Launch a Debugging Terminal into GitHub Actions

(blog.gripdev.xyz)

143 points | by martinpeck a day ago ago

58 comments

  • embedding-shape 19 hours ago ago

    That the entire ecosystem seems to have moved to GitHub Actions is such a loss for productivity. I remember when CircleCI first launched, and you could "Rebuild with SSH" which gave you a bash command to connect to the running instance whenever you wanted, was such a no-brainer, and I'm sure why many of us ended up using CircleCI for years. Eventually CircleCI became too expensive, but I still thought that if other services learnt anything from CircleCI, it would be this single feature, because of the amount of hours it saved thousands of developers.

    Lo and behold, when GitHub Actions first launched, that feature was nowhere to be seen, and I knew from that moment on that betting on GitHub Actions would be a mistake, if they didn't launch with such a table-stakes feature. Seems still Microsoft didn't get their thumb out, and wasting countless developer's time with this, sad state of affairs.

    Thank you pbiggar for the time we got with CircleCI :) Here's to hoping we'll have CircleCI.V2 appearing at some point in the future, I just know it involves DAGs and "Rebuild with SSH" somehow :)

    • kevmo314 18 hours ago ago

      I am surprised Docker didn't launch into the CI market. Running a container build as CI seems like it would both be a boon for simplifying CI caching and also debugging since it's ~reproducible locally.

      • hobofan 18 hours ago ago

        They _are_ in the CI market. Two of their products are the Docker Build Cloud and Testcontainers Cloud. IIRC Docker Hub also came with automated builds at some point (not sure if it still does).

        I do get your sentiment tough. For the position they are in, a CircleCI-like product would seem to be quite fitting.

        • kevmo314 17 hours ago ago

          Wow you're right they are. Yeah, they could really use some improvement there.

          https://docs.docker.com/build-cloud/ci/

          This could've been a "change runs-on to be this" like all the other faster GHA startup products, but instead the way they set it up I would have to keep paying for GHA while also paying for their build cloud. No fun!

    • fyhn 16 hours ago ago

      I've gotten used to this essential feature too via Semaphore CI, and I just can't stand not being able to SSH into a GitHub Action. Debugging is so slow.

      • embedding-shape 15 hours ago ago

        I've seen people spend something like 2 hours fixing something that can be fixed in minutes if you had a normal feedback cycle instead of the 5 minute "change > commit > push > wait > see results" feedback cycle GitHub Action forces people into. It's baffling until you realize Microsoft charges per usage, so why fix it? I guess the baffling part is how developers put up with it anyways.

        • Storment33 14 hours ago ago

          Does not sound like a GitHub failure, sounds it is the company's failure. They haven't invested in the developer experience and they have developers who cannot run stuff locally and are having to push to CI in order to get feedback.

          • embedding-shape 14 hours ago ago

            Can't do much about that when there is something you're troubleshooting about the CI platform itself. Say you're troubleshooting why the deployment doesn't work, somehow got the environment variable wrong for whatever reason. So you edit and add a "env | sort" before that, commit it, push it, so on. With "rebuilt with ssh", you literally are inside the "job" as it runs.

            • Storment33 14 hours ago ago

              Yes you can't really debug CI specific stuff locally, like if your setting up build caching or something. But it seems like 90%+ of the time people are complaining about builds/tests that should have local feedback loops.

              • embedding-shape 14 hours ago ago

                Yeah, fair point, I see that a lot in the wild too. I guess I kind of assumed we all here had internalized the practice of isolating everything into one command that runs remotely, like "make test" or whatever, rather than what some people do and put entire shellscripts-but-yaml in their pipeline configs.

                • Storment33 12 hours ago ago

                  Yeah everytime I see logic in YAML I cringe. Trying at work to get people to use a task runner or even call out to scripts was a fight...

          • IshKebab 12 hours ago ago

            You can't run a GitHub CI pipeline locally (in general; there are some projects to try but they're limited). Even if you make as much of it runnable locally as possible (which you should) you're inevitably going to end up debugging some stuff by making commits and pushing them. Release automation. Test reporting. Artifact upload. Pipeline triggers. Permissions.

            Count yourself lucky you've never had to deal with any of that!

            • Storment33 12 hours ago ago

              Yes there are a few things you can't do locally. But the vast majority of complaints I see 90%+ are for builds/tests etc that should have the same local feedback loops. CI shouldn't be anything special, it should be a 'shell as a service' with some privileged credentials for pushing artefacts.

              > Release automation. Test reporting. Artifact upload.

              Those I can actually all do locally for my open source projects on GitHub, if I the correct credentials in my env. It is all automated(which I developed/tested locally) but I can break glass if needed.

    • ljm 16 hours ago ago

      Still using CircleCI. I do not love YAML at all, in fact I hate it because it's basically a 1980s text preprocessor on steroids and with dependency management. Too much logic applied to config that depends on implicit syntax and unintuitive significant whitespace.

      I mean, I had an issue once where this broke the pipeline:

         key:
           - value 1
           - value 2
      
      But this was fine:

          key:
          - value 1
          - value 2
      
      Fuck that noise!

      Otherwise it works just as good as it ever did and I don't miss Github Actions where every pipeline step is packaged into a dependency. I think Github has stagnated harder than CircleCI.

      • woodruffw 15 hours ago ago

        > I mean, I had an issue once where this broke the pipeline:

        It seems fair to dislike YAML (I dislike it too), but I don't understand how this broke for you unless CircleCI (or whoever) isn't actually using a legal YAML parser.

            irb(main):009:0> YAML.load <<EOD
            irb(main):010:0" key:
            irb(main):011:0"  - value 1
            irb(main):012:0"  - value 2
            irb(main):013:0" EOD
            => {"key"=>["value 1", "value 2"]}
            irb(main):014:0> YAML.load <<EOD
            irb(main):015:0" key:
            irb(main):016:0" - value 1
            irb(main):017:0" - value 2
            irb(main):018:0" EOD
            => {"key"=>["value 1", "value 2"]}
        
        (This works for any number of leading spaces, so long as the spacing is consistent.)
      • jborean93 15 hours ago ago

        There shouldn't be any difference between those two values. I'm not saying you are wrong and it didn't break but it's definitely surprising a parser would choke on that vs YAML itself being the problem.

        Don't get me wrong I can empathise with whitespace formatting being annoying and having both forms be valid just adds confusion it's just surprising to see this was the problem.

  • stabbles 20 hours ago ago
    • efrecon 15 hours ago ago

      I have written https://github.com/efrecon/sshd-cloudflared to solve the same problem. It provides you with an SSH connection inside a transient cloudflare tunnel. The connection is only accessible to the SSH public keys stored in your GitHub account.

    • Etheryte 19 hours ago ago

      This is the only reasonable way to ever do this, requires no effort, just copy paste one of the examples and you're done. My only gripe is that the most secure option isn't the first example in the repo. Limit access to the actor and put it behind the debug only flag and you're good to go. Still, I remove it after the fact once I don't need it anymore since it feels a bit too sketch with secrets available.

    • gorjusborg 17 hours ago ago

      I'll second this.

      I've used this action to debug builds, and it works beautifully.

      However, I've had to stop because the action isn't a 'verified' action and corporate policy.

      I'd love to see github themselves offer something like this.

    • theK 16 hours ago ago

      tmate.io returns a 503. Hugged to death by your comment?

  • dreslan a day ago ago

    I love this use of hole punching, also love how the author handled authentication.

    I have definitely been in the position of needing to tweak a workflow over and over to get it to work, wasting hours when a terminal into the action would have allowed me to close the loop in minutes. Nice work to the author!

  • lawrencegripper a day ago ago

    Author here, this was something I wrote for fun/because I wanted to use it. Happy to answer any questions

    • Imustaskforhelp 21 hours ago ago

      This is really awesome and I might try it (definitely bookmarked)

      This might seem (offtopic?) but you mention railway and how for a 20mb app the costs become almost negligible and I got curious because I usually refer hetzner to be one of the cheapest but still good/well worthy solution

      I find the pricing model of railway the most interesting. I am curious if you know of any other alternatives to railway which follow a similar pricing model as well as I'd like to compare if there are more of such cloud providers which provide this (preferably from a service which is more closer to bare metal than y'know cloud providers perhaps if that makes sense)

      • lawrencegripper 19 hours ago ago

        Thanks! I'm not aware of others offering this pricing model

  • whynotmaybe 21 hours ago ago

    That's my hill to die on : you must have a self hosted agent.

    You can have many cloud agents as you wish but you must at least have one where you can remotely connect.

    It has saved me hours of troubleshooting and polluting "workflow v1.3.56_final_should_work_2" commits

    • maxloh 18 hours ago ago

      > That's my hill to die on : you must have a self hosted agent.

      That’s only true if you’re building simple workflows.

      A counter-example would be a workflow that builds and uploads Android APKs. When I last checked last year, there weren't any well-maintained Docker images with the Android SDK pre-installed, and there are no updated, publicly available builds for the runner-images: https://github.com/actions/runner-images/issues/176

      • whynotmaybe 15 hours ago ago

        I'm building and deploying appbundle from my self hosted runner for this exact reason.

        I manually maintain flutter and Android sdk on my server.

        I've never been a docker fan, I prefer to completely handle my whole stack.

        I have scripts to install the required tools and some actions in my scripts are just echoing what needs to be done manually.

        With the years, I've found that infra for fully reproducible builds cost too much to maintain for us.

      • esafak 18 hours ago ago

        I do not follow. How does that change anything? Don't things still go wrong? Do you not need to debug?

        • maxloh 15 hours ago ago

          Sorry for not being clearly enough.

          The point is that it is very difficult to replicate the environment of a hosted GitHub Actions runner, and having to do so defeats the ease of use the platform provides.

    • nwellinghoff 20 hours ago ago

      Agreed. So much easier with self hosted runner. Just get out of your own way and do it. Use cases like caching etc also much more efficient on self hosted runner.

    • flanked-evergl 19 hours ago ago

      This kind of misses the point, though. I would say a much better rule is whatever runs in your workflows should also be entirely reproducible locally.

      Even if you can ssh into the remote environment that does not cover things like authentication and authorization, you don't just git a GITHUB_TOKEN with the same permissions.

      • Storment33 14 hours ago ago

        Exactly, you should be able to do everything locally! All this needing to SSH into runners or needing self-hosted runners or needing act to emulate GitHub Actions is really a failure of the developer experience.

        • whynotmaybe 13 hours ago ago

          A lot of stuff can be handled by developer themselves, but usually some steps are voluntarily blocked, like publishing to Google Play/App store.

          You don't want anyone to be able to publish public facing app from their version of the code that might not be committed.

          Some of us remember an era where deployment was copy-paste from the local /bin folder to the /bin folder on production server.

          • Storment33 13 hours ago ago

            While I get some stuff you can't test locally, like 90%+ of complaints I see are for builds/tests. Which is really a failure of the engineers for not having a local feedback loop.

            I am of the opinion you should be able to deploy from your machine, just you do not have the permissions to normally. So that if CI ever goes down and you need to push an emergency fix or something you can break glass if needed.

            • array_key_first 10 hours ago ago

              If you cannot build and run the application locally, I think there is something seriously, seriously wrong at the company. 90% of my day involves sitting in PHP storm with a debugger attached, introspecting whatever I need to. If I had to rely on even print statements being shit out on someone else's machine I don't know that I could be productive.

  • theknarf 2 hours ago ago

    I remember when https://sshx.io/ first launched for this use case

  • t_tsonev 15 hours ago ago

    Why SSH to the build agent when you can run your actions locally using the excellent https://github.com/nektos/act

  • baby_souffle 20 hours ago ago

    There are many tools and techniques like this. Not a nock against this tool, just an observation that we seemingly need these tools.

    Is there no better way, GitHub?

    • embedding-shape 19 hours ago ago

      > Is there no better way, GitHub?

      CircleCI solved this anno 2011, with "Rebuild with SSH". Microsoft asleep at the wheel as usual, not sure it's unexpected at this point.

      • bathtub365 18 hours ago ago

        The more you have to rerun your actions to debug them, the more money Microsoft makes. They aren’t incentivized to save you time.

        • embedding-shape 18 hours ago ago

          Completely bonkers that people, companies and organizations just swallow this, bait and all.

          • esafak 18 hours ago ago

            Free hosting, CI minutes, and an ecosystem.

            • embedding-shape 18 hours ago ago

              Commit and push to test small incremental changes, self-hosted runners' time still count towards CI minutes, and an ecosystem hellbent on presenting security holes as new features. I'm a bit unimpressed :)

    • esafak 18 hours ago ago

      Dagger. Workflows that run anywhere, including locally.

      • Storment33 14 hours ago ago

        I've seen dagger pipelines they're horrendous. Just have GitHub Actions call out to a task runner like Make/Taskfile etc and use an environment manager Mise or Nix to install all the tools.

        • esafak 13 hours ago ago

          I think that is a good pattern too, though I would replace the make/taskfile step with something bazel-like.

          Dagger used to be more declarative with CUE, but demand was not strong enough.

  • cyberax 16 hours ago ago

    I solved it by adding a simple Tailscale action to handle failure. It creates an ephemeral instance and waits for connections for 3 minutes. Then it loops while there's an active SSH session present.

    It's that simple: https://gist.github.com/Cyberax/9edbde51380bf7e1b298245464a2... and it saved me _hours_ of debug time.

    I've moved all my CI/CD to use Taskfiles inside a Docker container since then, so my local environment can replicate the CI/CD environment up to the GITHUB_TOKEN. Still, being able to poke around Github builders is great.

    • lioeters 10 hours ago ago

      That looks like a useful trick, using an ephemeral instance to SSH into a failed CI action context. I see in the script how it waits and checks for root user login, but to keep it alive, this part:

      > Then it loops while there's an active SSH session present.

      From what I can see, the loop stops when a user is logged in. Is this handled elsewhere?

      > use Taskfiles inside a Docker container since then, so my local environment can replicate the CI/CD environment

      Oh this is what I've been wanting, a vendor-neutral way to run the same CI actions locally. I'd seen go-task before, will try it, thanks for the info!

      • cyberax 10 hours ago ago

        > That looks like a useful trick, using an ephemeral instance to SSH into a failed CI action context.

        Yup. And Tailscale even manages the SSH key provisioning.

        > From what I can see, the loop stops when a user is logged in. Is this handled elsewhere?

        The script does handle it. The `pgrep` succeeds (returns zero exit code) if there's a "login" process for user 'root' present, which is created when there's an active SSH session. If pgrep fails, then `break` runs and exits the loop.

        Github then terminates the workflow and releases the runner.

        • lioeters 9 hours ago ago

          Ah I see what you mean, the loop keeps it alive until login is detected, and after that the machine is kept alive by the SSH session itself. Appreciated.

  • x0rg 14 hours ago ago

    Wow that's great, I'm definitely going to try it. This guy knows what he is doing.

  • axm__ 18 hours ago ago

    I was looking at frp for this. Setup is a bit more involved but you don't need a browser terminal: https://github.com/rgl/frp-github-actions-reverse-shell

  • stets 18 hours ago ago

    I want this for Gitlab so badly

  • franktankbank 19 hours ago ago

    When I see stuff like this, I think wow that is cool. But then I think about doing it myself and I get nervous about security ramifications. I don't know enough myself to know if author knows the right way ya know??

  • msie 18 hours ago ago

    I gave GH actions a chance when our org moved from Bamboo but I still hate it. I think i have to do more to get a build going.