From 84d5b9613847d047a7561d1af291c054cbff85eb Mon Sep 17 00:00:00 2001 From: "copilot-swe-agent[bot]" <198982749+Copilot@users.noreply.github.com> Date: Sun, 15 Mar 2026 02:05:59 +0000 Subject: [PATCH 1/2] Initial plan From b60f87ffab71ea0d02f4c779a849aa7b77dfe50e Mon Sep 17 00:00:00 2001 From: "copilot-swe-agent[bot]" <198982749+Copilot@users.noreply.github.com> Date: Sun, 15 Mar 2026 02:23:37 +0000 Subject: [PATCH 2/2] remove copilot-preflight script and associated step generation, recompile Co-authored-by: pelikhan <4175913+pelikhan@users.noreply.github.com> --- .github/workflows/ace-editor.lock.yml | 8 - .../workflows/agent-persona-explorer.lock.yml | 17 -- .github/workflows/bot-detection.lock.yml | 8 - .../workflows/chroma-issue-indexer.lock.yml | 8 - .github/workflows/ci-doctor.lock.yml | 17 -- .github/workflows/code-simplifier.lock.yml | 17 -- .../constraint-solving-potd.lock.yml | 17 -- .github/workflows/contribution-check.lock.yml | 17 -- .../workflows/daily-cli-tools-tester.lock.yml | 17 -- .../workflows/daily-firewall-report.lock.yml | 17 -- .../daily-performance-summary.lock.yml | 17 -- .github/workflows/daily-regulatory.lock.yml | 17 -- .github/workflows/daily-semgrep-scan.lock.yml | 17 -- .github/workflows/daily-team-status.lock.yml | 17 -- .github/workflows/dependabot-burner.lock.yml | 17 -- .../workflows/dependabot-go-checker.lock.yml | 17 -- .../example-permissions-warning.lock.yml | 8 - .github/workflows/firewall.lock.yml | 8 - .../workflows/functional-pragmatist.lock.yml | 17 -- .../github-remote-mcp-auth-test.lock.yml | 17 -- .../workflows/glossary-maintainer.lock.yml | 17 -- .github/workflows/gpclean.lock.yml | 17 -- .github/workflows/grumpy-reviewer.lock.yml | 17 -- .github/workflows/hourly-ci-cleaner.lock.yml | 17 -- .github/workflows/issue-monster.lock.yml | 17 -- .github/workflows/issue-triage-agent.lock.yml | 17 -- .github/workflows/jsweep.lock.yml | 17 -- .../workflows/layout-spec-maintainer.lock.yml | 17 -- .github/workflows/mcp-inspector.lock.yml | 17 -- .github/workflows/mergefest.lock.yml | 17 -- .github/workflows/metrics-collector.lock.yml | 8 - .../workflows/notion-issue-summary.lock.yml | 8 - .github/workflows/org-health-report.lock.yml | 17 -- .github/workflows/pdf-summary.lock.yml | 17 -- .github/workflows/plan.lock.yml | 17 -- .github/workflows/poem-bot.lock.yml | 17 -- .github/workflows/portfolio-analyst.lock.yml | 17 -- .../workflows/pr-nitpick-reviewer.lock.yml | 17 -- .github/workflows/pr-triage-agent.lock.yml | 17 -- .github/workflows/python-data-charts.lock.yml | 17 -- .github/workflows/q.lock.yml | 17 -- .github/workflows/refiner.lock.yml | 17 -- .github/workflows/release.lock.yml | 17 -- .../workflows/repo-audit-analyzer.lock.yml | 17 -- .github/workflows/repo-tree-map.lock.yml | 17 -- .../repository-quality-improver.lock.yml | 17 -- .github/workflows/research.lock.yml | 17 -- .../workflows/security-compliance.lock.yml | 17 -- .github/workflows/security-review.lock.yml | 17 -- .../workflows/slide-deck-maintainer.lock.yml | 17 -- .github/workflows/smoke-copilot-arm.lock.yml | 17 -- .github/workflows/smoke-copilot.lock.yml | 17 -- .github/workflows/smoke-multi-pr.lock.yml | 17 -- .github/workflows/smoke-project.lock.yml | 17 -- .github/workflows/smoke-temporary-id.lock.yml | 17 -- .github/workflows/smoke-test-tools.lock.yml | 17 -- .../smoke-workflow-call-with-inputs.lock.yml | 17 -- .../workflows/smoke-workflow-call.lock.yml | 17 -- .../workflows/stale-repo-identifier.lock.yml | 17 -- .github/workflows/sub-issue-closer.lock.yml | 17 -- .github/workflows/super-linter.lock.yml | 17 -- .../workflows/technical-doc-writer.lock.yml | 17 -- .github/workflows/terminal-stylist.lock.yml | 17 -- .github/workflows/test-dispatcher.lock.yml | 17 -- .../test-project-url-default.lock.yml | 17 -- .github/workflows/test-workflow.lock.yml | 8 - .github/workflows/tidy.lock.yml | 17 -- .../workflows/ubuntu-image-analyzer.lock.yml | 17 -- .github/workflows/video-analyzer.lock.yml | 17 -- .../weekly-editors-health-check.lock.yml | 17 -- .../workflows/weekly-issue-summary.lock.yml | 17 -- .../weekly-safe-outputs-spec-review.lock.yml | 17 -- .github/workflows/workflow-generator.lock.yml | 17 -- .../workflow-health-manager.lock.yml | 17 -- .../workflows/workflow-normalizer.lock.yml | 17 -- .../workflow-skill-extractor.lock.yml | 17 -- .../setup/sh/copilot_preflight_diagnostic.sh | 207 ------------------ pkg/workflow/copilot_engine_execution.go | 56 ----- pkg/workflow/copilot_engine_test.go | 196 ++++------------- pkg/workflow/enable_api_proxy_test.go | 25 +-- pkg/workflow/engine_agent_import_test.go | 24 +- pkg/workflow/firewall_args_test.go | 18 +- pkg/workflow/firewall_blocked_domains_test.go | 6 +- pkg/workflow/firewall_log_level_test.go | 6 +- pkg/workflow/gh_cli_mount_test.go | 12 +- pkg/workflow/mcp_scripts_firewall_test.go | 2 +- pkg/workflow/sandbox_mounts_test.go | 10 +- .../basic-copilot.golden | 8 - .../smoke-copilot.golden | 8 - .../with-imports.golden | 8 - pkg/workflow/tools_timeout_test.go | 8 +- 91 files changed, 93 insertions(+), 1721 deletions(-) delete mode 100755 actions/setup/sh/copilot_preflight_diagnostic.sh diff --git a/.github/workflows/ace-editor.lock.yml b/.github/workflows/ace-editor.lock.yml index 5ac9b68bc45..6526c68b595 100644 --- a/.github/workflows/ace-editor.lock.yml +++ b/.github/workflows/ace-editor.lock.yml @@ -379,14 +379,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): diff --git a/.github/workflows/agent-persona-explorer.lock.yml b/.github/workflows/agent-persona-explorer.lock.yml index bc4873d17df..ccee4995d51 100644 --- a/.github/workflows/agent-persona-explorer.lock.yml +++ b/.github/workflows/agent-persona-explorer.lock.yml @@ -748,14 +748,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -977,15 +969,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/bot-detection.lock.yml b/.github/workflows/bot-detection.lock.yml index 21d8d62c10c..ba81ab6d150 100644 --- a/.github/workflows/bot-detection.lock.yml +++ b/.github/workflows/bot-detection.lock.yml @@ -819,14 +819,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): diff --git a/.github/workflows/chroma-issue-indexer.lock.yml b/.github/workflows/chroma-issue-indexer.lock.yml index 01538694b3b..5019dcd1b97 100644 --- a/.github/workflows/chroma-issue-indexer.lock.yml +++ b/.github/workflows/chroma-issue-indexer.lock.yml @@ -403,14 +403,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): diff --git a/.github/workflows/ci-doctor.lock.yml b/.github/workflows/ci-doctor.lock.yml index c4b5978128a..4f6cf376978 100644 --- a/.github/workflows/ci-doctor.lock.yml +++ b/.github/workflows/ci-doctor.lock.yml @@ -920,14 +920,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1149,15 +1141,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/code-simplifier.lock.yml b/.github/workflows/code-simplifier.lock.yml index 5233658201e..f75ec3ac119 100644 --- a/.github/workflows/code-simplifier.lock.yml +++ b/.github/workflows/code-simplifier.lock.yml @@ -697,14 +697,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -921,15 +913,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/constraint-solving-potd.lock.yml b/.github/workflows/constraint-solving-potd.lock.yml index edc29f33d1b..c0d19a89c9d 100644 --- a/.github/workflows/constraint-solving-potd.lock.yml +++ b/.github/workflows/constraint-solving-potd.lock.yml @@ -651,14 +651,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -881,15 +873,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/contribution-check.lock.yml b/.github/workflows/contribution-check.lock.yml index 472c28f9a24..b1e5484b23b 100644 --- a/.github/workflows/contribution-check.lock.yml +++ b/.github/workflows/contribution-check.lock.yml @@ -771,14 +771,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -994,15 +986,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/daily-cli-tools-tester.lock.yml b/.github/workflows/daily-cli-tools-tester.lock.yml index 37cd4bafadd..71c0be5ccd5 100644 --- a/.github/workflows/daily-cli-tools-tester.lock.yml +++ b/.github/workflows/daily-cli-tools-tester.lock.yml @@ -750,14 +750,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -973,15 +965,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/daily-firewall-report.lock.yml b/.github/workflows/daily-firewall-report.lock.yml index 7036253a5f4..67a49718c7a 100644 --- a/.github/workflows/daily-firewall-report.lock.yml +++ b/.github/workflows/daily-firewall-report.lock.yml @@ -811,14 +811,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1052,15 +1044,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/daily-performance-summary.lock.yml b/.github/workflows/daily-performance-summary.lock.yml index fcd634a5b39..70f12820a06 100644 --- a/.github/workflows/daily-performance-summary.lock.yml +++ b/.github/workflows/daily-performance-summary.lock.yml @@ -1284,14 +1284,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1536,15 +1528,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/daily-regulatory.lock.yml b/.github/workflows/daily-regulatory.lock.yml index e019bd85954..ea88c62ada4 100644 --- a/.github/workflows/daily-regulatory.lock.yml +++ b/.github/workflows/daily-regulatory.lock.yml @@ -1201,14 +1201,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1435,15 +1427,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/daily-semgrep-scan.lock.yml b/.github/workflows/daily-semgrep-scan.lock.yml index 97c4798ef1f..b9d4f3b0a09 100644 --- a/.github/workflows/daily-semgrep-scan.lock.yml +++ b/.github/workflows/daily-semgrep-scan.lock.yml @@ -713,14 +713,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -936,15 +928,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/daily-team-status.lock.yml b/.github/workflows/daily-team-status.lock.yml index b99cda0f228..e060bc7f1d6 100644 --- a/.github/workflows/daily-team-status.lock.yml +++ b/.github/workflows/daily-team-status.lock.yml @@ -691,14 +691,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -914,15 +906,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/dependabot-burner.lock.yml b/.github/workflows/dependabot-burner.lock.yml index 686567cdee8..66b93ef8ef0 100644 --- a/.github/workflows/dependabot-burner.lock.yml +++ b/.github/workflows/dependabot-burner.lock.yml @@ -683,14 +683,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -906,15 +898,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/dependabot-go-checker.lock.yml b/.github/workflows/dependabot-go-checker.lock.yml index a8119bc3b4f..bfbfb79417a 100644 --- a/.github/workflows/dependabot-go-checker.lock.yml +++ b/.github/workflows/dependabot-go-checker.lock.yml @@ -732,14 +732,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -955,15 +947,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/example-permissions-warning.lock.yml b/.github/workflows/example-permissions-warning.lock.yml index 6413c1646f2..eab3175d2f8 100644 --- a/.github/workflows/example-permissions-warning.lock.yml +++ b/.github/workflows/example-permissions-warning.lock.yml @@ -352,14 +352,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): diff --git a/.github/workflows/firewall.lock.yml b/.github/workflows/firewall.lock.yml index 11689cdd526..0e560d6dc12 100644 --- a/.github/workflows/firewall.lock.yml +++ b/.github/workflows/firewall.lock.yml @@ -354,14 +354,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): diff --git a/.github/workflows/functional-pragmatist.lock.yml b/.github/workflows/functional-pragmatist.lock.yml index 800069cc5d8..fd9cee2c672 100644 --- a/.github/workflows/functional-pragmatist.lock.yml +++ b/.github/workflows/functional-pragmatist.lock.yml @@ -687,14 +687,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -911,15 +903,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/github-remote-mcp-auth-test.lock.yml b/.github/workflows/github-remote-mcp-auth-test.lock.yml index 5f79200c6f2..05f761aa9ec 100644 --- a/.github/workflows/github-remote-mcp-auth-test.lock.yml +++ b/.github/workflows/github-remote-mcp-auth-test.lock.yml @@ -666,14 +666,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -889,15 +881,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/glossary-maintainer.lock.yml b/.github/workflows/glossary-maintainer.lock.yml index 5c71a0891ff..77380399ab5 100644 --- a/.github/workflows/glossary-maintainer.lock.yml +++ b/.github/workflows/glossary-maintainer.lock.yml @@ -899,14 +899,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1177,15 +1169,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/gpclean.lock.yml b/.github/workflows/gpclean.lock.yml index 846f687f6a0..29c74888e13 100644 --- a/.github/workflows/gpclean.lock.yml +++ b/.github/workflows/gpclean.lock.yml @@ -704,14 +704,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -933,15 +925,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/grumpy-reviewer.lock.yml b/.github/workflows/grumpy-reviewer.lock.yml index 932f0987f68..e8338430985 100644 --- a/.github/workflows/grumpy-reviewer.lock.yml +++ b/.github/workflows/grumpy-reviewer.lock.yml @@ -801,14 +801,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1031,15 +1023,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/hourly-ci-cleaner.lock.yml b/.github/workflows/hourly-ci-cleaner.lock.yml index d8d916e8836..686d29a7917 100644 --- a/.github/workflows/hourly-ci-cleaner.lock.yml +++ b/.github/workflows/hourly-ci-cleaner.lock.yml @@ -737,14 +737,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -961,15 +953,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/issue-monster.lock.yml b/.github/workflows/issue-monster.lock.yml index 7db3b572862..ab6650f3874 100644 --- a/.github/workflows/issue-monster.lock.yml +++ b/.github/workflows/issue-monster.lock.yml @@ -735,14 +735,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -958,15 +950,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/issue-triage-agent.lock.yml b/.github/workflows/issue-triage-agent.lock.yml index a993d258b64..927f1a5289a 100644 --- a/.github/workflows/issue-triage-agent.lock.yml +++ b/.github/workflows/issue-triage-agent.lock.yml @@ -676,14 +676,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -899,15 +891,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/jsweep.lock.yml b/.github/workflows/jsweep.lock.yml index 5aa7c3814c3..bc095cc57f0 100644 --- a/.github/workflows/jsweep.lock.yml +++ b/.github/workflows/jsweep.lock.yml @@ -716,14 +716,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -946,15 +938,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/layout-spec-maintainer.lock.yml b/.github/workflows/layout-spec-maintainer.lock.yml index 4c2cf3bd38f..52fd536f3ff 100644 --- a/.github/workflows/layout-spec-maintainer.lock.yml +++ b/.github/workflows/layout-spec-maintainer.lock.yml @@ -687,14 +687,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -940,15 +932,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/mcp-inspector.lock.yml b/.github/workflows/mcp-inspector.lock.yml index 19a9bdc289e..7075c7aa195 100644 --- a/.github/workflows/mcp-inspector.lock.yml +++ b/.github/workflows/mcp-inspector.lock.yml @@ -1048,14 +1048,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1293,15 +1285,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/mergefest.lock.yml b/.github/workflows/mergefest.lock.yml index 16f85f3b954..5e1c739bf71 100644 --- a/.github/workflows/mergefest.lock.yml +++ b/.github/workflows/mergefest.lock.yml @@ -697,14 +697,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -961,15 +953,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/metrics-collector.lock.yml b/.github/workflows/metrics-collector.lock.yml index ed1611af937..c4bc42d4328 100644 --- a/.github/workflows/metrics-collector.lock.yml +++ b/.github/workflows/metrics-collector.lock.yml @@ -455,14 +455,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): diff --git a/.github/workflows/notion-issue-summary.lock.yml b/.github/workflows/notion-issue-summary.lock.yml index 78e7b83b182..ad1229a9ab4 100644 --- a/.github/workflows/notion-issue-summary.lock.yml +++ b/.github/workflows/notion-issue-summary.lock.yml @@ -631,14 +631,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): diff --git a/.github/workflows/org-health-report.lock.yml b/.github/workflows/org-health-report.lock.yml index ac32f31d004..6e569e7ff66 100644 --- a/.github/workflows/org-health-report.lock.yml +++ b/.github/workflows/org-health-report.lock.yml @@ -741,14 +741,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -982,15 +974,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/pdf-summary.lock.yml b/.github/workflows/pdf-summary.lock.yml index 4377ded3636..8ef6b299788 100644 --- a/.github/workflows/pdf-summary.lock.yml +++ b/.github/workflows/pdf-summary.lock.yml @@ -816,14 +816,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1046,15 +1038,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/plan.lock.yml b/.github/workflows/plan.lock.yml index c90ce88f229..8a54a4883d7 100644 --- a/.github/workflows/plan.lock.yml +++ b/.github/workflows/plan.lock.yml @@ -784,14 +784,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1008,15 +1000,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/poem-bot.lock.yml b/.github/workflows/poem-bot.lock.yml index 030a4f60ec8..f7b6140ccec 100644 --- a/.github/workflows/poem-bot.lock.yml +++ b/.github/workflows/poem-bot.lock.yml @@ -1477,14 +1477,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1746,15 +1738,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/portfolio-analyst.lock.yml b/.github/workflows/portfolio-analyst.lock.yml index a4135e7b4ec..31cec5bea8f 100644 --- a/.github/workflows/portfolio-analyst.lock.yml +++ b/.github/workflows/portfolio-analyst.lock.yml @@ -822,14 +822,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1063,15 +1055,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/pr-nitpick-reviewer.lock.yml b/.github/workflows/pr-nitpick-reviewer.lock.yml index 2a65c8a417b..4e694b100ff 100644 --- a/.github/workflows/pr-nitpick-reviewer.lock.yml +++ b/.github/workflows/pr-nitpick-reviewer.lock.yml @@ -902,14 +902,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1132,15 +1124,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/pr-triage-agent.lock.yml b/.github/workflows/pr-triage-agent.lock.yml index 7cdebda0030..3f1b7302c3e 100644 --- a/.github/workflows/pr-triage-agent.lock.yml +++ b/.github/workflows/pr-triage-agent.lock.yml @@ -808,14 +808,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1040,15 +1032,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/python-data-charts.lock.yml b/.github/workflows/python-data-charts.lock.yml index e01d6151296..3fd36377316 100644 --- a/.github/workflows/python-data-charts.lock.yml +++ b/.github/workflows/python-data-charts.lock.yml @@ -810,14 +810,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1051,15 +1043,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/q.lock.yml b/.github/workflows/q.lock.yml index 1e0229885c0..ed5621cd399 100644 --- a/.github/workflows/q.lock.yml +++ b/.github/workflows/q.lock.yml @@ -926,14 +926,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1157,15 +1149,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/refiner.lock.yml b/.github/workflows/refiner.lock.yml index ecfc2e2abe8..d6d6ee5109b 100644 --- a/.github/workflows/refiner.lock.yml +++ b/.github/workflows/refiner.lock.yml @@ -757,14 +757,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -981,15 +973,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/release.lock.yml b/.github/workflows/release.lock.yml index b1e0981b141..abf0979de90 100644 --- a/.github/workflows/release.lock.yml +++ b/.github/workflows/release.lock.yml @@ -680,14 +680,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -903,15 +895,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/repo-audit-analyzer.lock.yml b/.github/workflows/repo-audit-analyzer.lock.yml index b0d294d9863..91d929a6586 100644 --- a/.github/workflows/repo-audit-analyzer.lock.yml +++ b/.github/workflows/repo-audit-analyzer.lock.yml @@ -682,14 +682,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -911,15 +903,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/repo-tree-map.lock.yml b/.github/workflows/repo-tree-map.lock.yml index 0e1d2ee6a92..6882f44576b 100644 --- a/.github/workflows/repo-tree-map.lock.yml +++ b/.github/workflows/repo-tree-map.lock.yml @@ -658,14 +658,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -881,15 +873,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/repository-quality-improver.lock.yml b/.github/workflows/repository-quality-improver.lock.yml index 98f25aa9e40..b531c2d0950 100644 --- a/.github/workflows/repository-quality-improver.lock.yml +++ b/.github/workflows/repository-quality-improver.lock.yml @@ -689,14 +689,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -918,15 +910,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/research.lock.yml b/.github/workflows/research.lock.yml index d02ddf78ea2..6fbedce5c57 100644 --- a/.github/workflows/research.lock.yml +++ b/.github/workflows/research.lock.yml @@ -682,14 +682,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -907,15 +899,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/security-compliance.lock.yml b/.github/workflows/security-compliance.lock.yml index 6fbe91f05df..ada91389520 100644 --- a/.github/workflows/security-compliance.lock.yml +++ b/.github/workflows/security-compliance.lock.yml @@ -743,14 +743,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -975,15 +967,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/security-review.lock.yml b/.github/workflows/security-review.lock.yml index 3a0b3d5bca8..90b9598183b 100644 --- a/.github/workflows/security-review.lock.yml +++ b/.github/workflows/security-review.lock.yml @@ -880,14 +880,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1110,15 +1102,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/slide-deck-maintainer.lock.yml b/.github/workflows/slide-deck-maintainer.lock.yml index f5e836d05ed..88b60f5da60 100644 --- a/.github/workflows/slide-deck-maintainer.lock.yml +++ b/.github/workflows/slide-deck-maintainer.lock.yml @@ -743,14 +743,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1013,15 +1005,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/smoke-copilot-arm.lock.yml b/.github/workflows/smoke-copilot-arm.lock.yml index 137f34a837a..065faeb5b74 100644 --- a/.github/workflows/smoke-copilot-arm.lock.yml +++ b/.github/workflows/smoke-copilot-arm.lock.yml @@ -1766,14 +1766,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -2008,15 +2000,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/smoke-copilot.lock.yml b/.github/workflows/smoke-copilot.lock.yml index 96d1031bd2c..69512faf098 100644 --- a/.github/workflows/smoke-copilot.lock.yml +++ b/.github/workflows/smoke-copilot.lock.yml @@ -1881,14 +1881,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -2123,15 +2115,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/smoke-multi-pr.lock.yml b/.github/workflows/smoke-multi-pr.lock.yml index 594730f0849..2c682da429f 100644 --- a/.github/workflows/smoke-multi-pr.lock.yml +++ b/.github/workflows/smoke-multi-pr.lock.yml @@ -785,14 +785,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1034,15 +1026,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/smoke-project.lock.yml b/.github/workflows/smoke-project.lock.yml index d1cd4c58aa7..c60408b9911 100644 --- a/.github/workflows/smoke-project.lock.yml +++ b/.github/workflows/smoke-project.lock.yml @@ -1243,14 +1243,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1467,15 +1459,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/smoke-temporary-id.lock.yml b/.github/workflows/smoke-temporary-id.lock.yml index a12c2f5ac0e..07a2e1312b5 100644 --- a/.github/workflows/smoke-temporary-id.lock.yml +++ b/.github/workflows/smoke-temporary-id.lock.yml @@ -831,14 +831,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1054,15 +1046,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/smoke-test-tools.lock.yml b/.github/workflows/smoke-test-tools.lock.yml index a5807b5e1a7..8f713feb153 100644 --- a/.github/workflows/smoke-test-tools.lock.yml +++ b/.github/workflows/smoke-test-tools.lock.yml @@ -709,14 +709,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -932,15 +924,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/smoke-workflow-call-with-inputs.lock.yml b/.github/workflows/smoke-workflow-call-with-inputs.lock.yml index badb271f9ea..d95e92b30c4 100644 --- a/.github/workflows/smoke-workflow-call-with-inputs.lock.yml +++ b/.github/workflows/smoke-workflow-call-with-inputs.lock.yml @@ -727,14 +727,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -966,15 +958,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/smoke-workflow-call.lock.yml b/.github/workflows/smoke-workflow-call.lock.yml index b258c318036..d4f4c4e2032 100644 --- a/.github/workflows/smoke-workflow-call.lock.yml +++ b/.github/workflows/smoke-workflow-call.lock.yml @@ -680,14 +680,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -923,15 +915,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/stale-repo-identifier.lock.yml b/.github/workflows/stale-repo-identifier.lock.yml index 57db6bddf62..efc916e625f 100644 --- a/.github/workflows/stale-repo-identifier.lock.yml +++ b/.github/workflows/stale-repo-identifier.lock.yml @@ -814,14 +814,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1055,15 +1047,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/sub-issue-closer.lock.yml b/.github/workflows/sub-issue-closer.lock.yml index e86272f48f2..861b84de2e0 100644 --- a/.github/workflows/sub-issue-closer.lock.yml +++ b/.github/workflows/sub-issue-closer.lock.yml @@ -772,14 +772,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -995,15 +987,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/super-linter.lock.yml b/.github/workflows/super-linter.lock.yml index 5dfee8c3b24..1be765efb4c 100644 --- a/.github/workflows/super-linter.lock.yml +++ b/.github/workflows/super-linter.lock.yml @@ -712,14 +712,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -941,15 +933,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/technical-doc-writer.lock.yml b/.github/workflows/technical-doc-writer.lock.yml index 5f3a3101077..aa20ac7ea6e 100644 --- a/.github/workflows/technical-doc-writer.lock.yml +++ b/.github/workflows/technical-doc-writer.lock.yml @@ -995,14 +995,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1256,15 +1248,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/terminal-stylist.lock.yml b/.github/workflows/terminal-stylist.lock.yml index e4d52c23a28..bae77e1a0c3 100644 --- a/.github/workflows/terminal-stylist.lock.yml +++ b/.github/workflows/terminal-stylist.lock.yml @@ -670,14 +670,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -893,15 +885,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/test-dispatcher.lock.yml b/.github/workflows/test-dispatcher.lock.yml index c4699cb980a..99f6125a2ed 100644 --- a/.github/workflows/test-dispatcher.lock.yml +++ b/.github/workflows/test-dispatcher.lock.yml @@ -602,14 +602,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -825,15 +817,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/test-project-url-default.lock.yml b/.github/workflows/test-project-url-default.lock.yml index 032b9792ae4..130b67a6bf1 100644 --- a/.github/workflows/test-project-url-default.lock.yml +++ b/.github/workflows/test-project-url-default.lock.yml @@ -861,14 +861,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1084,15 +1076,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/test-workflow.lock.yml b/.github/workflows/test-workflow.lock.yml index 187dc998ecb..abee5869be7 100644 --- a/.github/workflows/test-workflow.lock.yml +++ b/.github/workflows/test-workflow.lock.yml @@ -354,14 +354,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): diff --git a/.github/workflows/tidy.lock.yml b/.github/workflows/tidy.lock.yml index c703393d0a0..d5a7d3ebb71 100644 --- a/.github/workflows/tidy.lock.yml +++ b/.github/workflows/tidy.lock.yml @@ -804,14 +804,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1054,15 +1046,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/ubuntu-image-analyzer.lock.yml b/.github/workflows/ubuntu-image-analyzer.lock.yml index fe5610a7c7c..92aaab847ef 100644 --- a/.github/workflows/ubuntu-image-analyzer.lock.yml +++ b/.github/workflows/ubuntu-image-analyzer.lock.yml @@ -693,14 +693,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -943,15 +935,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/video-analyzer.lock.yml b/.github/workflows/video-analyzer.lock.yml index 95e7fb1eaf0..aa9fb4e4814 100644 --- a/.github/workflows/video-analyzer.lock.yml +++ b/.github/workflows/video-analyzer.lock.yml @@ -694,14 +694,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -934,15 +926,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/weekly-editors-health-check.lock.yml b/.github/workflows/weekly-editors-health-check.lock.yml index 6899960ef5b..d6d9c617e88 100644 --- a/.github/workflows/weekly-editors-health-check.lock.yml +++ b/.github/workflows/weekly-editors-health-check.lock.yml @@ -728,14 +728,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -990,15 +982,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/weekly-issue-summary.lock.yml b/.github/workflows/weekly-issue-summary.lock.yml index 718e36b03b1..e08038b5159 100644 --- a/.github/workflows/weekly-issue-summary.lock.yml +++ b/.github/workflows/weekly-issue-summary.lock.yml @@ -721,14 +721,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -962,15 +954,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/weekly-safe-outputs-spec-review.lock.yml b/.github/workflows/weekly-safe-outputs-spec-review.lock.yml index 8b7c3646de5..11e64cbcda9 100644 --- a/.github/workflows/weekly-safe-outputs-spec-review.lock.yml +++ b/.github/workflows/weekly-safe-outputs-spec-review.lock.yml @@ -670,14 +670,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -894,15 +886,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/workflow-generator.lock.yml b/.github/workflows/workflow-generator.lock.yml index d5a87e92eea..8303561c221 100644 --- a/.github/workflows/workflow-generator.lock.yml +++ b/.github/workflows/workflow-generator.lock.yml @@ -815,14 +815,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1038,15 +1030,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/workflow-health-manager.lock.yml b/.github/workflows/workflow-health-manager.lock.yml index 21320a48714..89be3b63f93 100644 --- a/.github/workflows/workflow-health-manager.lock.yml +++ b/.github/workflows/workflow-health-manager.lock.yml @@ -905,14 +905,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -1137,15 +1129,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/workflow-normalizer.lock.yml b/.github/workflows/workflow-normalizer.lock.yml index 9ed41fad368..98679ab54ee 100644 --- a/.github/workflows/workflow-normalizer.lock.yml +++ b/.github/workflows/workflow-normalizer.lock.yml @@ -749,14 +749,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -972,15 +964,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/.github/workflows/workflow-skill-extractor.lock.yml b/.github/workflows/workflow-skill-extractor.lock.yml index 9931e03a36f..b8880774e1c 100644 --- a/.github/workflows/workflow-skill-extractor.lock.yml +++ b/.github/workflows/workflow-skill-extractor.lock.yml @@ -741,14 +741,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): @@ -984,15 +976,6 @@ jobs: run: | mkdir -p /tmp/gh-aw/threat-detection touch /tmp/gh-aw/threat-detection/detection.log - - name: Copilot pre-flight diagnostic - if: always() && steps.detection_guard.outputs.run_detection == 'true' - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI if: always() && steps.detection_guard.outputs.run_detection == 'true' id: detection_agentic_execution diff --git a/actions/setup/sh/copilot_preflight_diagnostic.sh b/actions/setup/sh/copilot_preflight_diagnostic.sh deleted file mode 100755 index 094810fb1aa..00000000000 --- a/actions/setup/sh/copilot_preflight_diagnostic.sh +++ /dev/null @@ -1,207 +0,0 @@ -#!/bin/bash -set -e - -# copilot_preflight_diagnostic.sh - Pre-flight diagnostic for Copilot engine on GHES -# -# This script performs diagnostic checks before executing Copilot CLI to provide -# clear error messages when Copilot is not properly configured on GHES instances. -# -# Checks performed: -# 1. Token exchange test - Validates COPILOT_GITHUB_TOKEN can exchange for Copilot access -# 2. GHES detection - Identifies GHES environments and validates configuration -# 3. API target validation - Ensures engine.api-target matches GITHUB_API_URL on GHES -# -# Exit codes: -# 0 - All checks passed, safe to proceed -# 1 - Critical failure, should fail the workflow - -# Check if we're on GHES (non-GitHub.com environment) -IS_GHES=false -if [ "$GITHUB_SERVER_URL" != "https://github.com" ]; then - IS_GHES=true - echo "🔍 Detected GitHub Enterprise Server environment" - echo " Server URL: $GITHUB_SERVER_URL" - echo " API URL: $GITHUB_API_URL" -fi - -# Test 1: Token exchange to Copilot inference API -echo "" -echo "🔍 Testing Copilot token exchange..." - -# Construct the token exchange endpoint -TOKEN_EXCHANGE_URL="${GITHUB_API_URL}/copilot_internal/v2/token" - -# Attempt token exchange using COPILOT_GITHUB_TOKEN -HTTP_STATUS=$(curl -s -o /tmp/copilot_token_exchange.json -w "%{http_code}" \ - -H "Authorization: Bearer ${COPILOT_GITHUB_TOKEN}" \ - -H "Accept: application/json" \ - "$TOKEN_EXCHANGE_URL" 2>&1 || echo "000") - -if [ "$HTTP_STATUS" = "200" ]; then - echo "✅ Token exchange successful (HTTP 200)" - echo " Copilot is licensed and accessible" -elif [ "$HTTP_STATUS" = "403" ]; then - # Parse error message from response - ERROR_MSG=$(cat /tmp/copilot_token_exchange.json 2>/dev/null | grep -o '"message":"[^"]*"' | cut -d'"' -f4 || echo "") - - echo "❌ Token exchange failed (HTTP 403)" - echo "" - - # Check for specific error messages - if echo "$ERROR_MSG" | grep -qi "not licensed"; then - { - echo "## ❌ Copilot Not Licensed" - echo "" - echo "The token exchange endpoint returned HTTP 403 with message:" - echo "\`\`\`" - echo "$ERROR_MSG" - echo "\`\`\`" - echo "" - echo "**This means Copilot is not licensed for this user/organization on GHES.**" - echo "" - echo "### How to fix:" - echo "1. Ask your GHES administrator to enable Copilot at the **enterprise level**" - echo "2. Ensure a Copilot seat is assigned to your user account" - echo "3. Verify your organization has Copilot enabled" - echo "" - echo "### GHES Admin Steps:" - echo "- Navigate to Enterprise settings → Copilot" - echo "- Enable Copilot for the enterprise" - echo "- Assign licenses to organizations" - echo "- Ensure users have seats assigned" - echo "" - echo "**Note:** This is a licensing issue, not a configuration problem with gh-aw." - } >> "$GITHUB_STEP_SUMMARY" - - echo "Copilot is not licensed for this user/org on GHES." >&2 - echo "Ask your GHES admin to enable Copilot at the enterprise level and assign a seat." >&2 - exit 1 - - elif echo "$ERROR_MSG" | grep -qi "not accessible by personal access token\|token type"; then - { - echo "## ❌ Incorrect Token Type" - echo "" - echo "The token exchange endpoint returned HTTP 403 with message:" - echo "\`\`\`" - echo "$ERROR_MSG" - echo "\`\`\`" - echo "" - echo "**The token type is not supported for Copilot access.**" - echo "" - echo "### How to fix:" - echo "- Ensure you're using a **fine-grained Personal Access Token** (starts with \`github_pat_\`)" - echo "- Configure the token with **Copilot Requests: Read-only** permission" - echo "- Do NOT use classic PATs (\`ghp_\`) or OAuth tokens (\`gho_\`)" - echo "" - echo "Create a fine-grained PAT at: https://${GITHUB_SERVER_URL#https://}/settings/personal-access-tokens/new" - } >> "$GITHUB_STEP_SUMMARY" - - echo "Token type is not supported for Copilot." >&2 - echo "Use a fine-grained PAT with Copilot Requests permission." >&2 - exit 1 - - else - # Generic 403 error - { - echo "## ❌ Copilot Access Denied" - echo "" - echo "The token exchange endpoint returned HTTP 403:" - echo "\`\`\`" - echo "$ERROR_MSG" - echo "\`\`\`" - echo "" - echo "**Common causes:**" - echo "- Copilot not licensed for this user/organization" - echo "- Incorrect token permissions" - echo "- Token type not supported" - echo "" - echo "Contact your GHES administrator for assistance." - } >> "$GITHUB_STEP_SUMMARY" - - echo "Token exchange failed with HTTP 403: $ERROR_MSG" >&2 - exit 1 - fi - -elif [ "$HTTP_STATUS" = "401" ]; then - { - echo "## ❌ Invalid or Expired Token" - echo "" - echo "The token exchange endpoint returned HTTP 401 (Unauthorized)." - echo "" - echo "**This means COPILOT_GITHUB_TOKEN is invalid or expired.**" - echo "" - echo "### How to fix:" - echo "1. Verify the secret is correctly configured in repository settings" - echo "2. Check if the token has expired (fine-grained PATs have expiration dates)" - echo "3. Regenerate the token if needed" - echo "4. Ensure the token has **Copilot Requests: Read-only** permission" - } >> "$GITHUB_STEP_SUMMARY" - - echo "COPILOT_GITHUB_TOKEN is invalid or expired (HTTP 401)" >&2 - exit 1 - -elif [ "$HTTP_STATUS" = "404" ]; then - { - echo "## ❌ Copilot Endpoint Not Found" - echo "" - echo "The token exchange endpoint returned HTTP 404 (Not Found)." - echo "" - echo "**This may indicate:**" - echo "- GHES version does not support Copilot" - echo "- Copilot infrastructure is not enabled on this instance" - echo "" - echo "### How to fix:" - echo "- Verify GHES version supports GitHub Copilot" - echo "- Ask your GHES admin to enable Copilot infrastructure" - echo "- Check endpoint URL: \`$TOKEN_EXCHANGE_URL\`" - } >> "$GITHUB_STEP_SUMMARY" - - echo "Copilot endpoint not found (HTTP 404) - GHES may not support Copilot" >&2 - exit 1 - -elif [ "$HTTP_STATUS" = "000" ] || [ -z "$HTTP_STATUS" ]; then - echo "âš ī¸ Could not connect to token exchange endpoint" - echo " This may indicate network issues or firewall blocking" - echo " Proceeding with Copilot execution (will fail if endpoint is truly unavailable)" - # Don't exit - let Copilot CLI fail with its own error if needed - -else - echo "âš ī¸ Unexpected response from token exchange endpoint (HTTP $HTTP_STATUS)" - echo " Proceeding with Copilot execution" - # Don't exit - unexpected statuses should not block execution -fi - -# Test 2: GHES-specific validation -if [ "$IS_GHES" = true ]; then - echo "" - echo "🔍 Running GHES-specific checks..." - - # Check if engine.api-target is set (should match GITHUB_API_URL) - # This env var would be set by the compiler if engine.api-target is configured - if [ -n "$COPILOT_API_TARGET" ]; then - if [ "$COPILOT_API_TARGET" != "$GITHUB_API_URL" ]; then - echo "âš ī¸ Warning: engine.api-target ($COPILOT_API_TARGET) does not match GITHUB_API_URL ($GITHUB_API_URL)" - echo " This may cause API routing issues" - else - echo "✅ engine.api-target matches GITHUB_API_URL" - fi - else - echo "â„šī¸ engine.api-target not configured (using default GITHUB_API_URL)" - fi - - # Verify GHES API domain is accessible - GHES_DOMAIN=$(echo "$GITHUB_API_URL" | sed -E 's|https?://([^/]+).*|\1|') - if [ -n "$GHES_DOMAIN" ]; then - echo "â„šī¸ GHES API domain: $GHES_DOMAIN" - echo " Ensure this domain is in network.allowed if using firewall" - fi -fi - -echo "" -echo "✅ Pre-flight diagnostic completed" -echo " Proceeding with Copilot CLI execution..." - -# Clean up temporary files -rm -f /tmp/copilot_token_exchange.json - -exit 0 diff --git a/pkg/workflow/copilot_engine_execution.go b/pkg/workflow/copilot_engine_execution.go index 7d13b1218c7..ceeeb0d406e 100644 --- a/pkg/workflow/copilot_engine_execution.go +++ b/pkg/workflow/copilot_engine_execution.go @@ -40,14 +40,6 @@ func (e *CopilotEngine) GetExecutionSteps(workflowData *WorkflowData, logFile st var steps []GitHubActionStep - // Add pre-flight diagnostic step before Copilot CLI execution - // This helps diagnose licensing and configuration issues on GHES - preflightStep := generateCopilotPreflightDiagnosticStep(workflowData) - if len(preflightStep) > 0 { - steps = append(steps, preflightStep) - copilotExecLog.Print("Added pre-flight diagnostic step") - } - // Build copilot CLI arguments based on configuration var copilotArgs []string sandboxEnabled := isFirewallEnabled(workflowData) @@ -454,51 +446,3 @@ func generateCopilotSessionFileCopyStep() GitHubActionStep { return GitHubActionStep(step) } - -// generateCopilotPreflightDiagnosticStep generates a pre-flight diagnostic step that runs -// before Copilot CLI execution to detect and report licensing/configuration issues early. -// This is especially helpful on GHES where errors are often opaque. -// -// The diagnostic checks: -// 1. Token exchange to Copilot inference API (validates licensing and token validity) -// 2. GHES-specific configuration validation (api-target, network domains) -// -// The step is skipped when: -// - copilot-requests feature is enabled (uses GitHub Actions token, no separate token needed) -// - custom command is specified (non-standard Copilot setup) -func generateCopilotPreflightDiagnosticStep(workflowData *WorkflowData) GitHubActionStep { - // Skip if copilot-requests feature is enabled (uses GitHub Actions token) - if isFeatureEnabled(constants.CopilotRequestsFeatureFlag, workflowData) { - copilotExecLog.Print("Skipping pre-flight diagnostic: copilot-requests feature enabled") - return GitHubActionStep{} - } - - // Skip if custom command is specified (non-standard setup) - if workflowData.EngineConfig != nil && workflowData.EngineConfig.Command != "" { - copilotExecLog.Print("Skipping pre-flight diagnostic: custom command specified") - return GitHubActionStep{} - } - - copilotExecLog.Print("Generating Copilot pre-flight diagnostic step") - - var step []string - step = append(step, " - name: Copilot pre-flight diagnostic") - step = append(step, " id: copilot-preflight") - step = append(step, " continue-on-error: true") - step = append(step, " env:") - - // Use COPILOT_GITHUB_TOKEN for the diagnostic - // #nosec G101 -- This is a GitHub Actions expression template, not a hardcoded credential - step = append(step, " COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }}") - step = append(step, " GITHUB_SERVER_URL: ${{ github.server_url }}") - step = append(step, " GITHUB_API_URL: ${{ github.api_url }}") - - // Pass engine.api-target if configured - if workflowData.EngineConfig != nil && workflowData.EngineConfig.APITarget != "" { - step = append(step, " COPILOT_API_TARGET: "+workflowData.EngineConfig.APITarget) - } - - step = append(step, " run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh") - - return GitHubActionStep(step) -} diff --git a/pkg/workflow/copilot_engine_test.go b/pkg/workflow/copilot_engine_test.go index 4a00755fdfd..742c9c50309 100644 --- a/pkg/workflow/copilot_engine_test.go +++ b/pkg/workflow/copilot_engine_test.go @@ -126,13 +126,13 @@ func TestCopilotEngineExecutionSteps(t *testing.T) { } steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") - // GetExecutionSteps now returns 2 steps: preflight diagnostic + copilot execution - if len(steps) != 2 { - t.Fatalf("Expected 2 steps (preflight + copilot execution), got %d", len(steps)) + // GetExecutionSteps returns 1 step: copilot execution + if len(steps) != 1 { + t.Fatalf("Expected 1 execution step, got %d", len(steps)) } - // Check the execution step (second step, after preflight) - stepContent := strings.Join([]string(steps[1]), "\n") + // Check the execution step + stepContent := strings.Join([]string(steps[0]), "\n") if !strings.Contains(stepContent, "name: Execute GitHub Copilot CLI") { t.Errorf("Expected step name 'Execute GitHub Copilot CLI' in step content:\n%s", stepContent) @@ -206,13 +206,13 @@ func TestCopilotEngineExecutionStepsWithOutput(t *testing.T) { } steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") - // GetExecutionSteps now returns 2 steps: preflight + execution - if len(steps) != 2 { - t.Fatalf("Expected 2 steps (preflight + execution), got %d", len(steps)) + // GetExecutionSteps returns 1 step: execution + if len(steps) != 1 { + t.Fatalf("Expected 1 execution step, got %d", len(steps)) } - // Check the execution step (second step) - stepContent := strings.Join([]string(steps[1]), "\n") + // Check the execution step + stepContent := strings.Join([]string(steps[0]), "\n") // Test that GH_AW_SAFE_OUTPUTS is present when SafeOutputs is not nil if !strings.Contains(stepContent, "GH_AW_SAFE_OUTPUTS: ${{ env.GH_AW_SAFE_OUTPUTS }}") { @@ -570,13 +570,12 @@ func TestCopilotEngineExecutionStepsWithToolArguments(t *testing.T) { } steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") - // GetExecutionSteps only returns the execution step - if len(steps) != 2 { - t.Fatalf("Expected 2 steps (preflight + execution), got %d", len(steps)) + if len(steps) != 1 { + t.Fatalf("Expected 1 execution step, got %d", len(steps)) } // Check the execution step contains tool arguments - stepContent := strings.Join([]string(steps[1]), "\n") + stepContent := strings.Join([]string(steps[0]), "\n") // Should contain the tool arguments in the command line if !strings.Contains(stepContent, "--allow-tool shell(echo)") { @@ -656,12 +655,11 @@ func TestCopilotEngineEditToolAddsAllowAllPaths(t *testing.T) { } steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") - // GetExecutionSteps only returns the execution step - if len(steps) != 2 { - t.Fatalf("Expected 2 steps, got %d", len(steps)) + if len(steps) != 1 { + t.Fatalf("Expected 1 step, got %d", len(steps)) } - stepContent := strings.Join([]string(steps[1]), "\n") + stepContent := strings.Join([]string(steps[0]), "\n") // Check for --allow-all-paths flag hasAllowAllPaths := strings.Contains(stepContent, "--allow-all-paths") @@ -703,13 +701,12 @@ func TestCopilotEngineShellEscaping(t *testing.T) { } steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") - // GetExecutionSteps only returns the execution step - if len(steps) != 2 { - t.Fatalf("Expected 2 steps, got %d", len(steps)) + if len(steps) != 1 { + t.Fatalf("Expected 1 step, got %d", len(steps)) } // Get the full command from the execution step - stepContent := strings.Join([]string(steps[1]), "\n") + stepContent := strings.Join([]string(steps[0]), "\n") // Find the line that contains the copilot command // When firewall is disabled, it uses 'copilot' instead of 'npx' @@ -750,13 +747,12 @@ func TestCopilotEngineInstructionPromptNotEscaped(t *testing.T) { } steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") - // GetExecutionSteps only returns the execution step - if len(steps) != 2 { - t.Fatalf("Expected 2 steps, got %d", len(steps)) + if len(steps) != 1 { + t.Fatalf("Expected 1 step, got %d", len(steps)) } // Get the full command from the execution step - stepContent := strings.Join([]string(steps[1]), "\n") + stepContent := strings.Join([]string(steps[0]), "\n") // Find the line that contains the copilot command // When firewall is disabled, it uses 'copilot' instead of 'npx' @@ -881,13 +877,12 @@ func TestCopilotEngineGitHubToolsShellEscaping(t *testing.T) { } steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") - // GetExecutionSteps only returns the execution step - if len(steps) != 2 { - t.Fatalf("Expected 2 steps, got %d", len(steps)) + if len(steps) != 1 { + t.Fatalf("Expected 1 step, got %d", len(steps)) } // Get the full command from the execution step - stepContent := strings.Join([]string(steps[1]), "\n") + stepContent := strings.Join([]string(steps[0]), "\n") // Find the line that contains the copilot command // When firewall is disabled, it uses 'copilot' instead of 'npx' @@ -1041,12 +1036,11 @@ func TestCopilotEngineExecutionStepsWithCacheMemory(t *testing.T) { } steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") - // GetExecutionSteps only returns the execution step - if len(steps) != 2 { - t.Fatalf("Expected 2 steps, got %d", len(steps)) + if len(steps) != 1 { + t.Fatalf("Expected 1 step, got %d", len(steps)) } - stepContent := strings.Join([]string(steps[1]), "\n") + stepContent := strings.Join([]string(steps[0]), "\n") // Test that mkdir commands are present for cache-memory directories if !strings.Contains(stepContent, "mkdir -p /tmp/gh-aw/cache-memory/") { @@ -1081,12 +1075,11 @@ func TestCopilotEngineExecutionStepsWithCustomAddDirArgs(t *testing.T) { } steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") - // GetExecutionSteps only returns the execution step - if len(steps) != 2 { - t.Fatalf("Expected 2 steps, got %d", len(steps)) + if len(steps) != 1 { + t.Fatalf("Expected 1 step, got %d", len(steps)) } - stepContent := strings.Join([]string(steps[1]), "\n") + stepContent := strings.Join([]string(steps[0]), "\n") // Test that mkdir commands are present for custom --add-dir path if !strings.Contains(stepContent, "mkdir -p /custom/path/") { @@ -1496,12 +1489,11 @@ func TestCopilotEnginePluginDiscoveryInSandboxMode(t *testing.T) { } steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") - // GetExecutionSteps only returns the execution step - if len(steps) != 2 { - t.Fatalf("Expected 2 steps, got %d", len(steps)) + if len(steps) != 1 { + t.Fatalf("Expected 1 step, got %d", len(steps)) } - stepContent := strings.Join([]string(steps[1]), "\n") + stepContent := strings.Join([]string(steps[0]), "\n") // Check for --add-dir /home/runner/.copilot/ in the copilot command hasCopilotDir := strings.Contains(stepContent, "--add-dir /home/runner/.copilot/") @@ -1547,12 +1539,11 @@ func TestCopilotEnginePluginDiscoveryWithSRT(t *testing.T) { } steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") - // GetExecutionSteps only returns the execution step - if len(steps) != 2 { - t.Fatalf("Expected 2 steps, got %d", len(steps)) + if len(steps) != 1 { + t.Fatalf("Expected 1 step, got %d", len(steps)) } - stepContent := strings.Join([]string(steps[1]), "\n") + stepContent := strings.Join([]string(steps[0]), "\n") // Should include --add-dir /home/runner/.copilot/ when SRT is enabled with plugins if !strings.Contains(stepContent, "--add-dir /home/runner/.copilot/") { @@ -1596,11 +1587,11 @@ func TestCopilotEngineEnvOverridesTokenExpression(t *testing.T) { } steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") - if len(steps) != 2 { - t.Fatalf("Expected 2 steps, got %d", len(steps)) + if len(steps) != 1 { + t.Fatalf("Expected 1 step, got %d", len(steps)) } - stepContent := strings.Join([]string(steps[1]), "\n") + stepContent := strings.Join([]string(steps[0]), "\n") // engine.env override should replace the default token expression if !strings.Contains(stepContent, "COPILOT_GITHUB_TOKEN: ${{ secrets.MY_ORG_COPILOT_TOKEN }}") { @@ -1622,115 +1613,14 @@ func TestCopilotEngineEnvOverridesTokenExpression(t *testing.T) { } steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") - if len(steps) != 2 { - t.Fatalf("Expected 2 steps, got %d", len(steps)) - } - - stepContent := strings.Join([]string(steps[1]), "\n") - - if !strings.Contains(stepContent, "CUSTOM_VAR: custom-value") { - t.Errorf("Expected engine.env to add CUSTOM_VAR, got:\n%s", stepContent) - } - }) -} - -func TestCopilotPreflightDiagnosticStep(t *testing.T) { - engine := NewCopilotEngine() - - t.Run("includes preflight diagnostic by default", func(t *testing.T) { - workflowData := &WorkflowData{ - Name: "test-workflow", - } - - steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") - - // Should have 2 steps: preflight + execution - if len(steps) != 2 { - t.Fatalf("Expected 2 steps (preflight + execution), got %d", len(steps)) - } - - // First step should be preflight diagnostic - preflightContent := strings.Join([]string(steps[0]), "\n") - if !strings.Contains(preflightContent, "Copilot pre-flight diagnostic") { - t.Errorf("Expected first step to be preflight diagnostic, got:\n%s", preflightContent) - } - - if !strings.Contains(preflightContent, "copilot_preflight_diagnostic.sh") { - t.Errorf("Expected preflight step to call diagnostic script, got:\n%s", preflightContent) - } - - if !strings.Contains(preflightContent, "COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }}") { - t.Errorf("Expected preflight step to pass COPILOT_GITHUB_TOKEN, got:\n%s", preflightContent) - } - - if !strings.Contains(preflightContent, "GITHUB_API_URL: ${{ github.api_url }}") { - t.Errorf("Expected preflight step to pass GITHUB_API_URL, got:\n%s", preflightContent) - } - }) - - t.Run("skips preflight when copilot-requests feature enabled", func(t *testing.T) { - workflowData := &WorkflowData{ - Name: "test-workflow", - Features: map[string]any{ - "copilot-requests": true, - }, - } - - steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") - - // Should have only 1 step: execution (no preflight) if len(steps) != 1 { - t.Fatalf("Expected 1 step (execution only), got %d", len(steps)) + t.Fatalf("Expected 1 step, got %d", len(steps)) } - // Step should be execution, not preflight stepContent := strings.Join([]string(steps[0]), "\n") - if strings.Contains(stepContent, "Copilot pre-flight diagnostic") { - t.Errorf("Expected preflight to be skipped with copilot-requests feature, but found it:\n%s", stepContent) - } - }) - t.Run("skips preflight when custom command specified", func(t *testing.T) { - workflowData := &WorkflowData{ - Name: "test-workflow", - EngineConfig: &EngineConfig{ - Command: "/custom/copilot", - }, - } - - steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") - - // Should have only 1 step: execution (no preflight) - if len(steps) != 1 { - t.Fatalf("Expected 1 step (execution only), got %d", len(steps)) - } - - // Step should be execution, not preflight - stepContent := strings.Join([]string(steps[0]), "\n") - if strings.Contains(stepContent, "Copilot pre-flight diagnostic") { - t.Errorf("Expected preflight to be skipped with custom command, but found it:\n%s", stepContent) - } - }) - - t.Run("includes api-target in preflight when configured", func(t *testing.T) { - workflowData := &WorkflowData{ - Name: "test-workflow", - EngineConfig: &EngineConfig{ - APITarget: "https://ghe.example.com/api/v3", - }, - } - - steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") - - // Should have 2 steps: preflight + execution - if len(steps) != 2 { - t.Fatalf("Expected 2 steps (preflight + execution), got %d", len(steps)) - } - - // First step should include COPILOT_API_TARGET - preflightContent := strings.Join([]string(steps[0]), "\n") - if !strings.Contains(preflightContent, "COPILOT_API_TARGET: https://ghe.example.com/api/v3") { - t.Errorf("Expected preflight to include COPILOT_API_TARGET, got:\n%s", preflightContent) + if !strings.Contains(stepContent, "CUSTOM_VAR: custom-value") { + t.Errorf("Expected engine.env to add CUSTOM_VAR, got:\n%s", stepContent) } }) } diff --git a/pkg/workflow/enable_api_proxy_test.go b/pkg/workflow/enable_api_proxy_test.go index 0eb0fc55ac3..3bce3dc11c1 100644 --- a/pkg/workflow/enable_api_proxy_test.go +++ b/pkg/workflow/enable_api_proxy_test.go @@ -5,33 +5,22 @@ import ( "testing" ) -func requireCopilotPreflightAndExecutionSteps(t *testing.T, steps []GitHubActionStep) (string, string) { +func requireCopilotExecutionStep(t *testing.T, steps []GitHubActionStep) string { t.Helper() - if len(steps) != 2 { - t.Fatalf("Expected 2 execution steps (preflight + execution), got %d", len(steps)) + if len(steps) != 1 { + t.Fatalf("Expected 1 execution step, got %d", len(steps)) } - preflightContent := strings.Join(steps[0], "\n") - if !strings.Contains(preflightContent, "Copilot pre-flight diagnostic") { - t.Fatalf("Expected first Copilot step to be the pre-flight diagnostic, got:\n%s", preflightContent) - } - if !strings.Contains(preflightContent, "id: copilot-preflight") { - t.Fatalf("Expected pre-flight step to have id 'copilot-preflight', got:\n%s", preflightContent) - } - if !strings.Contains(preflightContent, "copilot_preflight_diagnostic.sh") { - t.Fatalf("Expected pre-flight step to run the diagnostic script, got:\n%s", preflightContent) - } - - executionContent := strings.Join(steps[1], "\n") + executionContent := strings.Join(steps[0], "\n") if !strings.Contains(executionContent, "Execute GitHub Copilot CLI") { - t.Fatalf("Expected second Copilot step to execute the CLI, got:\n%s", executionContent) + t.Fatalf("Expected Copilot step to execute the CLI, got:\n%s", executionContent) } if !strings.Contains(executionContent, "id: agentic_execution") { t.Fatalf("Expected execution step to have id 'agentic_execution', got:\n%s", executionContent) } - return preflightContent, executionContent + return executionContent } // TestEngineAWFEnableApiProxy tests that engines with LLM gateway support @@ -80,7 +69,7 @@ func TestEngineAWFEnableApiProxy(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - _, stepContent := requireCopilotPreflightAndExecutionSteps(t, steps) + stepContent := requireCopilotExecutionStep(t, steps) if !strings.Contains(stepContent, "--enable-api-proxy") { t.Error("Expected Copilot AWF command to contain '--enable-api-proxy' flag") diff --git a/pkg/workflow/engine_agent_import_test.go b/pkg/workflow/engine_agent_import_test.go index 52ce6d77e66..3f3f1b538ce 100644 --- a/pkg/workflow/engine_agent_import_test.go +++ b/pkg/workflow/engine_agent_import_test.go @@ -22,11 +22,11 @@ func TestCopilotEngineWithAgentFromEngineConfig(t *testing.T) { steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") - if len(steps) != 2 { - t.Fatalf("Expected 2 execution steps (preflight + execution), got %d", len(steps)) + if len(steps) != 1 { + t.Fatalf("Expected 1 execution step, got %d", len(steps)) } - stepContent := strings.Join([]string(steps[1]), "\n") + stepContent := strings.Join([]string(steps[0]), "\n") // Copilot CLI expects agent identifier if !strings.Contains(stepContent, `--agent my-custom-agent`) { @@ -48,11 +48,11 @@ func TestCopilotEngineWithAgentFromImports(t *testing.T) { steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") - if len(steps) != 2 { - t.Fatalf("Expected 2 execution steps (preflight + execution), got %d", len(steps)) + if len(steps) != 1 { + t.Fatalf("Expected 1 execution step, got %d", len(steps)) } - stepContent := strings.Join([]string(steps[1]), "\n") + stepContent := strings.Join([]string(steps[0]), "\n") // Agent imports should NOT set --agent flag (only engine.agent does) if strings.Contains(stepContent, `--agent`) { @@ -74,11 +74,11 @@ func TestCopilotEngineAgentOnlyFromEngineConfig(t *testing.T) { steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") - if len(steps) != 2 { - t.Fatalf("Expected 2 execution steps (preflight + execution), got %d", len(steps)) + if len(steps) != 1 { + t.Fatalf("Expected 1 execution step, got %d", len(steps)) } - stepContent := strings.Join([]string(steps[1]), "\n") + stepContent := strings.Join([]string(steps[0]), "\n") // Should only use explicit agent from engine.agent if !strings.Contains(stepContent, `--agent explicit-agent`) { @@ -102,11 +102,11 @@ func TestCopilotEngineWithoutAgentFlag(t *testing.T) { steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") - if len(steps) != 2 { - t.Fatalf("Expected 2 execution steps (preflight + execution), got %d", len(steps)) + if len(steps) != 1 { + t.Fatalf("Expected 1 execution step, got %d", len(steps)) } - stepContent := strings.Join([]string(steps[1]), "\n") + stepContent := strings.Join([]string(steps[0]), "\n") if strings.Contains(stepContent, "--agent") { t.Errorf("Did not expect '--agent' flag when agent file is not specified, got:\n%s", stepContent) diff --git a/pkg/workflow/firewall_args_test.go b/pkg/workflow/firewall_args_test.go index 5b781d4fddc..348858cef2f 100644 --- a/pkg/workflow/firewall_args_test.go +++ b/pkg/workflow/firewall_args_test.go @@ -27,7 +27,7 @@ func TestFirewallArgsInCopilotEngine(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - _, stepContent := requireCopilotPreflightAndExecutionSteps(t, steps) + stepContent := requireCopilotExecutionStep(t, steps) // Check that the command contains awf (AWF v0.15.0+ uses chroot mode by default) if !strings.Contains(stepContent, "sudo -E awf") { @@ -65,7 +65,7 @@ func TestFirewallArgsInCopilotEngine(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - _, stepContent := requireCopilotPreflightAndExecutionSteps(t, steps) + stepContent := requireCopilotExecutionStep(t, steps) // Check that custom args are included if !strings.Contains(stepContent, "--custom-arg") { @@ -103,7 +103,7 @@ func TestFirewallArgsInCopilotEngine(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - _, stepContent := requireCopilotPreflightAndExecutionSteps(t, steps) + stepContent := requireCopilotExecutionStep(t, steps) // Check that args with spaces are present (they should be escaped) if !strings.Contains(stepContent, "--message") { @@ -132,7 +132,7 @@ func TestFirewallArgsInCopilotEngine(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - _, stepContent := requireCopilotPreflightAndExecutionSteps(t, steps) + stepContent := requireCopilotExecutionStep(t, steps) // Check that AWF is used for transparent host access (AWF v0.15.0+) // Chroot mode is now the default, so no --enable-chroot flag is needed @@ -162,7 +162,7 @@ func TestFirewallArgsInCopilotEngine(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - _, stepContent := requireCopilotPreflightAndExecutionSteps(t, steps) + stepContent := requireCopilotExecutionStep(t, steps) // Check that --image-tag is included with default version (without v prefix) expectedImageTag := "--image-tag " + strings.TrimPrefix(string(constants.DefaultFirewallVersion), "v") @@ -189,7 +189,7 @@ func TestFirewallArgsInCopilotEngine(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - _, stepContent := requireCopilotPreflightAndExecutionSteps(t, steps) + stepContent := requireCopilotExecutionStep(t, steps) // Check that --image-tag is included with custom version (without v prefix) expectedImageTag := "--image-tag " + strings.TrimPrefix(customVersion, "v") @@ -221,7 +221,7 @@ func TestFirewallArgsInCopilotEngine(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - _, stepContent := requireCopilotPreflightAndExecutionSteps(t, steps) + stepContent := requireCopilotExecutionStep(t, steps) // Check that --ssl-bump flag is included if !strings.Contains(stepContent, "--ssl-bump") { @@ -247,7 +247,7 @@ func TestFirewallArgsInCopilotEngine(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - _, stepContent := requireCopilotPreflightAndExecutionSteps(t, steps) + stepContent := requireCopilotExecutionStep(t, steps) // Check that --ssl-bump flag is included if !strings.Contains(stepContent, "--ssl-bump") { @@ -282,7 +282,7 @@ func TestFirewallArgsInCopilotEngine(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - _, stepContent := requireCopilotPreflightAndExecutionSteps(t, steps) + stepContent := requireCopilotExecutionStep(t, steps) // Check that --ssl-bump flag is NOT included if strings.Contains(stepContent, "--ssl-bump") { diff --git a/pkg/workflow/firewall_blocked_domains_test.go b/pkg/workflow/firewall_blocked_domains_test.go index 9a8c8b78588..904ed2ad613 100644 --- a/pkg/workflow/firewall_blocked_domains_test.go +++ b/pkg/workflow/firewall_blocked_domains_test.go @@ -29,7 +29,7 @@ func TestFirewallBlockedDomainsInCopilotEngine(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - _, stepContent := requireCopilotPreflightAndExecutionSteps(t, steps) + stepContent := requireCopilotExecutionStep(t, steps) // Verify --allow-domains is present assert.Contains(t, stepContent, "--allow-domains", "Expected command to contain '--allow-domains'") @@ -59,7 +59,7 @@ func TestFirewallBlockedDomainsInCopilotEngine(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - _, stepContent := requireCopilotPreflightAndExecutionSteps(t, steps) + stepContent := requireCopilotExecutionStep(t, steps) // Verify --allow-domains is present assert.Contains(t, stepContent, "--allow-domains", "Expected command to contain '--allow-domains'") @@ -86,7 +86,7 @@ func TestFirewallBlockedDomainsInCopilotEngine(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - _, stepContent := requireCopilotPreflightAndExecutionSteps(t, steps) + stepContent := requireCopilotExecutionStep(t, steps) // Verify --block-domains is present assert.Contains(t, stepContent, "--block-domains", "Expected command to contain '--block-domains'") diff --git a/pkg/workflow/firewall_log_level_test.go b/pkg/workflow/firewall_log_level_test.go index bfc304eb489..ba42dcf6e5f 100644 --- a/pkg/workflow/firewall_log_level_test.go +++ b/pkg/workflow/firewall_log_level_test.go @@ -137,7 +137,7 @@ func TestFirewallLogLevelInCopilotEngine(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - _, stepContent := requireCopilotPreflightAndExecutionSteps(t, steps) + stepContent := requireCopilotExecutionStep(t, steps) // Check that the command contains --log-level info (default) if !strings.Contains(stepContent, "--log-level info") { @@ -162,7 +162,7 @@ func TestFirewallLogLevelInCopilotEngine(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - _, stepContent := requireCopilotPreflightAndExecutionSteps(t, steps) + stepContent := requireCopilotExecutionStep(t, steps) // Check that the command contains --log-level debug if !strings.Contains(stepContent, "--log-level debug") { @@ -190,7 +190,7 @@ func TestFirewallLogLevelInCopilotEngine(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - _, stepContent := requireCopilotPreflightAndExecutionSteps(t, steps) + stepContent := requireCopilotExecutionStep(t, steps) expectedFlag := "--log-level " + level if !strings.Contains(stepContent, expectedFlag) { diff --git a/pkg/workflow/gh_cli_mount_test.go b/pkg/workflow/gh_cli_mount_test.go index 20a03be9799..09754aa566f 100644 --- a/pkg/workflow/gh_cli_mount_test.go +++ b/pkg/workflow/gh_cli_mount_test.go @@ -25,7 +25,7 @@ func TestChrootModeInAWFContainer(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - _, stepContent := requireCopilotPreflightAndExecutionSteps(t, steps) + stepContent := requireCopilotExecutionStep(t, steps) // Check that AWF is used (chroot mode is default in v0.15.0+) if !strings.Contains(stepContent, "sudo -E awf") { @@ -49,7 +49,7 @@ func TestChrootModeInAWFContainer(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - _, stepContent := requireCopilotPreflightAndExecutionSteps(t, steps) + stepContent := requireCopilotExecutionStep(t, steps) // Check that AWF command is not used if strings.Contains(stepContent, "awf") { @@ -73,7 +73,7 @@ func TestChrootModeInAWFContainer(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - _, stepContent := requireCopilotPreflightAndExecutionSteps(t, steps) + stepContent := requireCopilotExecutionStep(t, steps) // Verify AWF is present (chroot mode is default in v0.15.0+) if !strings.Contains(stepContent, "sudo -E awf") { @@ -113,7 +113,7 @@ func TestChrootModeInAWFContainer(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - _, stepContent := requireCopilotPreflightAndExecutionSteps(t, steps) + stepContent := requireCopilotExecutionStep(t, steps) // Verify AWF is present with custom args (chroot mode is default in v0.15.0+) if !strings.Contains(stepContent, "sudo -E awf") { @@ -147,7 +147,7 @@ func TestChrootModeInAWFContainer(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - _, stepContent := requireCopilotPreflightAndExecutionSteps(t, steps) + stepContent := requireCopilotExecutionStep(t, steps) // Verify AWF is being used (chroot mode is default in v0.15.0+) if !strings.Contains(stepContent, "awf") { @@ -174,7 +174,7 @@ func TestChrootModeEnvFlags(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - _, stepContent := requireCopilotPreflightAndExecutionSteps(t, steps) + stepContent := requireCopilotExecutionStep(t, steps) // Verify AWF is present (chroot mode is default in v0.15.0+) if !strings.Contains(stepContent, "sudo -E awf") { diff --git a/pkg/workflow/mcp_scripts_firewall_test.go b/pkg/workflow/mcp_scripts_firewall_test.go index 731705083aa..899b67e906b 100644 --- a/pkg/workflow/mcp_scripts_firewall_test.go +++ b/pkg/workflow/mcp_scripts_firewall_test.go @@ -37,7 +37,7 @@ func TestMCPScriptsWithFirewallIncludesHostDockerInternal(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - _, stepContent := requireCopilotPreflightAndExecutionSteps(t, steps) + stepContent := requireCopilotExecutionStep(t, steps) // Verify that host.docker.internal is in the allowed domains if !strings.Contains(stepContent, "host.docker.internal") { diff --git a/pkg/workflow/sandbox_mounts_test.go b/pkg/workflow/sandbox_mounts_test.go index 196045294ea..ed18dd14167 100644 --- a/pkg/workflow/sandbox_mounts_test.go +++ b/pkg/workflow/sandbox_mounts_test.go @@ -264,11 +264,11 @@ func TestCopilotEngineWithCustomMounts(t *testing.T) { engine := NewCopilotEngine() steps := engine.GetExecutionSteps(workflowData, "test.log") - if len(steps) < 2 { - t.Fatal("Expected at least 2 execution steps (preflight + execution)") + if len(steps) < 1 { + t.Fatal("Expected at least 1 execution step") } - stepContent := strings.Join(steps[1], "\n") + stepContent := strings.Join(steps[0], "\n") // Check that custom mounts are included if !strings.Contains(stepContent, "--mount /host/data:/data:ro") { @@ -305,7 +305,7 @@ func TestCopilotEngineWithCustomMounts(t *testing.T) { t.Fatal("Expected at least one execution step") } - stepContent := strings.Join(steps[1], "\n") + stepContent := strings.Join(steps[0], "\n") // Verify AWF is present (chroot mode is default in v0.15.0+) if !strings.Contains(stepContent, "sudo -E awf") { @@ -349,7 +349,7 @@ func TestCopilotEngineWithCustomMounts(t *testing.T) { t.Fatal("Expected at least one execution step") } - stepContent := strings.Join(steps[1], "\n") + stepContent := strings.Join(steps[0], "\n") // Find the positions of each mount in the output dataPos := strings.Index(stepContent, "--mount /data:/data:rw") diff --git a/pkg/workflow/testdata/wasm_golden/TestWasmGolden_CompileFixtures/basic-copilot.golden b/pkg/workflow/testdata/wasm_golden/TestWasmGolden_CompileFixtures/basic-copilot.golden index 6cc7ad9a97d..349ad75bfa7 100644 --- a/pkg/workflow/testdata/wasm_golden/TestWasmGolden_CompileFixtures/basic-copilot.golden +++ b/pkg/workflow/testdata/wasm_golden/TestWasmGolden_CompileFixtures/basic-copilot.golden @@ -330,14 +330,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): diff --git a/pkg/workflow/testdata/wasm_golden/TestWasmGolden_CompileFixtures/smoke-copilot.golden b/pkg/workflow/testdata/wasm_golden/TestWasmGolden_CompileFixtures/smoke-copilot.golden index 7f50c3ca1b0..8dc75d25853 100644 --- a/pkg/workflow/testdata/wasm_golden/TestWasmGolden_CompileFixtures/smoke-copilot.golden +++ b/pkg/workflow/testdata/wasm_golden/TestWasmGolden_CompileFixtures/smoke-copilot.golden @@ -508,14 +508,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): diff --git a/pkg/workflow/testdata/wasm_golden/TestWasmGolden_CompileFixtures/with-imports.golden b/pkg/workflow/testdata/wasm_golden/TestWasmGolden_CompileFixtures/with-imports.golden index 43073782f92..8410246bdb8 100644 --- a/pkg/workflow/testdata/wasm_golden/TestWasmGolden_CompileFixtures/with-imports.golden +++ b/pkg/workflow/testdata/wasm_golden/TestWasmGolden_CompileFixtures/with-imports.golden @@ -333,14 +333,6 @@ jobs: path: /tmp/gh-aw - name: Clean git credentials run: bash /opt/gh-aw/actions/clean_git_credentials.sh - - name: Copilot pre-flight diagnostic - id: copilot-preflight - continue-on-error: true - env: - COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} - GITHUB_SERVER_URL: ${{ github.server_url }} - GITHUB_API_URL: ${{ github.api_url }} - run: bash /opt/gh-aw/actions/copilot_preflight_diagnostic.sh - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): diff --git a/pkg/workflow/tools_timeout_test.go b/pkg/workflow/tools_timeout_test.go index a3deeaa0db4..f30e2c018f8 100644 --- a/pkg/workflow/tools_timeout_test.go +++ b/pkg/workflow/tools_timeout_test.go @@ -308,12 +308,12 @@ func TestCopilotEngineWithToolsTimeout(t *testing.T) { // Get execution steps executionSteps := engine.GetExecutionSteps(workflowData, "/tmp/test.log") - if len(executionSteps) < 2 { - t.Fatal("Expected at least 2 execution steps (preflight + execution)") + if len(executionSteps) < 1 { + t.Fatal("Expected at least 1 execution step") } - // Get the execution step (second step, after preflight) - stepContent := strings.Join([]string(executionSteps[1]), "\n") + // Get the execution step + stepContent := strings.Join([]string(executionSteps[0]), "\n") // Check for GH_AW_TOOL_TIMEOUT if expected if tt.expectedEnvVar != "" {