diff --git a/.github/workflows/ace-editor.lock.yml b/.github/workflows/ace-editor.lock.yml index 5ac9b68bc4..6526c68b59 100644 --- a/.github/workflows/ace-editor.lock.yml +++ b/.github/workflows/ace-editor.lock.yml @@ -379,14 +379,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): diff --git a/.github/workflows/agent-persona-explorer.lock.yml b/.github/workflows/agent-persona-explorer.lock.yml index bc4873d17d..ccee4995d5 100644 --- a/.github/workflows/agent-persona-explorer.lock.yml +++ b/.github/workflows/agent-persona-explorer.lock.yml @@ -748,14 +748,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -977,15 +969,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/bot-detection.lock.yml b/.github/workflows/bot-detection.lock.yml index 21d8d62c10..ba81ab6d15 100644 --- a/.github/workflows/bot-detection.lock.yml +++ b/.github/workflows/bot-detection.lock.yml @@ -819,14 +819,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): diff --git a/.github/workflows/chroma-issue-indexer.lock.yml b/.github/workflows/chroma-issue-indexer.lock.yml index 01538694b3..5019dcd1b9 100644 --- a/.github/workflows/chroma-issue-indexer.lock.yml +++ b/.github/workflows/chroma-issue-indexer.lock.yml @@ -403,14 +403,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): diff --git a/.github/workflows/ci-doctor.lock.yml b/.github/workflows/ci-doctor.lock.yml index c4b5978128..4f6cf37697 100644 --- a/.github/workflows/ci-doctor.lock.yml +++ b/.github/workflows/ci-doctor.lock.yml @@ -920,14 +920,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1149,15 +1141,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/code-simplifier.lock.yml b/.github/workflows/code-simplifier.lock.yml index 5233658201..f75ec3ac11 100644 --- a/.github/workflows/code-simplifier.lock.yml +++ b/.github/workflows/code-simplifier.lock.yml @@ -697,14 +697,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -921,15 +913,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/constraint-solving-potd.lock.yml b/.github/workflows/constraint-solving-potd.lock.yml index edc29f33d1..c0d19a89c9 100644 --- a/.github/workflows/constraint-solving-potd.lock.yml +++ b/.github/workflows/constraint-solving-potd.lock.yml @@ -651,14 +651,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -881,15 +873,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/contribution-check.lock.yml b/.github/workflows/contribution-check.lock.yml index 472c28f9a2..b1e5484b23 100644 --- a/.github/workflows/contribution-check.lock.yml +++ b/.github/workflows/contribution-check.lock.yml @@ -771,14 +771,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -994,15 +986,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/daily-cli-tools-tester.lock.yml b/.github/workflows/daily-cli-tools-tester.lock.yml index 37cd4bafad..71c0be5ccd 100644 --- a/.github/workflows/daily-cli-tools-tester.lock.yml +++ b/.github/workflows/daily-cli-tools-tester.lock.yml @@ -750,14 +750,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -973,15 +965,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/daily-firewall-report.lock.yml b/.github/workflows/daily-firewall-report.lock.yml index 7036253a5f..67a49718c7 100644 --- a/.github/workflows/daily-firewall-report.lock.yml +++ b/.github/workflows/daily-firewall-report.lock.yml @@ -811,14 +811,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1052,15 +1044,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/daily-performance-summary.lock.yml b/.github/workflows/daily-performance-summary.lock.yml index fcd634a5b3..70f12820a0 100644 --- a/.github/workflows/daily-performance-summary.lock.yml +++ b/.github/workflows/daily-performance-summary.lock.yml @@ -1284,14 +1284,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1536,15 +1528,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/daily-regulatory.lock.yml b/.github/workflows/daily-regulatory.lock.yml index e019bd8595..ea88c62ada 100644 --- a/.github/workflows/daily-regulatory.lock.yml +++ b/.github/workflows/daily-regulatory.lock.yml @@ -1201,14 +1201,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1435,15 +1427,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/daily-semgrep-scan.lock.yml b/.github/workflows/daily-semgrep-scan.lock.yml index 97c4798ef1..b9d4f3b0a0 100644 --- a/.github/workflows/daily-semgrep-scan.lock.yml +++ b/.github/workflows/daily-semgrep-scan.lock.yml @@ -713,14 +713,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -936,15 +928,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/daily-team-status.lock.yml b/.github/workflows/daily-team-status.lock.yml index b99cda0f22..e060bc7f1d 100644 --- a/.github/workflows/daily-team-status.lock.yml +++ b/.github/workflows/daily-team-status.lock.yml @@ -691,14 +691,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -914,15 +906,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/dependabot-burner.lock.yml b/.github/workflows/dependabot-burner.lock.yml index 686567cdee..66b93ef8ef 100644 --- a/.github/workflows/dependabot-burner.lock.yml +++ b/.github/workflows/dependabot-burner.lock.yml @@ -683,14 +683,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -906,15 +898,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/dependabot-go-checker.lock.yml b/.github/workflows/dependabot-go-checker.lock.yml index a8119bc3b4..bfbfb79417 100644 --- a/.github/workflows/dependabot-go-checker.lock.yml +++ b/.github/workflows/dependabot-go-checker.lock.yml @@ -732,14 +732,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -955,15 +947,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/example-permissions-warning.lock.yml b/.github/workflows/example-permissions-warning.lock.yml index 6413c1646f..eab3175d2f 100644 --- a/.github/workflows/example-permissions-warning.lock.yml +++ b/.github/workflows/example-permissions-warning.lock.yml @@ -352,14 +352,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): diff --git a/.github/workflows/firewall.lock.yml b/.github/workflows/firewall.lock.yml index 11689cdd52..0e560d6dc1 100644 --- a/.github/workflows/firewall.lock.yml +++ b/.github/workflows/firewall.lock.yml @@ -354,14 +354,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): diff --git a/.github/workflows/functional-pragmatist.lock.yml b/.github/workflows/functional-pragmatist.lock.yml index 800069cc5d..fd9cee2c67 100644 --- a/.github/workflows/functional-pragmatist.lock.yml +++ b/.github/workflows/functional-pragmatist.lock.yml @@ -687,14 +687,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -911,15 +903,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/github-remote-mcp-auth-test.lock.yml b/.github/workflows/github-remote-mcp-auth-test.lock.yml index 5f79200c6f..05f761aa9e 100644 --- a/.github/workflows/github-remote-mcp-auth-test.lock.yml +++ b/.github/workflows/github-remote-mcp-auth-test.lock.yml @@ -666,14 +666,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -889,15 +881,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/glossary-maintainer.lock.yml b/.github/workflows/glossary-maintainer.lock.yml index 5c71a0891f..77380399ab 100644 --- a/.github/workflows/glossary-maintainer.lock.yml +++ b/.github/workflows/glossary-maintainer.lock.yml @@ -899,14 +899,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1177,15 +1169,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/gpclean.lock.yml b/.github/workflows/gpclean.lock.yml index 846f687f6a..29c74888e1 100644 --- a/.github/workflows/gpclean.lock.yml +++ b/.github/workflows/gpclean.lock.yml @@ -704,14 +704,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -933,15 +925,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/grumpy-reviewer.lock.yml b/.github/workflows/grumpy-reviewer.lock.yml index 932f0987f6..e833843098 100644 --- a/.github/workflows/grumpy-reviewer.lock.yml +++ b/.github/workflows/grumpy-reviewer.lock.yml @@ -801,14 +801,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1031,15 +1023,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/hourly-ci-cleaner.lock.yml b/.github/workflows/hourly-ci-cleaner.lock.yml index d8d916e883..686d29a791 100644 --- a/.github/workflows/hourly-ci-cleaner.lock.yml +++ b/.github/workflows/hourly-ci-cleaner.lock.yml @@ -737,14 +737,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -961,15 +953,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/issue-monster.lock.yml b/.github/workflows/issue-monster.lock.yml index 7db3b57286..ab6650f387 100644 --- a/.github/workflows/issue-monster.lock.yml +++ b/.github/workflows/issue-monster.lock.yml @@ -735,14 +735,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -958,15 +950,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/issue-triage-agent.lock.yml b/.github/workflows/issue-triage-agent.lock.yml index a993d258b6..927f1a5289 100644 --- a/.github/workflows/issue-triage-agent.lock.yml +++ b/.github/workflows/issue-triage-agent.lock.yml @@ -676,14 +676,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -899,15 +891,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/jsweep.lock.yml b/.github/workflows/jsweep.lock.yml index 5aa7c3814c..bc095cc57f 100644 --- a/.github/workflows/jsweep.lock.yml +++ b/.github/workflows/jsweep.lock.yml @@ -716,14 +716,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -946,15 +938,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/layout-spec-maintainer.lock.yml b/.github/workflows/layout-spec-maintainer.lock.yml index 4c2cf3bd38..52fd536f3f 100644 --- a/.github/workflows/layout-spec-maintainer.lock.yml +++ b/.github/workflows/layout-spec-maintainer.lock.yml @@ -687,14 +687,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -940,15 +932,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/mcp-inspector.lock.yml b/.github/workflows/mcp-inspector.lock.yml index 19a9bdc289..7075c7aa19 100644 --- a/.github/workflows/mcp-inspector.lock.yml +++ b/.github/workflows/mcp-inspector.lock.yml @@ -1048,14 +1048,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1293,15 +1285,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/mergefest.lock.yml b/.github/workflows/mergefest.lock.yml index 16f85f3b95..5e1c739bf7 100644 --- a/.github/workflows/mergefest.lock.yml +++ b/.github/workflows/mergefest.lock.yml @@ -697,14 +697,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -961,15 +953,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/metrics-collector.lock.yml b/.github/workflows/metrics-collector.lock.yml index ed1611af93..c4bc42d432 100644 --- a/.github/workflows/metrics-collector.lock.yml +++ b/.github/workflows/metrics-collector.lock.yml @@ -455,14 +455,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): diff --git a/.github/workflows/notion-issue-summary.lock.yml b/.github/workflows/notion-issue-summary.lock.yml index 78e7b83b18..ad1229a9ab 100644 --- a/.github/workflows/notion-issue-summary.lock.yml +++ b/.github/workflows/notion-issue-summary.lock.yml @@ -631,14 +631,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): diff --git a/.github/workflows/org-health-report.lock.yml b/.github/workflows/org-health-report.lock.yml index ac32f31d00..6e569e7ff6 100644 --- a/.github/workflows/org-health-report.lock.yml +++ b/.github/workflows/org-health-report.lock.yml @@ -741,14 +741,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -982,15 +974,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/pdf-summary.lock.yml b/.github/workflows/pdf-summary.lock.yml index 4377ded363..8ef6b29978 100644 --- a/.github/workflows/pdf-summary.lock.yml +++ b/.github/workflows/pdf-summary.lock.yml @@ -816,14 +816,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1046,15 +1038,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/plan.lock.yml b/.github/workflows/plan.lock.yml index c90ce88f22..8a54a4883d 100644 --- a/.github/workflows/plan.lock.yml +++ b/.github/workflows/plan.lock.yml @@ -784,14 +784,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1008,15 +1000,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/poem-bot.lock.yml b/.github/workflows/poem-bot.lock.yml index 030a4f60ec..f7b6140cce 100644 --- a/.github/workflows/poem-bot.lock.yml +++ b/.github/workflows/poem-bot.lock.yml @@ -1477,14 +1477,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1746,15 +1738,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/portfolio-analyst.lock.yml b/.github/workflows/portfolio-analyst.lock.yml index a4135e7b4e..31cec5bea8 100644 --- a/.github/workflows/portfolio-analyst.lock.yml +++ b/.github/workflows/portfolio-analyst.lock.yml @@ -822,14 +822,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1063,15 +1055,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/pr-nitpick-reviewer.lock.yml b/.github/workflows/pr-nitpick-reviewer.lock.yml index 2a65c8a417..4e694b100f 100644 --- a/.github/workflows/pr-nitpick-reviewer.lock.yml +++ b/.github/workflows/pr-nitpick-reviewer.lock.yml @@ -902,14 +902,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1132,15 +1124,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/pr-triage-agent.lock.yml b/.github/workflows/pr-triage-agent.lock.yml index 7cdebda003..3f1b7302c3 100644 --- a/.github/workflows/pr-triage-agent.lock.yml +++ b/.github/workflows/pr-triage-agent.lock.yml @@ -808,14 +808,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1040,15 +1032,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/python-data-charts.lock.yml b/.github/workflows/python-data-charts.lock.yml index e01d615129..3fd3637731 100644 --- a/.github/workflows/python-data-charts.lock.yml +++ b/.github/workflows/python-data-charts.lock.yml @@ -810,14 +810,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1051,15 +1043,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/q.lock.yml b/.github/workflows/q.lock.yml index 1e0229885c..ed5621cd39 100644 --- a/.github/workflows/q.lock.yml +++ b/.github/workflows/q.lock.yml @@ -926,14 +926,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1157,15 +1149,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/refiner.lock.yml b/.github/workflows/refiner.lock.yml index ecfc2e2abe..d6d6ee5109 100644 --- a/.github/workflows/refiner.lock.yml +++ b/.github/workflows/refiner.lock.yml @@ -757,14 +757,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -981,15 +973,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/release.lock.yml b/.github/workflows/release.lock.yml index b1e0981b14..abf0979de9 100644 --- a/.github/workflows/release.lock.yml +++ b/.github/workflows/release.lock.yml @@ -680,14 +680,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -903,15 +895,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/repo-audit-analyzer.lock.yml b/.github/workflows/repo-audit-analyzer.lock.yml index b0d294d986..91d929a658 100644 --- a/.github/workflows/repo-audit-analyzer.lock.yml +++ b/.github/workflows/repo-audit-analyzer.lock.yml @@ -682,14 +682,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -911,15 +903,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/repo-tree-map.lock.yml b/.github/workflows/repo-tree-map.lock.yml index 0e1d2ee6a9..6882f44576 100644 --- a/.github/workflows/repo-tree-map.lock.yml +++ b/.github/workflows/repo-tree-map.lock.yml @@ -658,14 +658,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -881,15 +873,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/repository-quality-improver.lock.yml b/.github/workflows/repository-quality-improver.lock.yml index 98f25aa9e4..b531c2d095 100644 --- a/.github/workflows/repository-quality-improver.lock.yml +++ b/.github/workflows/repository-quality-improver.lock.yml @@ -689,14 +689,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -918,15 +910,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/research.lock.yml b/.github/workflows/research.lock.yml index d02ddf78ea..6fbedce5c5 100644 --- a/.github/workflows/research.lock.yml +++ b/.github/workflows/research.lock.yml @@ -682,14 +682,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -907,15 +899,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/security-compliance.lock.yml b/.github/workflows/security-compliance.lock.yml index 6fbe91f05d..ada9138952 100644 --- a/.github/workflows/security-compliance.lock.yml +++ b/.github/workflows/security-compliance.lock.yml @@ -743,14 +743,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -975,15 +967,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/security-review.lock.yml b/.github/workflows/security-review.lock.yml index 3a0b3d5bca..90b9598183 100644 --- a/.github/workflows/security-review.lock.yml +++ b/.github/workflows/security-review.lock.yml @@ -880,14 +880,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1110,15 +1102,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/slide-deck-maintainer.lock.yml b/.github/workflows/slide-deck-maintainer.lock.yml index f5e836d05e..88b60f5da6 100644 --- a/.github/workflows/slide-deck-maintainer.lock.yml +++ b/.github/workflows/slide-deck-maintainer.lock.yml @@ -743,14 +743,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1013,15 +1005,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/smoke-copilot-arm.lock.yml b/.github/workflows/smoke-copilot-arm.lock.yml index 137f34a837..065faeb5b7 100644 --- a/.github/workflows/smoke-copilot-arm.lock.yml +++ b/.github/workflows/smoke-copilot-arm.lock.yml @@ -1766,14 +1766,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -2008,15 +2000,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/smoke-copilot.lock.yml b/.github/workflows/smoke-copilot.lock.yml index 96d1031bd2..69512faf09 100644 --- a/.github/workflows/smoke-copilot.lock.yml +++ b/.github/workflows/smoke-copilot.lock.yml @@ -1881,14 +1881,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -2123,15 +2115,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/smoke-multi-pr.lock.yml b/.github/workflows/smoke-multi-pr.lock.yml index 594730f084..2c682da429 100644 --- a/.github/workflows/smoke-multi-pr.lock.yml +++ b/.github/workflows/smoke-multi-pr.lock.yml @@ -785,14 +785,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1034,15 +1026,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/smoke-project.lock.yml b/.github/workflows/smoke-project.lock.yml index d1cd4c58aa..c60408b991 100644 --- a/.github/workflows/smoke-project.lock.yml +++ b/.github/workflows/smoke-project.lock.yml @@ -1243,14 +1243,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1467,15 +1459,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/smoke-temporary-id.lock.yml b/.github/workflows/smoke-temporary-id.lock.yml index a12c2f5ac0..07a2e1312b 100644 --- a/.github/workflows/smoke-temporary-id.lock.yml +++ b/.github/workflows/smoke-temporary-id.lock.yml @@ -831,14 +831,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1054,15 +1046,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/smoke-test-tools.lock.yml b/.github/workflows/smoke-test-tools.lock.yml index a5807b5e1a..8f713feb15 100644 --- a/.github/workflows/smoke-test-tools.lock.yml +++ b/.github/workflows/smoke-test-tools.lock.yml @@ -709,14 +709,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -932,15 +924,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/smoke-workflow-call-with-inputs.lock.yml b/.github/workflows/smoke-workflow-call-with-inputs.lock.yml index badb271f9e..d95e92b30c 100644 --- a/.github/workflows/smoke-workflow-call-with-inputs.lock.yml +++ b/.github/workflows/smoke-workflow-call-with-inputs.lock.yml @@ -727,14 +727,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -966,15 +958,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/smoke-workflow-call.lock.yml b/.github/workflows/smoke-workflow-call.lock.yml index b258c31803..d4f4c4e203 100644 --- a/.github/workflows/smoke-workflow-call.lock.yml +++ b/.github/workflows/smoke-workflow-call.lock.yml @@ -680,14 +680,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -923,15 +915,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/stale-repo-identifier.lock.yml b/.github/workflows/stale-repo-identifier.lock.yml index 57db6bddf6..efc916e625 100644 --- a/.github/workflows/stale-repo-identifier.lock.yml +++ b/.github/workflows/stale-repo-identifier.lock.yml @@ -814,14 +814,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1055,15 +1047,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/sub-issue-closer.lock.yml b/.github/workflows/sub-issue-closer.lock.yml index e86272f48f..861b84de2e 100644 --- a/.github/workflows/sub-issue-closer.lock.yml +++ b/.github/workflows/sub-issue-closer.lock.yml @@ -772,14 +772,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -995,15 +987,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/super-linter.lock.yml b/.github/workflows/super-linter.lock.yml index 5dfee8c3b2..1be765efb4 100644 --- a/.github/workflows/super-linter.lock.yml +++ b/.github/workflows/super-linter.lock.yml @@ -712,14 +712,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -941,15 +933,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/technical-doc-writer.lock.yml b/.github/workflows/technical-doc-writer.lock.yml index 5f3a310107..aa20ac7ea6 100644 --- a/.github/workflows/technical-doc-writer.lock.yml +++ b/.github/workflows/technical-doc-writer.lock.yml @@ -995,14 +995,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1256,15 +1248,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/terminal-stylist.lock.yml b/.github/workflows/terminal-stylist.lock.yml index e4d52c23a2..bae77e1a0c 100644 --- a/.github/workflows/terminal-stylist.lock.yml +++ b/.github/workflows/terminal-stylist.lock.yml @@ -670,14 +670,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -893,15 +885,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/test-dispatcher.lock.yml b/.github/workflows/test-dispatcher.lock.yml index c4699cb980..99f6125a2e 100644 --- a/.github/workflows/test-dispatcher.lock.yml +++ b/.github/workflows/test-dispatcher.lock.yml @@ -602,14 +602,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -825,15 +817,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/test-project-url-default.lock.yml b/.github/workflows/test-project-url-default.lock.yml index 032b9792ae..130b67a6bf 100644 --- a/.github/workflows/test-project-url-default.lock.yml +++ b/.github/workflows/test-project-url-default.lock.yml @@ -861,14 +861,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1084,15 +1076,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/test-workflow.lock.yml b/.github/workflows/test-workflow.lock.yml index 187dc998ec..abee5869be 100644 --- a/.github/workflows/test-workflow.lock.yml +++ b/.github/workflows/test-workflow.lock.yml @@ -354,14 +354,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): diff --git a/.github/workflows/tidy.lock.yml b/.github/workflows/tidy.lock.yml index c703393d0a..d5a7d3ebb7 100644 --- a/.github/workflows/tidy.lock.yml +++ b/.github/workflows/tidy.lock.yml @@ -804,14 +804,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1054,15 +1046,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/ubuntu-image-analyzer.lock.yml b/.github/workflows/ubuntu-image-analyzer.lock.yml index fe5610a7c7..92aaab847e 100644 --- a/.github/workflows/ubuntu-image-analyzer.lock.yml +++ b/.github/workflows/ubuntu-image-analyzer.lock.yml @@ -693,14 +693,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -943,15 +935,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/video-analyzer.lock.yml b/.github/workflows/video-analyzer.lock.yml index 95e7fb1eaf..aa9fb4e481 100644 --- a/.github/workflows/video-analyzer.lock.yml +++ b/.github/workflows/video-analyzer.lock.yml @@ -694,14 +694,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -934,15 +926,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/weekly-editors-health-check.lock.yml b/.github/workflows/weekly-editors-health-check.lock.yml index 6899960ef5..d6d9c617e8 100644 --- a/.github/workflows/weekly-editors-health-check.lock.yml +++ b/.github/workflows/weekly-editors-health-check.lock.yml @@ -728,14 +728,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -990,15 +982,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/weekly-issue-summary.lock.yml b/.github/workflows/weekly-issue-summary.lock.yml index 718e36b03b..e08038b515 100644 --- a/.github/workflows/weekly-issue-summary.lock.yml +++ b/.github/workflows/weekly-issue-summary.lock.yml @@ -721,14 +721,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -962,15 +954,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/weekly-safe-outputs-spec-review.lock.yml b/.github/workflows/weekly-safe-outputs-spec-review.lock.yml index 8b7c3646de..11e64cbcda 100644 --- a/.github/workflows/weekly-safe-outputs-spec-review.lock.yml +++ b/.github/workflows/weekly-safe-outputs-spec-review.lock.yml @@ -670,14 +670,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -894,15 +886,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/workflow-generator.lock.yml b/.github/workflows/workflow-generator.lock.yml index d5a87e92ee..8303561c22 100644 --- a/.github/workflows/workflow-generator.lock.yml +++ b/.github/workflows/workflow-generator.lock.yml @@ -815,14 +815,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1038,15 +1030,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/workflow-health-manager.lock.yml b/.github/workflows/workflow-health-manager.lock.yml index 21320a4871..89be3b63f9 100644 --- a/.github/workflows/workflow-health-manager.lock.yml +++ b/.github/workflows/workflow-health-manager.lock.yml @@ -905,14 +905,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1137,15 +1129,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/workflow-normalizer.lock.yml b/.github/workflows/workflow-normalizer.lock.yml index 9ed41fad36..98679ab54e 100644 --- a/.github/workflows/workflow-normalizer.lock.yml +++ b/.github/workflows/workflow-normalizer.lock.yml @@ -749,14 +749,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -972,15 +964,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/workflow-skill-extractor.lock.yml b/.github/workflows/workflow-skill-extractor.lock.yml index 9931e03a36..b8880774e1 100644 --- a/.github/workflows/workflow-skill-extractor.lock.yml +++ b/.github/workflows/workflow-skill-extractor.lock.yml @@ -741,14 +741,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -984,15 +976,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/actions/setup/sh/copilot_preflight_diagnostic.sh b/actions/setup/sh/copilot_preflight_diagnostic.sh deleted file mode 100755 index 094810fb1a..0000000000 --- a/actions/setup/sh/copilot_preflight_diagnostic.sh +++ /dev/null @@ -1,207 +0,0 @@ -#!/bin/bash -set -e - -# copilot_preflight_diagnostic.sh - Pre-flight diagnostic for Copilot engine on GHES -# -# This script performs diagnostic checks before executing Copilot CLI to provide -# clear error messages when Copilot is not properly configured on GHES instances. -# -# Checks performed: -# 1. Token exchange test - Validates COPILOT_GITHUB_TOKEN can exchange for Copilot access -# 2. GHES detection - Identifies GHES environments and validates configuration -# 3. API target validation - Ensures engine.api-target matches GITHUB_API_URL on GHES -# -# Exit codes: -# 0 - All checks passed, safe to proceed -# 1 - Critical failure, should fail the workflow - -# Check if we're on GHES (non-GitHub.com environment) -IS_GHES=false -if [ "$GITHUB_SERVER_URL" != "https://github.com" ]; then - IS_GHES=true - echo "🔍 Detected GitHub Enterprise Server environment" - echo " Server URL: $GITHUB_SERVER_URL" - echo " API URL: $GITHUB_API_URL" -fi - -# Test 1: Token exchange to Copilot inference API -echo "" -echo "🔍 Testing Copilot token exchange..." - -# Construct the token exchange endpoint -TOKEN_EXCHANGE_URL="${GITHUB_API_URL}/copilot_internal/v2/token" - -# Attempt token exchange using COPILOT_GITHUB_TOKEN -HTTP_STATUS=$(curl -s -o /tmp/copilot_token_exchange.json -w "%{http_code}" \ - -H "Authorization: Bearer ${COPILOT_GITHUB_TOKEN}" \ - -H "Accept: application/json" \ - "$TOKEN_EXCHANGE_URL" 2>&1 || echo "000") - -if [ "$HTTP_STATUS" = "200" ]; then - echo "✅ Token exchange successful (HTTP 200)" - echo " Copilot is licensed and accessible" -elif [ "$HTTP_STATUS" = "403" ]; then - # Parse error message from response - ERROR_MSG=$(cat /tmp/copilot_token_exchange.json 2>/dev/null | grep -o '"message":"[^"]*"' | cut -d'"' -f4 || echo "") - - echo "❌ Token exchange failed (HTTP 403)" - echo "" - - # Check for specific error messages - if echo "$ERROR_MSG" | grep -qi "not licensed"; then - { - echo "## ❌ Copilot Not Licensed" - echo "" - echo "The token exchange endpoint returned HTTP 403 with message:" - echo "\`\`\`" - echo "$ERROR_MSG" - echo "\`\`\`" - echo "" - echo "**This means Copilot is not licensed for this user/organization on GHES.**" - echo "" - echo "### How to fix:" - echo "1. Ask your GHES administrator to enable Copilot at the **enterprise level**" - echo "2. Ensure a Copilot seat is assigned to your user account" - echo "3. Verify your organization has Copilot enabled" - echo "" - echo "### GHES Admin Steps:" - echo "- Navigate to Enterprise settings → Copilot" - echo "- Enable Copilot for the enterprise" - echo "- Assign licenses to organizations" - echo "- Ensure users have seats assigned" - echo "" - echo "**Note:** This is a licensing issue, not a configuration problem with gh-aw." - } >> "$GITHUB_STEP_SUMMARY" - - echo "Copilot is not licensed for this user/org on GHES." >&2 - echo "Ask your GHES admin to enable Copilot at the enterprise level and assign a seat." >&2 - exit 1 - - elif echo "$ERROR_MSG" | grep -qi "not accessible by personal access token\|token type"; then - { - echo "## ❌ Incorrect Token Type" - echo "" - echo "The token exchange endpoint returned HTTP 403 with message:" - echo "\`\`\`" - echo "$ERROR_MSG" - echo "\`\`\`" - echo "" - echo "**The token type is not supported for Copilot access.**" - echo "" - echo "### How to fix:" - echo "- Ensure you're using a **fine-grained Personal Access Token** (starts with \`github_pat_\`)" - echo "- Configure the token with **Copilot Requests: Read-only** permission" - echo "- Do NOT use classic PATs (\`ghp_\`) or OAuth tokens (\`gho_\`)" - echo "" - echo "Create a fine-grained PAT at: https://${GITHUB_SERVER_URL#https://}/settings/personal-access-tokens/new" - } >> "$GITHUB_STEP_SUMMARY" - - echo "Token type is not supported for Copilot." >&2 - echo "Use a fine-grained PAT with Copilot Requests permission." >&2 - exit 1 - - else - # Generic 403 error - { - echo "## ❌ Copilot Access Denied" - echo "" - echo "The token exchange endpoint returned HTTP 403:" - echo "\`\`\`" - echo "$ERROR_MSG" - echo "\`\`\`" - echo "" - echo "**Common causes:**" - echo "- Copilot not licensed for this user/organization" - echo "- Incorrect token permissions" - echo "- Token type not supported" - echo "" - echo "Contact your GHES administrator for assistance." - } >> "$GITHUB_STEP_SUMMARY" - - echo "Token exchange failed with HTTP 403: $ERROR_MSG" >&2 - exit 1 - fi - -elif [ "$HTTP_STATUS" = "401" ]; then - { - echo "## ❌ Invalid or Expired Token" - echo "" - echo "The token exchange endpoint returned HTTP 401 (Unauthorized)." - echo "" - echo "**This means COPILOT_GITHUB_TOKEN is invalid or expired.**" - echo "" - echo "### How to fix:" - echo "1. Verify the secret is correctly configured in repository settings" - echo "2. Check if the token has expired (fine-grained PATs have expiration dates)" - echo "3. Regenerate the token if needed" - echo "4. Ensure the token has **Copilot Requests: Read-only** permission" - } >> "$GITHUB_STEP_SUMMARY" - - echo "COPILOT_GITHUB_TOKEN is invalid or expired (HTTP 401)" >&2 - exit 1 - -elif [ "$HTTP_STATUS" = "404" ]; then - { - echo "## ❌ Copilot Endpoint Not Found" - echo "" - echo "The token exchange endpoint returned HTTP 404 (Not Found)." - echo "" - echo "**This may indicate:**" - echo "- GHES version does not support Copilot" - echo "- Copilot infrastructure is not enabled on this instance" - echo "" - echo "### How to fix:" - echo "- Verify GHES version supports GitHub Copilot" - echo "- Ask your GHES admin to enable Copilot infrastructure" - echo "- Check endpoint URL: \`$TOKEN_EXCHANGE_URL\`" - } >> "$GITHUB_STEP_SUMMARY" - - echo "Copilot endpoint not found (HTTP 404) - GHES may not support Copilot" >&2 - exit 1 - -elif [ "$HTTP_STATUS" = "000" ] || [ -z "$HTTP_STATUS" ]; then - echo "âš ī¸ Could not connect to token exchange endpoint" - echo " This may indicate network issues or firewall blocking" - echo " Proceeding with Copilot execution (will fail if endpoint is truly unavailable)" - # Don't exit - let Copilot CLI fail with its own error if needed - -else - echo "âš ī¸ Unexpected response from token exchange endpoint (HTTP $HTTP_STATUS)" - echo " Proceeding with Copilot execution" - # Don't exit - unexpected statuses should not block execution -fi - -# Test 2: GHES-specific validation -if [ "$IS_GHES" = true ]; then - echo "" - echo "🔍 Running GHES-specific checks..." - - # Check if engine.api-target is set (should match GITHUB_API_URL) - # This env var would be set by the compiler if engine.api-target is configured - if [ -n "$COPILOT_API_TARGET" ]; then - if [ "$COPILOT_API_TARGET" != "$GITHUB_API_URL" ]; then - echo "âš ī¸ Warning: engine.api-target ($COPILOT_API_TARGET) does not match GITHUB_API_URL ($GITHUB_API_URL)" - echo " This may cause API routing issues" - else - echo "✅ engine.api-target matches GITHUB_API_URL" - fi - else - echo "â„šī¸ engine.api-target not configured (using default GITHUB_API_URL)" - fi - - # Verify GHES API domain is accessible - GHES_DOMAIN=$(echo "$GITHUB_API_URL" | sed -E 's|https?://([^/]+).*|\1|') - if [ -n "$GHES_DOMAIN" ]; then - echo "â„šī¸ GHES API domain: $GHES_DOMAIN" - echo " Ensure this domain is in network.allowed if using firewall" - fi -fi - -echo "" -echo "✅ Pre-flight diagnostic completed" -echo " Proceeding with Copilot CLI execution..." - -# Clean up temporary files -rm -f /tmp/copilot_token_exchange.json - -exit 0 diff --git a/pkg/workflow/copilot_engine_execution.go b/pkg/workflow/copilot_engine_execution.go index 7d13b1218c..ceeeb0d406 100644 --- a/pkg/workflow/copilot_engine_execution.go +++ b/pkg/workflow/copilot_engine_execution.go @@ -40,14 +40,6 @@ func (e *CopilotEngine) GetExecutionSteps(workflowData *WorkflowData, logFile st var steps []GitHubActionStep - // Add pre-flight diagnostic step before Copilot CLI execution - // This helps diagnose licensing and configuration issues on GHES - preflightStep := generateCopilotPreflightDiagnosticStep(workflowData) - if len(preflightStep) > 0 { - steps = append(steps, preflightStep) - copilotExecLog.Print("Added pre-flight diagnostic step") - } - // Build copilot CLI arguments based on configuration var copilotArgs []string sandboxEnabled := isFirewallEnabled(workflowData) @@ -454,51 +446,3 @@ func generateCopilotSessionFileCopyStep() GitHubActionStep { return GitHubActionStep(step) } - -// generateCopilotPreflightDiagnosticStep generates a pre-flight diagnostic step that runs -// before Copilot CLI execution to detect and report licensing/configuration issues early. -// This is especially helpful on GHES where errors are often opaque. -// -// The diagnostic checks: -// 1. Token exchange to Copilot inference API (validates licensing and token validity) -// 2. GHES-specific configuration validation (api-target, network domains) -// -// The step is skipped when: -// - copilot-requests feature is enabled (uses GitHub Actions token, no separate token needed) -// - custom command is specified (non-standard Copilot setup) -func generateCopilotPreflightDiagnosticStep(workflowData *WorkflowData) GitHubActionStep { - // Skip if copilot-requests feature is enabled (uses GitHub Actions token) - if isFeatureEnabled(constants.CopilotRequestsFeatureFlag, workflowData) { - copilotExecLog.Print("Skipping pre-flight diagnostic: copilot-requests feature enabled") - return GitHubActionStep{} - } - - // Skip if custom command is specified (non-standard setup) - if workflowData.EngineConfig != nil && workflowData.EngineConfig.Command != "" { - copilotExecLog.Print("Skipping pre-flight diagnostic: custom command specified") - return GitHubActionStep{} - } - - copilotExecLog.Print("Generating Copilot pre-flight diagnostic step") - - var step []string - step = append(step, " - name: Copilot pre-flight diagnostic") - step = append(step, " id: copilot-preflight") - step = append(step, " continue-on-error: true") - step = append(step, " env:") - - // Use COPILOT_GITHUB_TOKEN for the diagnostic - // #nosec G101 -- This is a GitHub Actions expression template, not a hardcoded credential - step = append(step, " COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }}") - step = append(step, " GITHUB_SERVER_URL: ${{ github.server_url }}") - step = append(step, " GITHUB_API_URL: ${{ github.api_url }}") - - // Pass engine.api-target if configured - if workflowData.EngineConfig != nil && workflowData.EngineConfig.APITarget != "" { - step = append(step, " COPILOT_API_TARGET: "+workflowData.EngineConfig.APITarget) - } - - step = append(step, " run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh") - - return GitHubActionStep(step) -} diff --git a/pkg/workflow/copilot_engine_test.go b/pkg/workflow/copilot_engine_test.go index 4a00755fdf..742c9c5030 100644 --- a/pkg/workflow/copilot_engine_test.go +++ b/pkg/workflow/copilot_engine_test.go @@ -126,13 +126,13 @@ func TestCopilotEngineExecutionSteps(t *testing.T) { } steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") - // GetExecutionSteps now returns 2 steps: preflight diagnostic + copilot execution - if len(steps) != 2 { - t.Fatalf("Expected 2 steps (preflight + copilot execution), got %d", len(steps)) + // GetExecutionSteps returns 1 step: copilot execution + if len(steps) != 1 { + t.Fatalf("Expected 1 execution step, got %d", len(steps)) } - // Check the execution step (second step, after preflight) - stepContent := strings.Join([]string(steps[1]), "\n") + // Check the execution step + stepContent := strings.Join([]string(steps[0]), "\n") if !strings.Contains(stepContent, "name: Execute GitHub Copilot CLI") { t.Errorf("Expected step name 'Execute GitHub Copilot CLI' in step content:\n%s", stepContent) @@ -206,13 +206,13 @@ func TestCopilotEngineExecutionStepsWithOutput(t *testing.T) { } steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") - // GetExecutionSteps now returns 2 steps: preflight + execution - if len(steps) != 2 { - t.Fatalf("Expected 2 steps (preflight + execution), got %d", len(steps)) + // GetExecutionSteps returns 1 step: execution + if len(steps) != 1 { + t.Fatalf("Expected 1 execution step, got %d", len(steps)) } - // Check the execution step (second step) - stepContent := strings.Join([]string(steps[1]), "\n") + // Check the execution step + stepContent := strings.Join([]string(steps[0]), "\n") // Test that GH_AW_SAFE_OUTPUTS is present when SafeOutputs is not nil if !strings.Contains(stepContent, "GH_AW_SAFE_OUTPUTS: ${{ env.GH_AW_SAFE_OUTPUTS }}") { @@ -570,13 +570,12 @@ func TestCopilotEngineExecutionStepsWithToolArguments(t *testing.T) { } steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") - // GetExecutionSteps only returns the execution step - if len(steps) != 2 { - t.Fatalf("Expected 2 steps (preflight + execution), got %d", len(steps)) + if len(steps) != 1 { + t.Fatalf("Expected 1 execution step, got %d", len(steps)) } // Check the execution step contains tool arguments - stepContent := strings.Join([]string(steps[1]), "\n") + stepContent := strings.Join([]string(steps[0]), "\n") // Should contain the tool arguments in the command line if !strings.Contains(stepContent, "--allow-tool shell(echo)") { @@ -656,12 +655,11 @@ func TestCopilotEngineEditToolAddsAllowAllPaths(t *testing.T) { } steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") - // GetExecutionSteps only returns the execution step - if len(steps) != 2 { - t.Fatalf("Expected 2 steps, got %d", len(steps)) + if len(steps) != 1 { + t.Fatalf("Expected 1 step, got %d", len(steps)) } - stepContent := strings.Join([]string(steps[1]), "\n") + stepContent := strings.Join([]string(steps[0]), "\n") // Check for --allow-all-paths flag hasAllowAllPaths := strings.Contains(stepContent, "--allow-all-paths") @@ -703,13 +701,12 @@ func TestCopilotEngineShellEscaping(t *testing.T) { } steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") - // GetExecutionSteps only returns the execution step - if len(steps) != 2 { - t.Fatalf("Expected 2 steps, got %d", len(steps)) + if len(steps) != 1 { + t.Fatalf("Expected 1 step, got %d", len(steps)) } // Get the full command from the execution step - stepContent := strings.Join([]string(steps[1]), "\n") + stepContent := strings.Join([]string(steps[0]), "\n") // Find the line that contains the copilot command // When firewall is disabled, it uses 'copilot' instead of 'npx' @@ -750,13 +747,12 @@ func TestCopilotEngineInstructionPromptNotEscaped(t *testing.T) { } steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") - // GetExecutionSteps only returns the execution step - if len(steps) != 2 { - t.Fatalf("Expected 2 steps, got %d", len(steps)) + if len(steps) != 1 { + t.Fatalf("Expected 1 step, got %d", len(steps)) } // Get the full command from the execution step - stepContent := strings.Join([]string(steps[1]), "\n") + stepContent := strings.Join([]string(steps[0]), "\n") // Find the line that contains the copilot command // When firewall is disabled, it uses 'copilot' instead of 'npx' @@ -881,13 +877,12 @@ func TestCopilotEngineGitHubToolsShellEscaping(t *testing.T) { } steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") - // GetExecutionSteps only returns the execution step - if len(steps) != 2 { - t.Fatalf("Expected 2 steps, got %d", len(steps)) + if len(steps) != 1 { + t.Fatalf("Expected 1 step, got %d", len(steps)) } // Get the full command from the execution step - stepContent := strings.Join([]string(steps[1]), "\n") + stepContent := strings.Join([]string(steps[0]), "\n") // Find the line that contains the copilot command // When firewall is disabled, it uses 'copilot' instead of 'npx' @@ -1041,12 +1036,11 @@ func TestCopilotEngineExecutionStepsWithCacheMemory(t *testing.T) { } steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") - // GetExecutionSteps only returns the execution step - if len(steps) != 2 { - t.Fatalf("Expected 2 steps, got %d", len(steps)) + if len(steps) != 1 { + t.Fatalf("Expected 1 step, got %d", len(steps)) } - stepContent := strings.Join([]string(steps[1]), "\n") + stepContent := strings.Join([]string(steps[0]), "\n") // Test that mkdir commands are present for cache-memory directories if !strings.Contains(stepContent, "mkdir -p /tmp/gh-aw/cache-memory/") { @@ -1081,12 +1075,11 @@ func TestCopilotEngineExecutionStepsWithCustomAddDirArgs(t *testing.T) { } steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") - // GetExecutionSteps only returns the execution step - if len(steps) != 2 { - t.Fatalf("Expected 2 steps, got %d", len(steps)) + if len(steps) != 1 { + t.Fatalf("Expected 1 step, got %d", len(steps)) } - stepContent := strings.Join([]string(steps[1]), "\n") + stepContent := strings.Join([]string(steps[0]), "\n") // Test that mkdir commands are present for custom --add-dir path if !strings.Contains(stepContent, "mkdir -p /custom/path/") { @@ -1496,12 +1489,11 @@ func TestCopilotEnginePluginDiscoveryInSandboxMode(t *testing.T) { } steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") - // GetExecutionSteps only returns the execution step - if len(steps) != 2 { - t.Fatalf("Expected 2 steps, got %d", len(steps)) + if len(steps) != 1 { + t.Fatalf("Expected 1 step, got %d", len(steps)) } - stepContent := strings.Join([]string(steps[1]), "\n") + stepContent := strings.Join([]string(steps[0]), "\n") // Check for --add-dir /home/runner/.copilot/ in the copilot command hasCopilotDir := strings.Contains(stepContent, "--add-dir /home/runner/.copilot/") @@ -1547,12 +1539,11 @@ func TestCopilotEnginePluginDiscoveryWithSRT(t *testing.T) { } steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") - // GetExecutionSteps only returns the execution step - if len(steps) != 2 { - t.Fatalf("Expected 2 steps, got %d", len(steps)) + if len(steps) != 1 { + t.Fatalf("Expected 1 step, got %d", len(steps)) } - stepContent := strings.Join([]string(steps[1]), "\n") + stepContent := strings.Join([]string(steps[0]), "\n") // Should include --add-dir /home/runner/.copilot/ when SRT is enabled with plugins if !strings.Contains(stepContent, "--add-dir /home/runner/.copilot/") { @@ -1596,11 +1587,11 @@ func TestCopilotEngineEnvOverridesTokenExpression(t *testing.T) { } steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") - if len(steps) != 2 { - t.Fatalf("Expected 2 steps, got %d", len(steps)) + if len(steps) != 1 { + t.Fatalf("Expected 1 step, got %d", len(steps)) } - stepContent := strings.Join([]string(steps[1]), "\n") + stepContent := strings.Join([]string(steps[0]), "\n") // engine.env override should replace the default token expression if !strings.Contains(stepContent, "COPILOT_GITHUB_TOKEN: ${{ secrets.MY_ORG_COPILOT_TOKEN }}") { @@ -1622,115 +1613,14 @@ func TestCopilotEngineEnvOverridesTokenExpression(t *testing.T) { } steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") - if len(steps) != 2 { - t.Fatalf("Expected 2 steps, got %d", len(steps)) - } - - stepContent := strings.Join([]string(steps[1]), "\n") - - if !strings.Contains(stepContent, "CUSTOM_VAR: custom-value") { - t.Errorf("Expected engine.env to add CUSTOM_VAR, got:\n%s", stepContent) - } - }) -} - -func TestCopilotPreflightDiagnosticStep(t *testing.T) { - engine := NewCopilotEngine() - - t.Run("includes preflight diagnostic by default", func(t *testing.T) { - workflowData := &WorkflowData{ - Name: "test-workflow", - } - - steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") - - // Should have 2 steps: preflight + execution - if len(steps) != 2 { - t.Fatalf("Expected 2 steps (preflight + execution), got %d", len(steps)) - } - - // First step should be preflight diagnostic - preflightContent := strings.Join([]string(steps[0]), "\n") - if !strings.Contains(preflightContent, "Copilot pre-flight diagnostic") { - t.Errorf("Expected first step to be preflight diagnostic, got:\n%s", preflightContent) - } - - if !strings.Contains(preflightContent, "copilot_preflight_diagnostic.sh") { - t.Errorf("Expected preflight step to call diagnostic script, got:\n%s", preflightContent) - } - - if !strings.Contains(preflightContent, "COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }}") { - t.Errorf("Expected preflight step to pass COPILOT_GITHUB_TOKEN, got:\n%s", preflightContent) - } - - if !strings.Contains(preflightContent, "GITHUB_API_URL: ${{ github.api_url }}") { - t.Errorf("Expected preflight step to pass GITHUB_API_URL, got:\n%s", preflightContent) - } - }) - - t.Run("skips preflight when copilot-requests feature enabled", func(t *testing.T) { - workflowData := &WorkflowData{ - Name: "test-workflow", - Features: map[string]any{ - "copilot-requests": true, - }, - } - - steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") - - // Should have only 1 step: execution (no preflight) if len(steps) != 1 { - t.Fatalf("Expected 1 step (execution only), got %d", len(steps)) + t.Fatalf("Expected 1 step, got %d", len(steps)) } - // Step should be execution, not preflight stepContent := strings.Join([]string(steps[0]), "\n") - if strings.Contains(stepContent, "Copilot pre-flight diagnostic") { - t.Errorf("Expected preflight to be skipped with copilot-requests feature, but found it:\n%s", stepContent) - } - }) - t.Run("skips preflight when custom command specified", func(t *testing.T) { - workflowData := &WorkflowData{ - Name: "test-workflow", - EngineConfig: &EngineConfig{ - Command: "/custom/copilot", - }, - } - - steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") - - // Should have only 1 step: execution (no preflight) - if len(steps) != 1 { - t.Fatalf("Expected 1 step (execution only), got %d", len(steps)) - } - - // Step should be execution, not preflight - stepContent := strings.Join([]string(steps[0]), "\n") - if strings.Contains(stepContent, "Copilot pre-flight diagnostic") { - t.Errorf("Expected preflight to be skipped with custom command, but found it:\n%s", stepContent) - } - }) - - t.Run("includes api-target in preflight when configured", func(t *testing.T) { - workflowData := &WorkflowData{ - Name: "test-workflow", - EngineConfig: &EngineConfig{ - APITarget: "https://ghe.example.com/api/v3", - }, - } - - steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") - - // Should have 2 steps: preflight + execution - if len(steps) != 2 { - t.Fatalf("Expected 2 steps (preflight + execution), got %d", len(steps)) - } - - // First step should include COPILOT_API_TARGET - preflightContent := strings.Join([]string(steps[0]), "\n") - if !strings.Contains(preflightContent, "COPILOT_API_TARGET: https://ghe.example.com/api/v3") { - t.Errorf("Expected preflight to include COPILOT_API_TARGET, got:\n%s", preflightContent) + if !strings.Contains(stepContent, "CUSTOM_VAR: custom-value") { + t.Errorf("Expected engine.env to add CUSTOM_VAR, got:\n%s", stepContent) } }) } diff --git a/pkg/workflow/enable_api_proxy_test.go b/pkg/workflow/enable_api_proxy_test.go index 0eb0fc55ac..3bce3dc11c 100644 --- a/pkg/workflow/enable_api_proxy_test.go +++ b/pkg/workflow/enable_api_proxy_test.go @@ -5,33 +5,22 @@ import ( "testing" ) -func requireCopilotPreflightAndExecutionSteps(t *testing.T, steps []GitHubActionStep) (string, string) { +func requireCopilotExecutionStep(t *testing.T, steps []GitHubActionStep) string { t.Helper() - if len(steps) != 2 { - t.Fatalf("Expected 2 execution steps (preflight + execution), got %d", len(steps)) + if len(steps) != 1 { + t.Fatalf("Expected 1 execution step, got %d", len(steps)) } - preflightContent := strings.Join(steps[0], "\n") - if !strings.Contains(preflightContent, "Copilot pre-flight diagnostic") { - t.Fatalf("Expected first Copilot step to be the pre-flight diagnostic, got:\n%s", preflightContent) - } - if !strings.Contains(preflightContent, "id: copilot-preflight") { - t.Fatalf("Expected pre-flight step to have id 'copilot-preflight', got:\n%s", preflightContent) - } - if !strings.Contains(preflightContent, "copilot_preflight_diagnostic.sh") { - t.Fatalf("Expected pre-flight step to run the diagnostic script, got:\n%s", preflightContent) - } - - executionContent := strings.Join(steps[1], "\n") + executionContent := strings.Join(steps[0], "\n") if !strings.Contains(executionContent, "Execute GitHub Copilot CLI") { - t.Fatalf("Expected second Copilot step to execute the CLI, got:\n%s", executionContent) + t.Fatalf("Expected Copilot step to execute the CLI, got:\n%s", executionContent) } if !strings.Contains(executionContent, "id: agentic_execution") { t.Fatalf("Expected execution step to have id 'agentic_execution', got:\n%s", executionContent) } - return preflightContent, executionContent + return executionContent } // TestEngineAWFEnableApiProxy tests that engines with LLM gateway support @@ -80,7 +69,7 @@ func TestEngineAWFEnableApiProxy(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - _, stepContent := requireCopilotPreflightAndExecutionSteps(t, steps) + stepContent := requireCopilotExecutionStep(t, steps) if !strings.Contains(stepContent, "--enable-api-proxy") { t.Error("Expected Copilot AWF command to contain '--enable-api-proxy' flag") diff --git a/pkg/workflow/engine_agent_import_test.go b/pkg/workflow/engine_agent_import_test.go index 52ce6d77e6..3f3f1b538c 100644 --- a/pkg/workflow/engine_agent_import_test.go +++ b/pkg/workflow/engine_agent_import_test.go @@ -22,11 +22,11 @@ func TestCopilotEngineWithAgentFromEngineConfig(t *testing.T) { steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") - if len(steps) != 2 { - t.Fatalf("Expected 2 execution steps (preflight + execution), got %d", len(steps)) + if len(steps) != 1 { + t.Fatalf("Expected 1 execution step, got %d", len(steps)) } - stepContent := strings.Join([]string(steps[1]), "\n") + stepContent := strings.Join([]string(steps[0]), "\n") // Copilot CLI expects agent identifier if !strings.Contains(stepContent, `--agent my-custom-agent`) { @@ -48,11 +48,11 @@ func TestCopilotEngineWithAgentFromImports(t *testing.T) { steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") - if len(steps) != 2 { - t.Fatalf("Expected 2 execution steps (preflight + execution), got %d", len(steps)) + if len(steps) != 1 { + t.Fatalf("Expected 1 execution step, got %d", len(steps)) } - stepContent := strings.Join([]string(steps[1]), "\n") + stepContent := strings.Join([]string(steps[0]), "\n") // Agent imports should NOT set --agent flag (only engine.agent does) if strings.Contains(stepContent, `--agent`) { @@ -74,11 +74,11 @@ func TestCopilotEngineAgentOnlyFromEngineConfig(t *testing.T) { steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") - if len(steps) != 2 { - t.Fatalf("Expected 2 execution steps (preflight + execution), got %d", len(steps)) + if len(steps) != 1 { + t.Fatalf("Expected 1 execution step, got %d", len(steps)) } - stepContent := strings.Join([]string(steps[1]), "\n") + stepContent := strings.Join([]string(steps[0]), "\n") // Should only use explicit agent from engine.agent if !strings.Contains(stepContent, `--agent explicit-agent`) { @@ -102,11 +102,11 @@ func TestCopilotEngineWithoutAgentFlag(t *testing.T) { steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") - if len(steps) != 2 { - t.Fatalf("Expected 2 execution steps (preflight + execution), got %d", len(steps)) + if len(steps) != 1 { + t.Fatalf("Expected 1 execution step, got %d", len(steps)) } - stepContent := strings.Join([]string(steps[1]), "\n") + stepContent := strings.Join([]string(steps[0]), "\n") if strings.Contains(stepContent, "--agent") { t.Errorf("Did not expect '--agent' flag when agent file is not specified, got:\n%s", stepContent) diff --git a/pkg/workflow/firewall_args_test.go b/pkg/workflow/firewall_args_test.go index 5b781d4fdd..348858cef2 100644 --- a/pkg/workflow/firewall_args_test.go +++ b/pkg/workflow/firewall_args_test.go @@ -27,7 +27,7 @@ func TestFirewallArgsInCopilotEngine(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - _, stepContent := requireCopilotPreflightAndExecutionSteps(t, steps) + stepContent := requireCopilotExecutionStep(t, steps) // Check that the command contains awf (AWF v0.15.0+ uses chroot mode by default) if !strings.Contains(stepContent, "sudo -E awf") { @@ -65,7 +65,7 @@ func TestFirewallArgsInCopilotEngine(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - _, stepContent := requireCopilotPreflightAndExecutionSteps(t, steps) + stepContent := requireCopilotExecutionStep(t, steps) // Check that custom args are included if !strings.Contains(stepContent, "--custom-arg") { @@ -103,7 +103,7 @@ func TestFirewallArgsInCopilotEngine(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - _, stepContent := requireCopilotPreflightAndExecutionSteps(t, steps) + stepContent := requireCopilotExecutionStep(t, steps) // Check that args with spaces are present (they should be escaped) if !strings.Contains(stepContent, "--message") { @@ -132,7 +132,7 @@ func TestFirewallArgsInCopilotEngine(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - _, stepContent := requireCopilotPreflightAndExecutionSteps(t, steps) + stepContent := requireCopilotExecutionStep(t, steps) // Check that AWF is used for transparent host access (AWF v0.15.0+) // Chroot mode is now the default, so no --enable-chroot flag is needed @@ -162,7 +162,7 @@ func TestFirewallArgsInCopilotEngine(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - _, stepContent := requireCopilotPreflightAndExecutionSteps(t, steps) + stepContent := requireCopilotExecutionStep(t, steps) // Check that --image-tag is included with default version (without v prefix) expectedImageTag := "--image-tag " + strings.TrimPrefix(string(constants.DefaultFirewallVersion), "v") @@ -189,7 +189,7 @@ func TestFirewallArgsInCopilotEngine(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - _, stepContent := requireCopilotPreflightAndExecutionSteps(t, steps) + stepContent := requireCopilotExecutionStep(t, steps) // Check that --image-tag is included with custom version (without v prefix) expectedImageTag := "--image-tag " + strings.TrimPrefix(customVersion, "v") @@ -221,7 +221,7 @@ func TestFirewallArgsInCopilotEngine(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - _, stepContent := requireCopilotPreflightAndExecutionSteps(t, steps) + stepContent := requireCopilotExecutionStep(t, steps) // Check that --ssl-bump flag is included if !strings.Contains(stepContent, "--ssl-bump") { @@ -247,7 +247,7 @@ func TestFirewallArgsInCopilotEngine(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - _, stepContent := requireCopilotPreflightAndExecutionSteps(t, steps) + stepContent := requireCopilotExecutionStep(t, steps) // Check that --ssl-bump flag is included if !strings.Contains(stepContent, "--ssl-bump") { @@ -282,7 +282,7 @@ func TestFirewallArgsInCopilotEngine(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - _, stepContent := requireCopilotPreflightAndExecutionSteps(t, steps) + stepContent := requireCopilotExecutionStep(t, steps) // Check that --ssl-bump flag is NOT included if strings.Contains(stepContent, "--ssl-bump") { diff --git a/pkg/workflow/firewall_blocked_domains_test.go b/pkg/workflow/firewall_blocked_domains_test.go index 9a8c8b7858..904ed2ad61 100644 --- a/pkg/workflow/firewall_blocked_domains_test.go +++ b/pkg/workflow/firewall_blocked_domains_test.go @@ -29,7 +29,7 @@ func TestFirewallBlockedDomainsInCopilotEngine(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - _, stepContent := requireCopilotPreflightAndExecutionSteps(t, steps) + stepContent := requireCopilotExecutionStep(t, steps) // Verify --allow-domains is present assert.Contains(t, stepContent, "--allow-domains", "Expected command to contain '--allow-domains'") @@ -59,7 +59,7 @@ func TestFirewallBlockedDomainsInCopilotEngine(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - _, stepContent := requireCopilotPreflightAndExecutionSteps(t, steps) + stepContent := requireCopilotExecutionStep(t, steps) // Verify --allow-domains is present assert.Contains(t, stepContent, "--allow-domains", "Expected command to contain '--allow-domains'") @@ -86,7 +86,7 @@ func TestFirewallBlockedDomainsInCopilotEngine(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - _, stepContent := requireCopilotPreflightAndExecutionSteps(t, steps) + stepContent := requireCopilotExecutionStep(t, steps) // Verify --block-domains is present assert.Contains(t, stepContent, "--block-domains", "Expected command to contain '--block-domains'") diff --git a/pkg/workflow/firewall_log_level_test.go b/pkg/workflow/firewall_log_level_test.go index bfc304eb48..ba42dcf6e5 100644 --- a/pkg/workflow/firewall_log_level_test.go +++ b/pkg/workflow/firewall_log_level_test.go @@ -137,7 +137,7 @@ func TestFirewallLogLevelInCopilotEngine(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - _, stepContent := requireCopilotPreflightAndExecutionSteps(t, steps) + stepContent := requireCopilotExecutionStep(t, steps) // Check that the command contains --log-level info (default) if !strings.Contains(stepContent, "--log-level info") { @@ -162,7 +162,7 @@ func TestFirewallLogLevelInCopilotEngine(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - _, stepContent := requireCopilotPreflightAndExecutionSteps(t, steps) + stepContent := requireCopilotExecutionStep(t, steps) // Check that the command contains --log-level debug if !strings.Contains(stepContent, "--log-level debug") { @@ -190,7 +190,7 @@ func TestFirewallLogLevelInCopilotEngine(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - _, stepContent := requireCopilotPreflightAndExecutionSteps(t, steps) + stepContent := requireCopilotExecutionStep(t, steps) expectedFlag := "--log-level " + level if !strings.Contains(stepContent, expectedFlag) { diff --git a/pkg/workflow/gh_cli_mount_test.go b/pkg/workflow/gh_cli_mount_test.go index 20a03be979..09754aa566 100644 --- a/pkg/workflow/gh_cli_mount_test.go +++ b/pkg/workflow/gh_cli_mount_test.go @@ -25,7 +25,7 @@ func TestChrootModeInAWFContainer(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - _, stepContent := requireCopilotPreflightAndExecutionSteps(t, steps) + stepContent := requireCopilotExecutionStep(t, steps) // Check that AWF is used (chroot mode is default in v0.15.0+) if !strings.Contains(stepContent, "sudo -E awf") { @@ -49,7 +49,7 @@ func TestChrootModeInAWFContainer(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - _, stepContent := requireCopilotPreflightAndExecutionSteps(t, steps) + stepContent := requireCopilotExecutionStep(t, steps) // Check that AWF command is not used if strings.Contains(stepContent, "awf") { @@ -73,7 +73,7 @@ func TestChrootModeInAWFContainer(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - _, stepContent := requireCopilotPreflightAndExecutionSteps(t, steps) + stepContent := requireCopilotExecutionStep(t, steps) // Verify AWF is present (chroot mode is default in v0.15.0+) if !strings.Contains(stepContent, "sudo -E awf") { @@ -113,7 +113,7 @@ func TestChrootModeInAWFContainer(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - _, stepContent := requireCopilotPreflightAndExecutionSteps(t, steps) + stepContent := requireCopilotExecutionStep(t, steps) // Verify AWF is present with custom args (chroot mode is default in v0.15.0+) if !strings.Contains(stepContent, "sudo -E awf") { @@ -147,7 +147,7 @@ func TestChrootModeInAWFContainer(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - _, stepContent := requireCopilotPreflightAndExecutionSteps(t, steps) + stepContent := requireCopilotExecutionStep(t, steps) // Verify AWF is being used (chroot mode is default in v0.15.0+) if !strings.Contains(stepContent, "awf") { @@ -174,7 +174,7 @@ func TestChrootModeEnvFlags(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - _, stepContent := requireCopilotPreflightAndExecutionSteps(t, steps) + stepContent := requireCopilotExecutionStep(t, steps) // Verify AWF is present (chroot mode is default in v0.15.0+) if !strings.Contains(stepContent, "sudo -E awf") { diff --git a/pkg/workflow/mcp_scripts_firewall_test.go b/pkg/workflow/mcp_scripts_firewall_test.go index 731705083a..899b67e906 100644 --- a/pkg/workflow/mcp_scripts_firewall_test.go +++ b/pkg/workflow/mcp_scripts_firewall_test.go @@ -37,7 +37,7 @@ func TestMCPScriptsWithFirewallIncludesHostDockerInternal(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - _, stepContent := requireCopilotPreflightAndExecutionSteps(t, steps) + stepContent := requireCopilotExecutionStep(t, steps) // Verify that host.docker.internal is in the allowed domains if !strings.Contains(stepContent, "host.docker.internal") { diff --git a/pkg/workflow/sandbox_mounts_test.go b/pkg/workflow/sandbox_mounts_test.go index 196045294e..ed18dd1416 100644 --- a/pkg/workflow/sandbox_mounts_test.go +++ b/pkg/workflow/sandbox_mounts_test.go @@ -264,11 +264,11 @@ func TestCopilotEngineWithCustomMounts(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - if len(steps) < 2 { - t.Fatal("Expected at least 2 execution steps (preflight + execution)") + if len(steps) < 1 { + t.Fatal("Expected at least 1 execution step") } - stepContent := strings.Join(steps[1], "\n") + stepContent := strings.Join(steps[0], "\n") // Check that custom mounts are included if !strings.Contains(stepContent, "--mount /host/data:/data:ro") { @@ -305,7 +305,7 @@ func TestCopilotEngineWithCustomMounts(t *testing.T) { t.Fatal("Expected at least one execution step") } - stepContent := strings.Join(steps[1], "\n") + stepContent := strings.Join(steps[0], "\n") // Verify AWF is present (chroot mode is default in v0.15.0+) if !strings.Contains(stepContent, "sudo -E awf") { @@ -349,7 +349,7 @@ func TestCopilotEngineWithCustomMounts(t *testing.T) { t.Fatal("Expected at least one execution step") } - stepContent := strings.Join(steps[1], "\n") + stepContent := strings.Join(steps[0], "\n") // Find the positions of each mount in the output dataPos := strings.Index(stepContent, "--mount /data:/data:rw") diff --git a/pkg/workflow/testdata/wasm_golden/TestWasmGolden_CompileFixtures/basic-copilot.golden b/pkg/workflow/testdata/wasm_golden/TestWasmGolden_CompileFixtures/basic-copilot.golden index 6cc7ad9a97..349ad75bfa 100644 --- a/pkg/workflow/testdata/wasm_golden/TestWasmGolden_CompileFixtures/basic-copilot.golden +++ b/pkg/workflow/testdata/wasm_golden/TestWasmGolden_CompileFixtures/basic-copilot.golden @@ -330,14 +330,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): diff --git a/pkg/workflow/testdata/wasm_golden/TestWasmGolden_CompileFixtures/smoke-copilot.golden b/pkg/workflow/testdata/wasm_golden/TestWasmGolden_CompileFixtures/smoke-copilot.golden index 7f50c3ca1b..8dc75d2585 100644 --- a/pkg/workflow/testdata/wasm_golden/TestWasmGolden_CompileFixtures/smoke-copilot.golden +++ b/pkg/workflow/testdata/wasm_golden/TestWasmGolden_CompileFixtures/smoke-copilot.golden @@ -508,14 +508,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): diff --git a/pkg/workflow/testdata/wasm_golden/TestWasmGolden_CompileFixtures/with-imports.golden b/pkg/workflow/testdata/wasm_golden/TestWasmGolden_CompileFixtures/with-imports.golden index 43073782f9..8410246bdb 100644 --- a/pkg/workflow/testdata/wasm_golden/TestWasmGolden_CompileFixtures/with-imports.golden +++ b/pkg/workflow/testdata/wasm_golden/TestWasmGolden_CompileFixtures/with-imports.golden @@ -333,14 +333,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): diff --git a/pkg/workflow/tools_timeout_test.go b/pkg/workflow/tools_timeout_test.go index a3deeaa0db..f30e2c018f 100644 --- a/pkg/workflow/tools_timeout_test.go +++ b/pkg/workflow/tools_timeout_test.go @@ -308,12 +308,12 @@ func TestCopilotEngineWithToolsTimeout(t *testing.T) { // Get execution steps executionSteps := engine.GetExecutionSteps(workflowData, "/tmp/test.log") - if len(executionSteps) < 2 { - t.Fatal("Expected at least 2 execution steps (preflight + execution)") + if len(executionSteps) < 1 { + t.Fatal("Expected at least 1 execution step") } - // Get the execution step (second step, after preflight) - stepContent := strings.Join([]string(executionSteps[1]), "\n") + // Get the execution step + stepContent := strings.Join([]string(executionSteps[0]), "\n") // Check for GH_AW_TOOL_TIMEOUT if expected if tt.expectedEnvVar != "" {