More hacking towards user/port/host combinations
All checks were successful
continuous-integration/drone/push Build is passing
All checks were successful
continuous-integration/drone/push Build is passing
This commit is contained in:
@ -1,7 +1,9 @@
|
||||
#!/bin/sh
|
||||
|
||||
PLUGIN_PORT=${PLUGIN_PORT:-22}
|
||||
PLUGIN_COMPOSE=${PLUGIN_COMPOSE:-compose.yml}
|
||||
PLUGIN_HOST=${PLUGIN_HOST:-swarm.autonomic.zone}
|
||||
PLUGIN_PORT=${PLUGIN_PORT:-222}
|
||||
PLUGIN_USER=${PLUGIN_USER:-drone}
|
||||
|
||||
load_deploy_key() {
|
||||
mkdir -p "$HOME/.ssh/"
|
||||
@ -17,7 +19,7 @@ run_stack_deploy() {
|
||||
echo "--- end docker info ---"
|
||||
|
||||
docker \
|
||||
-H "ssh://$PLUGIN_HOST:$PLUGIN_PORT" \
|
||||
-H "ssh://$PLUGIN_USER@$PLUGIN_HOST:$PLUGIN_PORT" \
|
||||
stack deploy -c "$PLUGIN_COMPOSE" "$PLUGIN_STACK"
|
||||
}
|
||||
|
||||
|
||||
Reference in New Issue
Block a user