Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

update readme #2201

Closed
wants to merge 4 commits into from
Closed

update readme #2201

wants to merge 4 commits into from

Conversation

Majid-justice
Copy link

test piepline

Does this PR introduce a breaking change? (check one with "x")

[ ] Yes
[x] No

@hmcts-jenkins-a-to-c hmcts-jenkins-a-to-c bot requested a deployment to preview April 17, 2024 10:38 Abandoned
@hmcts-jenkins-a-to-c hmcts-jenkins-a-to-c bot requested a deployment to preview April 17, 2024 10:53 Abandoned
@hmcts-jenkins-a-to-c
Copy link
Contributor

Plan Result (aat)

Plan: 0 to add, 11 to change, 0 to destroy.
  • Update
    • azurerm_key_vault_secret.flexible_secret_staging["host"]
    • azurerm_key_vault_secret.flexible_secret_staging["name"]
    • azurerm_key_vault_secret.flexible_secret_staging["password"]
    • azurerm_key_vault_secret.flexible_secret_staging["port"]
    • azurerm_key_vault_secret.flexible_secret_staging["user"]
    • azurerm_key_vault_secret.flexible_secret_standard_format["DATABASE"]
    • azurerm_key_vault_secret.flexible_secret_standard_format["HOST"]
    • azurerm_key_vault_secret.flexible_secret_standard_format["PASS"]
    • azurerm_key_vault_secret.flexible_secret_standard_format["PORT"]
    • azurerm_key_vault_secret.flexible_secret_standard_format["USER"]
    • module.api_mgmt_policy.azurerm_api_management_api_policy.api_policy
Change Result (Click me)
  # azurerm_key_vault_secret.flexible_secret_staging["host"] will be updated in-place
  ~ resource "azurerm_key_vault_secret" "flexible_secret_staging" {
      ~ expiration_date         = "2026-04-17T13:02:45Z" -> (known after apply)
        id                      = "https://reform-scan-aat.vault.azure.net/secrets/blob-router-staging-flexible-db-host/51af603b98ee42aca7cf2631adc3bbe0"
        name                    = "blob-router-staging-flexible-db-host"
        tags                    = {
            "application"         = "bulk-scan-print"
            "autoShutdown"        = "true"
            "builtFrom"           = "https://github.com/HMCTS/blob-router-service.git"
            "businessArea"        = "CFT"
            "contactSlackChannel" = "#rbs"
            "environment"         = "staging"
            "managedBy"           = "Bulk Scanning and Printing"
            "source"              = "blob-router PostgreSQL"
        }
        # (6 unchanged attributes hidden)
    }

  # azurerm_key_vault_secret.flexible_secret_staging["name"] will be updated in-place
  ~ resource "azurerm_key_vault_secret" "flexible_secret_staging" {
      ~ expiration_date         = "2026-04-17T13:02:45Z" -> (known after apply)
        id                      = "https://reform-scan-aat.vault.azure.net/secrets/blob-router-staging-flexible-db-name/1b3b5c5e0c554eb89a60aef83a27c8cb"
        name                    = "blob-router-staging-flexible-db-name"
        tags                    = {
            "application"         = "bulk-scan-print"
            "autoShutdown"        = "true"
            "builtFrom"           = "https://github.com/HMCTS/blob-router-service.git"
            "businessArea"        = "CFT"
            "contactSlackChannel" = "#rbs"
            "environment"         = "staging"
            "managedBy"           = "Bulk Scanning and Printing"
            "source"              = "blob-router PostgreSQL"
        }
        # (6 unchanged attributes hidden)
    }

  # azurerm_key_vault_secret.flexible_secret_staging["password"] will be updated in-place
  ~ resource "azurerm_key_vault_secret" "flexible_secret_staging" {
      ~ expiration_date         = "2026-04-17T13:02:45Z" -> (known after apply)
        id                      = "https://reform-scan-aat.vault.azure.net/secrets/blob-router-staging-flexible-db-password/f4dab7117dd94d0c917122dc8264f07f"
        name                    = "blob-router-staging-flexible-db-password"
        tags                    = {
            "application"         = "bulk-scan-print"
            "autoShutdown"        = "true"
            "builtFrom"           = "https://github.com/HMCTS/blob-router-service.git"
            "businessArea"        = "CFT"
            "contactSlackChannel" = "#rbs"
            "environment"         = "staging"
            "managedBy"           = "Bulk Scanning and Printing"
            "source"              = "blob-router PostgreSQL"
        }
        # (6 unchanged attributes hidden)
    }

  # azurerm_key_vault_secret.flexible_secret_staging["port"] will be updated in-place
  ~ resource "azurerm_key_vault_secret" "flexible_secret_staging" {
      ~ expiration_date         = "2026-04-17T13:02:45Z" -> (known after apply)
        id                      = "https://reform-scan-aat.vault.azure.net/secrets/blob-router-staging-flexible-db-port/3f6911f2652641e28c00c0f7617e8352"
        name                    = "blob-router-staging-flexible-db-port"
        tags                    = {
            "application"         = "bulk-scan-print"
            "autoShutdown"        = "true"
            "builtFrom"           = "https://github.com/HMCTS/blob-router-service.git"
            "businessArea"        = "CFT"
            "contactSlackChannel" = "#rbs"
            "environment"         = "staging"
            "managedBy"           = "Bulk Scanning and Printing"
            "source"              = "blob-router PostgreSQL"
        }
        # (6 unchanged attributes hidden)
    }

  # azurerm_key_vault_secret.flexible_secret_staging["user"] will be updated in-place
  ~ resource "azurerm_key_vault_secret" "flexible_secret_staging" {
      ~ expiration_date         = "2026-04-17T13:02:45Z" -> (known after apply)
        id                      = "https://reform-scan-aat.vault.azure.net/secrets/blob-router-staging-flexible-db-user/dceb88eefa2e4175b5479e9433a0a42c"
        name                    = "blob-router-staging-flexible-db-user"
        tags                    = {
            "application"         = "bulk-scan-print"
            "autoShutdown"        = "true"
            "builtFrom"           = "https://github.com/HMCTS/blob-router-service.git"
            "businessArea"        = "CFT"
            "contactSlackChannel" = "#rbs"
            "environment"         = "staging"
            "managedBy"           = "Bulk Scanning and Printing"
            "source"              = "blob-router PostgreSQL"
        }
        # (6 unchanged attributes hidden)
    }

  # azurerm_key_vault_secret.flexible_secret_standard_format["DATABASE"] will be updated in-place
  ~ resource "azurerm_key_vault_secret" "flexible_secret_standard_format" {
      ~ expiration_date         = "2026-04-17T13:02:45Z" -> (known after apply)
        id                      = "https://reform-scan-aat.vault.azure.net/secrets/blob-router-POSTGRES-DATABASE/7a0447b3f9f6468e8254dd6cd6a251fe"
        name                    = "blob-router-POSTGRES-DATABASE"
        tags                    = {
            "application"         = "bulk-scan-print"
            "autoShutdown"        = "true"
            "builtFrom"           = "https://github.com/HMCTS/blob-router-service.git"
            "businessArea"        = "CFT"
            "contactSlackChannel" = "#rbs"
            "environment"         = "staging"
            "managedBy"           = "Bulk Scanning and Printing"
            "source"              = "blob-router PostgreSQL"
        }
        # (6 unchanged attributes hidden)
    }

  # azurerm_key_vault_secret.flexible_secret_standard_format["HOST"] will be updated in-place
  ~ resource "azurerm_key_vault_secret" "flexible_secret_standard_format" {
      ~ expiration_date         = "2026-04-17T13:02:45Z" -> (known after apply)
        id                      = "https://reform-scan-aat.vault.azure.net/secrets/blob-router-POSTGRES-HOST/e6389c15635b4b6fb3a25730d66faa8d"
        name                    = "blob-router-POSTGRES-HOST"
        tags                    = {
            "application"         = "bulk-scan-print"
            "autoShutdown"        = "true"
            "builtFrom"           = "https://github.com/HMCTS/blob-router-service.git"
            "businessArea"        = "CFT"
            "contactSlackChannel" = "#rbs"
            "environment"         = "staging"
            "managedBy"           = "Bulk Scanning and Printing"
            "source"              = "blob-router PostgreSQL"
        }
        # (6 unchanged attributes hidden)
    }

  # azurerm_key_vault_secret.flexible_secret_standard_format["PASS"] will be updated in-place
  ~ resource "azurerm_key_vault_secret" "flexible_secret_standard_format" {
      ~ expiration_date         = "2026-04-17T13:02:45Z" -> (known after apply)
        id                      = "https://reform-scan-aat.vault.azure.net/secrets/blob-router-POSTGRES-PASS/7dfccbdee4744013b65f47dcb5e16581"
        name                    = "blob-router-POSTGRES-PASS"
        tags                    = {
            "application"         = "bulk-scan-print"
            "autoShutdown"        = "true"
            "builtFrom"           = "https://github.com/HMCTS/blob-router-service.git"
            "businessArea"        = "CFT"
            "contactSlackChannel" = "#rbs"
            "environment"         = "staging"
            "managedBy"           = "Bulk Scanning and Printing"
            "source"              = "blob-router PostgreSQL"
        }
        # (6 unchanged attributes hidden)
    }

  # azurerm_key_vault_secret.flexible_secret_standard_format["PORT"] will be updated in-place
  ~ resource "azurerm_key_vault_secret" "flexible_secret_standard_format" {
      ~ expiration_date         = "2026-04-17T13:02:45Z" -> (known after apply)
        id                      = "https://reform-scan-aat.vault.azure.net/secrets/blob-router-POSTGRES-PORT/4130bc7a2b324a03b6f605cecd9558da"
        name                    = "blob-router-POSTGRES-PORT"
        tags                    = {
            "application"         = "bulk-scan-print"
            "autoShutdown"        = "true"
            "builtFrom"           = "https://github.com/HMCTS/blob-router-service.git"
            "businessArea"        = "CFT"
            "contactSlackChannel" = "#rbs"
            "environment"         = "staging"
            "managedBy"           = "Bulk Scanning and Printing"
            "source"              = "blob-router PostgreSQL"
        }
        # (6 unchanged attributes hidden)
    }

  # azurerm_key_vault_secret.flexible_secret_standard_format["USER"] will be updated in-place
  ~ resource "azurerm_key_vault_secret" "flexible_secret_standard_format" {
      ~ expiration_date         = "2026-04-17T13:02:45Z" -> (known after apply)
        id                      = "https://reform-scan-aat.vault.azure.net/secrets/blob-router-POSTGRES-USER/030d6661b5ff4e76ba34d7f3918a3609"
        name                    = "blob-router-POSTGRES-USER"
        tags                    = {
            "application"         = "bulk-scan-print"
            "autoShutdown"        = "true"
            "builtFrom"           = "https://github.com/HMCTS/blob-router-service.git"
            "businessArea"        = "CFT"
            "contactSlackChannel" = "#rbs"
            "environment"         = "staging"
            "managedBy"           = "Bulk Scanning and Printing"
            "source"              = "blob-router PostgreSQL"
        }
        # (6 unchanged attributes hidden)
    }

  # module.api_mgmt_policy.azurerm_api_management_api_policy.api_policy will be updated in-place
  ~ resource "azurerm_api_management_api_policy" "api_policy" {
        id                  = "/subscriptions/1c4f0704-a29e-403d-b719-b90c34ef14c9/resourceGroups/core-infra-aat/providers/Microsoft.ApiManagement/service/core-api-mgmt-aat/apis/blob-router-api"
      ~ xml_content         = <<-EOT
          - <policies>
          - 	<backend>
          - 		<base />
          - 	</backend>
          - 	<inbound>
          - 		<base />
          - 		<choose>
          - 			<when condition="@(context.Request.Certificate == null)">
          - 				<return-response>
          - 					<set-status code="401" />
          - 					<set-body>Missing client certificate</set-body>
          - 				</return-response>
          - 			</when>
          - 			<when condition="@(context.Request.Certificate.NotAfter &lt; DateTime.Now || context.Request.Certificate.NotBefore &gt; DateTime.Now || !(new string[] {&quot;33881E822271B9421BE2E4FF28AA52BECE4AAEDC&quot;,&quot;D593AF43215C219EEA637A851F55FC9C03EE4A00&quot;,&quot;41B0BA6FF84CE7BDB1F7864BC9248CFBF107B54E&quot;,&quot;3D4A8AD0F5EF4779347B0E448ABC1ADC4D61BDF9&quot;,&quot;792265A947D0C76D4F67A0878B1D06E60976DFDA&quot;}.Any(c => c == context.Request.Certificate.Thumbprint)))">
          - 				<return-response>
          - 					<set-status code="401" />
          - 					<set-body>Invalid client certificate</set-body>
          - 				</return-response>
          - 			</when>
          - 			<!-- Reconciliation endpoint -->
          - 			<when condition="@(context.Request.Url.Path.Contains(&quot;reconciliation-report&quot;))">
          - 				<send-request mode="new" response-variable-name="apiKeySecret" timeout="20" ignore-error="false">
          - 					<set-url>https://reform-scan-{{environment}}.vault.azure.net/secrets/reconciliation-api-key/?api-version=7.0</set-url>
          - 					<set-method>GET</set-method>
          - 					<authentication-managed-identity resource="https://vault.azure.net" />
          - 				</send-request>
          - 				<!-- transform keyvault secret response to string -->
          - 				<set-variable name="apiKeySecretResponse" value="@{
          + <policies>
          +   <backend>
          +     <base/>
          +   </backend>
          +   <inbound>
          +     <base/>
          +     <choose>
          +       <when condition="@(context.Request.Certificate == null)" >
          +         <return-response>
          +           <set-status code="401" />
          +           <set-body>Missing client certificate</set-body>
          +         </return-response>
          +       </when>
          +       <when condition="@(context.Request.Certificate.NotAfter &lt; DateTime.Now || context.Request.Certificate.NotBefore &gt; DateTime.Now || !(new string[] {&quot;33881E822271B9421BE2E4FF28AA52BECE4AAEDC&quot;,&quot;D593AF43215C219EEA637A851F55FC9C03EE4A00&quot;,&quot;41B0BA6FF84CE7BDB1F7864BC9248CFBF107B54E&quot;,&quot;3D4A8AD0F5EF4779347B0E448ABC1ADC4D61BDF9&quot;}.Any(c => c == context.Request.Certificate.Thumbprint)))" >
          +         <return-response>
          +           <set-status code="401" />
          +           <set-body>Invalid client certificate</set-body>
          +         </return-response>
          +       </when>
          +       <!-- Reconciliation endpoint -->
          +       <when condition="@(context.Request.Url.Path.Contains(&quot;reconciliation-report&quot;))">
          +         <send-request mode="new" response-variable-name="apiKeySecret" timeout="20" ignore-error="false">
          +           <set-url>https://reform-scan-{{environment}}.vault.azure.net/secrets/reconciliation-api-key/?api-version=7.0</set-url>
          +           <set-method>GET</set-method>
          +           <authentication-managed-identity resource="https://vault.azure.net" />
          +         </send-request>
          +         <!-- transform keyvault secret response to string -->
          +         <set-variable name="apiKeySecretResponse" value="@{
                            var secret = ((IResponse)context.Variables[&quot;apiKeySecret&quot;]).Body.As<JObject>();
                            return secret[&quot;value&quot;].ToString();
          -             }" />
          - 				<!-- Set Apikey with Bearer as Authorization header -->
          - 				<set-header name="Authorization" exists-action="override">
          - 					<value>@("Bearer " + (string)context.Variables["apiKeySecretResponse"])</value>
          - 				</set-header>
          - 			</when>
          - 		</choose>
          - 	</inbound>
          - 	<outbound>
          - 		<base />
          - 	</outbound>
          - 	<on-error>
          - 		<base />
          - 	</on-error>
          +             }" />
          +         <!-- Set Apikey with Bearer as Authorization header -->
          +         <set-header name="Authorization" exists-action="override">
          +           <value>@("Bearer " + (string)context.Variables["apiKeySecretResponse"])</value>
          +         </set-header>
          +       </when>
          +     </choose>
          +   </inbound>
          +   <outbound>
          +     <base/>
          +   </outbound>
          +   <on-error>
          +     <base/>
          +   </on-error>
            </policies>
        EOT
        # (3 unchanged attributes hidden)
    }

Plan: 0 to add, 11 to change, 0 to destroy.

@hmcts-jenkins-a-to-c
Copy link
Contributor

Plan Result (prod)

Plan: 0 to add, 6 to change, 0 to destroy.
  • Update
    • azurerm_key_vault_secret.flexible_secret_standard_format["DATABASE"]
    • azurerm_key_vault_secret.flexible_secret_standard_format["HOST"]
    • azurerm_key_vault_secret.flexible_secret_standard_format["PASS"]
    • azurerm_key_vault_secret.flexible_secret_standard_format["PORT"]
    • azurerm_key_vault_secret.flexible_secret_standard_format["USER"]
    • module.api_mgmt_policy.azurerm_api_management_api_policy.api_policy
Change Result (Click me)
  # azurerm_key_vault_secret.flexible_secret_standard_format["DATABASE"] will be updated in-place
  ~ resource "azurerm_key_vault_secret" "flexible_secret_standard_format" {
      ~ expiration_date         = "2026-04-17T13:10:54Z" -> (known after apply)
        id                      = "https://reform-scan-prod.vault.azure.net/secrets/blob-router-POSTGRES-DATABASE/8fcfcc7568314980a0d149fde7581330"
        name                    = "blob-router-POSTGRES-DATABASE"
        tags                    = {
            "application"         = "bulk-scan-print"
            "builtFrom"           = "https://github.com/HMCTS/blob-router-service.git"
            "businessArea"        = "CFT"
            "contactSlackChannel" = "#rbs"
            "environment"         = "production"
            "managedBy"           = "Bulk Scanning and Printing"
            "source"              = "blob-router PostgreSQL"
        }
        # (6 unchanged attributes hidden)
    }

  # azurerm_key_vault_secret.flexible_secret_standard_format["HOST"] will be updated in-place
  ~ resource "azurerm_key_vault_secret" "flexible_secret_standard_format" {
      ~ expiration_date         = "2026-04-17T13:10:54Z" -> (known after apply)
        id                      = "https://reform-scan-prod.vault.azure.net/secrets/blob-router-POSTGRES-HOST/ed980219a91e4a53a32550c8b91bdffb"
        name                    = "blob-router-POSTGRES-HOST"
        tags                    = {
            "application"         = "bulk-scan-print"
            "builtFrom"           = "https://github.com/HMCTS/blob-router-service.git"
            "businessArea"        = "CFT"
            "contactSlackChannel" = "#rbs"
            "environment"         = "production"
            "managedBy"           = "Bulk Scanning and Printing"
            "source"              = "blob-router PostgreSQL"
        }
        # (6 unchanged attributes hidden)
    }

  # azurerm_key_vault_secret.flexible_secret_standard_format["PASS"] will be updated in-place
  ~ resource "azurerm_key_vault_secret" "flexible_secret_standard_format" {
      ~ expiration_date         = "2026-04-17T13:10:54Z" -> (known after apply)
        id                      = "https://reform-scan-prod.vault.azure.net/secrets/blob-router-POSTGRES-PASS/8eb8d92035ca4a98b659a9592856d9a7"
        name                    = "blob-router-POSTGRES-PASS"
        tags                    = {
            "application"         = "bulk-scan-print"
            "builtFrom"           = "https://github.com/HMCTS/blob-router-service.git"
            "businessArea"        = "CFT"
            "contactSlackChannel" = "#rbs"
            "environment"         = "production"
            "managedBy"           = "Bulk Scanning and Printing"
            "source"              = "blob-router PostgreSQL"
        }
        # (6 unchanged attributes hidden)
    }

  # azurerm_key_vault_secret.flexible_secret_standard_format["PORT"] will be updated in-place
  ~ resource "azurerm_key_vault_secret" "flexible_secret_standard_format" {
      ~ expiration_date         = "2026-04-17T13:10:54Z" -> (known after apply)
        id                      = "https://reform-scan-prod.vault.azure.net/secrets/blob-router-POSTGRES-PORT/625ba64f902c483f8454541197005db0"
        name                    = "blob-router-POSTGRES-PORT"
        tags                    = {
            "application"         = "bulk-scan-print"
            "builtFrom"           = "https://github.com/HMCTS/blob-router-service.git"
            "businessArea"        = "CFT"
            "contactSlackChannel" = "#rbs"
            "environment"         = "production"
            "managedBy"           = "Bulk Scanning and Printing"
            "source"              = "blob-router PostgreSQL"
        }
        # (6 unchanged attributes hidden)
    }

  # azurerm_key_vault_secret.flexible_secret_standard_format["USER"] will be updated in-place
  ~ resource "azurerm_key_vault_secret" "flexible_secret_standard_format" {
      ~ expiration_date         = "2026-04-17T13:10:54Z" -> (known after apply)
        id                      = "https://reform-scan-prod.vault.azure.net/secrets/blob-router-POSTGRES-USER/3ee7881662a042839db61e23d65df6bb"
        name                    = "blob-router-POSTGRES-USER"
        tags                    = {
            "application"         = "bulk-scan-print"
            "builtFrom"           = "https://github.com/HMCTS/blob-router-service.git"
            "businessArea"        = "CFT"
            "contactSlackChannel" = "#rbs"
            "environment"         = "production"
            "managedBy"           = "Bulk Scanning and Printing"
            "source"              = "blob-router PostgreSQL"
        }
        # (6 unchanged attributes hidden)
    }

  # module.api_mgmt_policy.azurerm_api_management_api_policy.api_policy will be updated in-place
  ~ resource "azurerm_api_management_api_policy" "api_policy" {
        id                  = "/subscriptions/8999dec3-0104-4a27-94ee-6588559729d1/resourceGroups/core-infra-prod/providers/Microsoft.ApiManagement/service/core-api-mgmt-prod/apis/blob-router-api"
      ~ xml_content         = <<-EOT
          - <policies>
          - 	<backend>
          - 		<base />
          - 	</backend>
          - 	<inbound>
          - 		<base />
          - 		<choose>
          - 			<when condition="@(context.Request.Certificate == null)">
          - 				<return-response>
          - 					<set-status code="401" />
          - 					<set-body>Missing client certificate</set-body>
          - 				</return-response>
          - 			</when>
          - 			<when condition="@(context.Request.Certificate.NotAfter &lt; DateTime.Now || context.Request.Certificate.NotBefore &gt; DateTime.Now || !(new string[] {&quot;284A5A1DC75748A657D18FE77A666B0291974289&quot;,&quot;D593AF43215C219EEA637A851F55FC9C03EE4A00&quot;,&quot;41B0BA6FF84CE7BDB1F7864BC9248CFBF107B54E&quot;,&quot;D8633FCA569981EB00741A3079F3E5744F7B0FE5&quot;,&quot;CC852B5D1349041E1309AC5F9918ECE1FE5C023C&quot;}.Any(c => c == context.Request.Certificate.Thumbprint)))">
          - 				<return-response>
          - 					<set-status code="401" />
          - 					<set-body>Invalid client certificate</set-body>
          - 				</return-response>
          - 			</when>
          - 			<!-- Reconciliation endpoint -->
          - 			<when condition="@(context.Request.Url.Path.Contains(&quot;reconciliation-report&quot;))">
          - 				<send-request mode="new" response-variable-name="apiKeySecret" timeout="20" ignore-error="false">
          - 					<set-url>https://reform-scan-{{environment}}.vault.azure.net/secrets/reconciliation-api-key/?api-version=7.0</set-url>
          - 					<set-method>GET</set-method>
          - 					<authentication-managed-identity resource="https://vault.azure.net" />
          - 				</send-request>
          - 				<!-- transform keyvault secret response to string -->
          - 				<set-variable name="apiKeySecretResponse" value="@{
          + <policies>
          +   <backend>
          +     <base/>
          +   </backend>
          +   <inbound>
          +     <base/>
          +     <choose>
          +       <when condition="@(context.Request.Certificate == null)" >
          +         <return-response>
          +           <set-status code="401" />
          +           <set-body>Missing client certificate</set-body>
          +         </return-response>
          +       </when>
          +       <when condition="@(context.Request.Certificate.NotAfter &lt; DateTime.Now || context.Request.Certificate.NotBefore &gt; DateTime.Now || !(new string[] {&quot;284A5A1DC75748A657D18FE77A666B0291974289&quot;,&quot;D593AF43215C219EEA637A851F55FC9C03EE4A00&quot;,&quot;41B0BA6FF84CE7BDB1F7864BC9248CFBF107B54E&quot;,&quot;D8633FCA569981EB00741A3079F3E5744F7B0FE5&quot;}.Any(c => c == context.Request.Certificate.Thumbprint)))" >
          +         <return-response>
          +           <set-status code="401" />
          +           <set-body>Invalid client certificate</set-body>
          +         </return-response>
          +       </when>
          +       <!-- Reconciliation endpoint -->
          +       <when condition="@(context.Request.Url.Path.Contains(&quot;reconciliation-report&quot;))">
          +         <send-request mode="new" response-variable-name="apiKeySecret" timeout="20" ignore-error="false">
          +           <set-url>https://reform-scan-{{environment}}.vault.azure.net/secrets/reconciliation-api-key/?api-version=7.0</set-url>
          +           <set-method>GET</set-method>
          +           <authentication-managed-identity resource="https://vault.azure.net" />
          +         </send-request>
          +         <!-- transform keyvault secret response to string -->
          +         <set-variable name="apiKeySecretResponse" value="@{
                            var secret = ((IResponse)context.Variables[&quot;apiKeySecret&quot;]).Body.As<JObject>();
                            return secret[&quot;value&quot;].ToString();
          -             }" />
          - 				<!-- Set Apikey with Bearer as Authorization header -->
          - 				<set-header name="Authorization" exists-action="override">
          - 					<value>@("Bearer " + (string)context.Variables["apiKeySecretResponse"])</value>
          - 				</set-header>
          - 			</when>
          - 		</choose>
          - 	</inbound>
          - 	<outbound>
          - 		<base />
          - 	</outbound>
          - 	<on-error>
          - 		<base />
          - 	</on-error>
          +             }" />
          +         <!-- Set Apikey with Bearer as Authorization header -->
          +         <set-header name="Authorization" exists-action="override">
          +           <value>@("Bearer " + (string)context.Variables["apiKeySecretResponse"])</value>
          +         </set-header>
          +       </when>
          +     </choose>
          +   </inbound>
          +   <outbound>
          +     <base/>
          +   </outbound>
          +   <on-error>
          +     <base/>
          +   </on-error>
            </policies>
        EOT
        # (3 unchanged attributes hidden)
    }

Plan: 0 to add, 6 to change, 0 to destroy.

@hmcts-jenkins-a-to-c hmcts-jenkins-a-to-c bot requested a deployment to preview April 18, 2024 08:54 Abandoned
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants