diff options
| -rw-r--r-- | provider_base/common.json | 4 | ||||
| -rw-r--r-- | provider_base/files/service-definitions/provider.json.erb | 2 | ||||
| -rw-r--r-- | provider_base/lib/macros/nodes.rb | 4 | ||||
| -rw-r--r-- | provider_base/lib/macros/secrets.rb | 8 | 
4 files changed, 9 insertions, 9 deletions
| diff --git a/provider_base/common.json b/provider_base/common.json index aee9bd41..c7be5cf4 100644 --- a/provider_base/common.json +++ b/provider_base/common.json @@ -29,8 +29,8 @@      "cert": "= x509.use ? file(:node_x509_cert, :missing => 'x509 certificate for node $node. Run `leap cert update`') : nil",      "key": "= x509.use ? file(:node_x509_key, :missing => 'x509 key for node $node. Run `leap cert update`') : nil",      "ca_cert": "= try_file :ca_cert", -    "commercial_cert": "= x509.use_commercial ? file([:commercial_cert, try{webapp.domain}||domain.full_suffix], :missing => 'commercial x509 certificate for node $node. Add file $file, or run `leap cert csr` to generate a temporary self-signed cert and CSR you can use to purchase a real cert.') : nil", -    "commercial_key": "= x509.use_commercial ? file([:commercial_key, try{webapp.domain}||domain.full_suffix], :missing => 'commercial x509 certificate for node $node. Add file $file, or run `leap cert csr` to generate a temporary self-signed cert and CSR you can use to purchase a real cert.') : nil", +    "commercial_cert": "= x509.use_commercial ? file([:commercial_cert, try{webapp.domain}||domain.full_suffix], :missing => 'commercial x509 certificate for node $node. Add file $file, or run `leap cert csr --domain %s` to generate a temporary self-signed cert and CSR you can use to purchase a real cert.' % (try{webapp.domain}||domain.full_suffix)) : nil", +    "commercial_key": "= x509.use_commercial ? file([:commercial_key, try{webapp.domain}||domain.full_suffix], :missing => 'commercial x509 certificate for node $node. Add file $file, or run `leap cert csr --domain %s` to generate a temporary self-signed cert and CSR you can use to purchase a real cert.' % (try{webapp.domain}||domain.full_suffix)) : nil",      "commercial_ca_cert": "= x509.use_commercial ? try_file(:commercial_ca_cert) : nil"    },    "service_type": "internal_service", diff --git a/provider_base/files/service-definitions/provider.json.erb b/provider_base/files/service-definitions/provider.json.erb index 2d0a5886..be8ae484 100644 --- a/provider_base/files/service-definitions/provider.json.erb +++ b/provider_base/files/service-definitions/provider.json.erb @@ -7,7 +7,7 @@    hsh['domain'] = domain.full_suffix    # advertise services that are 'user services' and for which there are actually nodes -  hsh['services'] ||= global.env(environment).services[:service_type => :user_service].field(:name).select do |service| +  hsh['services'] ||= global.services[:service_type => :user_service].field(:name).select do |service|      nodes_like_me[:services => service].any?    end diff --git a/provider_base/lib/macros/nodes.rb b/provider_base/lib/macros/nodes.rb index 0c6668a0..8b961cbc 100644 --- a/provider_base/lib/macros/nodes.rb +++ b/provider_base/lib/macros/nodes.rb @@ -15,10 +15,10 @@ module LeapCli      end      # -    # grab an environment appropriate provider +    # simple alias for global.provider      #      def provider -      global.env(@node.environment).provider +      global.provider      end      # diff --git a/provider_base/lib/macros/secrets.rb b/provider_base/lib/macros/secrets.rb index 51bf3971..8d1feb55 100644 --- a/provider_base/lib/macros/secrets.rb +++ b/provider_base/lib/macros/secrets.rb @@ -13,17 +13,17 @@ module LeapCli      # +length+ is the character length of the generated password.      #      def secret(name, length=32) -      @manager.secrets.set(name, Util::Secret.generate(length), @node[:environment]) +      manager.secrets.set(name, @node.environment) { Util::Secret.generate(length) }      end      # inserts a base32 encoded secret      def base32_secret(name, length=20) -      @manager.secrets.set(name, Base32.encode(Util::Secret.generate(length)), @node[:environment]) +      manager.secrets.set(name, @node.environment) { Base32.encode(Util::Secret.generate(length)) }      end      # Picks a random obfsproxy port from given range      def rand_range(name, range) -      @manager.secrets.set(name, rand(range), @node[:environment]) +      manager.secrets.set(name, @node.environment) { rand(range) }      end      # @@ -32,7 +32,7 @@ module LeapCli      # +bit_length+ is the bits in the secret, (ie length of resulting hex string will be bit_length/4)      #      def hex_secret(name, bit_length=128) -      @manager.secrets.set(name, Util::Secret.generate_hex(bit_length), @node[:environment]) +      manager.secrets.set(name, @node.environment) { Util::Secret.generate_hex(bit_length) }      end    end | 
