3.2 KiB
Deploying
We deploy automatically to cloud.gov for demo and staging environments.
Deployment to staging runs via the base deployment action on GitHub, which pulls credentials from GitHub's secrets store in the staging environment.
Deployment to demo runs via the demo deployment action on GitHub, which pulls credentials from GitHub's secrets store in the demo environment.
The action that we use deploys using a rolling strategy, so all deployments should have zero downtime.
The API has 2 deployment environments:
- Staging, which deploys from
main - Demo, which deploys from
production
In the future, we will add a Production deploy environment, which will deploy in parallel to Demo.
Configurations for these are located in the deploy-config folder.
In the event that a deployment includes a Terraform change, that change will run before any code is deployed to the environment. Each environment has its own Terraform GitHub Action to handle that change.
Failures in any of these GitHub workflows will be surfaced in the Pull Request related to the code change, and in the case of checks.yml actively prevent the PR from being merged. Failure in the Terraform workflow will not actively prevent the PR from being merged, but reviewers should not approve a PR with a failing terraform plan.
Egress Proxy
The API app runs in a restricted egress space. This allows direct communication to cloud.gov-brokered services, but not to other APIs that we require.
As part of the deploy, we create an egress proxy application that allows traffic out of our application to a select list of allowed domains.
Update the allowed domains by updating deploy-config/egress_proxy/notify-api-<env>.allow.acl
and deploying an updated version of the application throught he normal deploy process.
Sandbox environment
There is a sandbox space, complete with terraform and deploy-config/sandbox.yml file available
for experimenting with infrastructure changes without going through the full CI/CD cycle each time.
Rules for use:
- Ensure that no other developer is using the environment, as there is nothing stopping changes from overwriting each other.
- Clean up when you are done:
terraform destroyfrom within theterraform/sandboxdirectory will take care of the provisioned services- Delete the apps and routes shown in
cf appsby runningcf delete APP_NAME -r - Delete the space deployers still shown in
cf servicesby runningterraform/destroy_service_account.sh -s notify-sandbox -u <space-deployer>
Deploying to the sandbox
- Set up services:
$ cd terraform/sandbox $ ../create_service_account.sh -s notify-sandbox -u <your-name>-terraform -m > secrets.auto.tfvars $ terraform init $ terraform plan $ terraform apply - start a pipenv shell as a shortcut to load
.envfile variables:$ pipenv shell - Deploy the application:
cf push --vars-file deploy-config/sandbox.yml