ssh-action
GitHub Actions for executing remote ssh commands. (by appleboy)
login-action
GitHub Action to login against a Docker registry (by docker)
ssh-action | login-action | |
---|---|---|
20 | 11 | |
4,273 | 942 | |
- | 2.7% | |
6.7 | 7.8 | |
30 days ago | 1 day ago | |
Shell | TypeScript | |
MIT License | Apache License 2.0 |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
ssh-action
Posts with mentions or reviews of ssh-action.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-12-15.
-
Portfolio Site Continuous Integration GitHub Action
This GitHub action will use another ssh-action action to handle the remote ssh connection. After storing the connection credentials in the GitHub repository secrets, this can securely/dynamically connect to the remote Ubuntu machine. The last key for this action job is the script, or verbatim Ubuntu commands that will be run. For the sake of brevity, I have only written pseudo-code for the deployment steps.
-
Do I need Dockerhub for CI/CD with Github Actions?
If you have SSH setup, you could have the your pipeline SSH in and run start your script. A quick search found a few actions that might work, including this one that does most of the heavy lifting for you. Just setup your secrets, give it the command you want to run, and it'll go from there. Good luck!
-
Need advice for deploying a web app on a single server: Docker compose VS direct install + systemd?
Then on my backend and frontend GitHub repos, I'll have another GitHub Actions workflow that uses something like appleboy/ssh-action to simply SSH into my server, pull the new images, and re-start the containers, whenever someone pushes to master.
- How any of this works (github action)?
-
What tools/services are you using to deploy your Symfony app to servers?
Personally I use GitHub Actions that connects via SSH and runs custom bash deploy scripts.
-
Deploy A Simple Application To AWS EC2
Executing remote ssh commands using appleboy/ssh-action@master.
-
Review My CI/CD Tool
Yeah it's definitely a pet project. I'll look into Puppet for actual applications. Do you think that something like this would be a good, realistic alternative rather than going over HTTPS, if the use case is just a few simple, repeated shell commands: https://github.com/marketplace/actions/ssh-remote-commands
-
Setting up Continuous Deployment for a vue app on a VPS using Github Actions
SSH Remote Commands
-
Sync Git Repo To htdocs Folder on Ubuntu VPS?
Or you combine part of both and use a GitHub action to run the script from the first action as a remote SSH command: https://github.com/marketplace/actions/ssh-remote-commands
-
PM2 configuration question
You could add a Github Action to your repo which uses https://github.com/appleboy/ssh-action that SSHs into your server, pulls the repo there and restarts pm2.
login-action
Posts with mentions or reviews of login-action.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2023-10-05.
-
Dockerize and Deploy a NodeJS Application to Cloud Run with GitHub Actions
name: Lint and Dockerize the app on: push: branches: [master] pull_request: branches: [master] env: # Use docker.io for Docker Hub if empty REGISTRY: docker.io # github.repository as / IMAGE_NAME: ${{ github.repository }} jobs: build: runs-on: ubuntu-latest permissions: contents: read packages: write steps: - name: Checkout repository uses: actions/checkout@v2 - name: Set up Google Cloud uses: google-github-actions/[email protected] with: project_id: ${{ secrets.GCP_PROJECT_ID }} service_account_key: ${{ secrets.GCP_SA_KEY }} # Login against a Docker registry except on PR # https://github.com/docker/login-action - name: Log into registry ${{ env.REGISTRY }} # if: github.event_name != 'pull_request' uses: docker/login-action@v1 with: username: ${{ secrets.DOCKER_USERNAME }} password: ${{ secrets.DOCKER_PASSWORD }} # Extract metadata (tags, labels) for Docker # https://github.com/docker/metadata-action #- name: Extract Docker metadata # id: meta # uses: docker/metadata-action@98669ae865ea3cffbcbaa878cf57c20bbf1c6c38 # with: # images: ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }} # Build and push Docker image with Buildx (don't push on PR) # https://github.com/docker/build-push-action - name: Build and push Docker image uses: docker/build-push-action@v2 with: context: ./ tags: ${{ secrets.DOCKER_USERNAME }}/magga:latest push: true file: ./Dockerfile - name: Image digest run: echo
-
Automating Tag Creation, Release, and Docker Image Publishing with GitHub Actions
docker/login-action@v2 to login against a Docker registry.
-
Automate Docker Image Builds and Push to GitHub Registry Using GitHub Actions 🐙
name: Docker Image Publish on: push: branches: [ "main" ] # Publish semver tags as releases. tags: [ 'v*.*.*' ] pull_request: branches: [ "main" ] env: # Use docker.io for Docker Hub if empty REGISTRY: ghcr.io # github.repository as / IMAGE_NAME: ${{ github.repository }} jobs: build: runs-on: ubuntu-latest permissions: contents: read packages: write # This is used to complete the identity challenge # with sigstore/fulcio when running outside of PRs. id-token: write steps: - name: Checkout repository uses: actions/checkout@v3 # Install the cosign tool except on PR # https://github.com/sigstore/cosign-installer - name: Install cosign if: github.event_name != 'pull_request' uses: sigstore/cosign-installer@f3c664df7af409cb4873aa5068053ba9d61a57b6 #v2.6.0 with: cosign-release: 'v1.11.0' # Workaround: https://github.com/docker/build-push-action/issues/461 - name: Setup Docker buildx uses: docker/setup-buildx-action@v2 # Login against a Docker registry except on PR # https://github.com/docker/login-action - name: Log into registry ${{ env.REGISTRY }} if: github.event_name != 'pull_request' uses: docker/login-action@28218f9b04b4f3f62068d7b6ce6ca5b26e35336c with: registry: ${{ env.REGISTRY }} username: ${{ github.actor }} password: ${{ secrets.GITHUB_TOKEN }} # Extract metadata (tags, labels) for Docker # https://github.com/docker/metadata-action - name: Extract Docker metadata id: meta uses: docker/metadata-action@98669ae865ea3cffbcbaa878cf57c20bbf1c6c38 with: images: ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }} # Build and push Docker image with Buildx (don't push on PR) # https://github.com/docker/build-push-action - name: Build and push Docker image id: build-and-push uses: docker/build-push-action@v4 with: context: "{{defaultContext}}:src" push: ${{ github.event_name != 'pull_request' }} # Don't push on PR tags: ${{ steps.meta.outputs.tags }} labels: ${{ steps.meta.outputs.labels }} cache-from: type=gha cache-to: type=gha,mode=max
-
Automate Docker Image Builds and Push to Docker Hub Using GitHub Actions 🐳🐙
Log in to Docker Hub: We will use the docker/login-action action to log in to Docker Hub. We will use the following inputs:
-
Error: Unable to resolve action `docker/login-actions@v1`, repository not found
Simple - learn to read. It's called docker/login-action not docker/login-actions.
-
Docker build fails on GitHub Action after net7 update
name: Docker # This workflow uses actions that are not certified by GitHub. # They are provided by a third-party and are governed by # separate terms of service, privacy policy, and support # documentation. on: push: branches: [ "main" ] # Publish semver tags as releases. tags: [ 'v*.*.*' ] pull_request: branches: [ "main" ] paths: - src/MamisSolidarias.WebAPI.Campaigns/Dockerfile - .github/workflows/docker-publish.yml workflow_dispatch: env: # Use docker.io for Docker Hub if empty REGISTRY: ghcr.io IMAGE_NAME: mamis-solidarias/campaigns jobs: build: runs-on: ubuntu-latest permissions: contents: read packages: write # This is used to complete the identity challenge # with sigstore/fulcio when running outside of PRs. id-token: write steps: - name: Checkout repository uses: actions/checkout@v3 # Install the cosign tool except on PR # https://github.com/sigstore/cosign-installer - name: Install cosign if: github.event_name != 'pull_request' uses: sigstore/cosign-installer@main with: cosign-release: 'v1.13.1' - name: Set up QEMU uses: docker/setup-qemu-action@v2 with: platforms: 'arm64' # Workaround: https://github.com/docker/build-push-action/issues/461 - name: Setup Docker buildx uses: docker/setup-buildx-action@v2 # Login against a Docker registry except on PR # https://github.com/docker/login-action - name: Log into registry ${{ env.REGISTRY }} if: github.event_name != 'pull_request' uses: docker/login-action@v2 with: registry: ${{ env.REGISTRY }} username: ${{ github.actor }} password: ${{ secrets.GITHUB_TOKEN }} # Extract metadata (tags, labels) for Docker # https://github.com/docker/metadata-action - name: Extract Docker metadata id: meta uses: docker/metadata-action@v4 with: images: ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }} tags: | type=schedule type=ref,event=branch type=ref,event=pr type=semver,pattern={{version}} type=semver,pattern={{major}}.{{minor}} type=semver,pattern={{major}} type=sha # Build and push Docker image with Buildx (don't push on PR) # https://github.com/docker/build-push-action - name: Build and push Docker image id: build-and-push uses: docker/build-push-action@v3 with: context: . platforms: linux/amd64, linux/arm64 file: src/MamisSolidarias.WebAPI.Campaigns/Dockerfile push: ${{ github.event_name != 'pull_request' }} tags: ${{ steps.meta.outputs.tags }} labels: ${{ steps.meta.outputs.labels }} # Sign the resulting Docker image digest except on PRs. # This will only write to the public Rekor transparency log when the Docker # repository is public to avoid leaking data. If you would like to publish # transparency data even for private images, pass --force to cosign below. # https://github.com/sigstore/cosign - name: Sign the published Docker image if: ${{ github.event_name != 'pull_request' }} env: COSIGN_EXPERIMENTAL: "true" # This step uses the identity token to provision an ephemeral certificate # against the sigstore community Fulcio instance. run: echo "${{ steps.meta.outputs.tags }}" | xargs -I {} cosign sign {}@${{ steps.build-and-push.outputs.digest }}
-
Pushing Cutom Images to Docker Hub using GitHub Actions
Fourth step is login (docker/login-action@v2) in to docker account, it is using username and token configured in the repository's action secret section. Then next step is building and pushing it to docker hub.
-
No more links between GitHub and DockerHub
docker/login-action to log in to a container registy from a GitHub action (using GitHub secrets for the credentials, of course). Examples for common registries are included.
-
Deploying Prometheus Operator via the Kubestack Catalog
name: Docker Publish on: push: branches: [ main ] tags: [ 'v*' ] pull_request: branches: [ main ] env: REGISTRY: ghcr.io # github.repository as / IMAGE_NAME: ${{ github.repository }} jobs: build: runs-on: ubuntu-latest permissions: contents: read packages: write steps: - name: Checkout repository uses: actions/checkout@v2 # https://github.com/docker/login-action - name: Log into registry ${{ env.REGISTRY }} if: github.event_name != 'pull_request' uses: docker/login-action@v1 with: registry: ${{ env.REGISTRY }} username: ${{ github.actor }} password: ${{ secrets.GITHUB_TOKEN }} # https://github.com/docker/metadata-action - name: Extract Docker metadata id: meta uses: docker/metadata-action@v3 with: images: ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }} # https://github.com/docker/build-push-action - name: Build and push Docker image uses: docker/build-push-action@v2 with: context: . push: ${{ github.event_name != 'pull_request' }} tags: ${{ steps.meta.outputs.tags }} labels: ${{ steps.meta.outputs.labels }}
-
Building a CI/CD Workflow for my CFML/Vue.js Application
docker/login-action (Login to Dockerhub so it can push the image)
What are some alternatives?
When comparing ssh-action and login-action you can also consider the following projects:
build-push-action - GitHub Action to build and push Docker images with Buildx
checkout - Action for checking out a repo
setup-buildx-action - GitHub Action to set up Docker Buildx
git-actions - A GitHub Action to run arbitrary git commands
docker-action-examples
setup-dlang - Github action for dlang compiler setup
cleaver-docker - Support repo for the scripts and files used to build the Cleaver Docker image
scp-action - GitHub Action that copy files and artifacts via SSH.
cosign-installer - Cosign Github Action
do-actions-runner - Self-hosted actions runner on DigitalOcean App Platform
ytmdl-web-v2 - Web version of ytmdl. Allows downloading songs with metadata embedded from various sources like itunes, gaana, LastFM etc.
ssh-action vs build-push-action
login-action vs build-push-action
ssh-action vs checkout
login-action vs setup-buildx-action
ssh-action vs git-actions
login-action vs docker-action-examples
ssh-action vs setup-dlang
login-action vs cleaver-docker
ssh-action vs scp-action
login-action vs cosign-installer
ssh-action vs do-actions-runner
login-action vs ytmdl-web-v2