Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion .github/actions/docker-build-push/action.yml
Original file line number Diff line number Diff line change
Expand Up @@ -30,7 +30,7 @@ inputs:
description: Name of the image within the registry
required: true
IMAGE_TAG:
description: Name of the image within the registry
description: Tag of the image within the registry
required: false
default: latest
DOCKERFILE_LOCATION:
Expand Down
192 changes: 53 additions & 139 deletions .github/workflows/hash-backend-cd.yml
Original file line number Diff line number Diff line change
Expand Up @@ -21,36 +21,21 @@ env:
ARTIFACTS_ECR_ROLE_ARN: arn:aws:iam::469596578827:role/h-artifacts-euc1-ecr-push
ARTIFACTS_AWS_REGION: eu-central-1

STAGING_AWS_REGION: eu-central-1
STAGING_APP_CLUSTER_NAME: h-stage-euc1-app
STAGING_APP_DEPLOY_ROLE_ARN: arn:aws:iam::054238437032:role/h-stage-euc1-app-deploy
STAGING_APP_GRAPH_SERVICE_NAME: h-stage-euc1-app-graph
STAGING_APP_GRAPH_TEST_SERVICE_NAME: h-stage-euc1-app-graph-test
STAGING_APP_TYPE_FETCHER_SERVICE_NAME: h-stage-euc1-app-type-fetcher
STAGING_APP_API_SERVICE_NAME: h-stage-euc1-app-api
STAGING_WORKER_CLUSTER_NAME: h-stage-euc1-worker
STAGING_WORKER_DEPLOY_ROLE_ARN: arn:aws:iam::054238437032:role/h-stage-euc1-worker-deploy
STAGING_WORKER_AI_TS_SERVICE_NAME: h-stage-euc1-worker-ai-ts
STAGING_WORKER_INTEGRATION_SERVICE_NAME: h-stage-euc1-worker-integration
STAGING_AUTH_CLUSTER_NAME: h-stage-euc1-auth
STAGING_AUTH_DEPLOY_ROLE_ARN: arn:aws:iam::054238437032:role/h-stage-euc1-auth-deploy
STAGING_AUTH_KRATOS_SERVICE_NAME: h-stage-euc1-auth-kratos
STAGING_AUTH_HYDRA_SERVICE_NAME: h-stage-euc1-auth-hydra

PRODUCTION_AWS_REGION: eu-central-1
PRODUCTION_APP_CLUSTER_NAME: h-prod-euc1-app
PRODUCTION_APP_DEPLOY_ROLE_ARN: arn:aws:iam::597482567121:role/h-prod-euc1-app-deploy
PRODUCTION_APP_GRAPH_SERVICE_NAME: h-prod-euc1-app-graph
PRODUCTION_APP_TYPE_FETCHER_SERVICE_NAME: h-prod-euc1-app-type-fetcher
PRODUCTION_APP_API_SERVICE_NAME: h-prod-euc1-app-api
PRODUCTION_WORKER_CLUSTER_NAME: h-prod-euc1-worker
PRODUCTION_WORKER_DEPLOY_ROLE_ARN: arn:aws:iam::597482567121:role/h-prod-euc1-worker-deploy
PRODUCTION_WORKER_AI_TS_SERVICE_NAME: h-prod-euc1-worker-ai-ts
PRODUCTION_WORKER_INTEGRATION_SERVICE_NAME: h-prod-euc1-worker-integration
PRODUCTION_AUTH_CLUSTER_NAME: h-prod-euc1-auth
PRODUCTION_AUTH_DEPLOY_ROLE_ARN: arn:aws:iam::597482567121:role/h-prod-euc1-auth-deploy
PRODUCTION_AUTH_KRATOS_SERVICE_NAME: h-prod-euc1-auth-kratos
PRODUCTION_AUTH_HYDRA_SERVICE_NAME: h-prod-euc1-auth-hydra
AWS_REGION: eu-central-1
APP_CLUSTER_NAME: h-stage-euc1-app
APP_DEPLOY_ROLE_ARN: arn:aws:iam::054238437032:role/h-stage-euc1-app-deploy
APP_GRAPH_SERVICE_NAME: h-stage-euc1-app-graph
APP_GRAPH_TEST_SERVICE_NAME: h-stage-euc1-app-graph-test
APP_TYPE_FETCHER_SERVICE_NAME: h-stage-euc1-app-type-fetcher
APP_API_SERVICE_NAME: h-stage-euc1-app-api
WORKER_CLUSTER_NAME: h-stage-euc1-worker
WORKER_DEPLOY_ROLE_ARN: arn:aws:iam::054238437032:role/h-stage-euc1-worker-deploy
WORKER_AI_TS_SERVICE_NAME: h-stage-euc1-worker-ai-ts
WORKER_INTEGRATION_SERVICE_NAME: h-stage-euc1-worker-integration
AUTH_CLUSTER_NAME: h-stage-euc1-auth
AUTH_DEPLOY_ROLE_ARN: arn:aws:iam::054238437032:role/h-stage-euc1-auth-deploy
AUTH_KRATOS_SERVICE_NAME: h-stage-euc1-auth-kratos
AUTH_HYDRA_SERVICE_NAME: h-stage-euc1-auth-hydra

name: HASH backend deployment
jobs:
Expand Down Expand Up @@ -91,6 +76,7 @@ jobs:
AWS_ECR_URL: ${{ env.ARTIFACTS_ECR_URL }}
ROLE_ARN: ${{ env.ARTIFACTS_ECR_ROLE_ARN }}
IMAGE_NAME: ${{ github.repository }}/graph
IMAGE_TAG: staging
GITHUB_TOKEN: ${{ github.token }}
BUILD_ARGS: |
ENABLE_TEST_SERVER=yes
Expand Down Expand Up @@ -132,6 +118,7 @@ jobs:
AWS_ECR_URL: ${{ env.ARTIFACTS_ECR_URL }}
ROLE_ARN: ${{ env.ARTIFACTS_ECR_ROLE_ARN }}
IMAGE_NAME: ${{ github.repository }}/api
IMAGE_TAG: staging
GITHUB_TOKEN: ${{ github.token }}

build-kratos:
Expand Down Expand Up @@ -171,6 +158,7 @@ jobs:
AWS_ECR_URL: ${{ env.ARTIFACTS_ECR_URL }}
ROLE_ARN: ${{ env.ARTIFACTS_ECR_ROLE_ARN }}
IMAGE_NAME: ${{ github.repository }}/kratos
IMAGE_TAG: staging
GITHUB_TOKEN: ${{ github.token }}

build-hydra:
Expand Down Expand Up @@ -210,6 +198,7 @@ jobs:
AWS_ECR_URL: ${{ env.ARTIFACTS_ECR_URL }}
ROLE_ARN: ${{ env.ARTIFACTS_ECR_ROLE_ARN }}
IMAGE_NAME: ${{ github.repository }}/hydra
IMAGE_TAG: staging
GITHUB_TOKEN: ${{ github.token }}
BUILD_ARGS: |
ENV=prod
Expand Down Expand Up @@ -251,6 +240,7 @@ jobs:
AWS_ECR_URL: ${{ env.ARTIFACTS_ECR_URL }}
ROLE_ARN: ${{ env.ARTIFACTS_ECR_ROLE_ARN }}
IMAGE_NAME: ${{ github.repository }}/ai-worker-ts
IMAGE_TAG: staging
GITHUB_TOKEN: ${{ github.token }}
BUILD_ARGS: |
GOOGLE_CLOUD_WORKLOAD_IDENTITY_FEDERATION_CONFIG_JSON: ${{ secrets.GOOGLE_CLOUD_WORKLOAD_IDENTITY_FEDERATION_CONFIG_JSON }}
Expand Down Expand Up @@ -292,6 +282,7 @@ jobs:
AWS_ECR_URL: ${{ env.ARTIFACTS_ECR_URL }}
ROLE_ARN: ${{ env.ARTIFACTS_ECR_ROLE_ARN }}
IMAGE_NAME: ${{ github.repository }}/integration-worker
IMAGE_TAG: staging
GITHUB_TOKEN: ${{ github.token }}

deploy-graph:
Expand Down Expand Up @@ -326,54 +317,32 @@ jobs:
AWS_ACCESS_KEY_ID: ${{ steps.secrets.outputs.AWS_ACCESS_KEY_ID }}
AWS_SECRET_ACCESS_KEY: ${{ steps.secrets.outputs.AWS_SECRET_ACCESS_KEY }}
AWS_SESSION_TOKEN: ${{ steps.secrets.outputs.AWS_SESSION_TOKEN }}
AWS_REGION: ${{ env.STAGING_AWS_REGION }}
ECS_CLUSTER_NAME: ${{ env.STAGING_APP_CLUSTER_NAME }}
ECS_SERVICE_NAME: ${{ env.STAGING_APP_GRAPH_SERVICE_NAME }}
ROLE_ARN: ${{ env.STAGING_APP_DEPLOY_ROLE_ARN }}
AWS_REGION: ${{ env.AWS_REGION }}
ECS_CLUSTER_NAME: ${{ env.APP_CLUSTER_NAME }}
ECS_SERVICE_NAME: ${{ env.APP_GRAPH_SERVICE_NAME }}
ROLE_ARN: ${{ env.APP_DEPLOY_ROLE_ARN }}

- name: Redeploy graph-test staging service
uses: ./.github/actions/redeploy-ecs-service
with:
AWS_ACCESS_KEY_ID: ${{ steps.secrets.outputs.AWS_ACCESS_KEY_ID }}
AWS_SECRET_ACCESS_KEY: ${{ steps.secrets.outputs.AWS_SECRET_ACCESS_KEY }}
AWS_SESSION_TOKEN: ${{ steps.secrets.outputs.AWS_SESSION_TOKEN }}
AWS_REGION: ${{ env.STAGING_AWS_REGION }}
ECS_CLUSTER_NAME: ${{ env.STAGING_APP_CLUSTER_NAME }}
ECS_SERVICE_NAME: ${{ env.STAGING_APP_GRAPH_TEST_SERVICE_NAME }}
ROLE_ARN: ${{ env.STAGING_APP_DEPLOY_ROLE_ARN }}
AWS_REGION: ${{ env.AWS_REGION }}
ECS_CLUSTER_NAME: ${{ env.APP_CLUSTER_NAME }}
ECS_SERVICE_NAME: ${{ env.APP_GRAPH_TEST_SERVICE_NAME }}
ROLE_ARN: ${{ env.APP_DEPLOY_ROLE_ARN }}

- name: Redeploy type-fetcher staging service
uses: ./.github/actions/redeploy-ecs-service
with:
AWS_ACCESS_KEY_ID: ${{ steps.secrets.outputs.AWS_ACCESS_KEY_ID }}
AWS_SECRET_ACCESS_KEY: ${{ steps.secrets.outputs.AWS_SECRET_ACCESS_KEY }}
AWS_SESSION_TOKEN: ${{ steps.secrets.outputs.AWS_SESSION_TOKEN }}
AWS_REGION: ${{ env.STAGING_AWS_REGION }}
ECS_CLUSTER_NAME: ${{ env.STAGING_APP_CLUSTER_NAME }}
ECS_SERVICE_NAME: ${{ env.STAGING_APP_TYPE_FETCHER_SERVICE_NAME }}
ROLE_ARN: ${{ env.STAGING_APP_DEPLOY_ROLE_ARN }}

- name: Redeploy graph production service
uses: ./.github/actions/redeploy-ecs-service
with:
AWS_ACCESS_KEY_ID: ${{ steps.secrets.outputs.AWS_ACCESS_KEY_ID }}
AWS_SECRET_ACCESS_KEY: ${{ steps.secrets.outputs.AWS_SECRET_ACCESS_KEY }}
AWS_SESSION_TOKEN: ${{ steps.secrets.outputs.AWS_SESSION_TOKEN }}
AWS_REGION: ${{ env.PRODUCTION_AWS_REGION }}
ECS_CLUSTER_NAME: ${{ env.PRODUCTION_APP_CLUSTER_NAME }}
ECS_SERVICE_NAME: ${{ env.PRODUCTION_APP_GRAPH_SERVICE_NAME }}
ROLE_ARN: ${{ env.PRODUCTION_APP_DEPLOY_ROLE_ARN }}

- name: Redeploy type-fetcher production service
uses: ./.github/actions/redeploy-ecs-service
with:
AWS_ACCESS_KEY_ID: ${{ steps.secrets.outputs.AWS_ACCESS_KEY_ID }}
AWS_SECRET_ACCESS_KEY: ${{ steps.secrets.outputs.AWS_SECRET_ACCESS_KEY }}
AWS_SESSION_TOKEN: ${{ steps.secrets.outputs.AWS_SESSION_TOKEN }}
AWS_REGION: ${{ env.PRODUCTION_AWS_REGION }}
ECS_CLUSTER_NAME: ${{ env.PRODUCTION_APP_CLUSTER_NAME }}
ECS_SERVICE_NAME: ${{ env.PRODUCTION_APP_TYPE_FETCHER_SERVICE_NAME }}
ROLE_ARN: ${{ env.PRODUCTION_APP_DEPLOY_ROLE_ARN }}
AWS_REGION: ${{ env.AWS_REGION }}
ECS_CLUSTER_NAME: ${{ env.APP_CLUSTER_NAME }}
ECS_SERVICE_NAME: ${{ env.APP_TYPE_FETCHER_SERVICE_NAME }}
ROLE_ARN: ${{ env.APP_DEPLOY_ROLE_ARN }}

deploy-app:
name: Deploy HASH app images
Expand Down Expand Up @@ -411,65 +380,32 @@ jobs:
AWS_ACCESS_KEY_ID: ${{ steps.secrets.outputs.AWS_ACCESS_KEY_ID }}
AWS_SECRET_ACCESS_KEY: ${{ steps.secrets.outputs.AWS_SECRET_ACCESS_KEY }}
AWS_SESSION_TOKEN: ${{ steps.secrets.outputs.AWS_SESSION_TOKEN }}
AWS_REGION: ${{ env.STAGING_AWS_REGION }}
ECS_CLUSTER_NAME: ${{ env.STAGING_APP_CLUSTER_NAME }}
ECS_SERVICE_NAME: ${{ env.STAGING_APP_API_SERVICE_NAME }}
ROLE_ARN: ${{ env.STAGING_APP_DEPLOY_ROLE_ARN }}
AWS_REGION: ${{ env.AWS_REGION }}
ECS_CLUSTER_NAME: ${{ env.APP_CLUSTER_NAME }}
ECS_SERVICE_NAME: ${{ env.APP_API_SERVICE_NAME }}
ROLE_ARN: ${{ env.APP_DEPLOY_ROLE_ARN }}

- name: Redeploy kratos staging service
uses: ./.github/actions/redeploy-ecs-service
with:
AWS_ACCESS_KEY_ID: ${{ steps.secrets.outputs.AWS_ACCESS_KEY_ID }}
AWS_SECRET_ACCESS_KEY: ${{ steps.secrets.outputs.AWS_SECRET_ACCESS_KEY }}
AWS_SESSION_TOKEN: ${{ steps.secrets.outputs.AWS_SESSION_TOKEN }}
AWS_REGION: ${{ env.STAGING_AWS_REGION }}
ECS_CLUSTER_NAME: ${{ env.STAGING_AUTH_CLUSTER_NAME }}
ECS_SERVICE_NAME: ${{ env.STAGING_AUTH_KRATOS_SERVICE_NAME }}
ROLE_ARN: ${{ env.STAGING_AUTH_DEPLOY_ROLE_ARN }}
AWS_REGION: ${{ env.AWS_REGION }}
ECS_CLUSTER_NAME: ${{ env.AUTH_CLUSTER_NAME }}
ECS_SERVICE_NAME: ${{ env.AUTH_KRATOS_SERVICE_NAME }}
ROLE_ARN: ${{ env.AUTH_DEPLOY_ROLE_ARN }}

- name: Redeploy hydra staging service
uses: ./.github/actions/redeploy-ecs-service
with:
AWS_ACCESS_KEY_ID: ${{ steps.secrets.outputs.AWS_ACCESS_KEY_ID }}
AWS_SECRET_ACCESS_KEY: ${{ steps.secrets.outputs.AWS_SECRET_ACCESS_KEY }}
AWS_SESSION_TOKEN: ${{ steps.secrets.outputs.AWS_SESSION_TOKEN }}
AWS_REGION: ${{ env.STAGING_AWS_REGION }}
ECS_CLUSTER_NAME: ${{ env.STAGING_AUTH_CLUSTER_NAME }}
ECS_SERVICE_NAME: ${{ env.STAGING_AUTH_HYDRA_SERVICE_NAME }}
ROLE_ARN: ${{ env.STAGING_AUTH_DEPLOY_ROLE_ARN }}

- name: Redeploy API production service
uses: ./.github/actions/redeploy-ecs-service
with:
AWS_ACCESS_KEY_ID: ${{ steps.secrets.outputs.AWS_ACCESS_KEY_ID }}
AWS_SECRET_ACCESS_KEY: ${{ steps.secrets.outputs.AWS_SECRET_ACCESS_KEY }}
AWS_SESSION_TOKEN: ${{ steps.secrets.outputs.AWS_SESSION_TOKEN }}
AWS_REGION: ${{ env.PRODUCTION_AWS_REGION }}
ECS_CLUSTER_NAME: ${{ env.PRODUCTION_APP_CLUSTER_NAME }}
ECS_SERVICE_NAME: ${{ env.PRODUCTION_APP_API_SERVICE_NAME }}
ROLE_ARN: ${{ env.PRODUCTION_APP_DEPLOY_ROLE_ARN }}

- name: Redeploy kratos production service
uses: ./.github/actions/redeploy-ecs-service
with:
AWS_ACCESS_KEY_ID: ${{ steps.secrets.outputs.AWS_ACCESS_KEY_ID }}
AWS_SECRET_ACCESS_KEY: ${{ steps.secrets.outputs.AWS_SECRET_ACCESS_KEY }}
AWS_SESSION_TOKEN: ${{ steps.secrets.outputs.AWS_SESSION_TOKEN }}
AWS_REGION: ${{ env.PRODUCTION_AWS_REGION }}
ECS_CLUSTER_NAME: ${{ env.PRODUCTION_AUTH_CLUSTER_NAME }}
ECS_SERVICE_NAME: ${{ env.PRODUCTION_AUTH_KRATOS_SERVICE_NAME }}
ROLE_ARN: ${{ env.PRODUCTION_AUTH_DEPLOY_ROLE_ARN }}

- name: Redeploy hydra production service
uses: ./.github/actions/redeploy-ecs-service
with:
AWS_ACCESS_KEY_ID: ${{ steps.secrets.outputs.AWS_ACCESS_KEY_ID }}
AWS_SECRET_ACCESS_KEY: ${{ steps.secrets.outputs.AWS_SECRET_ACCESS_KEY }}
AWS_SESSION_TOKEN: ${{ steps.secrets.outputs.AWS_SESSION_TOKEN }}
AWS_REGION: ${{ env.PRODUCTION_AWS_REGION }}
ECS_CLUSTER_NAME: ${{ env.PRODUCTION_AUTH_CLUSTER_NAME }}
ECS_SERVICE_NAME: ${{ env.PRODUCTION_AUTH_HYDRA_SERVICE_NAME }}
ROLE_ARN: ${{ env.PRODUCTION_AUTH_DEPLOY_ROLE_ARN }}
AWS_REGION: ${{ env.AWS_REGION }}
ECS_CLUSTER_NAME: ${{ env.AUTH_CLUSTER_NAME }}
ECS_SERVICE_NAME: ${{ env.AUTH_HYDRA_SERVICE_NAME }}
ROLE_ARN: ${{ env.AUTH_DEPLOY_ROLE_ARN }}

deploy-workers:
name: Deploy HASH worker images
Expand Down Expand Up @@ -506,43 +442,21 @@ jobs:
AWS_ACCESS_KEY_ID: ${{ steps.secrets.outputs.AWS_ACCESS_KEY_ID }}
AWS_SECRET_ACCESS_KEY: ${{ steps.secrets.outputs.AWS_SECRET_ACCESS_KEY }}
AWS_SESSION_TOKEN: ${{ steps.secrets.outputs.AWS_SESSION_TOKEN }}
AWS_REGION: ${{ env.STAGING_AWS_REGION }}
ECS_CLUSTER_NAME: ${{ env.STAGING_WORKER_CLUSTER_NAME }}
ECS_SERVICE_NAME: ${{ env.STAGING_WORKER_AI_TS_SERVICE_NAME }}
ROLE_ARN: ${{ env.STAGING_WORKER_DEPLOY_ROLE_ARN }}
AWS_REGION: ${{ env.AWS_REGION }}
ECS_CLUSTER_NAME: ${{ env.WORKER_CLUSTER_NAME }}
ECS_SERVICE_NAME: ${{ env.WORKER_AI_TS_SERVICE_NAME }}
ROLE_ARN: ${{ env.WORKER_DEPLOY_ROLE_ARN }}

- name: Redeploy Integration staging service
uses: ./.github/actions/redeploy-ecs-service
with:
AWS_ACCESS_KEY_ID: ${{ steps.secrets.outputs.AWS_ACCESS_KEY_ID }}
AWS_SECRET_ACCESS_KEY: ${{ steps.secrets.outputs.AWS_SECRET_ACCESS_KEY }}
AWS_SESSION_TOKEN: ${{ steps.secrets.outputs.AWS_SESSION_TOKEN }}
AWS_REGION: ${{ env.STAGING_AWS_REGION }}
ECS_CLUSTER_NAME: ${{ env.STAGING_WORKER_CLUSTER_NAME }}
ECS_SERVICE_NAME: ${{ env.STAGING_WORKER_INTEGRATION_SERVICE_NAME }}
ROLE_ARN: ${{ env.STAGING_WORKER_DEPLOY_ROLE_ARN }}

- name: Redeploy AI-TS production service
uses: ./.github/actions/redeploy-ecs-service
with:
AWS_ACCESS_KEY_ID: ${{ steps.secrets.outputs.AWS_ACCESS_KEY_ID }}
AWS_SECRET_ACCESS_KEY: ${{ steps.secrets.outputs.AWS_SECRET_ACCESS_KEY }}
AWS_SESSION_TOKEN: ${{ steps.secrets.outputs.AWS_SESSION_TOKEN }}
AWS_REGION: ${{ env.PRODUCTION_AWS_REGION }}
ECS_CLUSTER_NAME: ${{ env.PRODUCTION_WORKER_CLUSTER_NAME }}
ECS_SERVICE_NAME: ${{ env.PRODUCTION_WORKER_AI_TS_SERVICE_NAME }}
ROLE_ARN: ${{ env.PRODUCTION_WORKER_DEPLOY_ROLE_ARN }}

- name: Redeploy Integration production service
uses: ./.github/actions/redeploy-ecs-service
with:
AWS_ACCESS_KEY_ID: ${{ steps.secrets.outputs.AWS_ACCESS_KEY_ID }}
AWS_SECRET_ACCESS_KEY: ${{ steps.secrets.outputs.AWS_SECRET_ACCESS_KEY }}
AWS_SESSION_TOKEN: ${{ steps.secrets.outputs.AWS_SESSION_TOKEN }}
AWS_REGION: ${{ env.PRODUCTION_AWS_REGION }}
ECS_CLUSTER_NAME: ${{ env.PRODUCTION_WORKER_CLUSTER_NAME }}
ECS_SERVICE_NAME: ${{ env.PRODUCTION_WORKER_INTEGRATION_SERVICE_NAME }}
ROLE_ARN: ${{ env.PRODUCTION_WORKER_DEPLOY_ROLE_ARN }}
AWS_REGION: ${{ env.AWS_REGION }}
ECS_CLUSTER_NAME: ${{ env.WORKER_CLUSTER_NAME }}
ECS_SERVICE_NAME: ${{ env.WORKER_INTEGRATION_SERVICE_NAME }}
ROLE_ARN: ${{ env.WORKER_DEPLOY_ROLE_ARN }}

notify-slack:
name: Notify Slack on failure
Expand Down
4 changes: 2 additions & 2 deletions apps/hash-external-services/package.json
Original file line number Diff line number Diff line change
Expand Up @@ -4,8 +4,8 @@
"private": true,
"description": "External services needed to run HASH (databases, auth, etc.)",
"scripts": {
"build:hydra": "docker buildx build --file hydra/Dockerfile hydra --load",
"build:kratos": "docker buildx build --file kratos/Dockerfile --build-arg ENV=prod kratos --load",
"build:hydra": "docker buildx build --tag hashintel/hash/hydra:latest --file hydra/Dockerfile hydra --load",
"build:kratos": "docker buildx build --tag hashintel/hash/kratos:latest --file kratos/Dockerfile --build-arg ENV=prod kratos --load",
"build:postgres": "docker buildx build --file postgres/Dockerfile postgres --load",
"build:temporal": "yarn build:temporal:setup && yarn build:temporal:migrate",
"build:temporal:migrate": "docker buildx build --file temporal/migrate.Dockerfile --build-arg TEMPORAL_VERSION=1.23.1.0 temporal --load",
Expand Down
Loading