraform/well-architected/cloud-sovereignty"
|
||||
|
||||
echo "╔════════════════════════════════════════════════════════════════╗"
|
||||
echo "║ DEPLOYING KEY VAULTS ONLY (PHASE 1 - INFRASTRUCTURE) ║"
|
||||
echo "╚════════════════════════════════════════════════════════════════╝"
|
||||
|
||||
cd "$TERRAFORM_DIR"
|
||||
|
||||
# Check if terraform.tfvars.36regions exists
|
||||
if [ ! -f "terraform.tfvars.36regions" ]; then
|
||||
echo "❌ Error: terraform.tfvars.36regions not found"
|
||||
exit 1
|
||||
fi
|
||||
|
||||
# Create temporary tfvars with deploy_aks_clusters = false
|
||||
cat terraform.tfvars.36regions | sed 's/deploy_aks_clusters = true/deploy_aks_clusters = false/' > terraform.tfvars.keyvaults
|
||||
|
||||
echo "Using configuration: terraform.tfvars.keyvaults"
|
||||
echo " • deploy_aks_clusters = false (Key Vaults only)"
|
||||
|
||||
# Initialize Terraform if needed
|
||||
if [ ! -d ".terraform" ]; then
|
||||
echo "Initializing Terraform..."
|
||||
terraform init
|
||||
fi
|
||||
|
||||
# Plan deployment
|
||||
echo "=" | awk '{printf "%-64s\n", ""}'
|
||||
echo "📋 RUNNING TERRAFORM PLAN"
|
||||
echo "=" | awk '{printf "%-64s\n", ""}'
|
||||
|
||||
terraform plan -var-file=terraform.tfvars.keyvaults -out=tfplan.keyvaults
|
||||
|
||||
echo "=" | awk '{printf "%-64s\n", ""}'
|
||||
echo "🚀 APPLYING TERRAFORM PLAN"
|
||||
echo "=" | awk '{printf "%-64s\n", ""}'
|
||||
|
||||
echo "This will create Key Vaults across 36 regions..."
|
||||
echo "Press Ctrl+C to cancel, or wait 5 seconds to continue..."
|
||||
sleep 5
|
||||
|
||||
terraform apply tfplan.keyvaults
|
||||
|
||||
echo "=" | awk '{printf "%-64s\n", ""}'
|
||||
echo "✅ KEY VAULT DEPLOYMENT COMPLETE"
|
||||
echo "=" | awk '{printf "%-64s\n", ""}'
|
||||
|
||||
# Cleanup
|
||||
rm -f terraform.tfvars.keyvaults
|
||||
|
||||
echo "Next step: Store node secrets in Key Vaults"
|
||||
echo " Run: bash scripts/key-management/store-nodes-in-keyvault.sh"
|
||||
|
||||
Reference in New Issue
Block a user