1
0
Fork 0
mirror of https://github.com/shimataro/ssh-key-action.git synced 2025-06-19 22:52:10 +10:00
GitHub Action that installs SSH key to .ssh https://github.com/marketplace/actions/install-ssh-key
Find a file
2020-01-27 06:18:25 +09:00
.github/workflows * remove .bak file (#70) 2020-01-18 12:25:23 +09:00
lib Feature/ci (#63) 2020-01-18 10:28:30 +09:00
node_modules/@actions/core version 1.6.4 (#102) 2020-01-27 06:16:12 +09:00
scripts * fix the timing of "rm -rf node_modules" (#101) 2020-01-27 06:12:28 +09:00
src * add lint tools (#61) 2020-01-18 09:56:30 +09:00
.editorconfig * add .editorconfig (#4) 2019-09-18 22:53:46 +09:00
.eslintrc.yml * add lint tools (#61) 2020-01-18 09:56:30 +09:00
.gitignore * first action! (#1) 2019-09-18 20:39:54 +09:00
.markdownlint.yml Feature/faq (#96) 2020-01-27 00:07:39 +09:00
.npmrc Feature/dependencies (#16) 2019-09-22 08:29:38 +09:00
action.yml * use "install in", not "install to" (#75) 2020-01-18 20:30:41 +09:00
CHANGELOG.md version 1.6.4 (#102) 2020-01-27 06:16:12 +09:00
LICENSE Initial commit 2019-09-18 20:10:02 +09:00
package-lock.json version 1.6.4 (#102) 2020-01-27 06:16:12 +09:00
package.json version 1.6.4 (#102) 2020-01-27 06:16:12 +09:00
README.md Feature/faq (#96) 2020-01-27 00:07:39 +09:00
ssh-key-action.code-workspace Feature/vscode (#5) 2019-09-18 22:54:17 +09:00
tsconfig.json * first action! (#1) 2019-09-18 20:39:54 +09:00

Install SSH Key

Build Windows macOS Ubuntu Ubuntu 16.04 Release License Stars

This action installs SSH key in ~/.ssh.

Useful for SCP, SFTP, and rsync over SSH in deployment script.

Works on all virtual environment -- Windows, macOS, Ubuntu and Ubuntu 16.04.

Usage

Add your SSH key to your product secrets by clicking Settings - Secrets - Add a new secret beforehand.

NOTE: OPENSSH format (key begins with -----BEGIN OPENSSH PRIVATE KEY-----) may not work due to OpenSSH version on VM. Please use PEM format (begins with -----BEGIN RSA PRIVATE KEY-----) instead.

runs-on: ubuntu-latest
steps:
- name: Install SSH key
  uses: shimataro/ssh-key-action@v1
  with:
    private-key: ${{ secrets.SSH_KEY }}
    name: id_rsa # optional
    known-hosts: ${{ secrets.KNOWN_HOSTS }} # known_hosts; optional
    config: ${{ secrets.CONFIG }} # ssh_config; optional
- name: rsync over ssh
  run: rsync ./foo/ user@remote:bar/

See Workflow syntax for GitHub Actions for details.

Install multiple keys

If you want to install multiple keys, call this action multiple times. It is useful for port forwarding.

NOTE: When this action is called multiple times, the contents of known-hosts and config will be appended. private-key must be saved as different name, by using name option.

runs-on: ubuntu-latest
steps:
- name: Install SSH key of bastion
  uses: shimataro/ssh-key-action@v1
  with:
    private-key: ${{ secrets.SSH_KEY_OF_BASTION }}
    name: id_rsa-bastion
    known-hosts: ${{ secrets.KNOWN_HOSTS_OF_BASTION }}
    config: |
      Host bastion
        HostName xxx.xxx.xxx.xxx
        User user-of-bastion
        IdentityFile ~/.ssh/id_rsa-bastion
- name: Install SSH key of target
  uses: shimataro/ssh-key-action@v1
  with:
    private-key: ${{ secrets.SSH_KEY_OF_TARGET }}
    name: id_rsa-target
    known-hosts: ${{ secrets.KNOWN_HOSTS_OF_TARGET }} # will be appended!
    config: |                                         # will be appended!
      Host target
        HostName yyy.yyy.yyy.yyy
        User user-of-target
        IdentityFile ~/.ssh/id_rsa-target
        ProxyCommand ssh -W %h:%p bastion
- name: SCP via port-forwarding
  run: scp ./foo/ target:bar/

Q&A

SSH failed even though key has been installed.

Check belows:

  • Load key "/HOME/.ssh/id_rsa": invalid format:
    • OPENSSH format (key begins with -----BEGIN OPENSSH PRIVATE KEY-----) may not work.
    • Use PEM format (begins with -----BEGIN RSA PRIVATE KEY-----).
  • Host key verification failed.:
    • Set known-hosts option or use ssh -o StrictHostKeyChecking=no.
    • The former is HIGHLY recommended for security reason.
    • I'm planning to make known-hosts required in v2.

How do I use encrypted SSH key?

This action doesn't support encrypted key directly. Here are some solutions:

  • decrypting key beforehand: best bet, and works on any VM
  • sshpass command: next best bet, but not supported on Windows
  • expect command: be careful not to expose passphrase to console
  • SSH_ASKPASS environment variable: might be troublesome

Which one is the best way for transferring files, "direct SCP/SFTP/rsync" or "SCP/SFTP/rsync via bastion"?

I recommend rsync via bastion. It has some advantages over other methods:

  • "Rsync via bastion" doesn't require to update workflow files and secrets even if it is necessary to transfer files to multiple servers.
    • Other methods require to update known-hosts if servers have changed.
  • Rsync:
    • is fastest of all.
    • does NOT break files even if disconnected during transferring.
    • can remove files that don't exist on server.
  • SCP is deprecated by OpenSSH due to outdated and inflexible protocol.
  • Using bastion is more secure because:
    • it is not necessarily to expose SSH port on servers to public.
      • Address filtering is less effective.
      • Because Azure address range is very wide.
      • And will be updated continuously.
    • if security incident ―e.g., private key leaked― occurs, it's OK just to remove authorized_keys on bastion.

License

The scripts and documentation in this project are released under the MIT License

Changelog

See CHANGELOG.md.