This is a GitHub Action designed to run commands on a remote server using SSH. It allows you to securely execute commands on a remote server from your GitHub workflow, making it ideal for deployment, server management, and other remote tasks.
- Secure: Uses SSH with key-based authentication to securely execute commands on remote servers.
- Flexible: Run any command supported by the shell on the remote server.
- Easy Integration: Simple to include in your GitHub Actions workflow.
Here's an action example of how to use this ssh-command-action
.
- name: Run remote command via SSH
uses: D3rHase/ssh-command-action@latest
with:
host: ${{ secrets.HOST }}
port: ${{ secrets.PORT }}
user: ${{ secrets.USER }}
private_key: ${{ secrets.PRIVATE_KEY }}
host_fingerprint: ${{ secrets.HOST_FINGERPRINT }}
command: echo 'Hello, World!'
- name: Run multiple remote commands via SSH
uses: D3rHase/ssh-command-action@latest
with:
host: ${{ secrets.HOST }}
port: ${{ secrets.PORT }}
user: ${{ secrets.USER }}
private_key: ${{ secrets.PRIVATE_KEY }}
host_fingerprint: ${{ secrets.HOST_FINGERPRINT }}
command: |
cd /path/to/your/directory
git pull origin main
npm install
npm run build
You can use plain text instead of the secrets for these values directly in your action, but it is highly recommended to use GitHub Secrets for sensitive information to ensure privacy and security. See Secrets Configuration.
host
: The remote server address (IP or domain) - Required.port
: The port to connect to on the remote server - Default: 22.user
: The username for SSH access - Required.private_key
: The private SSH key to authenticate with the remote server - Required.host_fingerprint
: The public SSH key fingerprint of the remote server for verification - Optional.command
: The command to execute on the remote server - Required.
To keep your credentials secure, store sensitive information like host
, port
, user
, and private_key
as GitHub Secrets. You can add these secrets in your repository's settings under Secrets and variables
> Actions
> Repository secrets
.
To use this action, you'll need to set up an SSH key on your server. Here's how to do it:
-
Generate an SSH Key Pair on your local machine (if you don't have one already):
ssh-keygen -t rsa -b 4096
This command creates a new SSH key using the RSA algorithm with a 4096-bit key length.
-
Add the SSH Key to the Server:
Copy the public key (
~/.ssh/id_rsa.pub
) to your server using thessh-copy-id
command:ssh-copy-id user@your-server-ip
Replace
user
with your server's username andyour-server-ip
with the IP address of your server. This command adds your public key to the~/.ssh/authorized_keys
file on the server. -
Test the SSH Connection:
Verify that you can connect to your server using the SSH key:
ssh user@your-server-ip
-
Store the SSH Key in GitHub Secrets:
Go to your repository on GitHub, navigate to
Settings
in your repository >Secrets and variables
>Actions
, and add a new repository secret namedPRIVATE_KEY
. Paste the contents of your private key (~/.ssh/id_rsa
) into this secret.Note: Ensure your private key remains confidential. Do not share it publicly.
To ensure you're connecting to the correct server and to prevent man-in-the-middle attacks, you can verify the server's host fingerprint. Here's how to obtain it:
-
Connect to your server using SSH from your local machine:
ssh user@your-server-ip
-
Get the SSH host key fingerprint:
After connecting, run the following command on your server:
ssh-keygen -lf /etc/ssh/ssh_host_rsa_key.pub
Replace
/etc/ssh/ssh_host_rsa_key.pub
with the path to your server's SSH public key file if it's different. -
Copy the fingerprint displayed by the command. It should look something like this:
2048 SHA256:ABC123def456ghi789... (RSA)
-
Store the Host Fingerprint in GitHub Secrets:
Go to your repository on GitHub, navigate to
Settings
in your repository >Secrets and variables
>Actions
, and add a new repository secret namedHOST_FINGERPRINT
. Paste the fingerprint into this secret.
This is an example of how you could use it in your GitHub workflow YAML file.
name: Example workflow file
on:
push:
branches:
- main
jobs:
remote-command:
runs-on: ubuntu-latest
steps:
- name: Checkout code
uses: actions/checkout@v2
- name: Run remote command via SSH
uses: D3rHase/ssh-command-action@latest
with:
host: ${{ secrets.HOST }}
port: ${{ secrets.PORT }}
user: ${{ secrets.USER }}
private_key: ${{ secrets.PRIVATE_KEY }}
host_fingerprint: ${{ secrets.HOST_FINGERPRINT }}
command: echo 'Hello, World!'
- name: Notify Command Success
run: echo "Command executed on ${{ secrets.HOST }} successfully!"
This project is licensed under the MIT License. See the LICENSE file for more details.