How to deploy Shiny application to Digital Ocean using GitHub Actions
Want to share your content on R-bloggers? click here if you have a blog, or here if you don't.
ShinyProxy on DigitalOcean
For the remainder of this walkthrough, I’ll assume that a DigitalOcean droplet running ShinyProxy is already set up. The great people at Analythium have made setting up an encrypted ShinyProxy server seamless with their 1-click (https://marketplace.digitalocean.com/apps/shinyproxy) application solution. Please follow their tutorials to set this up.
Having said that, this is in no way limited to the Analythium 1-click solution. You can set up a new DigitalOcean server running ShinyProxy from scratch, or adapt the below protocol to different cloud service provider.
GitHub Actions and DigitalOcean setup
In this section we’ll set up SSH access on Digital Ocean servers for GH actions:
- Set up a user for GHActions on the server
We can use root
to login to the remote server, but its better for GH Actions
to run things without root priveledges. So, login to the droplet as user:
ssh [email protected]
and run
useradd ghactions
This will create our user and should not prompt for password. The only way to
access the server with this user is through ssh keys
(see below).
Because the user will most likely require to pull docker images, its also good to add it to the docker user group. This will bypass the requirement for sudo when running docker commands:
sudo usermod -aG docker ghactions newgrp docker
- Create ssh keys for the
ghactions
user on your local computer
On your local machine, we want to create a private-public ssh key pair for our ghactions user. We don’t want to use the personal ssh keys. To do this, we generate the keys in a temporary location:
ssh-keygen -C ghactions -f /tmp/ghactions-keys
- Upload the public key to the server
-
log in as root:
ssh [email protected]
-
create
.ssh
folder for userghactions
:mkdir /home/ghactions/.ssh
-
create
.ssh/authorized_keys
file for userghactions
:touch /home/ghactions/.ssh/authorized_keys
-
change ownership for the ssh config files:
chown ghactions:ghactions -R /home/ghactions/.ssh
-
change permissions for the files:
chmod 700 -R /home/ghactions/.ssh
-
copy paste the public key from your local computer (
/tmp/ghactions-keys.pub
) to the/home/ghactions/.ssh/authorized_keys
file -
disconnect from the server (
exit
orctrl+d
) -
try connecting as the ghactions user:
ssh -i /tmp/ghactions-keys [email protected]
-
if you can log in, the ssh setup should be good to go
-
test that you can run
docker
withoutsudo
:docker run hello-world
- Store the private key to the GitHub repository secret
This requires admin priveledges on the github repo.
Go to Settings -> Secrets and Variables -> Actions
and click New repository secret
.
Paste the entire contents of your temporary private key, file /tmp/ghactions.keys
(including the first and last line
-----BEGIN OPENSSH PRIVATE KEY-----
and
-----END OPENSSH PRIVATE KEY-----
).
Call the secret SSH_PRIVATE_KEY
.
- Test your github action. A simple action to verify that the GitHub Action runner can access the droplet could be as follows:
on: push: branches: - dev jobs: test_gh_to_do_ssh: name: test gh to do ssh connection runs-on: ubuntu-latest steps: - name: Create a dummy file on server uses: appleboy/[email protected] with: host: ip.addr.of.droplet username: ghactions key: ${{ secrets.SSH_PRIVATE_KEY }} script: touch github-actions-made-this-file
If you got no errors, login to the server as user ghactions and check if the file is there. Then delete it.
- Delete your local copy of the ssh keys for ghactions user
If everything went well, you can delete the temporary ssh files you created for
the ghactions
user: rm /tmp/ghactions-keys /tmp/ghactions-keys.pub
.
The private key is safe in github secrets. For added security you could periodically change update the key.
Docker container registry on DigitalOcean
One of the components of the deployment workflow is that we have to host our docker
images on a remote repository and pull them to the DigitalOcean server. To do this,
one can use any Docker registry, including Docker hub, GitHub’s docker registry. For this post, I’ll use DigitalOcean’s container
registry solution.
To set this up we simply create a registry for our account or team. Then, to access the registry, we need to generate an access token. For example, by following this help page
Finally, we need provide this access token as a repository secret to GitHub Actions,
because it is needed for the runners to be able to push and pull images. To do this,
go Settings -> Secrets and Variables -> Actions
and click New repository secret
.
Paste the access token string and name the secret DIGITALOCEAN_ACCESS_TOKEN
.
We are now ready to use the token in our workflow.
GH Actions workflow for deployment
The workflow below is fairly straighforward. Mostly calling docker
to
login, push and pull images. The appleboy/[email protected]
is used to
access the DigitalOcean droplet via ssh following our earlier setup of the
ghactions
user.
In sequence, the steps are:
- The workflow will run on push to dev. For example after merging a PR for example
- Checkout the dev branch
- Build a docker image out of it using the Dockerfile included in the repo.
For this I used
golem::add_dockerfile_shinyproxy()
- Push the docker image to the DO registry under a tag
latest
. One can also use a SHA string to tag the image specifically ssh
to the droplet using USERNAME@HOST with keySSH_PRIVATE_KEY
(as we set it up earlier), The user name and host are hard-coded here, but if necessary they can be set as secrets or variables.- Pull the image using the same tag (the DigitalOcean access token is passed as
an environmental variable so the runner has access to the container registry after
ssh
-ing) - Next time you log in the app ShinyProxy will automatically serve the latest
docker
image
on: push: branches: - dev jobs: deploy_to_dev: name: deploy to dev runs-on: ubuntu-latest steps: - name: Checkout dev uses: actions/checkout@v4 with: ref: dev - name: Build container image run: docker build -t registry.digitalocean.com/myregistry/testgolem:latest . - name: Log in to DigitalOcean Container Registry with short-lived credentials run: echo ${{ secrets.DIGITALOCEAN_ACCESS_TOKEN }} | docker login registry.digitalocean.com/myregistry -u $(echo ${{ secrets.DIGITALOCEAN_ACCESS_TOKEN }}) --password-stdin - name: Push image to DigitalOcean Container Registry run: docker push registry.digitalocean.com/myregistry/testgolem:latest - name: Pull image on DigitalOcean ShinyProxy Server uses: appleboy/[email protected] env: DO_REGISTRY_TOKEN: ${{ secrets.DIGITALOCEAN_ACCESS_TOKEN }} with: host: ip.addr.do.droplet username: ghactions key: ${{ secrets.SSH_PRIVATE_KEY }} envs: DO_REGISTRY_TOKEN script: | echo $DO_REGISTRY_TOKEN | docker login registry.digitalocean.com/myregistry -u $(echo $DO_REGISTRY_TOKEN) --password-stdin docker pull registry.digitalocean.com/myregistry/testgolem:latest
Gist
For quick access to the main files visit this gist
Summary
This article includes a step-by-step tutorial on setting up automatic deployment of a Shiny application to a DigitalOcean server running ShinyProxy via GitHub Actions.
R-bloggers.com offers daily e-mail updates about R news and tutorials about learning R and many other topics. Click here if you're looking to post or find an R/data-science job.
Want to share your content on R-bloggers? click here if you have a blog, or here if you don't.