More hacking towards user/port/host combinations
All checks were successful
continuous-integration/drone/push Build is passing

This commit is contained in:
2020-09-23 09:38:51 +02:00
parent 7c11311f02
commit 7ea09b7a64
2 changed files with 13 additions and 7 deletions

View File

@ -1,7 +1,9 @@
#!/bin/sh
PLUGIN_PORT=${PLUGIN_PORT:-22}
PLUGIN_COMPOSE=${PLUGIN_COMPOSE:-compose.yml}
PLUGIN_HOST=${PLUGIN_HOST:-swarm.autonomic.zone}
PLUGIN_PORT=${PLUGIN_PORT:-222}
PLUGIN_USER=${PLUGIN_USER:-drone}
load_deploy_key() {
mkdir -p "$HOME/.ssh/"
@ -17,7 +19,7 @@ run_stack_deploy() {
echo "--- end docker info ---"
docker \
-H "ssh://$PLUGIN_HOST:$PLUGIN_PORT" \
-H "ssh://$PLUGIN_USER@$PLUGIN_HOST:$PLUGIN_PORT" \
stack deploy -c "$PLUGIN_COMPOSE" "$PLUGIN_STACK"
}