generated from CDCgov/template
-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[WIP] Add tefca-viewer postgres db #81
Closed
Closed
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Bootstrap Next.js app
Added basic terraform
Kenneth/GitHub actions
* adding s3 bucket resource info * revise s3 bucket resource module * modifications for the s3 bucket module work * update ecr-viewer s3 and eks * remove extra space in module s3 in main.tf * fix main.tf format * fix format issues in s3 module * fix format issues in eks main.tf * add private and public vpc subnets by adding depends on s3 eks attribute * update iam.tf file to include s3 policy permissions for services * update bucket id attribute * remove extra spaces and incorrect changes to az implementation/variables.tf * update s3 iam policies for ecrViewer * revisions to s3 bucket module * create data.tf file for data blocks * update s3 iam roles and variables files * accept incoming changes from main branch * update default s3 bucket name * ensure the s3 bucket can have an env variable for the bucket --------- Co-authored-by: Mary Crawford <[email protected]> Co-authored-by: marycrawford <[email protected]>
Co-authored-by: marycrawford <[email protected]>
…tion name (#59) Co-authored-by: marycrawford <[email protected]>
Co-authored-by: marycrawford <[email protected]>
#62) * adding service principals to the data.tf file for ecr-viewer and orchestration * fix formatting issues --------- Co-authored-by: marycrawford <[email protected]>
* update iam roles for s3 and eks modules * update s3/data.tf file --------- Co-authored-by: marycrawford <[email protected]>
* update eks and s3 modules, as well as AWS implementation * fix orchestration spelling error * update .gitignore file * fix tf file formatting issues --------- Co-authored-by: marycrawford <[email protected]>
Co-authored-by: marycrawford <[email protected]>
Co-authored-by: marycrawford <[email protected]>
* Use ACM certificate with ALB instead of Cloudfront * terraform fmt * Add Cognito for authentication * Update domain name * Various fixes needed for ECR viewer * Add variable for disabling cognito
* removing orchestration services s3 access and updating ecrViewer * fix terraform fmt issues in main.tf --------- Co-authored-by: marycrawford <[email protected]>
* add tefca-viewer to services_to_chart * bump image version * add to ingress --------- Co-authored-by: Nick Clyde <[email protected]>
* adding github workflow original commit * Add external data source to grab latest Helm chart versions * Update image tag to 1.2.9 * update version for release and also test github workflow * update workflow implementation and setup * update version for setup-terraform and actions to v3 * update version for checkout to v4 * update aws-region value with vars * add kms_key_enable_default_policy variable * Add Developer role as key_administrator * Run data external through bash * Fix jq command syntax * Use a jq script to avoid shell character escaping mess * Try just using helm repo update without specifying version * Try reconfigure on init * Just specify external provider * Revert "Try just using helm repo update without specifying version" This reverts commit b2a79cb. * Try adding setup helm step in workflow * Try just bash * Version debugging * Add setup jq? * debugging command * add repo first * Trigger another deploy * Trigger another deploy * Always run helm repo update and fix chart names * Temporarily add replace statements * Cleanup * Add setup workflow for AWS * Remove destroy workflow * Add automatic phdi image tag upgrade * Rollback to v1.2.9 for testing * Don't run in shell * Add github token to use GitHub CLI * Test auto tag update * Cleanup --------- Co-authored-by: marycrawford <[email protected]> Co-authored-by: Nick Clyde <[email protected]>
* Update tefca-viewer port to 3000 for NextJs * Update tefca-viewer port in ingressWithCognito.yaml
* Adding refiner and TCR to Terraform * trying to shorten * adding tcr and refiner to main.tf for aws * formatting * trying to figure out right way to shorten this... * trying full name * shorten name * matching service name from helm chart
* Adding additional context for phdi-chart versioning * Update terraform/aws/implementation/description.md Co-authored-by: Marcelle <[email protected]> --------- Co-authored-by: Marcelle <[email protected]>
marycrawford
force-pushed
the
2226-add-postgres-db-for-tefca-viewer
branch
from
July 26, 2024 02:55
6974283
to
e2fb1e9
Compare
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
PULL REQUEST
Summary
What changes are being proposed?
Related Issue
Fixes #
Additional Information
Anything else the review team should know?