88c13c6c65
Yaml.load() return Python object may be dangerous if you receive a YAML document from an untrusted source such as the Internet. The function yaml.safe_load() limits this ability to simple Python objects like integers or lists. Reference: https://security.openstack.org/guidelines/dg_avoid-dangerous-input-parsing-libraries.html Change-Id: I63ce1f2db4dce895f3027bcf5e47edb51b26d40b |
||
---|---|---|
.. | ||
install.d | ||
os-refresh-config/configure.d | ||
element-deps | ||
README.rst |
A hook which uses docker-compose to deploy containers.
A special input 'env_files' can be used with SoftwareConfig and StructuredConfig for docker-compose env_file key(s).
if env_file keys specified in the docker-compose.yml, do not exist in input_values supplied, docker-compose will throw an error, as it can't find these files.
Also, --parameter-file option can be used to pass env files from client.
Example:
$ openstack stack create test_stack -t example-docker-compose-template.yaml --parameter-file env_file_0=./common.env --parameter-file env_file_1=./apps/web.env --parameter-file env_file_2=./test.env --parameter-file env_file_3=./busybox.env