This action is a part of GitHub Actions Library created by rtCamp.
A GitHub Action to deploy WordPress on a server using PHP's Deployer.org project.
Please note that, this action expects git repo structure in a certain way. Your webroot should include content inside wp-content except uploads. You may use our WordPress Skeleton as a base, or restructre existing project to fit in.
During deployment, by default this action will download WordPress, put the content of the repo in wp-content directory and then deploy the entire WordPress setup on the deploy path specified in hosts.yml.
hosts.yml is Deployer's inventory file.
- Create a
.github/workflows/deploy.ymlfile in your GitHub repo, if one doesn't exist already. - Add the following code to the
deploy.ymlfile.
on: push
name: Deploying WordPress Site
jobs:
deploy:
name: Deploy
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@master
- name: Deploy
uses: rtCamp/action-deploy-wordpress@master
env:
SSH_PRIVATE_KEY: ${{ secrets.SSH_PRIVATE_KEY }}- Create
SSH_PRIVATE_KEYsecret using GitHub Action's Secret and store the private key that you use use to ssh to server(s) defined inhosts.yml. - Create
.github/hosts.ymlinventory file, based on Deployer inventory file format. Make sure you explictly define GitHub branch mapping. Only the GitHub branches mapped inhosts.ymlwill be deployed, rest will be filtered out. Here is a sample hosts.yml.
This GitHub action's behavior can be customized using following environment variables:
| Variable | Default | Possible Values | Purpose |
|---|---|---|---|
MU_PLUGINS_URL |
null | vip, any git repo url | If value is vip, then action will clone VIP's MU plugins as mu-plugins folder. If you want to specifiy a non-VIP mu-plugins repo, you can provide a publicly accessible mu-plugins repo URL as the value. |
WP_VERSION |
latest | Any valid WordPress version | If you specify a WordPress version, then that speicifc WordPress version will be downloaded, instead of latest WordPress version. |
The Deployer.org expects server setup in a particular way.
Using EasyEngine v4
- Pass flag
--public-dir=currentduring site creation. - Delete the
currentfolder usingrm -r /opt/easyengine/sites/example.com/app/htdocs/current.
The current folder will be automatically created by Deployer during execution.
- Open file
/opt/easyengine/sites/example.com/config/nginx/conf.d/main.conf. - Replace
/var/www/htdocswith/var/www/htdocs/current. - Run
ee site reload example.com. - Move
wp-config.phptohtdocs. You can use following command:
mv /opt/easyengine/sites/example.com/app/wp-config.php /opt/easyengine/sites/example.com/app/htdocs/wp-config.php- Make sure your web server points to
currentsubdirectory inside original webroot. Make surecurrentsubdirectory do NOT exist actually. - You may need to reload your webserver.
- You may need to change location of
wp-config.phpas we need in above section.
This GitHub action supports Hashicorp Vault. This comes in handy if you manage multiple servers and providing SSH_PRIVATE_KEY as GitHub secret per project becomes cumbersome.
To enable Hashicorp Vault support, please define following GitHub secrets:
| Variable | Purpose | Example Vaule |
|---|---|---|
VAULT_ADDR |
Vault server address | https://example.com:8200 |
VAULT_TOKEN |
Vault token | s.gIX5MKov9TUp7iiIqhrP1HgN |
You will need to change secrets line in deploy.yml file to look like below.
on: push
name: Deploying WordPress Site using vault
jobs:
deploy:
name: Deploy
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@master
- name: Deploy
uses: rtCamp/action-deploy-wordpress@master
env:
VAULT_ADDR: ${{ secrets.VAULT_ADDR }}
VAULT_TOKEN: ${{ secrets.VAULT_TOKEN }}GitHub action uses VAULT_TOKEN to connect to VAULT_ADDR to retrieve Signed SSH Certificates and uses it for deployment.
Please remember that you must configure each of your target deployment server to accept ssh connection via signed certificate using Vault beforehand. Ususally, you need to run following commands once per server:
export VAULT_ADDR='https://example.com:8200'
export VAULT_TOKEN='s.gIX5MKov9TUp7iiIqhrP1HgN'
# Add the public key to all target host's SSH configuration.
curl -o /etc/ssh/trusted-user-ca-keys.pem "$VAULT_ADDR/v1/ssh-client-signer/public_key"
# Add the path where the public key contents are stored to the SSH configuration file as the TrustedUserCAKeys option.
echo "TrustedUserCAKeys /etc/ssh/trusted-user-ca-keys.pem" >> /etc/ssh/sshd_config
# Restart ssh service. This may differ according to the OS.
systemctl restart sshCreate a file at location .github/deploy/deploy.php in your git repo to provide your own Deployer.org script.
Please note that it will completely override this action's original deploy.php. So if you need some portion of original deploy.php, you need to copy that to your own .github/deploy/deploy.php.
MIT © 2019 rtCamp
