Skip to content

Add custom server certificate support #2110

Add custom server certificate support

Add custom server certificate support #2110

Triggered via pull request April 30, 2026 13:44
Status Failure
Total duration 52m 35s
Artifacts 12

test.yml

on: pull_request
Matrix: tests
Matrix: upgrade
Test suite
5s
Test suite
Fit to window
Zoom out
Zoom in

Annotations

3 errors and 2 warnings
Tests (certificates: custom_server, database: internal, security: none, box: centos/stream9)
Failed to start upterm - socket not found after maximum retries. Diagnostics: - Upterm data directory: /tmp/upterm-data - Expected socket directory: /tmp/upterm-data/runtime/upterm - Socket directory does not exist - Tmux sessions: No tmux sessions - Tmux error log: - Upterm command output: Error: error reading GitHub user keys: Get "https://github.com/ehelms.keys": context deadline exceeded (Client.Timeout exceeded while awaiting headers) Usage: upterm host [flags] Examples: # Host a terminal session running $SHELL, attaching client's IO to the host's: upterm host # Accept client connections automatically without prompts: upterm host --accept # Host a terminal session allowing only specified public key(s) to connect: upterm host --authorized-keys PATH_TO_AUTHORIZED_KEY_FILE # Host a session executing a custom command: upterm host -- docker run --rm -ti ubuntu bash # Host a 'tmux new -t pair-programming' session, forcing clients to join with 'tmux attach -t pair-programming': upterm host --force-command 'tmux attach -t pair-programming' -- tmux new -t pair-programming # Use a different Uptermd server, hosting a session via WebSocket: upterm host --server wss://YOUR_UPTERMD_SERVER -- YOUR_COMMAND Flags: --accept Automatically accept client connections without prompts. --authorized-keys string Specify a authorize_keys file listing authorized public keys for connection. --codeberg-user strings Authorize specified Codeberg users by allowing their public keys to connect. -f, --force-command string Enforce a specified command for clients to join, and link the command's input/output to the client's terminal. --github-user strings Authorize specified GitHub users by allowing their public keys to connect. Configure GitHub CLI environment variables as needed; see https://cli.github.com/manual/gh_help_environment for details. --gitlab-user strings Authorize specified GitLab users by allowing their public keys to connect. -h, --help help for host --hide-client-ip Hide client IP addresses from output (auto-enabled in CI environments). --known-hosts string Specify a file containing known keys for remote hosts (required). (default "/home/runner/.ssh/known_hosts") --no-sftp Disable file transfer via SFTP/SCP. By default, clients can transfer files with the same access as the terminal session. -i, --private-key strings Specify private key files for public key authentication with the upterm server (required). (default [/home/runner/.ssh/id_ed25519,/home/runner/.ssh/id_rsa]) -r, --read-only Host a read-only session, preventing client interaction. Also restricts SFTP to download-only. --server string Specify the upterm server address (required). Supported protocols: ssh, ws, wss. (default "ssh://uptermd.upterm.dev:22") --skip-host-key-check Automatically accept unknown server host keys and add them to known_hosts (similar to SSH's StrictHostKeyChecking=accept-new). This bypasses host key verification for new connections. --srht-user strings Authorize specified SourceHut users by allowing their public keys to connect. Global Flags: --debug enable debug level logging (log file: /tmp/upterm-data/state/upterm/upterm.log). 2026/04/30 14:00:40 ERROR Error executing command error="error reading GitHub user keys: Get \"https://github.com/ehelms.keys\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)" - Upterm binary check: Upterm version 0.22.0 Git commit: 1d809fde337afd99c149978ee08b37b16fe11a6f Build date: 2026-01-14T05:11:39Z - XDG_RUNTIME_DIR (passed to upterm): /tmp/upterm-data/runtime - XDG_RUNTIME_DIR (actual directory): /tmp/upterm-data/runtime - USER: runner - UID: 1001 - Platform: linux === Troubleshooting Steps === 1. Check tmux and upterm are installed and in PATH 2. Verify upterm-server setting is correct 3. Check network connectivity to upterm server 4. Review
Test suite
Process completed with exit code 1.
Tests (certificates: custom_server, database: internal, security: none, box: centos/stream9)
Node.js 20 actions are deprecated. The following actions are running on Node.js 20 and may not work as expected: owenthereal/action-upterm@v1. Actions will be forced to run with Node.js 24 by default starting June 2nd, 2026. Node.js 20 will be removed from the runner on September 16th, 2026. Please check if updated versions of these actions are available that support Node.js 24. To opt into Node.js 24 now, set the FORCE_JAVASCRIPT_ACTIONS_TO_NODE24=true environment variable on the runner or in your workflow file. Once Node.js 24 becomes the default, you can temporarily opt out by setting ACTIONS_ALLOW_USE_UNSECURE_NODE_VERSION=true. For more information see: https://github.blog/changelog/2025-09-19-deprecation-of-node-20-on-github-actions-runners/
Tests (certificates: custom_server, database: internal, security: none, box: centos/stream9)
No files were found with the provided path: /home/runner/smoker/report/. No artifacts will be uploaded.

Artifacts

Produced during runtime
Name Size Digest
smoker-default-fapolicyd-internal-centosstream9
21.4 MB
sha256:405c1bc9504d3de67ac6d6da36028e1c03609b250e02c206a6b1a9148a000446
smoker-default-none-external-centosstream9
21.4 MB
sha256:bb29da5330c9e0bc3873ba9c3e5793afbed6654bdddf0a5eedd5715a17fd8962
smoker-default-none-internal-centosstream10
21.4 MB
sha256:fb441ab0db47fafe9f12c369458435909811a39815f9117ff7d9cf9d58bb32a3
smoker-default-none-internal-centosstream9
21.3 MB
sha256:21c66785ecee1f4a02b6c1177ab774857a63115c54cb78dc442b73f6a7835465
smoker-installer-none-internal-centosstream9
21.5 MB
sha256:08c446e8065c1a949aa838af8d516d17543740b8099cb93de609e4f46547d816
sosreport-customserver-none-internal-centosstream9
20.7 MB
sha256:e29feefcfea4153f38a608cf9a8040b84b7633e8c68d125a5dd19b822b646dd3
sosreport-default-fapolicyd-internal-centosstream9
21.5 MB
sha256:78f6d3cf74aa2eaeb03c8def09e783a62f60f848371767787647f1c60c0a19a9
sosreport-default-none-external-centosstream9
21.3 MB
sha256:965d5fb1c0a8d82c060f8536b5765a6d44d583c6da7f17ae892fdd150cda6458
sosreport-default-none-internal-centosstream10
21.2 MB
sha256:cb036803e766f50372385bfd590f0c048a93567e97ca5e90f2408fa02bf5e9dd
sosreport-default-none-internal-centosstream9
21.4 MB
sha256:2f984c364748e735bc283ca1ae591e07e4da2ac974ca82d3610a4641317aa27d
sosreport-installer-none-internal-centosstream9
21.7 MB
sha256:0e15d09ceaae606c494e841574632f5434b11ba65ed29458cd838435cb230624
sosreport-upgrade
21.5 MB
sha256:1eb31fb6c4e3c68cf4cfe005d45669e478801e4f3f8a2b0860ccdaa36c825e0f