Files
the_order/scripts/deploy/store-entra-secrets.sh
defiQUG 8649ad4124 feat: implement naming convention, deployment automation, and infrastructure updates
- Add comprehensive naming convention (provider-region-resource-env-purpose)
- Implement Terraform locals for centralized naming
- Update all Terraform resources to use new naming convention
- Create deployment automation framework (18 phase scripts)
- Add Azure setup scripts (provider registration, quota checks)
- Update deployment scripts config with naming functions
- Create complete deployment documentation (guide, steps, quick reference)
- Add frontend portal implementations (public and internal)
- Add UI component library (18 components)
- Enhance Entra VerifiedID integration with file utilities
- Add API client package for all services
- Create comprehensive documentation (naming, deployment, next steps)

Infrastructure:
- Resource groups, storage accounts with new naming
- Terraform configuration updates
- Outputs with naming convention examples

Deployment:
- Automated deployment scripts for all 15 phases
- State management and logging
- Error handling and validation

Documentation:
- Naming convention guide and implementation summary
- Complete deployment guide (296 steps)
- Next steps and quick start guides
- Azure prerequisites and setup completion docs

Note: ESLint warnings present - will be addressed in follow-up commit
2025-11-12 08:22:51 -08:00

59 lines
1.5 KiB
Bash
Executable File

#!/bin/bash
#
# Store Entra ID secrets in Azure Key Vault
# Run this after completing manual Entra ID setup
#
set -euo pipefail
SCRIPT_DIR="$(cd "$(dirname "${BASH_SOURCE[0]}")" && pwd)"
source "${SCRIPT_DIR}/config.sh"
log_info "Storing Entra ID secrets in Azure Key Vault..."
# Prompt for values if not in environment
if [ -z "${ENTRA_TENANT_ID:-}" ]; then
read -p "Enter Entra Tenant ID: " ENTRA_TENANT_ID
fi
if [ -z "${ENTRA_CLIENT_ID:-}" ]; then
read -p "Enter Entra Client ID: " ENTRA_CLIENT_ID
fi
if [ -z "${ENTRA_CLIENT_SECRET:-}" ]; then
read -sp "Enter Entra Client Secret: " ENTRA_CLIENT_SECRET
echo
fi
if [ -z "${ENTRA_CREDENTIAL_MANIFEST_ID:-}" ]; then
read -p "Enter Entra Credential Manifest ID: " ENTRA_CREDENTIAL_MANIFEST_ID
fi
# Store secrets
az keyvault secret set \
--vault-name "${KEY_VAULT_NAME}" \
--name "entra-tenant-id" \
--value "${ENTRA_TENANT_ID}" \
|| error_exit "Failed to store tenant ID"
az keyvault secret set \
--vault-name "${KEY_VAULT_NAME}" \
--name "entra-client-id" \
--value "${ENTRA_CLIENT_ID}" \
|| error_exit "Failed to store client ID"
az keyvault secret set \
--vault-name "${KEY_VAULT_NAME}" \
--name "entra-client-secret" \
--value "${ENTRA_CLIENT_SECRET}" \
|| error_exit "Failed to store client secret"
az keyvault secret set \
--vault-name "${KEY_VAULT_NAME}" \
--name "entra-credential-manifest-id" \
--value "${ENTRA_CREDENTIAL_MANIFEST_ID}" \
|| error_exit "Failed to store manifest ID"
log_success "Entra ID secrets stored in Key Vault"