Back

Launch a Debugging Terminal into GitHub Actions

155 points26 daysblog.gripdev.xyz
embedding-shape25 days ago

That the entire ecosystem seems to have moved to GitHub Actions is such a loss for productivity. I remember when CircleCI first launched, and you could "Rebuild with SSH" which gave you a bash command to connect to the running instance whenever you wanted, was such a no-brainer, and I'm sure why many of us ended up using CircleCI for years. Eventually CircleCI became too expensive, but I still thought that if other services learnt anything from CircleCI, it would be this single feature, because of the amount of hours it saved thousands of developers.

Lo and behold, when GitHub Actions first launched, that feature was nowhere to be seen, and I knew from that moment on that betting on GitHub Actions would be a mistake, if they didn't launch with such a table-stakes feature. Seems still Microsoft didn't get their thumb out, and wasting countless developer's time with this, sad state of affairs.

Thank you pbiggar for the time we got with CircleCI :) Here's to hoping we'll have CircleCI.V2 appearing at some point in the future, I just know it involves DAGs and "Rebuild with SSH" somehow :)

olafmol12 days ago

We (CircleCI) are still there, and doing just fine :) Out of interest, what are you currently missing and what would those "essential" V2 features be? tnx for sharing your thoughts!

melezhik21 days ago

You can use http://deadsimpleci.sparrowhub.io it allows to debug ci locally , as under the hood this is just a docker and your scripts ( Python, bash, whatever ), no magic, , the project is in active development and I am open for feedback

kevmo31425 days ago

I am surprised Docker didn't launch into the CI market. Running a container build as CI seems like it would both be a boon for simplifying CI caching and also debugging since it's ~reproducible locally.

hobofan25 days ago

They _are_ in the CI market. Two of their products are the Docker Build Cloud and Testcontainers Cloud. IIRC Docker Hub also came with automated builds at some point (not sure if it still does).

I do get your sentiment tough. For the position they are in, a CircleCI-like product would seem to be quite fitting.

kevmo31425 days ago

Wow you're right they are. Yeah, they could really use some improvement there.

https://docs.docker.com/build-cloud/ci/

This could've been a "change runs-on to be this" like all the other faster GHA startup products, but instead the way they set it up I would have to keep paying for GHA while also paying for their build cloud. No fun!

fyhn25 days ago

I've gotten used to this essential feature too via Semaphore CI, and I just can't stand not being able to SSH into a GitHub Action. Debugging is so slow.

embedding-shape25 days ago

I've seen people spend something like 2 hours fixing something that can be fixed in minutes if you had a normal feedback cycle instead of the 5 minute "change > commit > push > wait > see results" feedback cycle GitHub Action forces people into. It's baffling until you realize Microsoft charges per usage, so why fix it? I guess the baffling part is how developers put up with it anyways.

Storment3325 days ago

Does not sound like a GitHub failure, sounds it is the company's failure. They haven't invested in the developer experience and they have developers who cannot run stuff locally and are having to push to CI in order to get feedback.

+1
IshKebab25 days ago
+1
embedding-shape25 days ago
ljm25 days ago

Still using CircleCI. I do not love YAML at all, in fact I hate it because it's basically a 1980s text preprocessor on steroids and with dependency management. Too much logic applied to config that depends on implicit syntax and unintuitive significant whitespace.

I mean, I had an issue once where this broke the pipeline:

   key:
     - value 1
     - value 2
But this was fine:

    key:
    - value 1
    - value 2
Fuck that noise!

Otherwise it works just as good as it ever did and I don't miss Github Actions where every pipeline step is packaged into a dependency. I think Github has stagnated harder than CircleCI.

woodruffw25 days ago

> I mean, I had an issue once where this broke the pipeline:

It seems fair to dislike YAML (I dislike it too), but I don't understand how this broke for you unless CircleCI (or whoever) isn't actually using a legal YAML parser.

    irb(main):009:0> YAML.load <<EOD
    irb(main):010:0" key:
    irb(main):011:0"  - value 1
    irb(main):012:0"  - value 2
    irb(main):013:0" EOD
    => {"key"=>["value 1", "value 2"]}
    irb(main):014:0> YAML.load <<EOD
    irb(main):015:0" key:
    irb(main):016:0" - value 1
    irb(main):017:0" - value 2
    irb(main):018:0" EOD
    => {"key"=>["value 1", "value 2"]}
(This works for any number of leading spaces, so long as the spacing is consistent.)
jborean9325 days ago

There shouldn't be any difference between those two values. I'm not saying you are wrong and it didn't break but it's definitely surprising a parser would choke on that vs YAML itself being the problem.

Don't get me wrong I can empathise with whitespace formatting being annoying and having both forms be valid just adds confusion it's just surprising to see this was the problem.

stabbles25 days ago
efrecon25 days ago

I have written https://github.com/efrecon/sshd-cloudflared to solve the same problem. It provides you with an SSH connection inside a transient cloudflare tunnel. The connection is only accessible to the SSH public keys stored in your GitHub account.

Etheryte25 days ago

This is the only reasonable way to ever do this, requires no effort, just copy paste one of the examples and you're done. My only gripe is that the most secure option isn't the first example in the repo. Limit access to the actor and put it behind the debug only flag and you're good to go. Still, I remove it after the fact once I don't need it anymore since it feels a bit too sketch with secrets available.

gorjusborg25 days ago

I'll second this.

I've used this action to debug builds, and it works beautifully.

However, I've had to stop because the action isn't a 'verified' action and corporate policy.

I'd love to see github themselves offer something like this.

SamuelAdams25 days ago

The neat part is you can do whatever you want in a GitHub action, corporate policy be damned. So:

git clone <tmate / banned action git URL> cd <the action> Run the action start point.

Apparently this is a feature, not a security risk.

https://blog.yossarian.net/2025/06/11/github-actions-policie...

theK25 days ago

tmate.io returns a 503. Hugged to death by your comment?

cyberax25 days ago

I solved it by adding a simple Tailscale action to handle failure. It creates an ephemeral instance and waits for connections for 3 minutes. Then it loops while there's an active SSH session present.

It's that simple: https://gist.github.com/Cyberax/9edbde51380bf7e1b298245464a2... and it saved me _hours_ of debug time.

I've moved all my CI/CD to use Taskfiles inside a Docker container since then, so my local environment can replicate the CI/CD environment up to the GITHUB_TOKEN. Still, being able to poke around Github builders is great.

lioeters25 days ago

That looks like a useful trick, using an ephemeral instance to SSH into a failed CI action context. I see in the script how it waits and checks for root user login, but to keep it alive, this part:

> Then it loops while there's an active SSH session present.

From what I can see, the loop stops when a user is logged in. Is this handled elsewhere?

> use Taskfiles inside a Docker container since then, so my local environment can replicate the CI/CD environment

Oh this is what I've been wanting, a vendor-neutral way to run the same CI actions locally. I'd seen go-task before, will try it, thanks for the info!

cyberax25 days ago

> That looks like a useful trick, using an ephemeral instance to SSH into a failed CI action context.

Yup. And Tailscale even manages the SSH key provisioning.

> From what I can see, the loop stops when a user is logged in. Is this handled elsewhere?

The script does handle it. The `pgrep` succeeds (returns zero exit code) if there's a "login" process for user 'root' present, which is created when there's an active SSH session. If pgrep fails, then `break` runs and exits the loop.

Github then terminates the workflow and releases the runner.

lioeters25 days ago

Ah I see what you mean, the loop keeps it alive until login is detected, and after that the machine is kept alive by the SSH session itself. Appreciated.

rurban24 days ago

You also got the Tesla keys, nice!

dreslan26 days ago

I love this use of hole punching, also love how the author handled authentication.

I have definitely been in the position of needing to tweak a workflow over and over to get it to work, wasting hours when a terminal into the action would have allowed me to close the loop in minutes. Nice work to the author!

lawrencegripper26 days ago

Author here, this was something I wrote for fun/because I wanted to use it. Happy to answer any questions

Imustaskforhelp26 days ago

This is really awesome and I might try it (definitely bookmarked)

This might seem (offtopic?) but you mention railway and how for a 20mb app the costs become almost negligible and I got curious because I usually refer hetzner to be one of the cheapest but still good/well worthy solution

I find the pricing model of railway the most interesting. I am curious if you know of any other alternatives to railway which follow a similar pricing model as well as I'd like to compare if there are more of such cloud providers which provide this (preferably from a service which is more closer to bare metal than y'know cloud providers perhaps if that makes sense)

lawrencegripper25 days ago

Thanks! I'm not aware of others offering this pricing model

t_tsonev25 days ago

Why SSH to the build agent when you can run your actions locally using the excellent https://github.com/nektos/act

apwheele25 days ago

I only have pretty tame actions workflows and I have had a hard time replicating simple set ups with this. I can't imagine a company with more complicated setups.

What I wish is github codespaces could just do this out of the box, at least for a specific action/runner.

hole_in_foot25 days ago

[dead]

whynotmaybe26 days ago

That's my hill to die on : you must have a self hosted agent.

You can have many cloud agents as you wish but you must at least have one where you can remotely connect.

It has saved me hours of troubleshooting and polluting "workflow v1.3.56_final_should_work_2" commits

maxloh25 days ago

> That's my hill to die on : you must have a self hosted agent.

That’s only true if you’re building simple workflows.

A counter-example would be a workflow that builds and uploads Android APKs. When I last checked last year, there weren't any well-maintained Docker images with the Android SDK pre-installed, and there are no updated, publicly available builds for the runner-images: https://github.com/actions/runner-images/issues/176

whynotmaybe25 days ago

I'm building and deploying appbundle from my self hosted runner for this exact reason.

I manually maintain flutter and Android sdk on my server.

I've never been a docker fan, I prefer to completely handle my whole stack.

I have scripts to install the required tools and some actions in my scripts are just echoing what needs to be done manually.

With the years, I've found that infra for fully reproducible builds cost too much to maintain for us.

esafak25 days ago

I do not follow. How does that change anything? Don't things still go wrong? Do you not need to debug?

maxloh25 days ago

Sorry for not being clearly enough.

The point is that it is very difficult to replicate the environment of a hosted GitHub Actions runner, and having to do so defeats the ease of use the platform provides.

nwellinghoff26 days ago

Agreed. So much easier with self hosted runner. Just get out of your own way and do it. Use cases like caching etc also much more efficient on self hosted runner.

flanked-evergl25 days ago

This kind of misses the point, though. I would say a much better rule is whatever runs in your workflows should also be entirely reproducible locally.

Even if you can ssh into the remote environment that does not cover things like authentication and authorization, you don't just git a GITHUB_TOKEN with the same permissions.

Storment3325 days ago

Exactly, you should be able to do everything locally! All this needing to SSH into runners or needing self-hosted runners or needing act to emulate GitHub Actions is really a failure of the developer experience.

whynotmaybe25 days ago

A lot of stuff can be handled by developer themselves, but usually some steps are voluntarily blocked, like publishing to Google Play/App store.

You don't want anyone to be able to publish public facing app from their version of the code that might not be committed.

Some of us remember an era where deployment was copy-paste from the local /bin folder to the /bin folder on production server.

+1
Storment3325 days ago
axm__25 days ago

I was looking at frp for this. Setup is a bit more involved but you don't need a browser terminal: https://github.com/rgl/frp-github-actions-reverse-shell

baby_souffle26 days ago

There are many tools and techniques like this. Not a nock against this tool, just an observation that we seemingly need these tools.

Is there no better way, GitHub?

embedding-shape25 days ago

> Is there no better way, GitHub?

CircleCI solved this anno 2011, with "Rebuild with SSH". Microsoft asleep at the wheel as usual, not sure it's unexpected at this point.

bathtub36525 days ago

The more you have to rerun your actions to debug them, the more money Microsoft makes. They aren’t incentivized to save you time.

embedding-shape25 days ago

Completely bonkers that people, companies and organizations just swallow this, bait and all.

+1
esafak25 days ago
esafak25 days ago

Dagger. Workflows that run anywhere, including locally.

Storment3325 days ago

I've seen dagger pipelines they're horrendous. Just have GitHub Actions call out to a task runner like Make/Taskfile etc and use an environment manager Mise or Nix to install all the tools.

esafak25 days ago

I think that is a good pattern too, though I would replace the make/taskfile step with something bazel-like.

Dagger used to be more declarative with CUE, but demand was not strong enough.

franktankbank25 days ago

When I see stuff like this, I think wow that is cool. But then I think about doing it myself and I get nervous about security ramifications. I don't know enough myself to know if author knows the right way ya know??

theknarf25 days ago

I remember when https://sshx.io/ first launched for this use case

x0rg25 days ago

Wow that's great, I'm definitely going to try it. This guy knows what he is doing.

stets25 days ago

I want this for Gitlab so badly

Mogzol25 days ago

GitLab already has "interactive web terminals" which is basically the same thing: https://docs.gitlab.com/ci/interactive_web_terminal/

msie25 days ago

I gave GH actions a chance when our org moved from Bamboo but I still hate it. I think i have to do more to get a build going.