Skip to content

Commit

Permalink
Remove dev environment manifests
Browse files Browse the repository at this point in the history
Remove `dev` environment manifests and disable CD pipeline to it.
  • Loading branch information
masih committed Apr 30, 2024
1 parent b98c4d1 commit 1bbd9d5
Show file tree
Hide file tree
Showing 119 changed files with 7 additions and 2,545 deletions.
1 change: 0 additions & 1 deletion .github/workflows/cd.yml
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,6 @@ name: CD
on:
push:
branches:
- 'cd/dev'
- 'cd/prod'

jobs:
Expand Down
6 changes: 3 additions & 3 deletions deploy/manifests/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ the encryption/decryption that under the hood uses designated KMS keys.

The key designated to storetheindex is specified in a SOPS configuration file in the folder that
contains its manifests for each of the runtime environments. For example, the SOPS config file for
the `dev` environment can be found [here](dev/us-east-2/tenant/storetheindex/.sops.yaml). The
the `prod` environment can be found [here](prod/us-east-2/tenant/storetheindex/.sops.yaml). The
presence of that file instructs all `sops` commands _executed in that directory_ to use the
configured key.

Expand All @@ -31,7 +31,7 @@ To encrypt a file containing sensitive information, e.g. `my-secret.txt`:

* `cd` into the `storetheindex` directory corresponding to the environment you want to make that
secret available in.
* For example, `dev/us-east-2/tenant/storetheindex` for the `dev` environment
* For example, `prod/us-east-2/tenant/storetheindex` for the `prod` environment
* Execute `sops -e my-secret.txt > my-secret.encrypted`
* This command would encrypt the content of `my-secret.txt` and stores the encrypted value to a
file named `my-secret.encrypted`.
Expand All @@ -43,7 +43,7 @@ To encrypt a file containing sensitive information, e.g. `my-secret.txt`:

You can now include the encrypted value in your `kustomization.yaml` using `secretGenerator` to
create K8S `Secret` object. An example of this technique can be found in `storetheindex`
Kustomization file in both `dev` and `prod` environments.
Kustomization file in `prod` environments.

It is also possible to define K8S `Secret` object directly, and encrypt its content (i.e. at
key `data` or `stringData`) using SOPS.
Expand Down

This file was deleted.

This file was deleted.

17 changes: 0 additions & 17 deletions deploy/manifests/dev/us-east-2/cluster/cert-manager/issuer.yaml

This file was deleted.

This file was deleted.

16 changes: 0 additions & 16 deletions deploy/manifests/dev/us-east-2/cluster/cert-manager/sa-patch.yaml

This file was deleted.

This file was deleted.

This file was deleted.

This file was deleted.

This file was deleted.

This file was deleted.

This file was deleted.

This file was deleted.

24 changes: 0 additions & 24 deletions deploy/manifests/dev/us-east-2/cluster/flux-system/cluster-cd.yaml

This file was deleted.

This file was deleted.

This file was deleted.

This file was deleted.

This file was deleted.

91 changes: 0 additions & 91 deletions deploy/manifests/dev/us-east-2/cluster/index-observer/flux-cd.yaml

This file was deleted.

Loading

0 comments on commit 1bbd9d5

Please sign in to comment.