-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathMakefile
78 lines (62 loc) · 2.91 KB
/
Makefile
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
SHELL=/bin/bash
ELASTICSEARCH_SETUP_DIR := cli/src/main/resources/elastic
ELASTICSEARCH_URL := http://localhost:30200
all:
prepare-dirs:
mkdir -v -p secrets/{postgres,camunda,catalogueapi,flyway,profile,mailer,messenger,web}
mkdir -v -p logs/{catalogueapi,api-gateway,bpm-engine,bpm-worker,profile,pid,mailer,messenger,web}
generate-signing-keys: \
.generate-signing-key-for-JWT \
.generate-signing-key-for-contracts
generate-secret-for-Flyway:
cat secrets/postgres/opertusmundi-password |\
xargs printf "flyway.password=%s" > secrets/flyway/secret.conf
chmod 0640 secrets/flyway/secret.conf
fix-ownership-of-data-volumes: \
.fix-ownership-of-data-volume-for-profile-output
.generate-signing-key-for-JWT:
test -f secrets/key || { \
dd if=/dev/urandom bs=1 count=18 | base64 -w 0 > secrets/key; }
chmod 0640 secrets/key
.generate-signing-key-for-contracts:
test -f secrets/signatory-keystore-password || { \
dd if=/dev/urandom bs=1 count=9 | base64 -w 0 > secrets/signatory-keystore-password; }
chmod 0640 secrets/signatory-keystore-password
test -f secrets/signatory-keystore || { \
keytool -genkeypair -keystore secrets/signatory-keystore \
-keyalg RSA -storetype PKCS12 -alias 1 -storepass:file secrets/signatory-keystore-password \
-dname '$(CONTRACT_SIGNPDF_DNAME)'; }
.fix-ownership-of-data-volume-for-profile-output:
docker-compose run --rm -u0 --no-deps -- profile chown 1000:1000 output
database-migrate:
docker-compose run --rm messenger_flyway migrate
docker-compose run --rm flyway migrate
elasticsearch-setup: \
.elasticsearch-setup-pipeline-auto_timestamp_pipeline \
.elasticsearch-setup-index-assets \
.elasticsearch-setup-index-assets_view \
.elasticsearch-setup-index-assets_view_aggregate \
.elasticsearch-setup-transform-assets_view_transform
.elasticsearch-setup-index-%:
# Create index
ls -1 -v $(ELASTICSEARCH_SETUP_DIR)/$(*)_index/V*settings.json | tail -n 1 | xargs cat |\
jq -M '. + {index: {number_of_shards: 1, number_of_replicas: 0}} | {settings: .}' |\
curl -s -XPUT $(ELASTICSEARCH_URL)/$(*) -H content-type:application/json --data-binary @- \
&& echo
# Define mappings for fields
ls -1 -v $(ELASTICSEARCH_SETUP_DIR)/$(*)_index/V*mappings.json | tail -n 1 | xargs cat |\
curl -s -XPUT $(ELASTICSEARCH_URL)/$(*)/_mappings -H content-type:application/json --data-binary @- \
&& echo \
&& touch $(@)
.elasticsearch-setup-pipeline-%:
ls -1 -v $(ELASTICSEARCH_SETUP_DIR)/$(*)/V*settings.json | tail -n 1 | xargs cat |\
curl -s -XPUT $(ELASTICSEARCH_URL)/_ingest/pipeline/$(*) -H content-type:application/json --data-binary @- \
&& echo \
&& touch $(@)
.elasticsearch-setup-transform-%:
ls -1 -v $(ELASTICSEARCH_SETUP_DIR)/$(*)/V*settings.json | tail -n 1 | xargs cat |\
curl -s -XPUT $(ELASTICSEARCH_URL)/_transform/$(*) -H content-type:application/json --data-binary @- \
&& echo
curl -s -XPOST $(ELASTICSEARCH_URL)/_transform/$(*)/_start \
&& echo \
&& touch $(@)