2015-12-31 01:25:12 +02:00
|
|
|
/*
|
2017-02-21 01:46:08 +02:00
|
|
|
* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Copyright 2017 Joyent, Inc.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/*
|
2015-12-31 01:25:12 +02:00
|
|
|
* Shared stuff for `triton profile ...` handling.
|
|
|
|
*/
|
|
|
|
|
|
|
|
var assert = require('assert-plus');
|
2016-03-19 01:51:22 +02:00
|
|
|
var auth = require('smartdc-auth');
|
|
|
|
var format = require('util').format;
|
|
|
|
var fs = require('fs');
|
2016-12-13 20:04:41 +02:00
|
|
|
var getpass = require('getpass');
|
2016-03-19 01:51:22 +02:00
|
|
|
var https = require('https');
|
|
|
|
var mkdirp = require('mkdirp');
|
|
|
|
var path = require('path');
|
|
|
|
var rimraf = require('rimraf');
|
|
|
|
var semver = require('semver');
|
|
|
|
var sshpk = require('sshpk');
|
|
|
|
var mod_url = require('url');
|
|
|
|
var vasync = require('vasync');
|
|
|
|
var which = require('which');
|
|
|
|
var wordwrap = require('wordwrap')(78);
|
2015-12-31 01:25:12 +02:00
|
|
|
|
2016-03-19 01:51:22 +02:00
|
|
|
var common = require('../common');
|
2015-12-31 01:25:12 +02:00
|
|
|
var mod_config = require('../config');
|
2016-02-03 08:03:01 +02:00
|
|
|
var errors = require('../errors');
|
2015-12-31 01:25:12 +02:00
|
|
|
|
|
|
|
|
2016-03-19 01:51:22 +02:00
|
|
|
// --- internal support functions
|
|
|
|
|
|
|
|
function portalUrlFromCloudapiUrl(url) {
|
|
|
|
assert.string(url, 'url');
|
|
|
|
var portalUrl;
|
|
|
|
|
|
|
|
var JPC_RE = /^https:\/\/([a-z0-9-]+)\.api\.joyent(cloud)?\.com\/?$/;
|
|
|
|
if (JPC_RE.test(url)) {
|
|
|
|
return 'https://my.joyent.com';
|
|
|
|
}
|
|
|
|
return portalUrl;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
function downloadUrl(opts, cb) {
|
|
|
|
assert.string(opts.url, 'opts.url');
|
|
|
|
assert.ok(/^https:/.test(opts.url));
|
|
|
|
assert.string(opts.dest, 'opts.dest');
|
|
|
|
assert.optionalBool(opts.insecure, 'opts.insecure');
|
|
|
|
assert.func(cb, 'cb');
|
|
|
|
|
|
|
|
var reqOpts = mod_url.parse(opts.url);
|
|
|
|
if (opts.insecure) {
|
|
|
|
reqOpts.rejectUnauthorized = false;
|
|
|
|
}
|
|
|
|
|
|
|
|
var file = fs.createWriteStream(opts.dest);
|
|
|
|
var req = https.get(reqOpts, function (res) {
|
|
|
|
res.pipe(file);
|
|
|
|
file.on('finish', function () {
|
|
|
|
file.close(cb);
|
|
|
|
});
|
|
|
|
});
|
|
|
|
|
|
|
|
req.on('error', function (err) {
|
|
|
|
fs.unlink(opts.dest);
|
|
|
|
cb(err);
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// --- exported functions
|
|
|
|
|
2015-12-31 01:25:12 +02:00
|
|
|
function setCurrentProfile(opts, cb) {
|
|
|
|
assert.object(opts.cli, 'opts.cli');
|
|
|
|
assert.string(opts.name, 'opts.name');
|
|
|
|
assert.func(cb, 'cb');
|
|
|
|
var cli = opts.cli;
|
|
|
|
|
2016-03-10 21:42:23 +02:00
|
|
|
if (opts.name === '-') {
|
|
|
|
if (cli.tritonapi.config.hasOwnProperty('oldProfile')) {
|
|
|
|
opts.name = cli.tritonapi.config.oldProfile;
|
|
|
|
} else {
|
|
|
|
cb(new errors.ConfigError('"oldProfile" is not set in config'));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-12-31 01:25:12 +02:00
|
|
|
try {
|
|
|
|
var profile = mod_config.loadProfile({
|
|
|
|
configDir: cli.configDir,
|
|
|
|
name: opts.name
|
|
|
|
});
|
|
|
|
} catch (err) {
|
|
|
|
return cb(err);
|
|
|
|
}
|
|
|
|
|
2016-02-03 08:03:01 +02:00
|
|
|
var currProfile;
|
|
|
|
try {
|
|
|
|
currProfile = cli.tritonapi.profile;
|
|
|
|
} catch (err) {
|
|
|
|
// Ignore inability to load a profile.
|
|
|
|
if (!(err instanceof errors.ConfigError)) {
|
|
|
|
throw err;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (currProfile && currProfile.name === profile.name) {
|
2015-12-31 01:25:12 +02:00
|
|
|
console.log('"%s" is already the current profile', profile.name);
|
|
|
|
return cb();
|
|
|
|
}
|
|
|
|
|
2016-03-10 21:42:23 +02:00
|
|
|
mod_config.setConfigVars({
|
2015-12-31 01:25:12 +02:00
|
|
|
configDir: cli.configDir,
|
2016-03-10 21:42:23 +02:00
|
|
|
vars: {
|
|
|
|
profile: profile.name
|
|
|
|
}
|
2015-12-31 01:25:12 +02:00
|
|
|
}, function (err) {
|
|
|
|
if (err) {
|
|
|
|
return cb(err);
|
|
|
|
}
|
|
|
|
console.log('Set "%s" as current profile', profile.name);
|
|
|
|
cb();
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-03-19 01:51:22 +02:00
|
|
|
/**
|
|
|
|
* Setup the given profile for Docker usage. This means checking the cloudapi
|
|
|
|
* has a Docker service (ListServices), finding the user's SSH *private* key,
|
|
|
|
* creating the client certs that will be used to talk to the Triton Docker
|
|
|
|
* Engine.
|
|
|
|
*
|
|
|
|
* @param {Object} opts: Required.
|
|
|
|
* - {Object} cli: Required. The Triton CLI object.
|
|
|
|
* - {String} name: Required. The profile name.
|
|
|
|
* - {Boolean} implicit: Optional. Boolean indicating if the Docker setup
|
|
|
|
* is implicit (e.g. as a default part of `triton profile create`). If
|
|
|
|
* implicit, we silently skip if ListServices shows no Docker service.
|
2017-02-24 19:29:05 +02:00
|
|
|
* - {Boolean} yes: Optional. Boolean indicating if confirmation prompts
|
|
|
|
* should be skipped, assuming a "yes" answer.
|
2016-03-19 01:51:22 +02:00
|
|
|
*/
|
|
|
|
function profileDockerSetup(opts, cb) {
|
|
|
|
assert.object(opts.cli, 'opts.cli');
|
|
|
|
assert.string(opts.name, 'opts.name');
|
|
|
|
assert.optionalBool(opts.implicit, 'opts.implicit');
|
2017-02-24 19:29:05 +02:00
|
|
|
assert.optionalBool(opts.yes, 'opts.yes');
|
2016-03-19 01:51:22 +02:00
|
|
|
assert.func(cb, 'cb');
|
|
|
|
|
|
|
|
var cli = opts.cli;
|
|
|
|
var tritonapi = cli.tritonapiFromProfileName({profileName: opts.name});
|
2016-12-13 20:04:41 +02:00
|
|
|
|
|
|
|
var implicit = Boolean(opts.implicit);
|
2017-02-24 19:29:05 +02:00
|
|
|
var yes = Boolean(opts.yes);
|
2016-12-13 20:04:41 +02:00
|
|
|
var log = cli.log;
|
|
|
|
|
2016-03-19 01:51:22 +02:00
|
|
|
var profile = tritonapi.profile;
|
|
|
|
var dockerHost;
|
|
|
|
|
2016-12-13 20:04:41 +02:00
|
|
|
vasync.pipeline({arg: {tritonapi: tritonapi}, funcs: [
|
|
|
|
function dockerKeyWarning(arg, next) {
|
2017-02-21 05:39:16 +02:00
|
|
|
console.log(wordwrap('WARNING: Docker uses authentication via ' +
|
2017-02-21 01:46:08 +02:00
|
|
|
'client TLS certificates that do not support encrypted ' +
|
2017-02-24 19:29:05 +02:00
|
|
|
'(passphrase protected) keys or SSH agents. If you continue, ' +
|
2017-02-21 01:46:08 +02:00
|
|
|
'this profile setup will attempt to write a copy of your ' +
|
|
|
|
'SSH private key formatted as an unencrypted TLS certificate ' +
|
|
|
|
'in "~/.triton/docker" for use by the Docker client.\n'));
|
2017-02-24 19:29:05 +02:00
|
|
|
if (yes) {
|
|
|
|
next();
|
|
|
|
return;
|
|
|
|
}
|
2016-12-13 20:04:41 +02:00
|
|
|
common.promptYesNo({msg: 'Continue? [y/n] '}, function (answer) {
|
|
|
|
if (answer !== 'y') {
|
2016-12-21 21:24:24 +02:00
|
|
|
console.error('Skipping Docker setup (you can run '
|
|
|
|
+ '"triton profile docker-setup" later).');
|
2016-12-13 20:04:41 +02:00
|
|
|
next(true);
|
|
|
|
} else {
|
2017-02-21 01:46:08 +02:00
|
|
|
console.log();
|
2016-12-13 20:04:41 +02:00
|
|
|
next();
|
|
|
|
}
|
|
|
|
});
|
|
|
|
},
|
|
|
|
|
|
|
|
common.cliSetupTritonApi,
|
|
|
|
|
2016-03-19 01:51:22 +02:00
|
|
|
function checkCloudapiStatus(arg, next) {
|
|
|
|
tritonapi.cloudapi.ping({}, function (err, pong, res) {
|
|
|
|
if (!res) {
|
|
|
|
next(new errors.SetupError(err, format(
|
|
|
|
'error pinging CloudAPI <%s>', profile.url)));
|
|
|
|
} else if (res.statusCode === 503) {
|
|
|
|
// TODO: Use maint res headers to estimate time back up.
|
|
|
|
next(new errors.SetupError(err, format('CloudAPI <%s> is ',
|
|
|
|
+ 'in maintenance, please try again later',
|
|
|
|
profile.url)));
|
|
|
|
} else if (res.statusCode === 200) {
|
|
|
|
next();
|
|
|
|
} else {
|
|
|
|
next(new errors.SetupError(err, format(
|
|
|
|
'error pinging CloudAPI <%s>: %s status code',
|
|
|
|
profile.url, res.statusCode)));
|
|
|
|
}
|
|
|
|
});
|
|
|
|
},
|
|
|
|
|
|
|
|
function checkForDockerService(arg, next) {
|
|
|
|
tritonapi.cloudapi.listServices({}, function (err, svcs, res) {
|
|
|
|
if (!res) {
|
|
|
|
next(new errors.SetupError(err, format(
|
|
|
|
'could not list services on cloudapi %s',
|
|
|
|
profile.url)));
|
|
|
|
} else if (res.statusCode === 401) {
|
|
|
|
var portalUrl = portalUrlFromCloudapiUrl(profile.url);
|
|
|
|
if (portalUrl) {
|
|
|
|
next(new errors.SetupError(err, format(
|
|
|
|
'invalid credentials. Visit <%s> to create the '
|
|
|
|
+ '"%s" account and/or add your SSH public key',
|
|
|
|
portalUrl, profile.account)));
|
|
|
|
} else {
|
|
|
|
next(new errors.SetupError(err, format(
|
|
|
|
'invalid credentials. You must create the '
|
|
|
|
+ '"%s" account and/or add your SSH public key',
|
|
|
|
profile.account)));
|
|
|
|
}
|
|
|
|
} else if (res.statusCode === 200) {
|
|
|
|
if (svcs.docker) {
|
|
|
|
dockerHost = svcs.docker;
|
|
|
|
log.trace({dockerHost: dockerHost},
|
|
|
|
'profileDockerSetup: checkForDockerService');
|
|
|
|
next();
|
|
|
|
} else if (implicit) {
|
|
|
|
/*
|
|
|
|
* No Docker service on this CloudAPI and this is an
|
|
|
|
* implicit attempt to setup for Docker, so that's fine.
|
|
|
|
* Use the early-abort signal.
|
|
|
|
*/
|
|
|
|
next(true);
|
|
|
|
} else {
|
|
|
|
next(new errors.SetupError(err, format(
|
|
|
|
'no "docker" service on this datacenter',
|
|
|
|
profile.url)));
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
// TODO: If this doesn't show res details, add that.
|
|
|
|
next(new errors.SetupError(err, format(
|
|
|
|
'unexpected response from cloudapi %s: %s status code',
|
|
|
|
profile.url, res.statusCode)));
|
|
|
|
}
|
|
|
|
});
|
|
|
|
},
|
|
|
|
|
|
|
|
function mentionSettingUp(arg, next) {
|
|
|
|
console.log('Setting up profile "%s" to use Docker.', profile.name);
|
|
|
|
next();
|
|
|
|
},
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Find the `docker` version, if we can. This can be used later to
|
|
|
|
* control some envvars that depend on the docker version.
|
|
|
|
*/
|
|
|
|
function whichDocker(arg, next) {
|
|
|
|
which('docker', function (err, dockerPath) {
|
|
|
|
if (err) {
|
|
|
|
console.log(wordwrap('\nNote: No "docker" was found on '
|
|
|
|
+ 'your PATH. It is not needed for this setup, but '
|
|
|
|
+ 'will be to run docker commands against Triton. '
|
|
|
|
+ 'You can find out how to install it at '
|
|
|
|
+ '<https://docs.docker.com/engine/installation/>.'));
|
|
|
|
} else {
|
|
|
|
arg.dockerPath = dockerPath;
|
|
|
|
log.trace({dockerPath: dockerPath},
|
|
|
|
'profileDockerSetup: whichDocker');
|
|
|
|
}
|
|
|
|
next();
|
|
|
|
});
|
|
|
|
},
|
|
|
|
function getDockerClientVersion(arg, next) {
|
|
|
|
if (!arg.dockerPath) {
|
|
|
|
next();
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
common.execPlus({
|
2016-10-26 21:11:27 +03:00
|
|
|
cmd: format('"%s" --version', arg.dockerPath),
|
2016-03-19 01:51:22 +02:00
|
|
|
log: log
|
|
|
|
}, function (err, stdout, stderr) {
|
|
|
|
if (err) {
|
|
|
|
console.log(
|
|
|
|
'\nWarning: Could not determine Docker version:\n%s',
|
|
|
|
common.indent(err.toString()));
|
|
|
|
} else {
|
|
|
|
// E.g.: 'Docker version 1.9.1, build a34a1d5'
|
|
|
|
// JSSTYLED
|
|
|
|
var DOCKER_VER_RE = /^Docker version (.*?), build/;
|
|
|
|
var match = DOCKER_VER_RE.exec(stdout);
|
|
|
|
if (!match) {
|
|
|
|
console.log('\nWarning: Could not determine Docker '
|
|
|
|
+ 'version: output of `%s --version` does not '
|
|
|
|
+ 'match %s: %j', arg.dockerPath, DOCKER_VER_RE,
|
|
|
|
stdout);
|
|
|
|
} else {
|
|
|
|
arg.dockerVersion = match[1];
|
|
|
|
log.trace({dockerVersion: arg.dockerVersion},
|
|
|
|
'profileDockerSetup: getDockerClientVersion');
|
|
|
|
}
|
|
|
|
}
|
|
|
|
next();
|
|
|
|
});
|
|
|
|
},
|
|
|
|
|
2017-02-21 05:39:16 +02:00
|
|
|
/*
|
|
|
|
* We need the private key to format as a client cert. If this profile's
|
|
|
|
* key was found in the SSH agent (and by default it prefers to take
|
|
|
|
* it from there), then we can't use `tritonapi.keyPair`, because
|
|
|
|
* the SSH agent protocol will not allow us access to the private key
|
|
|
|
* data (by design).
|
|
|
|
*
|
|
|
|
* As a fallback we'll look (via KeyRing) for a local copy of the
|
|
|
|
* private key to use, and then unlock it if necessary.
|
|
|
|
*/
|
|
|
|
function getPrivKey(arg, next) {
|
|
|
|
// If the key pair already works, then use that...
|
|
|
|
try {
|
|
|
|
arg.privKey = tritonapi.keyPair.getPrivateKey();
|
|
|
|
next();
|
|
|
|
return;
|
|
|
|
} catch (_) {
|
|
|
|
// ... else fall through.
|
|
|
|
}
|
|
|
|
|
|
|
|
var kr = new auth.KeyRing();
|
2017-02-21 18:56:04 +02:00
|
|
|
var profileFp = sshpk.parseFingerprint(tritonapi.profile.keyId);
|
|
|
|
kr.find(profileFp, function (findErr, keyPairs) {
|
|
|
|
if (findErr) {
|
|
|
|
next(findErr);
|
2017-02-21 05:39:16 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If our keyId was found, and with the 'homedir' plugin, then
|
|
|
|
* we should have access to the private key (modulo unlocking).
|
|
|
|
*/
|
|
|
|
var homedirKeyPair;
|
|
|
|
for (var i = 0; i < keyPairs.length; i++) {
|
|
|
|
if (keyPairs[i].plugin === 'homedir') {
|
|
|
|
homedirKeyPair = keyPairs[i];
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (homedirKeyPair) {
|
|
|
|
common.promptPassphraseUnlockKey({
|
|
|
|
// Fake the `tritonapi` object, only `.keyPair` is used.
|
|
|
|
tritonapi: {keyPair: homedirKeyPair}
|
|
|
|
}, function (unlockErr) {
|
|
|
|
if (unlockErr) {
|
|
|
|
next(unlockErr);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
try {
|
|
|
|
arg.privKey = homedirKeyPair.getPrivateKey();
|
|
|
|
} catch (homedirErr) {
|
|
|
|
next(new errors.SetupError(homedirErr, format(
|
|
|
|
'could not obtain SSH private key for keyId ' +
|
|
|
|
'"%s" to create Docker certificate',
|
|
|
|
profile.keyId)));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
next();
|
|
|
|
});
|
|
|
|
} else {
|
|
|
|
next(new errors.SetupError(format('could not obtain SSH ' +
|
|
|
|
'private key for keyId "%s" to create Docker ' +
|
|
|
|
'certificate', profile.keyId)));
|
|
|
|
}
|
|
|
|
});
|
|
|
|
},
|
2016-03-19 01:51:22 +02:00
|
|
|
|
|
|
|
function genClientCert_dir(arg, next) {
|
|
|
|
arg.dockerCertPath = path.resolve(cli.configDir,
|
|
|
|
'docker', common.profileSlug(profile));
|
|
|
|
mkdirp(arg.dockerCertPath, next);
|
|
|
|
},
|
|
|
|
function genClientCert_key(arg, next) {
|
|
|
|
arg.keyPath = path.resolve(arg.dockerCertPath, 'key.pem');
|
2017-02-21 05:39:16 +02:00
|
|
|
var data = arg.privKey.toBuffer('pkcs1');
|
2016-12-13 20:04:41 +02:00
|
|
|
fs.writeFile(arg.keyPath, data, function (err) {
|
|
|
|
if (err) {
|
|
|
|
next(new errors.SetupError(err, format(
|
|
|
|
'error writing file %s', arg.keyPath)));
|
|
|
|
} else {
|
|
|
|
next();
|
|
|
|
}
|
|
|
|
});
|
2016-03-19 01:51:22 +02:00
|
|
|
},
|
|
|
|
function genClientCert_cert(arg, next) {
|
|
|
|
arg.certPath = path.resolve(arg.dockerCertPath, 'cert.pem');
|
2016-12-13 20:04:41 +02:00
|
|
|
|
|
|
|
var id = sshpk.identityFromDN('CN=' + profile.account);
|
2017-02-21 05:39:16 +02:00
|
|
|
var cert = sshpk.createSelfSignedCertificate(id, arg.privKey);
|
2016-12-13 20:04:41 +02:00
|
|
|
var data = cert.toBuffer('pem');
|
|
|
|
|
|
|
|
fs.writeFile(arg.certPath, data, function (err) {
|
|
|
|
if (err) {
|
|
|
|
next(new errors.SetupError(err, format(
|
|
|
|
'error writing file %s', arg.keyPath)));
|
|
|
|
} else {
|
|
|
|
next();
|
|
|
|
}
|
|
|
|
});
|
2016-03-19 01:51:22 +02:00
|
|
|
},
|
|
|
|
|
|
|
|
function getServerCa(arg, next) {
|
|
|
|
arg.caPath = path.resolve(arg.dockerCertPath, 'ca.pem');
|
|
|
|
var caUrl = dockerHost.replace(/^tcp:/, 'https:') + '/ca.pem';
|
|
|
|
downloadUrl({
|
|
|
|
url: caUrl,
|
|
|
|
dest: arg.caPath,
|
|
|
|
insecure: profile.insecure
|
|
|
|
}, next);
|
|
|
|
},
|
|
|
|
|
|
|
|
function writeSetupJson(arg, next) {
|
|
|
|
var setupJson = path.resolve(arg.dockerCertPath, 'setup.json');
|
|
|
|
var setup = {
|
|
|
|
profile: profile,
|
|
|
|
time: (new Date()).toISOString(),
|
|
|
|
env: {
|
|
|
|
DOCKER_CERT_PATH: arg.dockerCertPath,
|
|
|
|
DOCKER_HOST: dockerHost,
|
|
|
|
DOCKER_TLS_VERIFY: '1'
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
if (profile.insecure) {
|
|
|
|
setup.env.DOCKER_TLS_VERIFY = null; // signal to unset it
|
|
|
|
} else {
|
|
|
|
setup.env.DOCKER_TLS_VERIFY = '1';
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Docker version 1.9.0 was released at the same time as
|
|
|
|
* Docker Compose 1.5.0. In that version they changed from using
|
|
|
|
* DOCKER_CLIENT_TIMEOUT to COMPOSE_HTTP_TIMEOUT and,
|
|
|
|
* annoyingly, added a warning that the user sees for all
|
|
|
|
* `compose ...` runs about DOCKER_CLIENT_TIMEOUT being
|
|
|
|
* deprecated. We want to avoid that deprecation message,
|
|
|
|
* but need the timeout value.
|
|
|
|
*
|
|
|
|
* This isn't fool proof (using mismatched `docker` and
|
|
|
|
* `docker-compose` versions). It is debatable if we want to
|
|
|
|
* play this game. E.g. someone moving from Docker 1.8 to newer,
|
|
|
|
* *but not re-setting up envvars* may start hitting timeouts.
|
2016-06-09 00:13:16 +03:00
|
|
|
*
|
|
|
|
* TODO: consider using `docker-compose` version on PATH?
|
2016-03-19 01:51:22 +02:00
|
|
|
*/
|
|
|
|
if (!arg.dockerVersion) {
|
|
|
|
setup.env.DOCKER_CLIENT_TIMEOUT = '300';
|
|
|
|
setup.env.COMPOSE_HTTP_TIMEOUT = '300';
|
|
|
|
} else if (semver.gte(arg.dockerVersion, '1.9.0')) {
|
|
|
|
setup.env.COMPOSE_HTTP_TIMEOUT = '300';
|
|
|
|
} else {
|
|
|
|
setup.env.DOCKER_CLIENT_TIMEOUT = '300';
|
|
|
|
}
|
|
|
|
|
|
|
|
fs.writeFile(setupJson,
|
|
|
|
JSON.stringify(setup, null, 4) + '\n',
|
|
|
|
next);
|
|
|
|
},
|
|
|
|
|
|
|
|
function mentionSuccess(arg, next) {
|
2017-02-21 01:46:08 +02:00
|
|
|
console.log([
|
|
|
|
'Successfully setup profile "%s" to use Docker%s.',
|
|
|
|
'',
|
|
|
|
'To setup environment variables to use the Docker client, run:',
|
|
|
|
' eval "$(triton env --docker %s)"',
|
|
|
|
' docker%s info',
|
|
|
|
'Or you can place the commands in your shell profile, e.g.:',
|
|
|
|
' triton env --docker %s >> ~/.profile'
|
|
|
|
].join('\n'),
|
2016-03-19 01:51:22 +02:00
|
|
|
profile.name,
|
|
|
|
(arg.dockerVersion ? format(' (v%s)', arg.dockerVersion) : ''),
|
2017-02-21 01:46:08 +02:00
|
|
|
profile.name,
|
|
|
|
(profile.insecure ? ' --tls' : ''),
|
|
|
|
profile.name);
|
2016-03-19 01:51:22 +02:00
|
|
|
next();
|
|
|
|
}
|
|
|
|
|
|
|
|
]}, function (err) {
|
|
|
|
tritonapi.close();
|
|
|
|
|
|
|
|
if (err === true) { // Early-abort signal.
|
|
|
|
err = null;
|
|
|
|
}
|
|
|
|
if (err && !dockerHost && implicit) {
|
|
|
|
console.error('Warning: Error determining ' +
|
|
|
|
'if CloudAPI "%s" provides a Docker service:\n %s',
|
|
|
|
profile.url, err);
|
|
|
|
err = null;
|
|
|
|
}
|
|
|
|
|
|
|
|
cb(err);
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-12-31 01:25:12 +02:00
|
|
|
module.exports = {
|
2016-03-19 01:51:22 +02:00
|
|
|
setCurrentProfile: setCurrentProfile,
|
|
|
|
profileDockerSetup: profileDockerSetup
|
2015-12-31 01:25:12 +02:00
|
|
|
};
|