Skip to content

fix: add github/gh-aw to log analyzer allowed-repos#3866

Merged
lpcox merged 1 commit intomainfrom
fix/log-analyzer-allowed-repos
Apr 15, 2026
Merged

fix: add github/gh-aw to log analyzer allowed-repos#3866
lpcox merged 1 commit intomainfrom
fix/log-analyzer-allowed-repos

Conversation

@lpcox
Copy link
Copy Markdown
Collaborator

@lpcox lpcox commented Apr 15, 2026

Problem

The MCP Gateway Log Analyzer workflow failed (#3836) because the agent couldn't access github/gh-aw resources due to two configuration issues:

  1. allowed-repos missing gh-aw — The workflow's purpose is to analyze logs from github/gh-aw workflow runs, but only github/gh-aw-mcpg was in the allowed-repos list
  2. min-integrity: unapproved too restrictive — Resources in gh-aw have lower integrity levels, causing the guard to filter all MCP tool calls targeting that repo

The agent reported:

All GitHub MCP tool calls targeting github/gh-aw are filtered by integrity policy: "Resource has lower integrity than agent requires."

Fix

  • Add github/gh-aw to allowed-repos so the agent can access the target repo
  • Lower min-integrity to none — appropriate since the workflow is read-only log analysis (no code modifications)
  • Recompile lock file

Verification

  • gh aw compile mcp-gateway-log-analyzer succeeds
  • make agent-finished passes all checks

Closes #3836

…egrity

The MCP Gateway Log Analyzer workflow (#3836) failed because the agent
could not access github/gh-aw resources. The workflow's entire purpose
is to analyze logs from gh-aw workflow runs, but:

1. allowed-repos only listed github/gh-aw-mcpg (missing gh-aw)
2. min-integrity: unapproved blocked gh-aw resources that have lower
   integrity levels

Changes:
- Add github/gh-aw to allowed-repos list
- Lower min-integrity to none (workflow is read-only log analysis)
- Recompile lock file

Closes #3836

Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
Copilot AI review requested due to automatic review settings April 15, 2026 14:49
Copy link
Copy Markdown
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

This PR fixes the MCP Gateway Log Analyzer agent workflow configuration so it can successfully read and analyze workflow logs from the intended target repository (github/gh-aw) without being blocked by repo allowlisting or integrity filtering.

Changes:

  • Added github/gh-aw to the GitHub tool allowed-repos list for the log analyzer workflow.
  • Lowered min-integrity from unapproved to none to allow reads from lower-integrity resources in github/gh-aw.
  • Regenerated the compiled workflow lockfile to reflect the updated frontmatter/tool guard policy configuration.
Show a summary per file
File Description
.github/workflows/mcp-gateway-log-analyzer.md Expands GitHub MCP repo allowlist and relaxes integrity requirement to enable read-only analysis of github/gh-aw.
.github/workflows/mcp-gateway-log-analyzer.lock.yml Recompiled lockfile updates embedded guard policy JSON (repos + min-integrity) and related metadata hashes.

Copilot's findings

Tip

Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

  • Files reviewed: 2/2 changed files
  • Comments generated: 0

@lpcox lpcox merged commit c4315a0 into main Apr 15, 2026
13 checks passed
@lpcox lpcox deleted the fix/log-analyzer-allowed-repos branch April 15, 2026 14:52
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

[aw] MCP Gateway Log Analyzer failed

2 participants