Skip to content

Commit 989648f

Browse files
committed
Rename SQL/Database Admins to PostgreSQL Admins and fix CI/CD firewall and Entra ID auth
1 parent 51e46b9 commit 989648f

8 files changed

Lines changed: 45 additions & 43 deletions

File tree

.github/workflows/_deploy-infrastructure.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ on:
3030
domain_name:
3131
required: true
3232
type: string
33-
db_admin_object_id:
33+
postgres_admin_object_id:
3434
required: true
3535
type: string
3636
production_service_principal_object_id:
@@ -84,7 +84,7 @@ jobs:
8484
STRIPE_PUBLISHABLE_KEY: ${{ vars.STRIPE_PUBLISHABLE_KEY }}
8585
STRIPE_API_KEY: ${{ secrets.STRIPE_API_KEY }}
8686
STRIPE_WEBHOOK_SECRET: ${{ secrets.STRIPE_WEBHOOK_SECRET }}
87-
run: bash ./cloud-infrastructure/cluster/deploy-cluster.sh ${{ inputs.unique_prefix }} ${{ inputs.azure_environment }} ${{ inputs.cluster_location }} ${{ inputs.cluster_location_acronym }} ${{ inputs.db_admin_object_id }} ${{ inputs.domain_name }} --plan
87+
run: bash ./cloud-infrastructure/cluster/deploy-cluster.sh ${{ inputs.unique_prefix }} ${{ inputs.azure_environment }} ${{ inputs.cluster_location }} ${{ inputs.cluster_location_acronym }} ${{ inputs.postgres_admin_object_id }} ${{ inputs.domain_name }} --plan
8888

8989
- name: Show DNS Configuration
9090
if: ${{ inputs.domain_name != '' && inputs.domain_name != '-' }}
@@ -149,7 +149,7 @@ jobs:
149149
STRIPE_PUBLISHABLE_KEY: ${{ vars.STRIPE_PUBLISHABLE_KEY }}
150150
STRIPE_API_KEY: ${{ secrets.STRIPE_API_KEY }}
151151
STRIPE_WEBHOOK_SECRET: ${{ secrets.STRIPE_WEBHOOK_SECRET }}
152-
run: bash ./cloud-infrastructure/cluster/deploy-cluster.sh ${{ inputs.unique_prefix }} ${{ inputs.azure_environment }} ${{ inputs.cluster_location }} ${{ inputs.cluster_location_acronym }} ${{ inputs.db_admin_object_id }} ${{ inputs.domain_name }} --apply
152+
run: bash ./cloud-infrastructure/cluster/deploy-cluster.sh ${{ inputs.unique_prefix }} ${{ inputs.azure_environment }} ${{ inputs.cluster_location }} ${{ inputs.cluster_location_acronym }} ${{ inputs.postgres_admin_object_id }} ${{ inputs.domain_name }} --apply
153153

154154
- name: Refresh Azure Tokens # The previous step may take a while, so we refresh the token to avoid timeouts
155155
uses: azure/login@v2
@@ -162,7 +162,7 @@ jobs:
162162
run: sudo apt-get update && sudo apt-get install -y postgresql-client
163163

164164
- name: Add PostgreSQL Admin
165-
run: bash ./cloud-infrastructure/cluster/add-postgres-admin.sh ${{ inputs.unique_prefix }} ${{ inputs.azure_environment }} ${{ inputs.cluster_location_acronym }} ${{ inputs.db_admin_object_id }}
165+
run: bash ./cloud-infrastructure/cluster/add-postgres-admin.sh ${{ inputs.unique_prefix }} ${{ inputs.azure_environment }} ${{ inputs.cluster_location_acronym }} ${{ inputs.postgres_admin_object_id }}
166166

167167
- name: Grant Database Permissions
168168
run: |

.github/workflows/_migrate-database.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,8 @@ jobs:
9191
id: generate-migration-script
9292
working-directory: application
9393
run: |
94-
CONNECTION_STRING="Host=${{ env.POSTGRES_HOST }};Database=${{ inputs.database_name }};Username=$(az account show --query user.name --output tsv);Password=$(az account get-access-token --resource-type oss-rdbms --query accessToken --output tsv);Ssl Mode=Require;"
94+
ENTRA_USER=$(az ad sp show --id $(az account show --query user.name --output tsv) --query displayName --output tsv)
95+
CONNECTION_STRING="Host=${{ env.POSTGRES_HOST }};Database=${{ inputs.database_name }};Username=$ENTRA_USER;Password=$(az account get-access-token --resource-type oss-rdbms --query accessToken --output tsv);Ssl Mode=Require;"
9596
9697
echo "Checking for pending migrations..."
9798
MIGRATION_INFO=$(dotnet ef migrations list \
@@ -274,7 +275,8 @@ jobs:
274275
run: |
275276
echo "Applying migrations to ${{ inputs.database_name }} database on ${{ env.POSTGRES_HOST }}..."
276277
ACCESS_TOKEN=$(az account get-access-token --resource-type oss-rdbms --query accessToken --output tsv)
277-
PGPASSWORD=$ACCESS_TOKEN psql "host=${{ env.POSTGRES_HOST }} dbname=${{ inputs.database_name }} user=$(az account show --query user.name --output tsv) sslmode=require" -f migration.sql
278+
ENTRA_USER=$(az ad sp show --id $(az account show --query user.name --output tsv) --query displayName --output tsv)
279+
PGPASSWORD=$ACCESS_TOKEN psql "host=${{ env.POSTGRES_HOST }} dbname=${{ inputs.database_name }} user='$ENTRA_USER' sslmode=require" -f migration.sql
278280
echo "Migrations applied successfully!"
279281
280282
- name: Display Migration Summary

.github/workflows/cloud-infrastructure.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ jobs:
3737
shared_location: ${{ vars.STAGING_SHARED_LOCATION }}
3838
cluster_location: ${{ vars.STAGING_CLUSTER_LOCATION }}
3939
domain_name: ${{ vars.STAGING_DOMAIN_NAME }}
40-
db_admin_object_id: ${{ vars.STAGING_DB_ADMIN_OBJECT_ID }}
40+
postgres_admin_object_id: ${{ vars.STAGING_POSTGRES_ADMIN_OBJECT_ID }}
4141
production_service_principal_object_id: ${{ vars.PRODUCTION_SERVICE_PRINCIPAL_OBJECT_ID }}
4242

4343
prod1:
@@ -55,5 +55,5 @@ jobs:
5555
shared_location: ${{ vars.PRODUCTION_SHARED_LOCATION }}
5656
cluster_location: ${{ vars.PRODUCTION_CLUSTER1_LOCATION }}
5757
domain_name: ${{ vars.PRODUCTION_DOMAIN_NAME }}
58-
db_admin_object_id: ${{ vars.PRODUCTION_DB_ADMIN_OBJECT_ID }}
58+
postgres_admin_object_id: ${{ vars.PRODUCTION_POSTGRES_ADMIN_OBJECT_ID }}
5959
tenant_id: ${{ vars.TENANT_ID }}
Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,16 @@
11
UNIQUE_PREFIX=$1
22
ENVIRONMENT=$2
33
CLUSTER_LOCATION_ACRONYM=$3
4-
DB_ADMIN_OBJECT_ID=$4
4+
POSTGRES_ADMIN_OBJECT_ID=$4
55

66
CLUSTER_RESOURCE_GROUP_NAME=$UNIQUE_PREFIX-$ENVIRONMENT-$CLUSTER_LOCATION_ACRONYM
77
POSTGRES_SERVER_NAME=$CLUSTER_RESOURCE_GROUP_NAME
88

9-
echo "$(date +"%Y-%m-%dT%H:%M:%S") Adding Entra ID group $DB_ADMIN_OBJECT_ID as admin on PostgreSQL server $POSTGRES_SERVER_NAME"
9+
echo "$(date +"%Y-%m-%dT%H:%M:%S") Adding Entra ID group $POSTGRES_ADMIN_OBJECT_ID as admin on PostgreSQL server $POSTGRES_SERVER_NAME"
1010

1111
az postgres flexible-server microsoft-entra-admin create \
1212
--resource-group $CLUSTER_RESOURCE_GROUP_NAME \
1313
--server-name $POSTGRES_SERVER_NAME \
14-
--display-name "Database Admins" \
15-
--object-id $DB_ADMIN_OBJECT_ID \
14+
--display-name "PostgreSQL Admins" \
15+
--object-id $POSTGRES_ADMIN_OBJECT_ID \
1616
--type Group

cloud-infrastructure/cluster/deploy-cluster.sh

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ UNIQUE_PREFIX=$1
44
ENVIRONMENT=$2
55
CLUSTER_LOCATION=$3
66
CLUSTER_LOCATION_ACRONYM=$4
7-
DB_ADMIN_OBJECT_ID=$5
7+
POSTGRES_ADMIN_OBJECT_ID=$5
88
DOMAIN_NAME=$6
99

1010
get_active_version()
@@ -105,7 +105,7 @@ then
105105
echo "BACK_OFFICE_IDENTITY_CLIENT_ID=$BACK_OFFICE_IDENTITY_CLIENT_ID" >> $GITHUB_OUTPUT
106106
echo "MAIN_IDENTITY_CLIENT_ID=$MAIN_IDENTITY_CLIENT_ID" >> $GITHUB_OUTPUT
107107
else
108-
. ./add-postgres-admin.sh $UNIQUE_PREFIX $ENVIRONMENT $CLUSTER_LOCATION_ACRONYM $DB_ADMIN_OBJECT_ID
108+
. ./add-postgres-admin.sh $UNIQUE_PREFIX $ENVIRONMENT $CLUSTER_LOCATION_ACRONYM $POSTGRES_ADMIN_OBJECT_ID
109109
. ./grant-database-permissions.sh $UNIQUE_PREFIX $ENVIRONMENT $CLUSTER_LOCATION_ACRONYM 'account' $ACCOUNT_IDENTITY_CLIENT_ID
110110
. ./grant-database-permissions.sh $UNIQUE_PREFIX $ENVIRONMENT $CLUSTER_LOCATION_ACRONYM 'back-office' $BACK_OFFICE_IDENTITY_CLIENT_ID
111111
. ./grant-database-permissions.sh $UNIQUE_PREFIX $ENVIRONMENT $CLUSTER_LOCATION_ACRONYM 'main' $MAIN_IDENTITY_CLIENT_ID

cloud-infrastructure/cluster/grant-database-permissions.sh

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,8 @@ echo "$(date +"%Y-%m-%dT%H:%M:%S") Granting $MANAGED_IDENTITY_NAME (Client ID: $
2424
# PostgreSQL uses roles instead of SQL Server users. Create a role for the managed identity
2525
# and grant it the necessary permissions. The pgaadauth_create_principal function handles
2626
# Entra ID principal creation in Azure Database for PostgreSQL Flexible Server.
27-
PGPASSWORD=$ACCESS_TOKEN psql "host=$POSTGRES_HOST dbname=$DATABASE_NAME user=$(az account show --query user.name --output tsv) sslmode=require" << EOF
27+
ENTRA_USER=$(az ad signed-in-user show --query userPrincipalName --output tsv 2>/dev/null || az ad sp show --id $(az account show --query user.name --output tsv) --query displayName --output tsv)
28+
PGPASSWORD=$ACCESS_TOKEN psql "host=$POSTGRES_HOST dbname=$DATABASE_NAME user='$ENTRA_USER' sslmode=require" << EOF
2829
DO \$\$
2930
BEGIN
3031
IF NOT EXISTS (SELECT FROM pg_catalog.pg_roles WHERE rolname = '$MANAGED_IDENTITY_NAME') THEN

cloud-infrastructure/cluster/main-cluster.bicep

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -153,7 +153,6 @@ module postgresServer '../modules/postgresql-flexible-server.bicep' = {
153153
subnetId: subnetId
154154
virtualNetworkId: virtualNetwork.outputs.virtualNetworkId
155155
}
156-
dependsOn: [virtualNetwork]
157156
}
158157

159158
var isCustomDomainSet = domainName != ''

developer-cli/Commands/DeployCommand.cs

Lines changed: 27 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ private void Execute()
6262

6363
ConfirmReuseIfAppRegistrationsExist();
6464

65-
ConfirmReuseIfDbAdminSecurityGroupExists();
65+
ConfirmReuseIfPostgresAdminSecurityGroupExists();
6666

6767
CollectAdditionalInfo();
6868

@@ -82,7 +82,7 @@ private void Execute()
8282

8383
GrantSubscriptionPermissionsToServicePrincipals();
8484

85-
CreateAzureDbAdminSecurityGroups();
85+
CreateAzurePostgresAdminSecurityGroups();
8686

8787
CreateGithubEnvironments();
8888

@@ -403,12 +403,12 @@ void ConfirmReuseIfAppRegistrationExist(AppRegistration appRegistration)
403403
}
404404
}
405405

406-
private void ConfirmReuseIfDbAdminSecurityGroupExists()
406+
private void ConfirmReuseIfPostgresAdminSecurityGroupExists()
407407
{
408-
Config.StagingSubscription.DbAdminsGroup.ObjectId = ConfirmReuseIfDbAdminSecurityGroupExist(Config.StagingSubscription.DbAdminsGroup.Name);
409-
Config.ProductionSubscription.DbAdminsGroup.ObjectId = ConfirmReuseIfDbAdminSecurityGroupExist(Config.ProductionSubscription.DbAdminsGroup.Name);
408+
Config.StagingSubscription.PostgresAdminsGroup.ObjectId = ConfirmReuseIfPostgresAdminSecurityGroupExist(Config.StagingSubscription.PostgresAdminsGroup.Name);
409+
Config.ProductionSubscription.PostgresAdminsGroup.ObjectId = ConfirmReuseIfPostgresAdminSecurityGroupExist(Config.ProductionSubscription.PostgresAdminsGroup.Name);
410410

411-
string? ConfirmReuseIfDbAdminSecurityGroupExist(string dbAdminsSecurityGroupName)
411+
string? ConfirmReuseIfPostgresAdminSecurityGroupExist(string dbAdminsSecurityGroupName)
412412
{
413413
var dbAdminsObjectId = RunAzureCliCommand(
414414
$"""ad group list --display-name "{dbAdminsSecurityGroupName}" --query "[].id" -o tsv"""
@@ -452,11 +452,11 @@ private void ConfirmChangesPrompt()
452452
var productionServicePrincipal = Config.ProductionSubscription.AppRegistration.Exists
453453
? Config.ProductionSubscription.AppRegistration.ServicePrincipalId
454454
: "Will be generated";
455-
var stagingDbAdminObject = Config.StagingSubscription.DbAdminsGroup.Exists
456-
? Config.StagingSubscription.DbAdminsGroup.ObjectId
455+
var stagingPostgresAdminObject = Config.StagingSubscription.PostgresAdminsGroup.Exists
456+
? Config.StagingSubscription.PostgresAdminsGroup.ObjectId
457457
: "Will be generated";
458-
var productionDbAdminObject = Config.ProductionSubscription.DbAdminsGroup.Exists
459-
? Config.ProductionSubscription.DbAdminsGroup.ObjectId
458+
var productionPostgresAdminObject = Config.ProductionSubscription.PostgresAdminsGroup.Exists
459+
? Config.ProductionSubscription.PostgresAdminsGroup.ObjectId
460460
: "Will be generated";
461461

462462
var setupConfirmPrompt =
@@ -472,10 +472,10 @@ [bold]Please review planned changes before continuing.[/]
472472
[yellow]** The Service Principals will get 'Contributor' and 'User Access Administrator' role on the Azure Subscriptions.[/]
473473
474474
[bold]Active Directory Security Groups:[/]
475-
* [blue]{Config.StagingSubscription.DbAdminsGroup.Name}[/]
476-
* [blue]{Config.ProductionSubscription.DbAdminsGroup.Name}[/]
475+
* [blue]{Config.StagingSubscription.PostgresAdminsGroup.Name}[/]
476+
* [blue]{Config.ProductionSubscription.PostgresAdminsGroup.Name}[/]
477477
478-
[yellow]** The Database Admins Security Groups are used to grant Managed Identities and CI/CD permissions to PostgreSQL databases.[/]
478+
[yellow]** The PostgreSQL Admins Security Groups are used to grant Managed Identities and CI/CD permissions to PostgreSQL databases.[/]
479479
480480
2. The following GitHub environments will be created if not exists:
481481
* [blue]staging[/]
@@ -493,7 +493,7 @@ [bold]Please review planned changes before continuing.[/]
493493
* STAGING_SUBSCRIPTION_ID: [blue]{Config.StagingSubscription.Id}[/]
494494
* STAGING_SHARED_LOCATION: [blue]{Config.StagingLocation.SharedLocation}[/]
495495
* STAGING_SERVICE_PRINCIPAL_ID: [blue]{stagingServicePrincipal}[/]
496-
* STAGING_DB_ADMIN_OBJECT_ID: [blue]{stagingDbAdminObject}[/]
496+
* STAGING_POSTGRES_ADMIN_OBJECT_ID: [blue]{stagingPostgresAdminObject}[/]
497497
* STAGING_DOMAIN_NAME: [blue]-[/] ([yellow]Manually changed this and triggered deployment to set up the domain[/])
498498
499499
[bold]Staging Cluster Variables:[/]
@@ -506,7 +506,7 @@ [bold]Please review planned changes before continuing.[/]
506506
* PRODUCTION_SHARED_LOCATION: [blue]{Config.ProductionLocation.SharedLocation}[/]
507507
* PRODUCTION_SERVICE_PRINCIPAL_ID: [blue]{productionServicePrincipal}[/]
508508
* PRODUCTION_SERVICE_PRINCIPAL_OBJECT_ID: [blue]{Config.ProductionSubscription.AppRegistration.ServicePrincipalObjectId}[/]
509-
* PRODUCTION_DB_ADMIN_OBJECT_ID: [blue]{productionDbAdminObject}[/]
509+
* PRODUCTION_POSTGRES_ADMIN_OBJECT_ID: [blue]{productionPostgresAdminObject}[/]
510510
* PRODUCTION_DOMAIN_NAME: [blue]-[/] ([yellow]Manually changed this and triggered deployment to set up the domain[/])
511511
512512
[bold]Production Cluster 1 Variables:[/]
@@ -662,12 +662,12 @@ void GrantAccess(Subscription subscription, string appRegistrationName)
662662
}
663663
}
664664

665-
private void CreateAzureDbAdminSecurityGroups()
665+
private void CreateAzurePostgresAdminSecurityGroups()
666666
{
667-
CreateAzureDbAdminSecurityGroup(Config.StagingSubscription.DbAdminsGroup, Config.StagingSubscription.AppRegistration);
668-
CreateAzureDbAdminSecurityGroup(Config.ProductionSubscription.DbAdminsGroup, Config.ProductionSubscription.AppRegistration);
667+
CreateAzurePostgresAdminSecurityGroup(Config.StagingSubscription.PostgresAdminsGroup, Config.StagingSubscription.AppRegistration);
668+
CreateAzurePostgresAdminSecurityGroup(Config.ProductionSubscription.PostgresAdminsGroup, Config.ProductionSubscription.AppRegistration);
669669

670-
void CreateAzureDbAdminSecurityGroup(DbAdminsGroup dbAdminGroup, AppRegistration appRegistration)
670+
void CreateAzurePostgresAdminSecurityGroup(PostgresAdminsGroup dbAdminGroup, AppRegistration appRegistration)
671671
{
672672
if (!dbAdminGroup.Exists)
673673
{
@@ -723,7 +723,7 @@ private static void CreateGithubSecretsAndVariables()
723723
SetGithubVariable(VariableNames.STAGING_SUBSCRIPTION_ID, Config.StagingSubscription.Id);
724724
SetGithubVariable(VariableNames.STAGING_SERVICE_PRINCIPAL_ID, Config.StagingSubscription.AppRegistration.ServicePrincipalId!);
725725
SetGithubVariable(VariableNames.STAGING_SHARED_LOCATION, Config.StagingLocation.SharedLocation);
726-
SetGithubVariable(VariableNames.STAGING_DB_ADMIN_OBJECT_ID, Config.StagingSubscription.DbAdminsGroup.ObjectId!);
726+
SetGithubVariable(VariableNames.STAGING_POSTGRES_ADMIN_OBJECT_ID, Config.StagingSubscription.PostgresAdminsGroup.ObjectId!);
727727
SetGithubVariable(VariableNames.STAGING_DOMAIN_NAME, "-");
728728

729729
SetGithubVariable(VariableNames.STAGING_CLUSTER_ENABLED, "true");
@@ -734,7 +734,7 @@ private static void CreateGithubSecretsAndVariables()
734734
SetGithubVariable(VariableNames.PRODUCTION_SERVICE_PRINCIPAL_ID, Config.ProductionSubscription.AppRegistration.ServicePrincipalId!);
735735
SetGithubVariable(VariableNames.PRODUCTION_SERVICE_PRINCIPAL_OBJECT_ID, Config.ProductionSubscription.AppRegistration.ServicePrincipalObjectId!);
736736
SetGithubVariable(VariableNames.PRODUCTION_SHARED_LOCATION, Config.ProductionLocation.SharedLocation);
737-
SetGithubVariable(VariableNames.PRODUCTION_DB_ADMIN_OBJECT_ID, Config.ProductionSubscription.DbAdminsGroup.ObjectId!);
737+
SetGithubVariable(VariableNames.PRODUCTION_POSTGRES_ADMIN_OBJECT_ID, Config.ProductionSubscription.PostgresAdminsGroup.ObjectId!);
738738
SetGithubVariable(VariableNames.PRODUCTION_DOMAIN_NAME, "-");
739739

740740
SetGithubVariable(VariableNames.PRODUCTION_CLUSTER1_ENABLED, "false");
@@ -1028,7 +1028,7 @@ public class Subscription(string id, string name, string tenantId, GithubInfo gi
10281028

10291029
public AppRegistration AppRegistration { get; } = new(githubInfo, environmentName);
10301030

1031-
public DbAdminsGroup DbAdminsGroup { get; } = new(githubInfo, environmentName);
1031+
public PostgresAdminsGroup PostgresAdminsGroup { get; } = new(githubInfo, environmentName);
10321032
}
10331033

10341034
public class AppRegistration(GithubInfo githubInfo, string environmentName)
@@ -1044,11 +1044,11 @@ public class AppRegistration(GithubInfo githubInfo, string environmentName)
10441044
public string? ServicePrincipalObjectId { get; set; }
10451045
}
10461046

1047-
public class DbAdminsGroup(GithubInfo githubInfo, string environmentName)
1047+
public class PostgresAdminsGroup(GithubInfo githubInfo, string environmentName)
10481048
{
1049-
public string Name => $"Database Admins - {environmentName} - {githubInfo.OrganizationName}/{githubInfo.RepositoryName}";
1049+
public string Name => $"PostgreSQL Admins - {environmentName} - {githubInfo.OrganizationName}/{githubInfo.RepositoryName}";
10501050

1051-
public string NickName => $"DatabaseAdmins{environmentName}{githubInfo.OrganizationName}{githubInfo.RepositoryName}";
1051+
public string NickName => $"PostgreSQLAdmins{environmentName}{githubInfo.OrganizationName}{githubInfo.RepositoryName}";
10521052

10531053
public bool Exists => !string.IsNullOrEmpty(ObjectId);
10541054

@@ -1066,7 +1066,7 @@ public enum VariableNames
10661066
STAGING_SUBSCRIPTION_ID,
10671067
STAGING_SERVICE_PRINCIPAL_ID,
10681068
STAGING_SHARED_LOCATION,
1069-
STAGING_DB_ADMIN_OBJECT_ID,
1069+
STAGING_POSTGRES_ADMIN_OBJECT_ID,
10701070
STAGING_DOMAIN_NAME,
10711071

10721072
STAGING_CLUSTER_ENABLED,
@@ -1077,7 +1077,7 @@ public enum VariableNames
10771077
PRODUCTION_SERVICE_PRINCIPAL_ID,
10781078
PRODUCTION_SERVICE_PRINCIPAL_OBJECT_ID,
10791079
PRODUCTION_SHARED_LOCATION,
1080-
PRODUCTION_DB_ADMIN_OBJECT_ID,
1080+
PRODUCTION_POSTGRES_ADMIN_OBJECT_ID,
10811081
PRODUCTION_DOMAIN_NAME,
10821082

10831083
PRODUCTION_CLUSTER1_ENABLED,

0 commit comments

Comments
 (0)