cli VS act

Compare cli vs act and see what are their differences.

cli

🖥️ Depot CLI, build your Docker images in the cloud (by depot)

act

Run your GitHub Actions locally 🚀 (by nektos)
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
cli act
67 146
110 50,914
7.3% 2.9%
9.3 9.2
3 days ago 1 day ago
Go Go
MIT License MIT License
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

cli

Posts with mentions or reviews of cli. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-04-04.
  • Show HN: Managed GitHub Actions Runners for AWS
    6 projects | news.ycombinator.com | 4 Apr 2024
    Hey HN! I'm Jacob, one of the founders of Depot (https://depot.dev), a build service for Docker images, and I'm excited to show what we’ve been working on for the past few months: run GitHub Actions jobs in AWS, orchestrated by Depot!

    Here's a video demo: https://www.youtube.com/watch?v=VX5Z-k1mGc8, and here’s our blog post: https://depot.dev/blog/depot-github-actions-runners.

    While GitHub Actions is one of the most prevalent CI providers, Actions is slow, for a few reasons: GitHub uses underpowered CPUs, network throughput for cache and the internet at large is capped at 1 Gbps, and total cache storage is limited to 10GB per repo. It is also rather expensive for runners with more than 2 CPUs, and larger runners frequently take a long time to start running jobs.

    Depot-managed runners solve this! Rather than your CI jobs running on GitHub's slow compute, Depot routes those same jobs to fast EC2 instances. And not only is this faster, it’s also 1/2 the cost of GitHub Actions!

    We do this by launching a dedicated instance for each job, registering that instance as a self-hosted Actions runner in your GitHub organization, then terminating the instance when the job is finished. Using AWS as the compute provider has a few advantages:

    - CPUs are typically 30%+ more performant than alternatives (the m7a instance type).

    - Each instance has high-throughput networking of up to 12.5 Gbps, hosted in us-east-1, so interacting with artifacts, cache, container registries, or the internet at large is quick.

    - Each instance has a public IPv4 address, so it does not share rate limits with anyone else.

    We integrated the runners with the distributed cache system (backed by S3 and Ceph) that we use for Docker build cache, so jobs automatically save / restore cache from this cache system, with speeds of up to 1 GB/s, and without the default 10 GB per repo limit.

    Building this was a fun challenge; some matrix workflows start 40+ jobs at once, then requiring 40 EC2 instances to launch at once.

    We’ve effectively gotten very good at starting EC2 instances with a "warm pool" system which allows us to prepare many EC2 instances to run a job, stop them, then resize and start them when an actual job request arrives, to keep job queue times around 5 seconds. We're using a homegrown orchestration system, as alternatives like autoscaling groups or Kubernetes weren't fast or secure enough.

    There are three alternatives to our managed runners currently:

    1. GitHub offers larger runners: these have more CPUs, but still have slow network and cache. Depot runners are also 1/2 the cost per minute of GitHub's runners.

    2. You can self-host the Actions runner on your own compute: this requires ongoing maintenance, and it can be difficult to ensure that the runner image or container matches GitHub's.

    3. There are other companies offering hosted GitHub Actions runners, though they frequently use cheaper compute hosting providers that are bottlenecked on network throughput or geography.

    Any feedback is very welcome! You can sign up at https://depot.dev/sign-up for a free trial if you'd like to try it out on your own workflows. We aren't able to offer a trial without a signup gate, both because using it requires installing a GitHub app, and we're offering build compute, so we need some way to keep out the cryptominers :)

  • Show HN: Open-source x64 and Arm GitHub runners. Reduces GitHub Actions bill 10x
    7 projects | news.ycombinator.com | 30 Jan 2024
    Depot [0] founder here. Thanks for the mention. We're also planning on bringing a bit of a different take to GitHub Action runners that's not tied to Hetzner directly. It will be entirely open-source as well, so you can take it and run it on your own instances if you'd like. Similar to how Depot supports self-hosted builders in your own AWS account [1].

    [0] https://depot.dev/

    [1] https://depot.dev/docs/self-hosted/architecture

  • Dive: A tool for exploring a Docker image, layer contents and more
    4 projects | news.ycombinator.com | 8 Jan 2024
    Dive is an amazing tool in the container/Docker space. It makes life so much easier to debug what is actually in your container. When we were first getting started with Depot [0], we often got asked how to reduce image size as well as make builds faster. So we wrote up a quick blog post that shows how to use Dive to help with that problem [1]. It might be a bit dated now, but in case it helps a future person.

    Dive also inspired us to make it easier to surface what is actually in your build context, on every build. So we shipped that as a feature in Depot a few weeks back.

    [0] https://depot.dev

  • Build Docker images faster using build cache
    1 project | dev.to | 7 Jan 2024
    If you want to learn more about how Depot can help you optimize your Docker image builds, sign up for our free trial.
  • Show HN: WarpBuild – x86-64 and arm GitHub Action runners for 30% faster builds
    10 projects | news.ycombinator.com | 8 Dec 2023
    We have this with https://depot.dev out of the box. You connect to a native BuildKit and run your Docker image build on native Intel and Arm CPUs with fast persistent SSD cache orchestrated across builds. It’s immediately there on the next build without having to save/load it over the network.
  • Launch HN: Loops (YC W22) – Email for SaaS Companies
    2 projects | news.ycombinator.com | 21 Sep 2023
    We use Loops to power the core of our email things for Depot [0] and it's been quite a breeze to use.

    I think there are some logic things to get right at the API level, like should I use events or contact properties to trigger loops? We're working on some of that and wish the guidance was a bit better/clearer, at the moment, any properties you send with an event get added to the contact, so it seems like contact properties are the way to go.

    My last request would be to support array properties on contacts as a given contact could be in multiple "things".

    [0] https://depot.dev/

  • Show HN: An OIDC issuer for GitHub Actions pull_request workflows
    2 projects | news.ycombinator.com | 19 Jul 2023
    We encountered a specific GitHub Actions restriction at Depot[0]: for pull_request workflows that originate from open-source forks, Actions disables access to all repository secrets and to the Actions OIDC issuer, as a security mechanism to deny untrusted code access to those secrets.

    But we needed a way to authenticate our CLI within those public workflows. This OIDC issuer is the result of that need, and works like so:

    1. The pull_request workflow makes a "claim request" to the OIDC issuer, claiming certain details about the workflow like the ID, run ID, repository, etc.

    2. The OIDC issuer responds with a "challenge code" that the workflow must periodically print to its logs

    3. The OIDC issuer connects to the GitHub Actions websocket endpoint for log streaming, validates that the challenge code is being printed, then returns a new OIDC token to the workflow

    This is working well for us, and lets us acquire an OIDC token similar to the GitHub Actions native OIDC token. The issuer itself runs as a Cloudflare Worker.

    Happy to answer questions and I'd love any feedback you may have!

    [0] https://depot.dev

  • Show HN: depot.ai – easily embed ML / AI models in your Dockerfile
    3 projects | news.ycombinator.com | 18 Jul 2023
    To optimize build speed, cache hits, and registry storage, we're building each image reproducibly and indexing the contents with eStargz[0]. The image is stored on Cloudflare R2, and served via a Cloudflare Worker. Everything is open source[1]!

    Compared to alternatives like `git lfs clone` or downloading your model at runtime, embedding it with `COPY` produces layers that are cache-stable, with identical hash digests across rebuilds. This means they can be fully cached, even if your base image or source code changes.

    And for Docker builders that enable eStargz, copying single files from the image will download only the requested files. eStargz can be enabled in a variety of image builders[2], and we’ve enabled it by default on Depot[3].

    Here’s an announcement post with more details: https://depot.dev/blog/depot-ai.

    We’d love to hear any feedback you may have!

    [0] https://github.com/containerd/stargz-snapshotter/blob/main/docs/estargz.md

    [1] https://github.com/depot/depot.ai

    [2] https://github.com/containerd/stargz-snapshotter/blob/main/docs/integration.md#image-builders

    [3] https://depot.dev

  • Launch HN: Resend (YC W23) – Email API for Developers Using React
    11 projects | news.ycombinator.com | 13 Jun 2023
    We use Resend for our transactional email at https://depot.dev after migrating away from Postmark following their acquisition. It's been awesome so far and because our app is Remix underneath the hood, it was delightfully easy to get our emails exactly how we wanted them.

    The visibility into what emails have been sent, to who, and what the content was is also incredibly helpful when we are talking about transactional emails. Double bonus for being able to share that email as well.

  • Docker layer cache is better when shared with your team.
    1 project | /r/u_depotdev | 19 May 2023

act

Posts with mentions or reviews of act. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-04-28.
  • Create a Custom GitHub Action in Rust
    3 projects | dev.to | 28 Apr 2024
    To speed up your development cycle, install and use the act tool to test-run your action directly in your development environment. This tool lets you invoke a GitHub workflow right on your local machine and will save you the round-trips of pushing each change to GitHub to see if it works.
  • How to debug GitHub actions. Real-world example
    3 projects | dev.to | 27 Mar 2024
    When it comes to the alternatives to tmate, there is another great debugging tool that you could check out. It is called act and it allows you to run GitHub Actions code on your local machine making debugging even easier. It has its own limitations and some learning curve but overall it is another tool you should use if you can’t fix the CI bugs by connecting directly into the running action with the tmate.
  • Using my new Raspberry Pi to run an existing GitHub Action
    2 projects | news.ycombinator.com | 11 Mar 2024
    Link: https://github.com/nektos/act
  • Show HN: Open-source x64 and Arm GitHub runners. Reduces GitHub Actions bill 10x
    7 projects | news.ycombinator.com | 30 Jan 2024
    Could you upload your build of GitHub's runner image to Docker Hub?

    This would be quite useful for users of other GitHub Actions clones like act [0].

    [0]: https://github.com/nektos/act

  • Git commit messages are useless
    1 project | news.ycombinator.com | 25 Jan 2024
    > These kinds of commit messages are typically an indicator of a broken process where somebody needs to commit to see something happen, like a deployment or build process, and aren't able to assert that stuff works locally.

    This is one of my biggest pet peeves with services like github actions. Something running locally like "act" [1] isn't sufficient because it doesn't have everything github has and is extra friction anyway to get everyone to use it for testing.

    [1] https://github.com/nektos/act

  • Essential Command Line Tools for Developers
    29 projects | dev.to | 15 Jan 2024
    View on GitHub
  • What’s with DevOps engineers using `make` of all things?
    17 projects | /r/devops | 6 Dec 2023
    If you use Github actions, act is incredibly useful. It can be used to test your GH actions, but also serves as an interface for running tasks locally.
  • Streamlining CI/CD Pipelines with Code: A Developer's Guide
    2 projects | news.ycombinator.com | 21 Nov 2023
    That's something that often is difficult or basically impossible. Except for maybe GitHub actions through Act (https://github.com/nektos/act). I'd still lean to something in the yaml sphere if it eventually would be used in deployment pipelines and such. For example a solution incorporating ansible.

    It also seems to me that the argument you make is mostly focused on the building step? Earthly certainly seems focused on that aspect.

  • GitHub Actions Are a Problem
    19 projects | news.ycombinator.com | 12 Nov 2023
    I feel I'm being trolled, but I'll bite and accept the resulting downvotes

    I don't think treating every mention of act as an opportunity for airing of personal grievances is helpful in a discussion when there's already ample reports of people's concrete issues with it, had one looked at the 800 issues in its repo https://github.com/nektos/act/issues?q=is%3Aissue or the 239 from gitea's for https://gitea.com/gitea/act_runner/issues or whatever is going on with Forgejo's fork https://code.forgejo.org/forgejo/act .

    But, as for me specifically, there are two and a half answers: I wanted to run VSCodium's build locally, which act for sure puked about. Then, while trying to troubleshoot that, I thought I'd try something simpler and have it run the lint job from act's own repo <https://github.com/nektos/act/blob/1252e551b8672b1e16dc8835d...> to rule out "you're holding it wrong" type junk. It died with

      [checks/lint]     Failure - Main actions/setup-go@v3
  • How Steve Jobs Saved Apple with the Online Apple Store
    2 projects | news.ycombinator.com | 10 Nov 2023
    https://twitter.com/mitsuhiko/status/1720410479141487099 :

    > GitHub Actions currently charges $0.16 per minute* for the macOS M1 Runners. That comes out to $84,096 for 1 machine year*

    GitHub Runner is written in Go; it fetches tasks from GitHub Actions and posts the results back to the Pull Request that spawned the build.

    nektos/act is how Gitea Actions builds GitHub Actions workflow YAML build definition documents. https://github.com/nektos/act

    https://twitter.com/MatthewCroughan/status/17200423527675700... :

    > This is the macOS Ventura installer running in 30 VMs, in 30 #nix derivations at once. It gets the installer from Apple, automates the installation using Tesseract OCR and TCL Expect scripts. This is to test the repeatability. A single function call `makeDarwinImage`.

    With a Multi-Stage Dockerfile/Containerfild, you can have a dev environment like xcode or gcc+make in the first stage that builds the package, and then the second stage the package is installed and tested, and then the package is signed and published to a package repo / app store / OCI container image repository.

    SLSA now specifies builders for signing things correctly in CI builds with keys in RAM on the build workers.

    "Build your own SLSA 3+ provenance builder on GitHub Actions" https://slsa.dev/blog/2023/08/bring-your-own-builder-github

What are some alternatives?

When comparing cli and act you can also consider the following projects:

lime - New standard library and runtime for the D programming language

reverse-rdp-windows-github-actions - Reverse Remote Desktop into Windows on GitHub Actions for Debugging and/or Job Introspection [GET https://api.github.com/repos/nelsonjchen/reverse-rdp-windows-github-actions: 403 - Repository access blocked]

plane - A distributed system for running WebSocket services at scale.

cache - Cache dependencies and build outputs in GitHub Actions

windmill - Open-source developer platform to turn scripts into workflows and UIs. Fastest workflow engine (5x vs Airflow). Open-source alternative to Airplane and Retool.

dagger - Application Delivery as Code that Runs Anywhere

fasten-onprem - Fasten is an open-source, self-hosted, personal/family electronic medical record aggregator, designed to integrate with 100,000's of insurances/hospitals/clinics

earthly - Super simple build framework with fast, repeatable builds and an instantly familiar syntax – like Dockerfile and Makefile had a baby.

resend-node - resend's node.js sdk

action-tmate - Debug your GitHub Actions via SSH by using tmate to get access to the runner system itself.

resend-java - Resend's Java SDK

LSPatch - LSPatch: A non-root Xposed framework extending from LSPosed