Skip to content

Commit 2ffc014

Browse files
committed
WIP - Modify pipeline & include full spec
Signed-off-by: Connor Avery <[email protected]>
1 parent 7c85ef3 commit 2ffc014

38 files changed

+6925
-220
lines changed

.github/scripts/deploy_api.sh

Lines changed: 195 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,195 @@
1+
#!/usr/bin/env bash
2+
set -eu pipefail
3+
4+
echo "Specification path: ${SPEC_PATH}"
5+
echo "Specification version: ${VERSION_NUMBER}"
6+
echo "Stack name: ${STACK_NAME}"
7+
echo "AWS environment: ${AWS_ENVIRONMENT}"
8+
echo "Apigee environment: ${APIGEE_ENVIRONMENT}"
9+
echo "Proxygen private key name: ${PROXYGEN_PRIVATE_KEY_NAME}"
10+
echo "Proxygen KID: ${PROXYGEN_KID}"
11+
echo "Dry run: ${DRY_RUN}"
12+
echo "ENABLE_MUTUAL_TLS: ${ENABLE_MUTUAL_TLS}"
13+
echo "is_pull_request: ${IS_PULL_REQUEST}"
14+
15+
client_private_key=$(cat ~/.proxygen/tmp/client_private_key)
16+
client_cert=$(cat ~/.proxygen/tmp/client_cert)
17+
18+
if [ -z "${client_private_key}" ]; then
19+
echo "client_private_key is unset or set to the empty string"
20+
exit 1
21+
fi
22+
if [ -z "${client_cert}" ]; then
23+
echo "client_cert is unset or set to the empty string"
24+
exit 1
25+
fi
26+
27+
put_secret_lambda=lambda-resources-ProxygenPTLMTLSSecretPut
28+
instance_put_lambda=lambda-resources-ProxygenPTLInstancePut
29+
spec_publish_lambda=lambda-resources-ProxygenPTLSpecPublish
30+
31+
if [[ "$APIGEE_ENVIRONMENT" =~ ^(int|sandbox|prod)$ ]]; then
32+
put_secret_lambda=lambda-resources-ProxygenProdMTLSSecretPut
33+
instance_put_lambda=lambda-resources-ProxygenProdInstancePut
34+
spec_publish_lambda=lambda-resources-ProxygenProdSpecPublish
35+
fi
36+
37+
instance_suffix=""
38+
if [[ "${IS_PULL_REQUEST}" == "true" ]]; then
39+
# Extracting the PR ID from $STACK_NAME
40+
pr_id=$(echo "$STACK_NAME" | awk -F'-' '{print $NF}')
41+
instance_suffix=-"pr-${pr_id}"
42+
fi
43+
44+
# Determine the proxy instance based on the provided $STACK_NAME
45+
apigee_api=pfp-proxygen
46+
instance="pfp-proxygen${instance_suffix}"
47+
48+
echo "Proxy instance: ${instance}"
49+
echo "Apigee api: ${apigee_api}"
50+
51+
echo
52+
53+
echo "Fixing the spec"
54+
# Find and replace the title
55+
title=$(jq -r '.info.title' "${SPEC_PATH}")
56+
if [[ "${IS_PULL_REQUEST}" == "true" ]]; then
57+
jq --arg title "[PR-${pr_id}] $title" '.info.title = $title' "${SPEC_PATH}" > temp.json && mv temp.json "${SPEC_PATH}"
58+
echo "disabling monitoring for pull request deployment"
59+
jq '."x-nhsd-apim".monitoring = false' "${SPEC_PATH}" > temp.json && mv temp.json "${SPEC_PATH}"
60+
fi
61+
62+
# Find and replace the specification version number
63+
jq --arg version "${VERSION_NUMBER}" '.info.version = $version' "${SPEC_PATH}" > temp.json && mv temp.json "${SPEC_PATH}"
64+
65+
# Find and replace the x-nhsd-apim.target.url value
66+
jq --arg stack_name "${STACK_NAME}" --arg aws_env "${AWS_ENVIRONMENT}" '.["x-nhsd-apim"].target.url = "https://\($stack_name).\($aws_env).eps.national.nhs.uk"' "${SPEC_PATH}" > temp.json && mv temp.json "${SPEC_PATH}"
67+
68+
# Find and replace the servers object
69+
if [[ "${APIGEE_ENVIRONMENT}" == "prod" ]]; then
70+
jq --arg inst "${instance}" '.servers = [ { "url": "https://api.service.nhs.uk/\($inst)" } ]' "${SPEC_PATH}" > temp.json && mv temp.json "${SPEC_PATH}"
71+
else
72+
jq --arg env "${APIGEE_ENVIRONMENT}" --arg inst "${instance}" '.servers = [ { "url": "https://\($env).api.service.nhs.uk/\($inst)" } ]' "${SPEC_PATH}" > temp.json && mv temp.json "${SPEC_PATH}"
73+
fi
74+
75+
# Find and replace securitySchemes
76+
if [[ "${APIGEE_ENVIRONMENT}" == "prod" ]]; then
77+
jq '.components.securitySchemes."nhs-cis2-aal3" = {"$ref": "https://proxygen.prod.api.platform.nhs.uk/components/securitySchemes/nhs-cis2-aal3"}' "${SPEC_PATH}" > temp.json && mv temp.json "${SPEC_PATH}"
78+
else
79+
jq '.components.securitySchemes."nhs-cis2-aal3" = {"$ref": "https://proxygen.ptl.api.platform.nhs.uk/components/securitySchemes/nhs-cis2-aal3"}' "${SPEC_PATH}" > temp.json && mv temp.json "${SPEC_PATH}"
80+
fi
81+
82+
# Find and replace the x-nhsd-apim.target.secret value
83+
jq --arg mtls_key "${MTLS_KEY}" '.["x-nhsd-apim"].target.security.secret = "\($mtls_key)"' "${SPEC_PATH}" > temp.json && mv temp.json "${SPEC_PATH}"
84+
85+
# Remove target attributes if the environment is sandbox
86+
if [[ "${APIGEE_ENVIRONMENT}" == *"sandbox"* ]]; then
87+
echo "Removing target attributes for sandbox environment"
88+
jq 'del(."x-nhsd-apim"."target-attributes")' "$SPEC_PATH" > temp.json && mv temp.json "${SPEC_PATH}"
89+
fi
90+
91+
echo
92+
93+
echo "Retrieving proxygen credentials"
94+
95+
# Retrieve the proxygen private key and client private key and cert from AWS Secrets Manager
96+
proxygen_private_key_arn=$(aws cloudformation list-exports --query "Exports[?Name=='account-resources:${PROXYGEN_PRIVATE_KEY_NAME}'].Value" --output text)
97+
98+
if [[ "${ENABLE_MUTUAL_TLS}" == "true" ]]; then
99+
echo
100+
echo "Store the secret used for mutual TLS to AWS using Proxygen proxy lambda"
101+
if [[ "${DRY_RUN}" == "false" ]]; then
102+
jq -n --arg apiName "${apigee_api}" \
103+
--arg environment "${APIGEE_ENVIRONMENT}" \
104+
--arg secretName "${MTLS_KEY}" \
105+
--arg secretKey "${client_private_key}" \
106+
--arg secretCert "${client_cert}" \
107+
--arg kid "${PROXYGEN_KID}" \
108+
--arg proxygenSecretName "${proxygen_private_key_arn}" \
109+
'{apiName: $apiName, environment: $environment, secretName: $secretName, secretKey: $secretKey, secretCert: $secretCert, kid, $kid, proxygenSecretName: $proxygenSecretName}' > payload.json
110+
111+
aws lambda invoke --function-name "${put_secret_lambda}" --cli-binary-format raw-in-base64-out --payload file://payload.json out.txt > response.json
112+
if eval "cat response.json | jq -e '.FunctionError' >/dev/null"; then
113+
echo 'Error calling lambda'
114+
cat out.txt
115+
exit 1
116+
fi
117+
echo "Secret stored successfully"
118+
else
119+
echo "Would call ${put_secret_lambda}"
120+
fi
121+
fi
122+
123+
echo
124+
echo "Deploy the API instance using Proxygen proxy lambda"
125+
if [[ "${DRY_RUN}" == "false" ]]; then
126+
127+
jq -n --argfile spec "${SPEC_PATH}" \
128+
--arg apiName "${apigee_api}" \
129+
--arg environment "${APIGEE_ENVIRONMENT}" \
130+
--arg instance "${instance}" \
131+
--arg kid "${PROXYGEN_KID}" \
132+
--arg proxygenSecretName "${proxygen_private_key_arn}" \
133+
'{apiName: $apiName, environment: $environment, specDefinition: $spec, instance: $instance, kid: $kid, proxygenSecretName: $proxygenSecretName}' > payload.json
134+
135+
aws lambda invoke --function-name "${instance_put_lambda}" --cli-binary-format raw-in-base64-out --payload file://payload.json out.txt > response.json
136+
137+
if eval "cat response.json | jq -e '.FunctionError' >/dev/null"; then
138+
echo 'Error calling lambda'
139+
cat out.txt
140+
exit 1
141+
fi
142+
echo "Instance deployed"
143+
else
144+
echo "Would call ${instance_put_lambda}"
145+
fi
146+
147+
# if [[ "${APIGEE_ENVIRONMENT}" == "int" ]]; then
148+
# echo
149+
# echo "Deploy the API spec to prod catalogue as it is int environment"
150+
# if [[ "${DRY_RUN}" == "false" ]]; then
151+
# jq -n --argfile spec "${SPEC_PATH}" \
152+
# --arg apiName "${apigee_api}" \
153+
# --arg environment "prod" \
154+
# --arg instance "${instance}" \
155+
# --arg kid "${PROXYGEN_KID}" \
156+
# --arg proxygenSecretName "${proxygen_private_key_arn}" \
157+
# '{apiName: $apiName, environment: $environment, specDefinition: $spec, instance: $instance, kid: $kid, proxygenSecretName: $proxygenSecretName}' > payload.json
158+
159+
# aws lambda invoke --function-name "${spec_publish_lambda}" --cli-binary-format raw-in-base64-out --payload file://payload.json out.txt > response.json
160+
161+
# if eval "cat response.json | jq -e '.FunctionError' >/dev/null"; then
162+
# echo 'Error calling lambda'
163+
# cat out.txt
164+
# exit 1
165+
# fi
166+
# echo "Spec deployed"
167+
# else
168+
# echo "Would call ${spec_publish_lambda}"
169+
# fi
170+
# fi
171+
172+
if [[ "${APIGEE_ENVIRONMENT}" == "internal-dev" && "${IS_PULL_REQUEST}" == "false" ]]; then
173+
echo
174+
echo "Deploy the API spec to uat catalogue as it is internal-dev environment"
175+
if [[ "${DRY_RUN}" == "false" ]]; then
176+
jq -n --argfile spec "${SPEC_PATH}" \
177+
--arg apiName "${apigee_api}" \
178+
--arg environment "uat" \
179+
--arg instance "${instance}" \
180+
--arg kid "${PROXYGEN_KID}" \
181+
--arg proxygenSecretName "${proxygen_private_key_arn}" \
182+
'{apiName: $apiName, environment: $environment, specDefinition: $spec, instance: $instance, kid: $kid, proxygenSecretName: $proxygenSecretName}' > payload.json
183+
184+
aws lambda invoke --function-name "${spec_publish_lambda}" --cli-binary-format raw-in-base64-out --payload file://payload.json out.txt > response.json
185+
186+
if eval "cat response.json | jq -e '.FunctionError' >/dev/null"; then
187+
echo 'Error calling lambda'
188+
cat out.txt
189+
exit 1
190+
fi
191+
echo "Spec deployed"
192+
else
193+
echo "Would call ${spec_publish_lambda}"
194+
fi
195+
fi

.github/workflows/ci.yml

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -67,6 +67,7 @@ jobs:
6767
TARGET_ENVIRONMENT: dev
6868
APIGEE_ENVIRONMENT: internal-dev
6969
ENABLE_MUTUAL_TLS: true
70+
MTLS_KEY: prescriptions-for-patients-mtls-1
7071
BUILD_ARTIFACT: packaged_code
7172
TRUSTSTORE_FILE: pfp-truststore.pem
7273
VERSION_NUMBER: ${{needs.tag_release.outputs.version_tag}}
@@ -90,6 +91,7 @@ jobs:
9091
INT_CLOUD_FORMATION_CHECK_VERSION_ROLE: ${{ secrets.INT_CLOUD_FORMATION_CHECK_VERSION_ROLE }}
9192
PROD_CLOUD_FORMATION_CHECK_VERSION_ROLE: ${{ secrets.PROD_CLOUD_FORMATION_CHECK_VERSION_ROLE }}
9293
DEV_CLOUD_FORMATION_EXECUTE_LAMBDA_ROLE: ${{ secrets.DEV_CLOUD_FORMATION_EXECUTE_LAMBDA_ROLE }}
94+
PROXYGEN_ROLE: ${{ secrets.PROXYGEN_PTL_ROLE }}
9395

9496
release_dev_sandbox:
9597
needs: [tag_release, package_code, get_commit_id]
@@ -100,6 +102,7 @@ jobs:
100102
TARGET_ENVIRONMENT: dev
101103
APIGEE_ENVIRONMENT: internal-dev-sandbox
102104
ENABLE_MUTUAL_TLS: true
105+
MTLS_KEY: prescriptions-for-patients-mtls-1
103106
BUILD_ARTIFACT: packaged_sandbox_code
104107
TRUSTSTORE_FILE: pfp-sandbox-truststore.pem
105108
VERSION_NUMBER: ${{needs.tag_release.outputs.version_tag}}
@@ -114,6 +117,7 @@ jobs:
114117
CLOUD_FORMATION_DEPLOY_ROLE: ${{ secrets.DEV_CLOUD_FORMATION_DEPLOY_ROLE }}
115118
TARGET_SPINE_SERVER: sandbox
116119
TARGET_SERVICE_SEARCH_SERVER: sandbox
120+
PROXYGEN_ROLE: ${{ secrets.PROXYGEN_PTL_ROLE }}
117121

118122
release_qa:
119123
needs:
@@ -131,6 +135,7 @@ jobs:
131135
TARGET_ENVIRONMENT: qa
132136
APIGEE_ENVIRONMENT: internal-qa
133137
ENABLE_MUTUAL_TLS: true
138+
MTLS_KEY: prescriptions-for-patients-mtls-1
134139
BUILD_ARTIFACT: packaged_code
135140
TRUSTSTORE_FILE: pfp-truststore.pem
136141
VERSION_NUMBER: ${{needs.tag_release.outputs.version_tag}}
@@ -148,3 +153,4 @@ jobs:
148153
CLOUD_FORMATION_DEPLOY_ROLE: ${{ secrets.QA_CLOUD_FORMATION_DEPLOY_ROLE }}
149154
TARGET_SPINE_SERVER: ${{ secrets.QA_TARGET_SPINE_SERVER }}
150155
TARGET_SERVICE_SEARCH_SERVER: ${{ secrets.QA_TARGET_SERVICE_SEARCH_SERVER }}
156+
PROXYGEN_ROLE: ${{ secrets.PROXYGEN_PTL_ROLE }}

.github/workflows/pull_request.yml

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -100,13 +100,15 @@ jobs:
100100
needs: [get_issue_number, package_code, get_commit_id]
101101
uses: ./.github/workflows/sam_release_code.yml
102102
with:
103+
IS_PULL_REQUEST: true
103104
STACK_NAME: pfp-pr-${{needs.get_issue_number.outputs.issue_number}}
104105
ARTIFACT_BUCKET_PREFIX: PR-${{needs.get_issue_number.outputs.issue_number}}
105106
TARGET_ENVIRONMENT: dev-pr
106107
APIGEE_ENVIRONMENT: internal-dev
107-
ENABLE_MUTUAL_TLS: false
108+
ENABLE_MUTUAL_TLS: true
109+
MTLS_KEY: prescriptions-for-patients-mtls-1
108110
BUILD_ARTIFACT: packaged_code
109-
TRUSTSTORE_FILE: pfp-truststore.pem
111+
TRUSTSTORE_FILE: pfp-truststore-pr.pem # temporary
110112
VERSION_NUMBER: PR-${{ needs.get_issue_number.outputs.issue_number }}
111113
COMMIT_ID: ${{ needs.get_commit_id.outputs.commit_id }}
112114
LOG_LEVEL: DEBUG
@@ -117,11 +119,13 @@ jobs:
117119
RUN_REGRESSION_TESTS: true
118120
REGRESSION_TEST_PRODUCT: PFP-AWS
119121
FORWARD_CSOC_LOGS: false
122+
DEPLOY_APIGEE: true # temporary
120123
secrets:
121124
REGRESSION_TESTS_PEM: ${{ secrets.REGRESSION_TESTS_PEM }}
122125
CLOUD_FORMATION_DEPLOY_ROLE: ${{ secrets.DEV_CLOUD_FORMATION_DEPLOY_ROLE }}
123126
TARGET_SPINE_SERVER: ${{ secrets.DEV_TARGET_SPINE_SERVER }}
124127
TARGET_SERVICE_SEARCH_SERVER: ${{ secrets.DEV_TARGET_SERVICE_SEARCH_SERVER }}
128+
PROXYGEN_ROLE: ${{ secrets.PROXYGEN_PTL_ROLE }}
125129

126130
release_sandbox_code:
127131
needs: [get_issue_number, package_code, get_commit_id]
@@ -132,6 +136,7 @@ jobs:
132136
TARGET_ENVIRONMENT: dev-pr
133137
APIGEE_ENVIRONMENT: internal-dev-sandbox
134138
ENABLE_MUTUAL_TLS: false
139+
MTLS_KEY: prescriptions-for-patients-mtls-1
135140
BUILD_ARTIFACT: packaged_sandbox_code
136141
TRUSTSTORE_FILE: pfp-sandbox-truststore.pem
137142
VERSION_NUMBER: PR-${{ needs.get_issue_number.outputs.issue_number }}
@@ -146,3 +151,4 @@ jobs:
146151
CLOUD_FORMATION_DEPLOY_ROLE: ${{ secrets.DEV_CLOUD_FORMATION_DEPLOY_ROLE }}
147152
TARGET_SPINE_SERVER: sandbox
148153
TARGET_SERVICE_SEARCH_SERVER: sandbox
154+
PROXYGEN_ROLE: ${{ secrets.PROXYGEN_PTL_ROLE }}

.github/workflows/release.yml

Lines changed: 14 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -64,6 +64,7 @@ jobs:
6464
TARGET_ENVIRONMENT: dev
6565
APIGEE_ENVIRONMENT: internal-dev
6666
ENABLE_MUTUAL_TLS: true
67+
MTLS_KEY: prescriptions-for-patients-mtls-1
6768
BUILD_ARTIFACT: packaged_code
6869
TRUSTSTORE_FILE: pfp-truststore.pem
6970
VERSION_NUMBER: ${{needs.tag_release.outputs.version_tag}}
@@ -90,7 +91,7 @@ jobs:
9091
INT_CLOUD_FORMATION_CHECK_VERSION_ROLE: ${{ secrets.INT_CLOUD_FORMATION_CHECK_VERSION_ROLE }}
9192
PROD_CLOUD_FORMATION_CHECK_VERSION_ROLE: ${{ secrets.PROD_CLOUD_FORMATION_CHECK_VERSION_ROLE }}
9293
DEV_CLOUD_FORMATION_EXECUTE_LAMBDA_ROLE: ${{ secrets.DEV_CLOUD_FORMATION_EXECUTE_LAMBDA_ROLE }}
93-
94+
PROXYGEN_ROLE: ${{ secrets.PROXYGEN_PTL_ROLE }}
9495
release_dev_sandbox:
9596
needs: [tag_release, package_code, get_commit_id]
9697
uses: ./.github/workflows/sam_release_code.yml
@@ -100,6 +101,7 @@ jobs:
100101
TARGET_ENVIRONMENT: dev
101102
APIGEE_ENVIRONMENT: internal-dev-sandbox
102103
ENABLE_MUTUAL_TLS: true
104+
MTLS_KEY: prescriptions-for-patients-mtls-1
103105
BUILD_ARTIFACT: packaged_sandbox_code
104106
TRUSTSTORE_FILE: pfp-sandbox-truststore.pem
105107
VERSION_NUMBER: ${{needs.tag_release.outputs.version_tag}}
@@ -117,6 +119,7 @@ jobs:
117119
CLOUD_FORMATION_DEPLOY_ROLE: ${{ secrets.DEV_CLOUD_FORMATION_DEPLOY_ROLE }}
118120
TARGET_SPINE_SERVER: sandbox
119121
TARGET_SERVICE_SEARCH_SERVER: sandbox
122+
PROXYGEN_ROLE: ${{ secrets.PROXYGEN_PTL_ROLE }}
120123

121124
release_ref:
122125
needs:
@@ -134,6 +137,7 @@ jobs:
134137
TARGET_ENVIRONMENT: ref
135138
APIGEE_ENVIRONMENT: ref
136139
ENABLE_MUTUAL_TLS: true
140+
MTLS_KEY: prescriptions-for-patients-mtls-1
137141
BUILD_ARTIFACT: packaged_code
138142
TRUSTSTORE_FILE: pfp-truststore.pem
139143
VERSION_NUMBER: ${{needs.tag_release.outputs.version_tag}}
@@ -153,7 +157,7 @@ jobs:
153157
CLOUD_FORMATION_DEPLOY_ROLE: ${{ secrets.REF_CLOUD_FORMATION_DEPLOY_ROLE }}
154158
TARGET_SPINE_SERVER: ${{ secrets.REF_TARGET_SPINE_SERVER }}
155159
TARGET_SERVICE_SEARCH_SERVER: ${{ secrets.REF_TARGET_SERVICE_SEARCH_SERVER }}
156-
160+
PROXYGEN_ROLE: ${{ secrets.PROXYGEN_PTL_ROLE }}
157161
release_qa:
158162
needs:
159163
[
@@ -170,6 +174,7 @@ jobs:
170174
TARGET_ENVIRONMENT: qa
171175
APIGEE_ENVIRONMENT: internal-qa
172176
ENABLE_MUTUAL_TLS: true
177+
MTLS_KEY: prescriptions-for-patients-mtls-1
173178
BUILD_ARTIFACT: packaged_code
174179
TRUSTSTORE_FILE: pfp-truststore.pem
175180
VERSION_NUMBER: ${{needs.tag_release.outputs.version_tag}}
@@ -190,7 +195,7 @@ jobs:
190195
CLOUD_FORMATION_DEPLOY_ROLE: ${{ secrets.QA_CLOUD_FORMATION_DEPLOY_ROLE }}
191196
TARGET_SPINE_SERVER: ${{ secrets.QA_TARGET_SPINE_SERVER }}
192197
TARGET_SERVICE_SEARCH_SERVER: ${{ secrets.QA_TARGET_SERVICE_SEARCH_SERVER }}
193-
198+
PROXYGEN_ROLE: ${{ secrets.PROXYGEN_PTL_ROLE }}
194199
release_int:
195200
needs: [tag_release, release_qa, package_code, get_commit_id]
196201
uses: ./.github/workflows/sam_release_code.yml
@@ -200,6 +205,7 @@ jobs:
200205
TARGET_ENVIRONMENT: int
201206
APIGEE_ENVIRONMENT: int
202207
ENABLE_MUTUAL_TLS: true
208+
MTLS_KEY: prescriptions-for-patients-mtls-1
203209
BUILD_ARTIFACT: packaged_code
204210
TRUSTSTORE_FILE: pfp-truststore.pem
205211
VERSION_NUMBER: ${{needs.tag_release.outputs.version_tag}}
@@ -226,7 +232,7 @@ jobs:
226232
INT_CLOUD_FORMATION_CHECK_VERSION_ROLE: ${{ secrets.INT_CLOUD_FORMATION_CHECK_VERSION_ROLE }}
227233
PROD_CLOUD_FORMATION_CHECK_VERSION_ROLE: ${{ secrets.PROD_CLOUD_FORMATION_CHECK_VERSION_ROLE }}
228234
DEV_CLOUD_FORMATION_EXECUTE_LAMBDA_ROLE: ${{ secrets.DEV_CLOUD_FORMATION_EXECUTE_LAMBDA_ROLE }}
229-
235+
PROXYGEN_ROLE: ${{ secrets.PROXYGEN_PTL_ROLE }}
230236
release_sandbox:
231237
needs: [tag_release, release_qa, package_code, get_commit_id]
232238
uses: ./.github/workflows/sam_release_code.yml
@@ -236,6 +242,7 @@ jobs:
236242
TARGET_ENVIRONMENT: int
237243
APIGEE_ENVIRONMENT: int-sandbox
238244
ENABLE_MUTUAL_TLS: true
245+
MTLS_KEY: prescriptions-for-patients-mtls-1
239246
BUILD_ARTIFACT: packaged_sandbox_code
240247
TRUSTSTORE_FILE: pfp-sandbox-truststore.pem
241248
VERSION_NUMBER: ${{needs.tag_release.outputs.version_tag}}
@@ -250,6 +257,7 @@ jobs:
250257
CLOUD_FORMATION_DEPLOY_ROLE: ${{ secrets.INT_CLOUD_FORMATION_DEPLOY_ROLE }}
251258
TARGET_SPINE_SERVER: sandbox
252259
TARGET_SERVICE_SEARCH_SERVER: sandbox
260+
PROXYGEN_ROLE: ${{ secrets.PROXYGEN_PTL_ROLE }}
253261

254262
release_prod:
255263
needs:
@@ -261,6 +269,7 @@ jobs:
261269
TARGET_ENVIRONMENT: prod
262270
APIGEE_ENVIRONMENT: prod
263271
ENABLE_MUTUAL_TLS: true
272+
MTLS_KEY: prescriptions-for-patients-mtls-1
264273
BUILD_ARTIFACT: packaged_code
265274
TRUSTSTORE_FILE: pfp-truststore.pem
266275
VERSION_NUMBER: ${{needs.tag_release.outputs.version_tag}}
@@ -283,3 +292,4 @@ jobs:
283292
INT_CLOUD_FORMATION_CHECK_VERSION_ROLE: ${{ secrets.INT_CLOUD_FORMATION_CHECK_VERSION_ROLE }}
284293
PROD_CLOUD_FORMATION_CHECK_VERSION_ROLE: ${{ secrets.PROD_CLOUD_FORMATION_CHECK_VERSION_ROLE }}
285294
DEV_CLOUD_FORMATION_EXECUTE_LAMBDA_ROLE: ${{ secrets.DEV_CLOUD_FORMATION_EXECUTE_LAMBDA_ROLE }}
295+
PROXYGEN_ROLE: ${{ secrets.PROXYGEN_PROD_ROLE }}

0 commit comments

Comments
 (0)