More hacking towards user/port/host combinations
All checks were successful
continuous-integration/drone/push Build is passing

This commit is contained in:
2020-09-23 09:38:51 +02:00
parent 7c11311f02
commit 7ea09b7a64
2 changed files with 13 additions and 7 deletions

View File

@ -8,11 +8,17 @@ This is meant to be used as a [Drone plugin](http://plugins.drone.io/).
## Settings
- **stack**: Name of the stack to be deployed
### With defaults
- **compose** (default: `compose.yml`): compose file to use for deploying
- **host**: SSH-based docker daemon context to deploy against (don't include `ssh://`)
- **port** (default: `22`): SSH port to connect to
- **host** (default: `swarm.autonomic.zone`): Host to deploy to (don't include `ssh://`)
- **port** (default: `222`): SSH port to connect to
- **user** (default: `drone`): System user to connect via SSH with
### Without defaults
- **deploy_key**: SSH private key part for ssh public key authentication
- **stack**: Name of the stack to be deployed
## Example
@ -25,8 +31,6 @@ steps:
image: decentral1se/stack-ssh-deploy:0.0.1
settings:
stack: mystack
host: "drone@swarm.autonomic.zone"
port: 222
deploy_key:
from_secret: drone_deploy_key
```