Align golden fixtures and lockfile hashes with current compiler output#27002
Align golden fixtures and lockfile hashes with current compiler output#27002
Conversation
Agent-Logs-Url: https://github.com/github/gh-aw/sessions/8e7b4a22-2138-4aef-aed0-ea5033fd0618 Co-authored-by: pelikhan <4175913+pelikhan@users.noreply.github.com>
There was a problem hiding this comment.
Pull request overview
Note
Copilot was unable to run its full agentic suite in this review.
Refreshes generated “expected artifacts” (WASM golden fixtures and workflow lockfiles) so CI matches the current compiler/lockfile output.
Changes:
- Updated WASM golden snapshots for
basic-copilotandwith-imports, including the MCP gateway docker command now injecting UID/GID via--user. - Recompiled workflow lockfiles to fix embedded
frontmatter_hashdrift. - Lockfile output also reflects updated MCP gateway container tag (
gh-aw-mcpg) in generated docker command strings.
Show a summary per file
| File | Description |
|---|---|
| pkg/workflow/testdata/TestWasmGolden_CompileFixtures/with-imports.golden | Updates expected YAML output for “with-imports” fixture (CLI version + MCP gateway docker command shape). |
| pkg/workflow/testdata/TestWasmGolden_CompileFixtures/basic-copilot.golden | Updates expected YAML output for “basic-copilot” fixture (CLI version + MCP gateway docker command shape). |
| .github/workflows/smoke-claude.lock.yml | Refreshes lock metadata hash; regenerated content also updates MCP gateway image tag in docker command line. |
| .github/workflows/daily-fact.lock.yml | Refreshes lock metadata hash; regenerated content also updates MCP gateway image tag in docker command line. |
Copilot's findings
Tip
Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.
- Files reviewed: 4/4 changed files
- Comments generated: 5
| GH_AW_INFO_VERSION: "1.0.21" | ||
| GH_AW_INFO_AGENT_VERSION: "1.0.21" |
There was a problem hiding this comment.
The PR description calls out golden refresh due to the MCP gateway docker command shape, but this fixture also changes the Copilot CLI version from 1.0.31 to 1.0.21 (both metadata and install script argument). If this version downgrade is intended as part of the ‘current compiler output’, it should be explicitly mentioned in the PR description (or otherwise investigated, since it may indicate the generator is now pinning an older CLI unexpectedly).
| await main(); | ||
| - name: Install GitHub Copilot CLI | ||
| run: bash "${RUNNER_TEMP}/gh-aw/actions/install_copilot_cli.sh" 1.0.31 | ||
| run: bash "${RUNNER_TEMP}/gh-aw/actions/install_copilot_cli.sh" 1.0.21 |
There was a problem hiding this comment.
The PR description calls out golden refresh due to the MCP gateway docker command shape, but this fixture also changes the Copilot CLI version from 1.0.31 to 1.0.21 (both metadata and install script argument). If this version downgrade is intended as part of the ‘current compiler output’, it should be explicitly mentioned in the PR description (or otherwise investigated, since it may indicate the generator is now pinning an older CLI unexpectedly).
| GH_AW_INFO_VERSION: "1.0.21" | ||
| GH_AW_INFO_AGENT_VERSION: "1.0.21" |
There was a problem hiding this comment.
Same as basic-copilot.golden: this golden update includes a Copilot CLI version change (1.0.31 -> 1.0.21) that isn’t called out in the PR description. Please either document this as an intended regeneration effect or confirm the generator/version source is correct.
| await main(); | ||
| - name: Install GitHub Copilot CLI | ||
| run: bash "${RUNNER_TEMP}/gh-aw/actions/install_copilot_cli.sh" 1.0.31 | ||
| run: bash "${RUNNER_TEMP}/gh-aw/actions/install_copilot_cli.sh" 1.0.21 |
There was a problem hiding this comment.
Same as basic-copilot.golden: this golden update includes a Copilot CLI version change (1.0.31 -> 1.0.21) that isn’t called out in the PR description. Please either document this as an intended regeneration effect or confirm the generator/version source is correct.
| MCP_GATEWAY_GID=$(id -g 2>/dev/null || echo '0') | ||
| DOCKER_SOCK_GID=$(stat -c '%g' /var/run/docker.sock 2>/dev/null || echo '0') | ||
| export MCP_GATEWAY_DOCKER_COMMAND='docker run -i --rm --network host --user '"${MCP_GATEWAY_UID}"':'"${MCP_GATEWAY_GID}"' --group-add '"${DOCKER_SOCK_GID}"' -v /var/run/docker.sock:/var/run/docker.sock -e MCP_GATEWAY_PORT -e MCP_GATEWAY_DOMAIN -e MCP_GATEWAY_API_KEY -e MCP_GATEWAY_PAYLOAD_DIR -e MCP_GATEWAY_PAYLOAD_SIZE_THRESHOLD -e DEBUG -e MCP_GATEWAY_LOG_DIR -e GH_AW_MCP_LOG_DIR -e GH_AW_SAFE_OUTPUTS -e GH_AW_SAFE_OUTPUTS_CONFIG_PATH -e GH_AW_SAFE_OUTPUTS_TOOLS_PATH -e GH_AW_ASSETS_BRANCH -e GH_AW_ASSETS_MAX_SIZE_KB -e GH_AW_ASSETS_ALLOWED_EXTS -e DEFAULT_BRANCH -e GITHUB_MCP_SERVER_TOKEN -e GITHUB_MCP_GUARD_MIN_INTEGRITY -e GITHUB_MCP_GUARD_REPOS -e GITHUB_REPOSITORY -e GITHUB_SERVER_URL -e GITHUB_SHA -e GITHUB_WORKSPACE -e GITHUB_TOKEN -e GITHUB_RUN_ID -e GITHUB_RUN_NUMBER -e GITHUB_RUN_ATTEMPT -e GITHUB_JOB -e GITHUB_ACTION -e GITHUB_EVENT_NAME -e GITHUB_EVENT_PATH -e GITHUB_ACTOR -e GITHUB_ACTOR_ID -e GITHUB_TRIGGERING_ACTOR -e GITHUB_WORKFLOW -e GITHUB_WORKFLOW_REF -e GITHUB_WORKFLOW_SHA -e GITHUB_REF -e GITHUB_REF_NAME -e GITHUB_REF_TYPE -e GITHUB_HEAD_REF -e GITHUB_BASE_REF -e GH_AW_MCP_SCRIPTS_PORT -e GH_AW_MCP_SCRIPTS_API_KEY -e GH_AW_SAFE_OUTPUTS_PORT -e GH_AW_SAFE_OUTPUTS_API_KEY -e GH_AW_GH_TOKEN -e GH_DEBUG -e GH_TOKEN -e TAVILY_API_KEY -v /tmp/gh-aw/mcp-payloads:/tmp/gh-aw/mcp-payloads:rw -v /opt:/opt:ro -v /tmp:/tmp:rw -v '"${GITHUB_WORKSPACE}"':'"${GITHUB_WORKSPACE}"':rw ghcr.io/github/gh-aw-mcpg:v0.2.22' | ||
| export MCP_GATEWAY_DOCKER_COMMAND='docker run -i --rm --network host --user '"${MCP_GATEWAY_UID}"':'"${MCP_GATEWAY_GID}"' --group-add '"${DOCKER_SOCK_GID}"' -v /var/run/docker.sock:/var/run/docker.sock -e MCP_GATEWAY_PORT -e MCP_GATEWAY_DOMAIN -e MCP_GATEWAY_API_KEY -e MCP_GATEWAY_PAYLOAD_DIR -e MCP_GATEWAY_PAYLOAD_SIZE_THRESHOLD -e DEBUG -e MCP_GATEWAY_LOG_DIR -e GH_AW_MCP_LOG_DIR -e GH_AW_SAFE_OUTPUTS -e GH_AW_SAFE_OUTPUTS_CONFIG_PATH -e GH_AW_SAFE_OUTPUTS_TOOLS_PATH -e GH_AW_ASSETS_BRANCH -e GH_AW_ASSETS_MAX_SIZE_KB -e GH_AW_ASSETS_ALLOWED_EXTS -e DEFAULT_BRANCH -e GITHUB_MCP_SERVER_TOKEN -e GITHUB_MCP_GUARD_MIN_INTEGRITY -e GITHUB_MCP_GUARD_REPOS -e GITHUB_REPOSITORY -e GITHUB_SERVER_URL -e GITHUB_SHA -e GITHUB_WORKSPACE -e GITHUB_TOKEN -e GITHUB_RUN_ID -e GITHUB_RUN_NUMBER -e GITHUB_RUN_ATTEMPT -e GITHUB_JOB -e GITHUB_ACTION -e GITHUB_EVENT_NAME -e GITHUB_EVENT_PATH -e GITHUB_ACTOR -e GITHUB_ACTOR_ID -e GITHUB_TRIGGERING_ACTOR -e GITHUB_WORKFLOW -e GITHUB_WORKFLOW_REF -e GITHUB_WORKFLOW_SHA -e GITHUB_REF -e GITHUB_REF_NAME -e GITHUB_REF_TYPE -e GITHUB_HEAD_REF -e GITHUB_BASE_REF -e GH_AW_MCP_SCRIPTS_PORT -e GH_AW_MCP_SCRIPTS_API_KEY -e GH_AW_SAFE_OUTPUTS_PORT -e GH_AW_SAFE_OUTPUTS_API_KEY -e GH_AW_GH_TOKEN -e GH_DEBUG -e GH_TOKEN -e TAVILY_API_KEY -v /tmp/gh-aw/mcp-payloads:/tmp/gh-aw/mcp-payloads:rw -v /opt:/opt:ro -v /tmp:/tmp:rw -v '"${GITHUB_WORKSPACE}"':'"${GITHUB_WORKSPACE}"':rw ghcr.io/github/gh-aw-mcpg:v0.2.24' |
There was a problem hiding this comment.
The PR description frames workflow lockfile updates as ‘frontmatter-hash drift’ repairs, but the regenerated lockfile content also updates the MCP gateway image tag in the embedded docker command (v0.2.22 -> v0.2.24). If this is an expected side-effect of recompiling lockfiles, please mention it in the PR description; otherwise, consider whether the lockfile regeneration tool should be constrained to hash-only updates for this change.
CI was failing due to stale expected artifacts, not runtime logic regressions: wasm golden snapshots no longer matched generated YAML, and two workflow lockfiles had frontmatter-hash drift from their markdown sources.
Wasm golden fixture refresh (
pkg/workflow)TestWasmGolden_CompileFixturesexpected outputs for:basic-copilot.goldenwith-imports.goldenWorkflow hash consistency repair (
.github/workflows)daily-fact.lock.ymlsmoke-claude.lock.yml.mdworkflow definitions.