Skip to content

fix(workflows): recompile agentic workflow lock files to gh-aw v0.68.1#1358

Closed
katriendg wants to merge 2 commits intomainfrom
chore/aw-upgrade
Closed

fix(workflows): recompile agentic workflow lock files to gh-aw v0.68.1#1358
katriendg wants to merge 2 commits intomainfrom
chore/aw-upgrade

Conversation

@katriendg
Copy link
Copy Markdown
Contributor

@katriendg katriendg commented Apr 14, 2026

Description

Recompiled all 5 agentic workflow lock files from gh-aw v0.65.4 to v0.68.1, resolving two distinct runtime failures that caused repeated "No Safe Outputs Generated" errors across 20+ workflow runs.

The old compiler version generated lock files with incompatible configurations for the current runtime environment, causing both checkout failures and MCP server policy blocks.

Root Causes Fixed

The sparse-checkout failure in dependency-pr-review occurred because the v0.65.4 compiler merged on.pull_request.paths glob patterns (**/requirements.txt, **/pyproject.toml) into the git sparse-checkout set command. Git cone-mode rejects ** glob patterns with fatal: specify directories rather than patterns.

The MCP policy blocking affected all workflows. Lock files compiled with AWF v0.25.6 and MCP Gateway v0.2.14 were incompatible with the updated runtime's stricter MCP server policies, causing 2 MCP servers were blocked by policy: 'github', 'safeoutputs'. The agent completed reviews but could not submit results through safe-output tools.

Version Upgrades

All lock files updated to the same component versions:

Component Before After
gh-aw compiler v0.65.4 v0.68.1
AWF (firewall) v0.25.6 v0.25.18
MCP Gateway v0.2.14 v0.2.17
actions/github-script v8 v9
github/gh-aw-actions/setup v0.65.6 v0.68.1

The actions-lock.json consolidated 4 stale github/gh-aw-actions/setup version pins (v0.63.1, v0.65.4, v0.65.6, v0.67.1) into a single v0.68.1 entry.

Related Issue(s)

Fixes #1261
Fixes #1357

Type of Change

Select all that apply:

Code & Documentation:

  • Bug fix (non-breaking change fixing an issue)
  • New feature (non-breaking change adding functionality)
  • Breaking change (fix or feature causing existing functionality to change)
  • Documentation update

Infrastructure & Configuration:

  • GitHub Actions workflow
  • Linting configuration (markdown, PowerShell, etc.)
  • Security configuration
  • DevContainer configuration
  • Dependency update

AI Artifacts:

  • Reviewed contribution with prompt-builder agent and addressed all feedback
  • Copilot instructions (.github/instructions/*.instructions.md)
  • Copilot prompt (.github/prompts/*.prompt.md)
  • Copilot agent (.github/agents/*.agent.md)
  • Copilot skill (.github/skills/*/SKILL.md)

Note for AI Artifact Contributors:

  • Agents: Research, indexing/referencing other project (using standard VS Code GitHub Copilot/MCP tools), planning, and general implementation agents likely already exist. Review .github/agents/ before creating new ones.
  • Skills: Must include both bash and PowerShell scripts. See Skills.
  • Model Versions: Only contributions targeting the latest Anthropic and OpenAI models will be accepted. Older model versions (e.g., GPT-3.5, Claude 3) will be rejected.
  • See Agents Not Accepted and Model Version Requirements.

Other:

  • Script/automation (.ps1, .sh, .py)
  • Other (please describe):

Sample Prompts (for AI Artifact Contributions)

Testing

  • gh aw compile --strict passed with 0 errors (5 warnings for the new github/gh-aw-actions/setup action SHA, expected for version upgrades)
  • gh aw status confirmed all 5 workflows as compiled and active
  • No source workflow .md files were modified — only auto-generated lock files changed
  • Manual testing was not performed; these are generated lock files validated by the gh-aw compiler

Checklist

Required Checks

  • Documentation is updated (if applicable)
  • Files follow existing naming conventions
  • Changes are backwards compatible (if applicable)
  • Tests added for new functionality (if applicable) (N/A — no new functionality; auto-generated lock files only)

AI Artifact Contributions

  • Used /prompt-analyze to review contribution
  • Addressed all feedback from prompt-builder review
  • Verified contribution follows common standards and type-specific requirements

Required Automated Checks

The following validation commands must pass before merging:

  • Markdown linting: npm run lint:md
  • Spell checking: npm run spell-check
  • Frontmatter validation: npm run lint:frontmatter
  • Skill structure validation: npm run validate:skills
  • Link validation: npm run lint:md-links
  • PowerShell analysis: npm run lint:ps
  • Plugin freshness: npm run plugin:generate
  • Docusaurus tests: npm run docs:test

Security Considerations

  • This PR does not contain any sensitive or NDA information
  • Any new dependencies have been reviewed for security issues
  • Security-related scripts follow the principle of least privilege (N/A — no security scripts modified)

Security review of new action: The github/gh-aw-actions/setup@2fe53acc038ba01c3bbdc767d4b25df31ca5bdfc (v0.68.1) is the official gh-aw setup action from GitHub, replacing the previous SHA 536ea1ba (v0.65.6). This is a routine version bump of an existing first-party trusted action. No new secrets are introduced; the same set is used across all workflows: COPILOT_GITHUB_TOKEN, GH_AW_GITHUB_MCP_SERVER_TOKEN, GH_AW_GITHUB_TOKEN, GITHUB_TOKEN.

Additional Notes

  • Lock files now include gh-aw-manifest headers listing all secrets and actions used, improving transparency for security reviews.
  • The actions/github-script upgrade from v8 to v9 was part of the gh-aw compiler's dependency updates and applies to all generated workflow steps.

- upgrade gh-aw compiler v0.65.4 to v0.68.1, AWF v0.25.6 to v0.25.18, MCP Gateway v0.2.14 to v0.2.17
- fix sparse-checkout failure from glob patterns merged into git cone-mode checkout
- fix MCP servers blocked by policy preventing safe-output tool calls
- bump actions/github-script v8 to v9 and gh-aw-actions/setup to v0.68.1

🔧 - Generated by Copilot
@katriendg katriendg requested a review from a team as a code owner April 14, 2026 06:32
@codecov-commenter
Copy link
Copy Markdown

codecov-commenter commented Apr 14, 2026

Codecov Report

✅ All modified and coverable lines are covered by tests.
✅ Project coverage is 87.65%. Comparing base (f7f43d3) to head (387b826).

Additional details and impacted files

Impacted file tree graph

@@            Coverage Diff             @@
##             main    #1358      +/-   ##
==========================================
- Coverage   87.66%   87.65%   -0.02%     
==========================================
  Files          61       61              
  Lines        9328     9328              
==========================================
- Hits         8177     8176       -1     
- Misses       1151     1152       +1     
Flag Coverage Δ
pester 85.22% <ø> (-0.02%) ⬇️

Flags with carried forward coverage won't be shown. Click here to find out more.
see 1 file with indirect coverage changes

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.

Copy link
Copy Markdown
Contributor

@github-actions github-actions Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

PR Review Summary

All initial quality checks passed. This is a clean, focused infrastructure maintenance PR.


✅ Issue Alignment

The changes directly address the two root causes described in the linked issues:

  • Fixes #1261 — Sparse-checkout failure in dependency-pr-review caused by cone-mode-incompatible ** glob patterns being injected into git sparse-checkout set by the v0.65.4 compiler.
  • The MCP policy blocking affecting all 5 workflows (v0.25.6 / Gateway v0.2.14 incompatibility with the updated runtime) is addressed by the compiler bump.

No scope creep. The PR does exactly what the issues require.


✅ PR Template Compliance

All required sections are present and correctly completed:

  • Description is thorough, with root cause analysis and a clear version table.
  • Related issues are properly linked with Fixes #.
  • GitHub Actions workflow is checked — appropriate since all changed files are .github/workflows/*.lock.yml and .github/aw/actions-lock.json.
  • Testing section accurately describes the validation approach for generated files (gh aw compile --strict, gh aw status).
  • Security Considerations section includes a helpful narrative about the action SHA being a first-party trusted source.
  • AI Artifact checklist items are correctly left unchecked (N/A for this change type).

✅ Coding Standards

All 5 .lock.yml files are auto-generated by gh aw compile --strict. The gh-aw-manifest headers confirm SHA-pinned action references throughout (e.g., actions/github-script@sha:373c709c..., github/gh-aw-actions/setup@sha:2fe53acc...). This satisfies the repository's dependency pinning requirements for workflow files.


✅ Code Quality & Security

  • No secrets introduced or modified; the same four tokens (COPILOT_GITHUB_TOKEN, GH_AW_GITHUB_MCP_SERVER_TOKEN, GH_AW_GITHUB_TOKEN, GITHUB_TOKEN) are used across all workflows as before.
  • The actions/github-script v8 → v9 and github/gh-aw-actions/setup v0.65.6 → v0.68.1 bumps are routine version updates of first-party/trusted actions.
  • Consolidating four stale github/gh-aw-actions/setup version pins into a single v0.68.1 entry is a welcome cleanup.

💡 Minor Observation (non-blocking)

The actions/github-script@v8 entry in .github/aw/actions-lock.json remains after this change, while the PR description states that all generated workflow steps now use v9. If no lock file references v8 anymore, this entry is orphaned. Since the lock file is compiler-managed, this is expected behavior if the compiler retains historical entries — but it's worth confirming that gh aw compile intentionally keeps the v8 entry or whether a follow-up cleanup pass would remove it.


Overall: This PR is well-scoped, clearly described, and correctly addresses the identified runtime failures. The changes are entirely auto-generated output, validated by the compiler's strict mode.

Note

🔒 Integrity filter blocked 1 item

The following item were blocked because they don't meet the GitHub integrity level.

  • #1357 issue_read: has lower integrity than agent requires. The agent cannot read data with integrity below "approved".

To allow these resources, lower min-integrity in your GitHub frontmatter:

tools:
  github:
    min-integrity: approved  # merged | approved | unapproved | none

Generated by PR Review for issue #1358 · ● 918.4K

@github-actions github-actions Bot mentioned this pull request Apr 14, 2026
- remove orphaned actions/github-script@v8 and github/gh-aw/actions/[email protected]
- add missing actions/[email protected], actions/[email protected], actions/upload-artifact@v7

🧹 - Generated by Copilot
Copy link
Copy Markdown
Contributor

@github-actions github-actions Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Advisory review — this PR is from a maintainer. Findings are informational only.

PR Review Summary

This is a clean, well-scoped infrastructure maintenance PR. All 6 changed files are auto-generated lock files produced by gh aw compile --strict. The review addresses two confirmed runtime failures. No source workflow .md files are modified.


✅ Issue Alignment

The changes directly address both linked issues:

  • Fixes #1261 — Sparse-checkout failure in dependency-pr-review caused by cone-mode-incompatible ** glob patterns injected by the v0.65.4 compiler.
  • Fixes #1357 — MCP policy blocking across all workflows due to incompatible AWF/MCP Gateway versions with the updated runtime.

No scope creep. The previous review's observation about a stale actions/github-script@v8 entry in actions-lock.json has been addressed — it is now removed.


⚠️ PR Template Compliance — Minor Finding

The Bug fix checkbox under Type of Change is unchecked. The commit title (fix(workflows): ...) and the description explicitly describe two runtime failures being fixed. Checking Bug fix alongside GitHub Actions workflow would more accurately reflect the intent of this PR and align with the conventional commit type in the title.

No other template compliance issues. Description, testing notes, security considerations, and checklist sections are all well-completed.


✅ Coding Standards

All uses: references across all 5 lock files are SHA-pinned with inline version comments (e.g., github/gh-aw-actions/setup@2fe53acc038ba01c3bbdc767d4b25df31ca5bdfc # v0.68.1), satisfying the repository's dependency pinning requirements.

Informational — pre-existing state: None of the lock files contain a top-level permissions: block. The Test-WorkflowPermissions.ps1 script currently only excludes copilot-setup-steps.yml by name, so lock files are technically in scope for that check. However, this is a pre-existing condition (the prior lock files compiled with v0.65.4 also lacked top-level permissions blocks) and is a limitation of the auto-generated format — not something this PR introduced or can address without an upstream change to the gh-aw compiler.

Informational — two SHAs for actions/github-script@v9: The gh-aw-manifest header in each lock file explicitly documents two distinct SHAs resolving to v9 (373c709c... used in setup/manifest steps, 3a2844b7... used in runtime steps). This is transparent compiler behavior — not a hidden inconsistency — and is consistent across all 5 generated files.


✅ Code Quality & Security

  • No new secrets introduced. The same four tokens (COPILOT_GITHUB_TOKEN, GH_AW_GITHUB_MCP_SERVER_TOKEN, GH_AW_GITHUB_TOKEN, GITHUB_TOKEN) are used unchanged.
  • actions/github-script v8 → v9 and github/gh-aw-actions/setup v0.65.6 → v0.68.1 are routine version bumps of first-party/trusted actions.
  • Consolidating four stale github/gh-aw-actions/setup version pins into a single v0.68.1 entry is a welcome cleanup.
  • The gh-aw-manifest headers added to each lock file improve transparency for security reviews.

Overall: Well-executed infrastructure upgrade. The only actionable suggestion is checking the Bug fix checkbox in the Type of Change section to align with the PR's conventional commit type and description.

Generated by PR Review for PR #1358 · advisory mode

Note

🔒 Integrity filter blocked 1 item

The following item were blocked because they don't meet the GitHub integrity level.

  • #1357 issue_read: has lower integrity than agent requires. The agent cannot read data with integrity below "approved".

To allow these resources, lower min-integrity in your GitHub frontmatter:

tools:
  github:
    min-integrity: approved  # merged | approved | unapproved | none

Generated by PR Review for issue #1358 · ● 2.8M

@katriendg
Copy link
Copy Markdown
Contributor Author

Closing as this will be fixed in a new upcoming PR.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

fix(workflows): recompile all agentic workflow lock files to gh-aw v0.68.1 [aw] Dependabot PR Review failed

3 participants