2020-08-15 09:43:20 +00:00
|
|
|
local build = import 'lib/build.libsonnet';
|
|
|
|
local images = import 'lib/images.libsonnet';
|
2020-08-19 20:12:35 +00:00
|
|
|
local environment = import 'lib/node_modules/@sigyl/jsonnet-drone-environment/environment.libsonnet';
|
2020-08-19 20:01:46 +00:00
|
|
|
local compose = import 'lib/node_modules/@sigyl/jsonnet-compose/compose.libsonnet';
|
2020-08-15 09:43:20 +00:00
|
|
|
local util = import 'lib/util.libsonnet';
|
|
|
|
|
|
|
|
function(
|
|
|
|
name,
|
|
|
|
root,
|
|
|
|
buildSecrets,
|
|
|
|
publicSecrets,
|
|
|
|
secretSecrets
|
|
|
|
)
|
|
|
|
{
|
|
|
|
kind: 'pipeline',
|
|
|
|
type: 'docker',
|
|
|
|
name: 'deploy',
|
|
|
|
clone: {
|
|
|
|
disable: false,
|
|
|
|
depth: 0,
|
|
|
|
},
|
|
|
|
services: [
|
|
|
|
images.docker {
|
|
|
|
privileged: true,
|
|
|
|
volumes: [
|
|
|
|
{
|
|
|
|
name: 'dockersock',
|
|
|
|
path: '/var/run',
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: 'ca',
|
|
|
|
path: '/etc/docker/certs.d',
|
|
|
|
},
|
|
|
|
],
|
|
|
|
},
|
|
|
|
],
|
|
|
|
volumes: [
|
|
|
|
{
|
|
|
|
name: 'dockersock',
|
|
|
|
temp: {},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: 'ca',
|
|
|
|
host: {
|
|
|
|
path: '/etc/docker/certs.d',
|
|
|
|
},
|
|
|
|
},
|
|
|
|
],
|
|
|
|
steps:[
|
|
|
|
compose(
|
|
|
|
std.map(
|
|
|
|
function(secret) util.printEnv('env-%s' % name, secret),
|
|
|
|
publicSecrets,
|
|
|
|
)
|
|
|
|
)
|
|
|
|
(
|
|
|
|
images.ssh {
|
|
|
|
settings +: {
|
|
|
|
script: [
|
|
|
|
'rm -f env-%s' % name,
|
|
|
|
],
|
|
|
|
},
|
|
|
|
},
|
|
|
|
) {
|
|
|
|
name: 'print env',
|
|
|
|
},
|
|
|
|
images.scp(
|
|
|
|
'%(root)s%(name)s' % { root: root, name: name }
|
|
|
|
),
|
|
|
|
images.wait(15),
|
|
|
|
build(buildSecrets),
|
|
|
|
compose(
|
|
|
|
std.map(
|
|
|
|
function(secret) environment.envSet(secret),
|
|
|
|
publicSecrets + secretSecrets,
|
|
|
|
),
|
|
|
|
)(
|
|
|
|
images.ssh {
|
|
|
|
name: 'deploy',
|
|
|
|
settings +: {
|
|
|
|
script +:
|
|
|
|
std.map(
|
|
|
|
function(secret)
|
|
|
|
'export %(env)s=$${%(env)s}' % {
|
|
|
|
env: environment.environment(secret)
|
|
|
|
},
|
|
|
|
secretSecrets + publicSecrets,
|
|
|
|
) +
|
|
|
|
[
|
|
|
|
'set -e',
|
|
|
|
'cd %(root)s%(name)s' % { root: root, name: name },
|
|
|
|
'sh .drone/login.sh',
|
|
|
|
'sh .drone/pull.sh',
|
|
|
|
'sh .drone/deploy.sh',
|
|
|
|
]
|
|
|
|
}
|
|
|
|
},
|
|
|
|
),
|
|
|
|
],
|
|
|
|
}
|
|
|
|
|
|
|
|
|