Live tail GitHub Action runs on git push
. It's cursed.
I really liked how Codecrafters test runs are mirrored back right in the
terminal when you git push
, so I thought: "surely this is something the gh
CLI supports". It doesn't.
A couple of hours of messing with HTTPS mitm proxies, websockets, headless browsers, you-name-it, and octotail was born.
Invoked with a commit_sha
(and optionally --workflow
and/or --ref-name
),
it polls the GitHub API for a matching, active run.
When a job associated with the run starts, it instructs a headless
chromium-based browser to visit the job's page.
The browser's traffic passes through a mitmproxy instance that it uses to extract the authenticated WebSocket subscriptions for live tailing.
The WebSocket address and subscribe messages are then passed to the tailing workers.
The headless browser tabs are cleaned up immediately after the WebSocket extraction, so the overhead is minimal. (well, it's still an empty browser)
- python 3.12
- a working chromium-based browser under
/usr/bin/chromium
Important
Make sure /usr/bin/chromium
points to a working chromium-based browser.
This is a good option for Arch Linux users:
paru ungoogled-chromium-bin
One can simply and hassle-free invoke octotail
through uvx.
First, generate the proxy root certificate:
uvx --from=octotail octotailx generate-cert
Then, see Install the generated proxy root certificate for instructions on how to install the generated certificate on your platform.
Finally, simply invoke it via:
uvx --from=octotail octotail
Or alias it as octotail
:
# change .zshrc to .bashrc, config.fish, etc. if needed
echo "alias octotail='uvx --from octotail octotail'" >> ~/.zshrc
mkdir octotail && cd octotail
python3 -mvenv .venv && source .venv/bin/activate
pip3 install octotail
# change .zshrc to .bashrc, config.fish, etc.
echo "alias octotail='$(pwd)/.venv/bin/python3 $(pwd)/.venv/bin/octotail'" >> ~/.zshrc
echo "alias octotailx='$(pwd)/.venv/bin/python3 $(pwd)/.venv/bin/octotailx'" >> ~/.zshrc
git clone https://github.com/getbettr/octotail.git
cd octotail
make
sudo make install
Important
Run octotailx generate-cert
once to generate the proxy root certificate:
octotailx generate-cert
This step is highly platform-dependent.
sudo trust anchor ~/.local/share/octotail/mitmproxy/mitmproxy-ca-cert.cer
sudo security add-trusted-cert -d -p ssl -p basic \
-k /Library/Keychains/System.keychain \
~/local/.share/octotail/mitmproxy/mitmproxy-ca-cert.pem
Please refer to the "Installing the mitmproxy CA certificate manually"
section of the mitmproxy documentation, changing ~/.mitmproxy
with
~/.local/share/octotail/mitmproxy
where appropriate.
# octotail --help
Usage: octotail [OPTIONS] COMMIT_SHA
Find an active workflow run for the given COMMIT_SHA (and optionally --workflow and/or --ref-name)
and attempt to tail its logs.
NOTE: the COMMIT_SHA has to be of the full 40 characters length.
-- Arguments ---------------------------------------------------------------------------------------
* commit_sha TEXT Full commit SHA that triggered the workflow.
[required]
-- Authentication ----------------------------------------------------------------------------------
* --gh-pat TEXT GitHub personal access token. (for API auth)
[env var: OCTOTAIL_GH_PAT]
[required]
* --gh-user TEXT GitHub username. (for web auth)
[env var: OCTOTAIL_GH_USER]
[required]
* --gh-pass TEXT GitHub password. (for web auth)
[env var: OCTOTAIL_GH_PASS]
[required]
--gh-otp TEXT GitHub OTP. (for web auth, if 2FA is on)
[env var: OCTOTAIL_GH_OTP]
[default: None]
-- Workflow filters --------------------------------------------------------------------------------
--workflow -w TEXT Only consider workflows with this name.
--ref-name -r TEXT Only consider workflows triggered by this ref. Example:
refs/heads/main
--repo -R USER/REPO Use this GitHub repo to look for workflow runs. If unspecified,
will look for a remote matching 'git@github.com:user/repo.git' in
the current directory. Examples: user/repo OR org_name/repo
-- Others ------------------------------------------------------------------------------------------
--headless --no-headless Run browser in headless mode.
[env var: OCTOTAIL_HEADLESS]
[default: headless]
--port INTEGER Port the proxy will listen on.
[env var: OCTOTAIL_PROXY_PORT]
[default: (random in range 8100-8500)]
--version Show the version and exit.
--help Show this message and exit.
A simple use case is tailing a workflow run right after git push
:
If simply pushing the HEAD
of the current branch:
git push
octotail $(git rev-parse HEAD)
Or if pushing to a different remote branch:
git push origin main
octotail $(git rev-parse origin/main) -r refs/heads/main
Or if pushing a tag:
git push origin v1.0.42
octotail $(git rev-parse v1.0.42^{commit}) -r refs/tags/v1.0.42
Tip
If you're using uv
you can now simply run:
uvx --from=octotail octotailx install-proxy-remote
..which will prompt you for setting up a proxy, post-receive-hook-enabled
remote for your repository. Then you can simply git push proxy
and all the
tailing should happen automatically!
Alternatively, if you installed via one of the other methods, the script should be called with:
octotailx install-proxy-remote
A slightly more advanced use case that allows streaming the run outputs on
git push
without invoking octotail
explicitly, similar to Codecrafters
test runs.
For this to work we'll need control over the remote's output, so we can't use
the GitHub remote directly. Instead, we'll use a bare repository as our proxy
remote and set up its post-receive hook to call octotail
.
cd your-original-repo
export PROXY_REPO="/wherever/you/want/to/store/the/proxy-repo"
mkdir -p $PROXY_REPO
git clone --mirror "$(git remote get-url origin)" $PROXY_REPO
git remote add proxy $PROXY_REPO
# back to octotail
cd -
cp post-receive.sample $PROXY_REPO/hooks/post-receive
Edit $PROXY_REPO/hooks/post-receive
and change things according to
your setup:
- set
_GH_USER
to your GitHub username - set
_GH_PASS_CMD
to a command that outputs the GitHub password, e.g._GH_PASS_CMD="pass github.com"
- if using 2FA - set
_GH_OTP_CMD
to a command that outputs an OTP token for the GitHub 2FA, e.g._GH_OTP_CMD="totp github.com"
- set
_GH_PAT_CMD
to a command that outputs your GitHub personal access token, e.g._GH_PAT_CMD="pass github_pat"
Note
The hook assumes one is using zsh
. The shebang can be changed to
any other shell, but it's best to invoke it with the right flags to get an
interactive, login shell. Useful to get access to custom functions and aliases.
That's it! (phew) - now try pushing to the proxy
remote and check
if the GitHub Actions workflow run logs are streaming right back:
cd your-original-repo
git commit --allow-empty -m 'test octotail'
git push proxy