From b0e9fd97c170dbbe52cd6e66ad40d7f0c06255a1 Mon Sep 17 00:00:00 2001 From: "copilot-swe-agent[bot]" <198982749+Copilot@users.noreply.github.com> Date: Thu, 11 Dec 2025 16:37:02 +0000 Subject: [PATCH 1/9] Initial plan From ad3d4380244f2ea78394516885aa103aa20bef04 Mon Sep 17 00:00:00 2001 From: "copilot-swe-agent[bot]" <198982749+Copilot@users.noreply.github.com> Date: Thu, 11 Dec 2025 16:43:37 +0000 Subject: [PATCH 2/9] Initial plan for adding session-state file to agent outputs Co-authored-by: pelikhan <4175913+pelikhan@users.noreply.github.com> --- .github/workflows/daily-team-status.lock.yml | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/.github/workflows/daily-team-status.lock.yml b/.github/workflows/daily-team-status.lock.yml index 46a80efe69d..285356fa2c2 100644 --- a/.github/workflows/daily-team-status.lock.yml +++ b/.github/workflows/daily-team-status.lock.yml @@ -431,7 +431,7 @@ jobs: which awf awf --version - name: Install GitHub Copilot CLI - run: npm install -g @github/copilot@0.0.367 + run: npm install -g @github/copilot@0.0.368 - name: Downloading container images run: | set -e @@ -2008,7 +2008,7 @@ jobs: engine_name: "GitHub Copilot CLI", model: process.env.GH_AW_MODEL_AGENT_COPILOT || "", version: "", - agent_version: "0.0.367", + agent_version: "0.0.368", workflow_name: "Daily Team Status", experimental: false, supports_tools_allowlist: true, @@ -2558,7 +2558,7 @@ jobs: run: | set -o pipefail sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ - -- npx -y @github/copilot@0.0.367 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeoutputs --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ + -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeoutputs --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -6976,7 +6976,7 @@ jobs: node-version: '24' package-manager-cache: false - name: Install GitHub Copilot CLI - run: npm install -g @github/copilot@0.0.367 + run: npm install -g @github/copilot@0.0.368 - name: Execute GitHub Copilot CLI id: agentic_execution # Copilot CLI tool arguments (sorted): From f44aafbb43fdcbada2804303ffc2e544921d1999 Mon Sep 17 00:00:00 2001 From: "copilot-swe-agent[bot]" <198982749+Copilot@users.noreply.github.com> Date: Thu, 11 Dec 2025 16:54:36 +0000 Subject: [PATCH 3/9] Add Copilot session-state file to agent output artifacts - Add session-state file to GetDeclaredOutputFiles() for Copilot engine - Copy session-state from /home/runner/.copilot/session-state to /tmp/gh-aw/sandbox/agent/session-state.txt - Add copy commands for all execution paths (SRT, AWF, and non-sandbox) - Rename to .txt extension to ensure file is scanned by secret redaction - All unit tests pass Co-authored-by: pelikhan <4175913+pelikhan@users.noreply.github.com> --- .github/workflows/ai-moderator.lock.yml | 8 ++++ .github/workflows/archie.lock.yml | 15 +++++++ .github/workflows/artifacts-summary.lock.yml | 15 +++++++ .github/workflows/brave.lock.yml | 15 +++++++ .../breaking-change-checker.lock.yml | 15 +++++++ .github/workflows/ci-coach.lock.yml | 15 +++++++ .github/workflows/ci-doctor.lock.yml | 15 +++++++ .../cli-consistency-checker.lock.yml | 15 +++++++ .../copilot-pr-merged-report.lock.yml | 15 +++++++ .../copilot-pr-nlp-analysis.lock.yml | 15 +++++++ .../copilot-pr-prompt-analysis.lock.yml | 15 +++++++ .github/workflows/craft.lock.yml | 15 +++++++ .../daily-assign-issue-to-user.lock.yml | 15 +++++++ .../daily-copilot-token-report.lock.yml | 15 +++++++ .../workflows/daily-firewall-report.lock.yml | 15 +++++++ .../daily-malicious-code-scan.lock.yml | 8 ++++ .github/workflows/daily-news.lock.yml | 15 +++++++ .../workflows/daily-repo-chronicle.lock.yml | 15 +++++++ .../workflows/daily-workflow-updater.lock.yml | 15 +++++++ .../workflows/dependabot-go-checker.lock.yml | 15 +++++++ .github/workflows/dev-hawk.lock.yml | 15 +++++++ .github/workflows/dev.lock.yml | 15 +++++++ .github/workflows/dictation-prompt.lock.yml | 15 +++++++ .github/workflows/docs-noob-tester.lock.yml | 15 +++++++ .../example-permissions-warning.lock.yml | 8 ++++ .github/workflows/firewall-escape.lock.yml | 8 ++++ .github/workflows/firewall.lock.yml | 8 ++++ .../workflows/glossary-maintainer.lock.yml | 15 +++++++ .github/workflows/grumpy-reviewer.lock.yml | 15 +++++++ .github/workflows/hourly-ci-cleaner.lock.yml | 15 +++++++ .github/workflows/issue-monster.lock.yml | 15 +++++++ .github/workflows/issue-triage-agent.lock.yml | 15 +++++++ .../workflows/layout-spec-maintainer.lock.yml | 15 +++++++ .github/workflows/mcp-inspector.lock.yml | 15 +++++++ .github/workflows/mergefest.lock.yml | 15 +++++++ .../workflows/notion-issue-summary.lock.yml | 15 +++++++ .github/workflows/org-health-report.lock.yml | 15 +++++++ .github/workflows/pdf-summary.lock.yml | 15 +++++++ .github/workflows/plan.lock.yml | 15 +++++++ .github/workflows/poem-bot.lock.yml | 15 +++++++ .github/workflows/portfolio-analyst.lock.yml | 15 +++++++ .../workflows/pr-nitpick-reviewer.lock.yml | 15 +++++++ .github/workflows/python-data-charts.lock.yml | 15 +++++++ .github/workflows/q.lock.yml | 15 +++++++ .github/workflows/release.lock.yml | 15 +++++++ .github/workflows/repo-tree-map.lock.yml | 15 +++++++ .../repository-quality-improver.lock.yml | 15 +++++++ .github/workflows/research.lock.yml | 15 +++++++ .../smoke-copilot-no-firewall.lock.yml | 15 +++++++ .../smoke-copilot-playwright.lock.yml | 15 +++++++ .../smoke-copilot-safe-inputs.lock.yml | 15 +++++++ .github/workflows/smoke-copilot.lock.yml | 15 +++++++ .../smoke-srt-custom-config.lock.yml | 8 ++++ .github/workflows/smoke-srt.lock.yml | 15 +++++++ .github/workflows/spec-kit-execute.lock.yml | 15 +++++++ .github/workflows/spec-kit-executor.lock.yml | 15 +++++++ .github/workflows/speckit-dispatcher.lock.yml | 15 +++++++ .../workflows/stale-repo-identifier.lock.yml | 15 +++++++ .github/workflows/super-linter.lock.yml | 15 +++++++ .../workflows/technical-doc-writer.lock.yml | 15 +++++++ .../test-discussion-expires.lock.yml | 15 +++++++ .../test-hide-older-comments.lock.yml | 15 +++++++ .../workflows/test-python-safe-input.lock.yml | 15 +++++++ .github/workflows/tidy.lock.yml | 15 +++++++ .github/workflows/video-analyzer.lock.yml | 15 +++++++ .../workflows/weekly-issue-summary.lock.yml | 15 +++++++ pkg/workflow/copilot_engine.go | 40 ++++++++++++++++--- 67 files changed, 983 insertions(+), 5 deletions(-) diff --git a/.github/workflows/ai-moderator.lock.yml b/.github/workflows/ai-moderator.lock.yml index 294e9ece5d2..ecb8109c95f 100644 --- a/.github/workflows/ai-moderator.lock.yml +++ b/.github/workflows/ai-moderator.lock.yml @@ -3702,6 +3702,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --model gpt-5-mini --allow-tool github --allow-tool safeoutputs --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)" \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -4819,6 +4826,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs diff --git a/.github/workflows/archie.lock.yml b/.github/workflows/archie.lock.yml index e973f3251b8..e4b5ac53ce3 100644 --- a/.github/workflows/archie.lock.yml +++ b/.github/workflows/archie.lock.yml @@ -4431,6 +4431,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeoutputs --allow-tool 'shell(cat)' --allow-tool 'shell(date)' --allow-tool 'shell(echo)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(ls)' --allow-tool 'shell(pwd)' --allow-tool 'shell(sort)' --allow-tool 'shell(tail)' --allow-tool 'shell(uniq)' --allow-tool 'shell(wc)' --allow-tool 'shell(yq)' --allow-tool write --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -5550,6 +5557,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -8136,6 +8144,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/artifacts-summary.lock.yml b/.github/workflows/artifacts-summary.lock.yml index d1483c3b858..aa25f878a68 100644 --- a/.github/workflows/artifacts-summary.lock.yml +++ b/.github/workflows/artifacts-summary.lock.yml @@ -2713,6 +2713,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.npms.io,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,bun.sh,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,deb.nodesource.com,deno.land,get.pnpm.io,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,nodejs.org,npm.pkg.github.com,npmjs.com,npmjs.org,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,ppa.launchpad.net,raw.githubusercontent.com,registry.bower.io,registry.npmjs.com,registry.npmjs.org,registry.yarnpkg.com,repo.yarnpkg.com,s.symcb.com,s.symcd.com,security.ubuntu.com,skimdb.npmjs.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com,www.npmjs.com,www.npmjs.org,yarnpkg.com --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeoutputs --allow-tool 'shell(cat)' --allow-tool 'shell(date)' --allow-tool 'shell(echo)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(ls)' --allow-tool 'shell(pwd)' --allow-tool 'shell(sort)' --allow-tool 'shell(tail)' --allow-tool 'shell(uniq)' --allow-tool 'shell(wc)' --allow-tool 'shell(yq)' --allow-tool write --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -3831,6 +3838,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7185,6 +7193,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/brave.lock.yml b/.github/workflows/brave.lock.yml index 31f1a504067..f5801008d0d 100644 --- a/.github/workflows/brave.lock.yml +++ b/.github/workflows/brave.lock.yml @@ -4220,6 +4220,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool brave-search --allow-tool 'brave-search(*)' --allow-tool github --allow-tool safeoutputs --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -5340,6 +5347,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7926,6 +7934,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/breaking-change-checker.lock.yml b/.github/workflows/breaking-change-checker.lock.yml index 46dc5d65b54..3164d786ec2 100644 --- a/.github/workflows/breaking-change-checker.lock.yml +++ b/.github/workflows/breaking-change-checker.lock.yml @@ -2797,6 +2797,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeoutputs --allow-tool 'shell(cat)' --allow-tool 'shell(cat:*)' --allow-tool 'shell(date)' --allow-tool 'shell(echo)' --allow-tool 'shell(git diff:*)' --allow-tool 'shell(git log:*)' --allow-tool 'shell(git show:*)' --allow-tool 'shell(grep)' --allow-tool 'shell(grep:*)' --allow-tool 'shell(head)' --allow-tool 'shell(ls)' --allow-tool 'shell(pwd)' --allow-tool 'shell(sort)' --allow-tool 'shell(tail)' --allow-tool 'shell(uniq)' --allow-tool 'shell(wc)' --allow-tool 'shell(yq)' --allow-tool write --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -3915,6 +3922,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7552,6 +7560,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/ci-coach.lock.yml b/.github/workflows/ci-coach.lock.yml index 504ed776734..8316fd31cfc 100644 --- a/.github/workflows/ci-coach.lock.yml +++ b/.github/workflows/ci-coach.lock.yml @@ -3999,6 +3999,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --add-dir /tmp/gh-aw/cache-memory/ --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -5117,6 +5124,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -8428,6 +8436,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/ci-doctor.lock.yml b/.github/workflows/ci-doctor.lock.yml index 5804a9d463f..4e71c01339e 100644 --- a/.github/workflows/ci-doctor.lock.yml +++ b/.github/workflows/ci-doctor.lock.yml @@ -3661,6 +3661,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeoutputs --allow-tool web-fetch --add-dir /tmp/gh-aw/cache-memory/ --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -4779,6 +4786,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -8008,6 +8016,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/cli-consistency-checker.lock.yml b/.github/workflows/cli-consistency-checker.lock.yml index 7b39b2db8ed..c21e7588fd1 100644 --- a/.github/workflows/cli-consistency-checker.lock.yml +++ b/.github/workflows/cli-consistency-checker.lock.yml @@ -2794,6 +2794,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.npms.io,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,bun.sh,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,deb.nodesource.com,deno.land,get.pnpm.io,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,nodejs.org,npm.pkg.github.com,npmjs.com,npmjs.org,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,ppa.launchpad.net,raw.githubusercontent.com,registry.bower.io,registry.npmjs.com,registry.npmjs.org,registry.yarnpkg.com,repo.yarnpkg.com,s.symcb.com,s.symcd.com,security.ubuntu.com,skimdb.npmjs.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com,www.npmjs.com,www.npmjs.org,yarnpkg.com --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -3912,6 +3919,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7125,6 +7133,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/copilot-pr-merged-report.lock.yml b/.github/workflows/copilot-pr-merged-report.lock.yml index 7a938366a62..d21baa843bd 100644 --- a/.github/workflows/copilot-pr-merged-report.lock.yml +++ b/.github/workflows/copilot-pr-merged-report.lock.yml @@ -4235,6 +4235,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains '*.githubusercontent.com,api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,codeload.github.com,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,github-cloud.githubusercontent.com,github-cloud.s3.amazonaws.com,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,lfs.github.com,objects.githubusercontent.com,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,ppa.launchpad.net,raw.githubusercontent.com,registry.npmjs.org,s.symcb.com,s.symcd.com,security.ubuntu.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com' --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -5353,6 +5360,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -8667,6 +8675,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/copilot-pr-nlp-analysis.lock.yml b/.github/workflows/copilot-pr-nlp-analysis.lock.yml index b1959f31a8d..ea5efec619d 100644 --- a/.github/workflows/copilot-pr-nlp-analysis.lock.yml +++ b/.github/workflows/copilot-pr-nlp-analysis.lock.yml @@ -4331,6 +4331,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains '*.pythonhosted.org,anaconda.org,api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.npms.io,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,binstar.org,bootstrap.pypa.io,bun.sh,conda.anaconda.org,conda.binstar.org,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,deb.nodesource.com,deno.land,files.pythonhosted.org,get.pnpm.io,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,nodejs.org,npm.pkg.github.com,npmjs.com,npmjs.org,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,pip.pypa.io,ppa.launchpad.net,pypi.org,pypi.python.org,raw.githubusercontent.com,registry.bower.io,registry.npmjs.com,registry.npmjs.org,registry.yarnpkg.com,repo.anaconda.com,repo.continuum.io,repo.yarnpkg.com,s.symcb.com,s.symcd.com,security.ubuntu.com,skimdb.npmjs.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com,www.npmjs.com,www.npmjs.org,yarnpkg.com' --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --add-dir /tmp/gh-aw/cache-memory/ --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -5452,6 +5459,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -8774,6 +8782,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/copilot-pr-prompt-analysis.lock.yml b/.github/workflows/copilot-pr-prompt-analysis.lock.yml index 3cf8e8cbfa6..8c6310da82d 100644 --- a/.github/workflows/copilot-pr-prompt-analysis.lock.yml +++ b/.github/workflows/copilot-pr-prompt-analysis.lock.yml @@ -3357,6 +3357,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.npms.io,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,bun.sh,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,deb.nodesource.com,deno.land,get.pnpm.io,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,nodejs.org,npm.pkg.github.com,npmjs.com,npmjs.org,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,ppa.launchpad.net,raw.githubusercontent.com,registry.bower.io,registry.npmjs.com,registry.npmjs.org,registry.yarnpkg.com,repo.yarnpkg.com,s.symcb.com,s.symcd.com,security.ubuntu.com,skimdb.npmjs.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com,www.npmjs.com,www.npmjs.org,yarnpkg.com --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --add-dir /tmp/gh-aw/cache-memory/ --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -4475,6 +4482,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7789,6 +7797,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/craft.lock.yml b/.github/workflows/craft.lock.yml index e5f3c63028e..bfb391f09a0 100644 --- a/.github/workflows/craft.lock.yml +++ b/.github/workflows/craft.lock.yml @@ -4565,6 +4565,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -5684,6 +5691,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -8279,6 +8287,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/daily-assign-issue-to-user.lock.yml b/.github/workflows/daily-assign-issue-to-user.lock.yml index 9956cabf3ed..7213aa96251 100644 --- a/.github/workflows/daily-assign-issue-to-user.lock.yml +++ b/.github/workflows/daily-assign-issue-to-user.lock.yml @@ -3165,6 +3165,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeoutputs --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -4283,6 +4290,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7431,6 +7439,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/daily-copilot-token-report.lock.yml b/.github/workflows/daily-copilot-token-report.lock.yml index c46e99bef6e..fe66ae30fbf 100644 --- a/.github/workflows/daily-copilot-token-report.lock.yml +++ b/.github/workflows/daily-copilot-token-report.lock.yml @@ -4500,6 +4500,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,ppa.launchpad.net,raw.githubusercontent.com,registry.npmjs.org,s.symcb.com,s.symcd.com,security.ubuntu.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --add-dir /tmp/gh-aw/cache-memory/ --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -5621,6 +5628,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -8947,6 +8955,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/daily-firewall-report.lock.yml b/.github/workflows/daily-firewall-report.lock.yml index bf7d0c0816b..4cc62774c20 100644 --- a/.github/workflows/daily-firewall-report.lock.yml +++ b/.github/workflows/daily-firewall-report.lock.yml @@ -3785,6 +3785,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --add-dir /tmp/gh-aw/cache-memory/ --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -4906,6 +4913,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -8242,6 +8250,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/daily-malicious-code-scan.lock.yml b/.github/workflows/daily-malicious-code-scan.lock.yml index 57e11e62f2a..82e06fd0737 100644 --- a/.github/workflows/daily-malicious-code-scan.lock.yml +++ b/.github/workflows/daily-malicious-code-scan.lock.yml @@ -3032,6 +3032,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeoutputs --allow-tool 'shell(cat)' --allow-tool 'shell(date)' --allow-tool 'shell(echo)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(ls)' --allow-tool 'shell(pwd)' --allow-tool 'shell(sort)' --allow-tool 'shell(tail)' --allow-tool 'shell(uniq)' --allow-tool 'shell(wc)' --allow-tool 'shell(yq)' --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -4150,6 +4157,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs diff --git a/.github/workflows/daily-news.lock.yml b/.github/workflows/daily-news.lock.yml index 675f07b8863..dae1e137072 100644 --- a/.github/workflows/daily-news.lock.yml +++ b/.github/workflows/daily-news.lock.yml @@ -4257,6 +4257,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains '*.pythonhosted.org,anaconda.org,api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.npms.io,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,binstar.org,bootstrap.pypa.io,bun.sh,conda.anaconda.org,conda.binstar.org,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,deb.nodesource.com,deno.land,files.pythonhosted.org,get.pnpm.io,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,nodejs.org,npm.pkg.github.com,npmjs.com,npmjs.org,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,pip.pypa.io,ppa.launchpad.net,pypi.org,pypi.python.org,raw.githubusercontent.com,registry.bower.io,registry.npmjs.com,registry.npmjs.org,registry.yarnpkg.com,repo.anaconda.com,repo.continuum.io,repo.yarnpkg.com,s.symcb.com,s.symcd.com,security.ubuntu.com,skimdb.npmjs.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com,www.npmjs.com,www.npmjs.org,yarnpkg.com' --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --add-dir /tmp/gh-aw/cache-memory/ --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -5380,6 +5387,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -8706,6 +8714,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/daily-repo-chronicle.lock.yml b/.github/workflows/daily-repo-chronicle.lock.yml index 87a3084ba38..20e70ebf323 100644 --- a/.github/workflows/daily-repo-chronicle.lock.yml +++ b/.github/workflows/daily-repo-chronicle.lock.yml @@ -3933,6 +3933,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains '*.pythonhosted.org,anaconda.org,api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.npms.io,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,binstar.org,bootstrap.pypa.io,bun.sh,conda.anaconda.org,conda.binstar.org,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,deb.nodesource.com,deno.land,files.pythonhosted.org,get.pnpm.io,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,nodejs.org,npm.pkg.github.com,npmjs.com,npmjs.org,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,pip.pypa.io,ppa.launchpad.net,pypi.org,pypi.python.org,raw.githubusercontent.com,registry.bower.io,registry.npmjs.com,registry.npmjs.org,registry.yarnpkg.com,repo.anaconda.com,repo.continuum.io,repo.yarnpkg.com,s.symcb.com,s.symcd.com,security.ubuntu.com,skimdb.npmjs.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com,www.npmjs.com,www.npmjs.org,yarnpkg.com' --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --add-dir /tmp/gh-aw/cache-memory/ --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -5054,6 +5061,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -8380,6 +8388,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/daily-workflow-updater.lock.yml b/.github/workflows/daily-workflow-updater.lock.yml index 59b7b49bdb1..4a7972639d4 100644 --- a/.github/workflows/daily-workflow-updater.lock.yml +++ b/.github/workflows/daily-workflow-updater.lock.yml @@ -2724,6 +2724,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains '*.githubusercontent.com,api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,codeload.github.com,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,github-cloud.githubusercontent.com,github-cloud.s3.amazonaws.com,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,lfs.github.com,objects.githubusercontent.com,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,ppa.launchpad.net,raw.githubusercontent.com,registry.npmjs.org,s.symcb.com,s.symcd.com,security.ubuntu.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com' --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeoutputs --allow-tool 'shell(cat)' --allow-tool 'shell(date)' --allow-tool 'shell(echo)' --allow-tool 'shell(gh aw update --verbose)' --allow-tool 'shell(git add .github/aw/actions-lock.json)' --allow-tool 'shell(git add:*)' --allow-tool 'shell(git branch:*)' --allow-tool 'shell(git checkout:*)' --allow-tool 'shell(git commit)' --allow-tool 'shell(git commit:*)' --allow-tool 'shell(git diff .github/aw/actions-lock.json)' --allow-tool 'shell(git merge:*)' --allow-tool 'shell(git push)' --allow-tool 'shell(git rm:*)' --allow-tool 'shell(git status)' --allow-tool 'shell(git switch:*)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(ls)' --allow-tool 'shell(pwd)' --allow-tool 'shell(sort)' --allow-tool 'shell(tail)' --allow-tool 'shell(uniq)' --allow-tool 'shell(wc)' --allow-tool 'shell(yq)' --allow-tool write --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -3842,6 +3849,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7147,6 +7155,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/dependabot-go-checker.lock.yml b/.github/workflows/dependabot-go-checker.lock.yml index 57d8159677a..a24ec103595 100644 --- a/.github/workflows/dependabot-go-checker.lock.yml +++ b/.github/workflows/dependabot-go-checker.lock.yml @@ -3327,6 +3327,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -4445,6 +4452,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7739,6 +7747,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/dev-hawk.lock.yml b/.github/workflows/dev-hawk.lock.yml index d0335c4893b..4ddb0936e7a 100644 --- a/.github/workflows/dev-hawk.lock.yml +++ b/.github/workflows/dev-hawk.lock.yml @@ -3445,6 +3445,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool gh-aw --allow-tool github --allow-tool safeoutputs --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -4563,6 +4570,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7151,6 +7159,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/dev.lock.yml b/.github/workflows/dev.lock.yml index 254894a4afb..2759a192c6e 100644 --- a/.github/workflows/dev.lock.yml +++ b/.github/workflows/dev.lock.yml @@ -3414,6 +3414,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,ppa.launchpad.net,raw.githubusercontent.com,registry.npmjs.org,s.symcb.com,s.symcd.com,security.ubuntu.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -4532,6 +4539,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7838,6 +7846,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/dictation-prompt.lock.yml b/.github/workflows/dictation-prompt.lock.yml index 370a8166b9b..76da726087f 100644 --- a/.github/workflows/dictation-prompt.lock.yml +++ b/.github/workflows/dictation-prompt.lock.yml @@ -2667,6 +2667,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -3785,6 +3792,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7086,6 +7094,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/docs-noob-tester.lock.yml b/.github/workflows/docs-noob-tester.lock.yml index 04e5808b994..aa047e730e9 100644 --- a/.github/workflows/docs-noob-tester.lock.yml +++ b/.github/workflows/docs-noob-tester.lock.yml @@ -2803,6 +2803,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.npms.io,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,bun.sh,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,deb.nodesource.com,deno.land,get.pnpm.io,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,nodejs.org,npm.pkg.github.com,npmjs.com,npmjs.org,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,ppa.launchpad.net,raw.githubusercontent.com,registry.bower.io,registry.npmjs.com,registry.npmjs.org,registry.yarnpkg.com,repo.yarnpkg.com,s.symcb.com,s.symcd.com,security.ubuntu.com,skimdb.npmjs.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com,www.npmjs.com,www.npmjs.org,yarnpkg.com --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -3924,6 +3931,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7238,6 +7246,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/example-permissions-warning.lock.yml b/.github/workflows/example-permissions-warning.lock.yml index 66c51849d57..03f227c2ea5 100644 --- a/.github/workflows/example-permissions-warning.lock.yml +++ b/.github/workflows/example-permissions-warning.lock.yml @@ -783,6 +783,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -917,6 +924,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs diff --git a/.github/workflows/firewall-escape.lock.yml b/.github/workflows/firewall-escape.lock.yml index edc51df4979..163a2291199 100644 --- a/.github/workflows/firewall-escape.lock.yml +++ b/.github/workflows/firewall-escape.lock.yml @@ -1203,6 +1203,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.npms.io,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,bun.sh,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,deb.nodesource.com,deno.land,get.pnpm.io,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,nodejs.org,npm.pkg.github.com,npmjs.com,npmjs.org,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,ppa.launchpad.net,raw.githubusercontent.com,registry.bower.io,registry.npmjs.com,registry.npmjs.org,registry.yarnpkg.com,repo.yarnpkg.com,s.symcb.com,s.symcd.com,security.ubuntu.com,skimdb.npmjs.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com,www.npmjs.com,www.npmjs.org,yarnpkg.com --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --add-dir /tmp/gh-aw/cache-memory/ --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -1337,6 +1344,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs diff --git a/.github/workflows/firewall.lock.yml b/.github/workflows/firewall.lock.yml index 2c2a14a02d7..d8e3f307c02 100644 --- a/.github/workflows/firewall.lock.yml +++ b/.github/workflows/firewall.lock.yml @@ -898,6 +898,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.npms.io,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,bun.sh,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,deb.nodesource.com,deno.land,get.pnpm.io,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,nodejs.org,npm.pkg.github.com,npmjs.com,npmjs.org,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,ppa.launchpad.net,raw.githubusercontent.com,registry.bower.io,registry.npmjs.com,registry.npmjs.org,registry.yarnpkg.com,repo.yarnpkg.com,s.symcb.com,s.symcd.com,security.ubuntu.com,skimdb.npmjs.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com,www.npmjs.com,www.npmjs.org,yarnpkg.com --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool web-fetch --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -1032,6 +1039,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs diff --git a/.github/workflows/glossary-maintainer.lock.yml b/.github/workflows/glossary-maintainer.lock.yml index cfbcca5f9ae..4537dfd9ba3 100644 --- a/.github/workflows/glossary-maintainer.lock.yml +++ b/.github/workflows/glossary-maintainer.lock.yml @@ -3825,6 +3825,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains '*.githubusercontent.com,api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,codeload.github.com,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,github-cloud.githubusercontent.com,github-cloud.s3.amazonaws.com,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,lfs.github.com,objects.githubusercontent.com,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,ppa.launchpad.net,raw.githubusercontent.com,registry.npmjs.org,s.symcb.com,s.symcd.com,security.ubuntu.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com' --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --agent technical-doc-writer --allow-tool github --allow-tool safeoutputs --allow-tool 'shell(cat)' --allow-tool 'shell(date)' --allow-tool 'shell(echo)' --allow-tool 'shell(find docs -name '\''*.md'\'')' --allow-tool 'shell(git add:*)' --allow-tool 'shell(git branch:*)' --allow-tool 'shell(git checkout:*)' --allow-tool 'shell(git commit:*)' --allow-tool 'shell(git log --since='\''24 hours ago'\'' --oneline)' --allow-tool 'shell(git log --since='\''7 days ago'\'' --oneline)' --allow-tool 'shell(git merge:*)' --allow-tool 'shell(git rm:*)' --allow-tool 'shell(git status)' --allow-tool 'shell(git switch:*)' --allow-tool 'shell(grep -r '\''*'\'' docs)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(ls)' --allow-tool 'shell(pwd)' --allow-tool 'shell(sort)' --allow-tool 'shell(tail)' --allow-tool 'shell(uniq)' --allow-tool 'shell(wc)' --allow-tool 'shell(yq)' --allow-tool write --add-dir /tmp/gh-aw/cache-memory/ --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -4943,6 +4950,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -8251,6 +8259,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/grumpy-reviewer.lock.yml b/.github/workflows/grumpy-reviewer.lock.yml index 6127c1e27a1..347b91f5340 100644 --- a/.github/workflows/grumpy-reviewer.lock.yml +++ b/.github/workflows/grumpy-reviewer.lock.yml @@ -4370,6 +4370,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeoutputs --add-dir /tmp/gh-aw/cache-memory/ --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -5489,6 +5496,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -8450,6 +8458,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/hourly-ci-cleaner.lock.yml b/.github/workflows/hourly-ci-cleaner.lock.yml index e989a172d70..2d128dbdab3 100644 --- a/.github/workflows/hourly-ci-cleaner.lock.yml +++ b/.github/workflows/hourly-ci-cleaner.lock.yml @@ -3143,6 +3143,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --agent ci-cleaner --allow-all-tools --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -4261,6 +4268,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7565,6 +7573,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/issue-monster.lock.yml b/.github/workflows/issue-monster.lock.yml index 0905f42a9eb..a922dbcd057 100644 --- a/.github/workflows/issue-monster.lock.yml +++ b/.github/workflows/issue-monster.lock.yml @@ -3604,6 +3604,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeoutputs --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -4722,6 +4729,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7873,6 +7881,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/issue-triage-agent.lock.yml b/.github/workflows/issue-triage-agent.lock.yml index 2a50cfbfdc5..f721f414483 100644 --- a/.github/workflows/issue-triage-agent.lock.yml +++ b/.github/workflows/issue-triage-agent.lock.yml @@ -2899,6 +2899,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeoutputs --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -4017,6 +4024,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -6602,6 +6610,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/layout-spec-maintainer.lock.yml b/.github/workflows/layout-spec-maintainer.lock.yml index 98ba733a5c7..53dbac847ec 100644 --- a/.github/workflows/layout-spec-maintainer.lock.yml +++ b/.github/workflows/layout-spec-maintainer.lock.yml @@ -2958,6 +2958,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains '*.githubusercontent.com,api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,codeload.github.com,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,github-cloud.githubusercontent.com,github-cloud.s3.amazonaws.com,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,lfs.github.com,objects.githubusercontent.com,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,ppa.launchpad.net,raw.githubusercontent.com,registry.npmjs.org,s.symcb.com,s.symcd.com,security.ubuntu.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com' --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeoutputs --allow-tool 'shell(cat specs/layout.md)' --allow-tool 'shell(cat)' --allow-tool 'shell(date)' --allow-tool 'shell(echo)' --allow-tool 'shell(find .github/workflows -name '\''*.lock.yml'\'')' --allow-tool 'shell(git add:*)' --allow-tool 'shell(git branch:*)' --allow-tool 'shell(git checkout:*)' --allow-tool 'shell(git commit:*)' --allow-tool 'shell(git diff specs/layout.md)' --allow-tool 'shell(git merge:*)' --allow-tool 'shell(git rm:*)' --allow-tool 'shell(git status)' --allow-tool 'shell(git switch:*)' --allow-tool 'shell(grep -r '\''.*'\'' pkg/workflow/*.go)' --allow-tool 'shell(grep -r '\''.*'\'' pkg/workflow/js/)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(ls)' --allow-tool 'shell(pwd)' --allow-tool 'shell(sort)' --allow-tool 'shell(tail)' --allow-tool 'shell(uniq)' --allow-tool 'shell(wc)' --allow-tool 'shell(yq '\''.*'\'' .github/workflows/*.lock.yml)' --allow-tool 'shell(yq)' --allow-tool write --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -4076,6 +4083,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7381,6 +7389,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/mcp-inspector.lock.yml b/.github/workflows/mcp-inspector.lock.yml index a1b912d6027..3760a45f224 100644 --- a/.github/workflows/mcp-inspector.lock.yml +++ b/.github/workflows/mcp-inspector.lock.yml @@ -3322,6 +3322,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains '*.docker.com,*.docker.io,api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.npms.io,api.snapcraft.io,archive.ubuntu.com,auth.docker.io,azure.archive.ubuntu.com,bun.sh,cdn.jsdelivr.net,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,deb.nodesource.com,deno.land,dl.k8s.io,fonts.googleapis.com,fonts.gstatic.com,gcr.io,get.pnpm.io,ghcr.io,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,mcr.microsoft.com,nodejs.org,npm.pkg.github.com,npmjs.com,npmjs.org,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,pkgs.k8s.io,ppa.launchpad.net,production.cloudflare.docker.com,quay.io,raw.githubusercontent.com,registry.bower.io,registry.hub.docker.com,registry.npmjs.com,registry.npmjs.org,registry.yarnpkg.com,repo.yarnpkg.com,s.symcb.com,s.symcd.com,security.ubuntu.com,skimdb.npmjs.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com,www.npmjs.com,www.npmjs.org,yarnpkg.com' --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool arxiv --allow-tool 'arxiv(get_paper_details)' --allow-tool 'arxiv(get_paper_pdf)' --allow-tool 'arxiv(search_arxiv)' --allow-tool ast-grep --allow-tool 'ast-grep(*)' --allow-tool brave-search --allow-tool 'brave-search(*)' --allow-tool context7 --allow-tool 'context7(get-library-docs)' --allow-tool 'context7(resolve-library-id)' --allow-tool datadog --allow-tool 'datadog(get_datadog_metric)' --allow-tool 'datadog(search_datadog_dashboards)' --allow-tool 'datadog(search_datadog_metrics)' --allow-tool 'datadog(search_datadog_slos)' --allow-tool deepwiki --allow-tool 'deepwiki(ask_question)' --allow-tool 'deepwiki(read_wiki_contents)' --allow-tool 'deepwiki(read_wiki_structure)' --allow-tool fabric-rti --allow-tool 'fabric-rti(get_eventstream)' --allow-tool 'fabric-rti(get_eventstream_definition)' --allow-tool 'fabric-rti(kusto_get_entities_schema)' --allow-tool 'fabric-rti(kusto_get_function_schema)' --allow-tool 'fabric-rti(kusto_get_shots)' --allow-tool 'fabric-rti(kusto_get_table_schema)' --allow-tool 'fabric-rti(kusto_known_services)' --allow-tool 'fabric-rti(kusto_list_databases)' --allow-tool 'fabric-rti(kusto_list_tables)' --allow-tool 'fabric-rti(kusto_query)' --allow-tool 'fabric-rti(kusto_sample_function_data)' --allow-tool 'fabric-rti(kusto_sample_table_data)' --allow-tool 'fabric-rti(list_eventstreams)' --allow-tool gh-aw --allow-tool github --allow-tool markitdown --allow-tool 'markitdown(*)' --allow-tool memory --allow-tool 'memory(delete_memory)' --allow-tool 'memory(list_memories)' --allow-tool 'memory(retrieve_memory)' --allow-tool 'memory(store_memory)' --allow-tool microsoftdocs --allow-tool 'microsoftdocs(*)' --allow-tool notion --allow-tool 'notion(get_database)' --allow-tool 'notion(get_page)' --allow-tool 'notion(query_database)' --allow-tool 'notion(search_pages)' --allow-tool safeoutputs --allow-tool sentry --allow-tool 'sentry(analyze_issue_with_seer)' --allow-tool 'sentry(find_dsns)' --allow-tool 'sentry(find_organizations)' --allow-tool 'sentry(find_projects)' --allow-tool 'sentry(find_releases)' --allow-tool 'sentry(find_teams)' --allow-tool 'sentry(get_doc)' --allow-tool 'sentry(get_event_attachment)' --allow-tool 'sentry(get_issue_details)' --allow-tool 'sentry(get_trace_details)' --allow-tool 'sentry(search_docs requires SENTRY_OPENAI_API_KEY)' --allow-tool 'sentry(search_events)' --allow-tool 'sentry(search_issues)' --allow-tool 'sentry(whoami)' --allow-tool 'shell(cat)' --allow-tool 'shell(date)' --allow-tool 'shell(echo)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(ls)' --allow-tool 'shell(pwd)' --allow-tool 'shell(sort)' --allow-tool 'shell(tail)' --allow-tool 'shell(uniq)' --allow-tool 'shell(wc)' --allow-tool 'shell(yq)' --allow-tool tavily --allow-tool 'tavily(*)' --allow-tool write --add-dir /tmp/gh-aw/cache-memory/ --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -4456,6 +4463,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7771,6 +7779,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/mergefest.lock.yml b/.github/workflows/mergefest.lock.yml index 8756d9889f0..bc57e673b67 100644 --- a/.github/workflows/mergefest.lock.yml +++ b/.github/workflows/mergefest.lock.yml @@ -3509,6 +3509,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeoutputs --allow-tool 'shell(cat)' --allow-tool 'shell(date)' --allow-tool 'shell(echo)' --allow-tool 'shell(git add)' --allow-tool 'shell(git add:*)' --allow-tool 'shell(git branch)' --allow-tool 'shell(git branch:*)' --allow-tool 'shell(git checkout)' --allow-tool 'shell(git checkout:*)' --allow-tool 'shell(git commit)' --allow-tool 'shell(git commit:*)' --allow-tool 'shell(git config)' --allow-tool 'shell(git diff)' --allow-tool 'shell(git fetch)' --allow-tool 'shell(git log)' --allow-tool 'shell(git merge)' --allow-tool 'shell(git merge:*)' --allow-tool 'shell(git pull)' --allow-tool 'shell(git reset)' --allow-tool 'shell(git rev-parse)' --allow-tool 'shell(git rm:*)' --allow-tool 'shell(git status)' --allow-tool 'shell(git switch:*)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(ls)' --allow-tool 'shell(make fmt)' --allow-tool 'shell(make lint)' --allow-tool 'shell(make recompile)' --allow-tool 'shell(make test-unit)' --allow-tool 'shell(pwd)' --allow-tool 'shell(sort)' --allow-tool 'shell(tail)' --allow-tool 'shell(uniq)' --allow-tool 'shell(wc)' --allow-tool 'shell(yq)' --allow-tool write --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -4628,6 +4635,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7220,6 +7228,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/notion-issue-summary.lock.yml b/.github/workflows/notion-issue-summary.lock.yml index 2d688306fa5..8c12aaba364 100644 --- a/.github/workflows/notion-issue-summary.lock.yml +++ b/.github/workflows/notion-issue-summary.lock.yml @@ -2401,6 +2401,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool notion --allow-tool 'notion(get_database)' --allow-tool 'notion(get_page)' --allow-tool 'notion(query_database)' --allow-tool 'notion(search_pages)' --allow-tool safeoutputs --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -3520,6 +3527,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -6105,6 +6113,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/org-health-report.lock.yml b/.github/workflows/org-health-report.lock.yml index 334b2276846..f45b0c3ae4e 100644 --- a/.github/workflows/org-health-report.lock.yml +++ b/.github/workflows/org-health-report.lock.yml @@ -4194,6 +4194,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains '*.pythonhosted.org,anaconda.org,api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,binstar.org,bootstrap.pypa.io,conda.anaconda.org,conda.binstar.org,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,files.pythonhosted.org,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,pip.pypa.io,ppa.launchpad.net,pypi.org,pypi.python.org,raw.githubusercontent.com,registry.npmjs.org,repo.anaconda.com,repo.continuum.io,s.symcb.com,s.symcd.com,security.ubuntu.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com' --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --add-dir /tmp/gh-aw/cache-memory/ --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -5315,6 +5322,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -8636,6 +8644,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/pdf-summary.lock.yml b/.github/workflows/pdf-summary.lock.yml index 9ee6244a438..ea38ad735ec 100644 --- a/.github/workflows/pdf-summary.lock.yml +++ b/.github/workflows/pdf-summary.lock.yml @@ -4395,6 +4395,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool markitdown --allow-tool 'markitdown(*)' --allow-tool safeoutputs --add-dir /tmp/gh-aw/cache-memory/ --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -5514,6 +5521,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -8107,6 +8115,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/plan.lock.yml b/.github/workflows/plan.lock.yml index cb1878ccff4..62317d10607 100644 --- a/.github/workflows/plan.lock.yml +++ b/.github/workflows/plan.lock.yml @@ -3682,6 +3682,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeoutputs --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -4801,6 +4808,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -8387,6 +8395,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/poem-bot.lock.yml b/.github/workflows/poem-bot.lock.yml index 2ce209efa99..2241606eef1 100644 --- a/.github/workflows/poem-bot.lock.yml +++ b/.github/workflows/poem-bot.lock.yml @@ -5444,6 +5444,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --model gpt-5 --allow-tool github --allow-tool safeoutputs --allow-tool 'shell(cat)' --allow-tool 'shell(date)' --allow-tool 'shell(echo)' --allow-tool 'shell(git add:*)' --allow-tool 'shell(git branch:*)' --allow-tool 'shell(git checkout:*)' --allow-tool 'shell(git commit:*)' --allow-tool 'shell(git merge:*)' --allow-tool 'shell(git rm:*)' --allow-tool 'shell(git status)' --allow-tool 'shell(git switch:*)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(ls)' --allow-tool 'shell(pwd)' --allow-tool 'shell(sort)' --allow-tool 'shell(tail)' --allow-tool 'shell(uniq)' --allow-tool 'shell(wc)' --allow-tool 'shell(yq)' --allow-tool write --add-dir /tmp/gh-aw/cache-memory/ --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)" \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -6566,6 +6573,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -11945,6 +11953,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --model gpt-5 --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION" 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/portfolio-analyst.lock.yml b/.github/workflows/portfolio-analyst.lock.yml index 2b445ce1366..917dad725d6 100644 --- a/.github/workflows/portfolio-analyst.lock.yml +++ b/.github/workflows/portfolio-analyst.lock.yml @@ -3562,6 +3562,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -4680,6 +4687,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7991,6 +7999,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/pr-nitpick-reviewer.lock.yml b/.github/workflows/pr-nitpick-reviewer.lock.yml index 0fa4bf82a34..7885d22cc7d 100644 --- a/.github/workflows/pr-nitpick-reviewer.lock.yml +++ b/.github/workflows/pr-nitpick-reviewer.lock.yml @@ -4678,6 +4678,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeoutputs --add-dir /tmp/gh-aw/cache-memory/ --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -5797,6 +5804,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -9480,6 +9488,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/python-data-charts.lock.yml b/.github/workflows/python-data-charts.lock.yml index 4a78204680e..ccf3e05d6e8 100644 --- a/.github/workflows/python-data-charts.lock.yml +++ b/.github/workflows/python-data-charts.lock.yml @@ -4567,6 +4567,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,ppa.launchpad.net,raw.githubusercontent.com,registry.npmjs.org,s.symcb.com,s.symcd.com,security.ubuntu.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --add-dir /tmp/gh-aw/cache-memory/ --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -5688,6 +5695,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -9008,6 +9016,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/q.lock.yml b/.github/workflows/q.lock.yml index 7bc897e1873..799f9233e86 100644 --- a/.github/workflows/q.lock.yml +++ b/.github/workflows/q.lock.yml @@ -4977,6 +4977,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool gh-aw --allow-tool github --allow-tool safeoutputs --allow-tool shell --allow-tool tavily --allow-tool 'tavily(*)' --allow-tool write --add-dir /tmp/gh-aw/cache-memory/ --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -6098,6 +6105,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -9461,6 +9469,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/release.lock.yml b/.github/workflows/release.lock.yml index 8eef11dd587..9fbfe0fd302 100644 --- a/.github/workflows/release.lock.yml +++ b/.github/workflows/release.lock.yml @@ -2860,6 +2860,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.npms.io,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,bun.sh,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,deb.nodesource.com,deno.land,get.pnpm.io,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,nodejs.org,npm.pkg.github.com,npmjs.com,npmjs.org,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,ppa.launchpad.net,raw.githubusercontent.com,registry.bower.io,registry.npmjs.com,registry.npmjs.org,registry.yarnpkg.com,repo.yarnpkg.com,s.symcb.com,s.symcd.com,security.ubuntu.com,skimdb.npmjs.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com,www.npmjs.com,www.npmjs.org,yarnpkg.com --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -3978,6 +3985,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -6561,6 +6569,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/repo-tree-map.lock.yml b/.github/workflows/repo-tree-map.lock.yml index ad1e38cc0de..686131d9517 100644 --- a/.github/workflows/repo-tree-map.lock.yml +++ b/.github/workflows/repo-tree-map.lock.yml @@ -2741,6 +2741,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -3859,6 +3866,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7165,6 +7173,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/repository-quality-improver.lock.yml b/.github/workflows/repository-quality-improver.lock.yml index 026f1e2c6fe..270d2a9e3a0 100644 --- a/.github/workflows/repository-quality-improver.lock.yml +++ b/.github/workflows/repository-quality-improver.lock.yml @@ -3778,6 +3778,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --add-dir /tmp/gh-aw/cache-memory-focus-areas/ --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -4896,6 +4903,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -8209,6 +8217,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/research.lock.yml b/.github/workflows/research.lock.yml index 007e687114d..6b4696c2d59 100644 --- a/.github/workflows/research.lock.yml +++ b/.github/workflows/research.lock.yml @@ -2653,6 +2653,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.npms.io,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,bun.sh,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,deb.nodesource.com,deno.land,get.pnpm.io,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,nodejs.org,npm.pkg.github.com,npmjs.com,npmjs.org,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,ppa.launchpad.net,raw.githubusercontent.com,registry.bower.io,registry.npmjs.com,registry.npmjs.org,registry.yarnpkg.com,repo.yarnpkg.com,s.symcb.com,s.symcd.com,security.ubuntu.com,skimdb.npmjs.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com,www.npmjs.com,www.npmjs.org,yarnpkg.com --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeoutputs --allow-tool tavily --allow-tool 'tavily(*)' --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -3773,6 +3780,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7078,6 +7086,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/smoke-copilot-no-firewall.lock.yml b/.github/workflows/smoke-copilot-no-firewall.lock.yml index 7b925d82048..e4d9778c5a9 100644 --- a/.github/workflows/smoke-copilot-no-firewall.lock.yml +++ b/.github/workflows/smoke-copilot-no-firewall.lock.yml @@ -5848,6 +5848,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains '*.githubusercontent.com,api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.npms.io,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,bun.sh,cdn.playwright.dev,codeload.github.com,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,deb.nodesource.com,deno.land,get.pnpm.io,github-cloud.githubusercontent.com,github-cloud.s3.amazonaws.com,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,lfs.github.com,nodejs.org,npm.pkg.github.com,npmjs.com,npmjs.org,objects.githubusercontent.com,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,playwright.download.prss.microsoft.com,ppa.launchpad.net,raw.githubusercontent.com,registry.bower.io,registry.npmjs.com,registry.npmjs.org,registry.yarnpkg.com,repo.yarnpkg.com,s.symcb.com,s.symcd.com,security.ubuntu.com,skimdb.npmjs.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com,www.npmjs.com,www.npmjs.org,yarnpkg.com' --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --add-dir /tmp/gh-aw/cache-memory/ --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -6967,6 +6974,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -10196,6 +10204,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/smoke-copilot-playwright.lock.yml b/.github/workflows/smoke-copilot-playwright.lock.yml index 666b25ac9c1..7938a37e106 100644 --- a/.github/workflows/smoke-copilot-playwright.lock.yml +++ b/.github/workflows/smoke-copilot-playwright.lock.yml @@ -5827,6 +5827,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains '*.githubusercontent.com,accounts.google.com,android.clients.google.com,api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.npms.io,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,bun.sh,cdn.playwright.dev,clients2.google.com,codeload.github.com,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,deb.nodesource.com,deno.land,get.pnpm.io,github-cloud.githubusercontent.com,github-cloud.s3.amazonaws.com,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,lfs.github.com,nodejs.org,npm.pkg.github.com,npmjs.com,npmjs.org,objects.githubusercontent.com,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,playwright.download.prss.microsoft.com,ppa.launchpad.net,raw.githubusercontent.com,registry.bower.io,registry.npmjs.com,registry.npmjs.org,registry.yarnpkg.com,repo.yarnpkg.com,s.symcb.com,s.symcd.com,security.ubuntu.com,skimdb.npmjs.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com,www.google.com,www.npmjs.com,www.npmjs.org,yarnpkg.com' --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --add-dir /tmp/gh-aw/cache-memory/ --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -6947,6 +6954,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -10187,6 +10195,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/smoke-copilot-safe-inputs.lock.yml b/.github/workflows/smoke-copilot-safe-inputs.lock.yml index e5840e7e546..2c361cda9b6 100644 --- a/.github/workflows/smoke-copilot-safe-inputs.lock.yml +++ b/.github/workflows/smoke-copilot-safe-inputs.lock.yml @@ -5554,6 +5554,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains '*.githubusercontent.com,api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.npms.io,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,bun.sh,codeload.github.com,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,deb.nodesource.com,deno.land,get.pnpm.io,github-cloud.githubusercontent.com,github-cloud.s3.amazonaws.com,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,lfs.github.com,nodejs.org,npm.pkg.github.com,npmjs.com,npmjs.org,objects.githubusercontent.com,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,ppa.launchpad.net,raw.githubusercontent.com,registry.bower.io,registry.npmjs.com,registry.npmjs.org,registry.yarnpkg.com,repo.yarnpkg.com,s.symcb.com,s.symcd.com,security.ubuntu.com,skimdb.npmjs.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com,www.npmjs.com,www.npmjs.org,yarnpkg.com' --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -6672,6 +6679,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -9893,6 +9901,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/smoke-copilot.lock.yml b/.github/workflows/smoke-copilot.lock.yml index 729f0914da4..79cdb62a19b 100644 --- a/.github/workflows/smoke-copilot.lock.yml +++ b/.github/workflows/smoke-copilot.lock.yml @@ -4379,6 +4379,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains '*.githubusercontent.com,api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.npms.io,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,bun.sh,codeload.github.com,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,deb.nodesource.com,deno.land,get.pnpm.io,github-cloud.githubusercontent.com,github-cloud.s3.amazonaws.com,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,lfs.github.com,nodejs.org,npm.pkg.github.com,npmjs.com,npmjs.org,objects.githubusercontent.com,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,ppa.launchpad.net,raw.githubusercontent.com,registry.bower.io,registry.npmjs.com,registry.npmjs.org,registry.yarnpkg.com,repo.yarnpkg.com,s.symcb.com,s.symcd.com,security.ubuntu.com,skimdb.npmjs.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com,www.npmjs.com,www.npmjs.org,yarnpkg.com' --log-level debug --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --add-dir /tmp/gh-aw/cache-memory/ --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -5497,6 +5504,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -8718,6 +8726,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/smoke-srt-custom-config.lock.yml b/.github/workflows/smoke-srt-custom-config.lock.yml index 5ddb8910798..85e1ef1ccc8 100644 --- a/.github/workflows/smoke-srt-custom-config.lock.yml +++ b/.github/workflows/smoke-srt-custom-config.lock.yml @@ -1082,6 +1082,13 @@ jobs: mv "$COPILOT_LOGS_DIR"/* /tmp/gh-aw/sandbox/agent/logs/ || true rmdir "$COPILOT_LOGS_DIR" || true fi + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -1216,6 +1223,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs diff --git a/.github/workflows/smoke-srt.lock.yml b/.github/workflows/smoke-srt.lock.yml index ee50da8cea3..0be60bef750 100644 --- a/.github/workflows/smoke-srt.lock.yml +++ b/.github/workflows/smoke-srt.lock.yml @@ -2551,6 +2551,13 @@ jobs: mv "$COPILOT_LOGS_DIR"/* /tmp/gh-aw/sandbox/agent/logs/ || true rmdir "$COPILOT_LOGS_DIR" || true fi + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -3669,6 +3676,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -5951,6 +5959,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/spec-kit-execute.lock.yml b/.github/workflows/spec-kit-execute.lock.yml index efab579e852..902bc5cd3be 100644 --- a/.github/workflows/spec-kit-execute.lock.yml +++ b/.github/workflows/spec-kit-execute.lock.yml @@ -3269,6 +3269,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeoutputs --allow-tool 'shell(cat .specify/memory/constitution.md)' --allow-tool 'shell(cat .specify/specs/*/plan.md)' --allow-tool 'shell(cat .specify/specs/*/spec.md)' --allow-tool 'shell(cat .specify/specs/*/tasks.md)' --allow-tool 'shell(cat)' --allow-tool 'shell(date)' --allow-tool 'shell(echo)' --allow-tool 'shell(find .specify/specs -type f -name '\''*.md'\'')' --allow-tool 'shell(git add:*)' --allow-tool 'shell(git branch)' --allow-tool 'shell(git branch:*)' --allow-tool 'shell(git checkout:*)' --allow-tool 'shell(git commit:*)' --allow-tool 'shell(git diff)' --allow-tool 'shell(git merge:*)' --allow-tool 'shell(git rm:*)' --allow-tool 'shell(git status)' --allow-tool 'shell(git switch:*)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(ls -la .specify/specs/)' --allow-tool 'shell(ls)' --allow-tool 'shell(make build)' --allow-tool 'shell(make fmt)' --allow-tool 'shell(make lint)' --allow-tool 'shell(make test)' --allow-tool 'shell(make test-unit)' --allow-tool 'shell(pwd)' --allow-tool 'shell(sort)' --allow-tool 'shell(tail)' --allow-tool 'shell(uniq)' --allow-tool 'shell(wc)' --allow-tool 'shell(yq)' --allow-tool write --add-dir /tmp/gh-aw/cache-memory/ --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -4387,6 +4394,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7760,6 +7768,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/spec-kit-executor.lock.yml b/.github/workflows/spec-kit-executor.lock.yml index 3406623a8a6..095392aa7b3 100644 --- a/.github/workflows/spec-kit-executor.lock.yml +++ b/.github/workflows/spec-kit-executor.lock.yml @@ -2959,6 +2959,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains '*.githubusercontent.com,api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,codeload.github.com,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,github-cloud.githubusercontent.com,github-cloud.s3.amazonaws.com,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,lfs.github.com,objects.githubusercontent.com,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,ppa.launchpad.net,raw.githubusercontent.com,registry.npmjs.org,s.symcb.com,s.symcd.com,security.ubuntu.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com' --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeoutputs --allow-tool 'shell(bash .specify/scripts/bash/check-prerequisites.sh)' --allow-tool 'shell(bash .specify/scripts/bash/create-new-feature.sh)' --allow-tool 'shell(cat .specify/memory/constitution.md)' --allow-tool 'shell(cat specs/*/plan.md)' --allow-tool 'shell(cat specs/*/tasks.md)' --allow-tool 'shell(cat)' --allow-tool 'shell(date)' --allow-tool 'shell(echo)' --allow-tool 'shell(find specs -type f -name '\''*.md'\'')' --allow-tool 'shell(git add:*)' --allow-tool 'shell(git branch)' --allow-tool 'shell(git branch:*)' --allow-tool 'shell(git checkout:*)' --allow-tool 'shell(git commit:*)' --allow-tool 'shell(git diff)' --allow-tool 'shell(git merge:*)' --allow-tool 'shell(git rm:*)' --allow-tool 'shell(git status)' --allow-tool 'shell(git switch:*)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(ls -la .specify/)' --allow-tool 'shell(ls)' --allow-tool 'shell(make build)' --allow-tool 'shell(make fmt)' --allow-tool 'shell(make lint)' --allow-tool 'shell(make test)' --allow-tool 'shell(pwd)' --allow-tool 'shell(sort)' --allow-tool 'shell(tail)' --allow-tool 'shell(uniq)' --allow-tool 'shell(wc)' --allow-tool 'shell(yq)' --allow-tool write --add-dir /tmp/gh-aw/cache-memory/ --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -4077,6 +4084,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7450,6 +7458,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/speckit-dispatcher.lock.yml b/.github/workflows/speckit-dispatcher.lock.yml index 74fd1c300d8..45a8d17bad9 100644 --- a/.github/workflows/speckit-dispatcher.lock.yml +++ b/.github/workflows/speckit-dispatcher.lock.yml @@ -4890,6 +4890,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --agent speckit-dispatcher --allow-tool github --allow-tool safeoutputs --allow-tool 'shell(cat .specify/memory/constitution.md)' --allow-tool 'shell(cat)' --allow-tool 'shell(date)' --allow-tool 'shell(echo)' --allow-tool 'shell(find specs -name '\''plan.md'\'' -exec cat {} \;)' --allow-tool 'shell(find specs -name '\''spec.md'\'' -exec cat {} \;)' --allow-tool 'shell(find specs -name '\''tasks.md'\'' -exec cat {} \;)' --allow-tool 'shell(find specs -type f -name '\''*.md'\'')' --allow-tool 'shell(git branch)' --allow-tool 'shell(git status)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(ls -la .specify/)' --allow-tool 'shell(ls -la specs/)' --allow-tool 'shell(ls)' --allow-tool 'shell(pwd)' --allow-tool 'shell(sort)' --allow-tool 'shell(tail)' --allow-tool 'shell(uniq)' --allow-tool 'shell(wc)' --allow-tool 'shell(yq)' --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -6009,6 +6016,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -9223,6 +9231,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/stale-repo-identifier.lock.yml b/.github/workflows/stale-repo-identifier.lock.yml index 4a92ceb3d95..b3fbd20cc12 100644 --- a/.github/workflows/stale-repo-identifier.lock.yml +++ b/.github/workflows/stale-repo-identifier.lock.yml @@ -4430,6 +4430,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains '*.githubusercontent.com,*.pythonhosted.org,anaconda.org,api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,binstar.org,bootstrap.pypa.io,codeload.github.com,conda.anaconda.org,conda.binstar.org,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,files.pythonhosted.org,github-cloud.githubusercontent.com,github-cloud.s3.amazonaws.com,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,lfs.github.com,objects.githubusercontent.com,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,pip.pypa.io,ppa.launchpad.net,pypi.org,pypi.python.org,raw.githubusercontent.com,registry.npmjs.org,repo.anaconda.com,repo.continuum.io,s.symcb.com,s.symcd.com,security.ubuntu.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com' --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --add-dir /tmp/gh-aw/cache-memory/ --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -5551,6 +5558,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -8781,6 +8789,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/super-linter.lock.yml b/.github/workflows/super-linter.lock.yml index 31283474f09..b7caa6440f0 100644 --- a/.github/workflows/super-linter.lock.yml +++ b/.github/workflows/super-linter.lock.yml @@ -2956,6 +2956,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --add-dir /tmp/gh-aw/cache-memory/ --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -4074,6 +4081,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7294,6 +7302,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/technical-doc-writer.lock.yml b/.github/workflows/technical-doc-writer.lock.yml index 0bf7678c5de..0c7cee75a53 100644 --- a/.github/workflows/technical-doc-writer.lock.yml +++ b/.github/workflows/technical-doc-writer.lock.yml @@ -4179,6 +4179,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains '*.githubusercontent.com,api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,codeload.github.com,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,github-cloud.githubusercontent.com,github-cloud.s3.amazonaws.com,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,lfs.github.com,objects.githubusercontent.com,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,ppa.launchpad.net,raw.githubusercontent.com,registry.npmjs.org,s.symcb.com,s.symcd.com,security.ubuntu.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com' --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --agent technical-doc-writer --allow-tool github --allow-tool safeoutputs --allow-tool shell --allow-tool write --add-dir /tmp/gh-aw/cache-memory/ --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -5300,6 +5307,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -8671,6 +8679,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/test-discussion-expires.lock.yml b/.github/workflows/test-discussion-expires.lock.yml index d46b4ca82c3..32910c6afcf 100644 --- a/.github/workflows/test-discussion-expires.lock.yml +++ b/.github/workflows/test-discussion-expires.lock.yml @@ -2340,6 +2340,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeoutputs --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -3458,6 +3465,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -6765,6 +6773,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/test-hide-older-comments.lock.yml b/.github/workflows/test-hide-older-comments.lock.yml index 84c29fa1ee0..f986c3fd88b 100644 --- a/.github/workflows/test-hide-older-comments.lock.yml +++ b/.github/workflows/test-hide-older-comments.lock.yml @@ -3114,6 +3114,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeoutputs --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -4232,6 +4239,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -6817,6 +6825,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/test-python-safe-input.lock.yml b/.github/workflows/test-python-safe-input.lock.yml index ca2b9737aff..42d2b73b35c 100644 --- a/.github/workflows/test-python-safe-input.lock.yml +++ b/.github/workflows/test-python-safe-input.lock.yml @@ -3953,6 +3953,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeinputs --allow-tool safeoutputs --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -5071,6 +5078,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -8291,6 +8299,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/tidy.lock.yml b/.github/workflows/tidy.lock.yml index 6a7a64151f7..083ee8d1469 100644 --- a/.github/workflows/tidy.lock.yml +++ b/.github/workflows/tidy.lock.yml @@ -3082,6 +3082,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeoutputs --allow-tool 'shell(cat)' --allow-tool 'shell(date)' --allow-tool 'shell(echo)' --allow-tool 'shell(git add:*)' --allow-tool 'shell(git branch:*)' --allow-tool 'shell(git checkout:*)' --allow-tool 'shell(git commit:*)' --allow-tool 'shell(git merge:*)' --allow-tool 'shell(git restore:*)' --allow-tool 'shell(git rm:*)' --allow-tool 'shell(git status)' --allow-tool 'shell(git switch:*)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(ls)' --allow-tool 'shell(make:*)' --allow-tool 'shell(pwd)' --allow-tool 'shell(sort)' --allow-tool 'shell(tail)' --allow-tool 'shell(uniq)' --allow-tool 'shell(wc)' --allow-tool 'shell(yq)' --allow-tool write --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -4201,6 +4208,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7555,6 +7563,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/video-analyzer.lock.yml b/.github/workflows/video-analyzer.lock.yml index 81ec96c0e81..129427dc05c 100644 --- a/.github/workflows/video-analyzer.lock.yml +++ b/.github/workflows/video-analyzer.lock.yml @@ -2997,6 +2997,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeoutputs --allow-tool 'shell(cat)' --allow-tool 'shell(date)' --allow-tool 'shell(echo)' --allow-tool 'shell(ffmpeg *)' --allow-tool 'shell(ffprobe *)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(ls)' --allow-tool 'shell(pwd)' --allow-tool 'shell(sort)' --allow-tool 'shell(tail)' --allow-tool 'shell(uniq)' --allow-tool 'shell(wc)' --allow-tool 'shell(yq)' --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -4115,6 +4122,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7328,6 +7336,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/weekly-issue-summary.lock.yml b/.github/workflows/weekly-issue-summary.lock.yml index a48cd23e5f5..69c44e4083f 100644 --- a/.github/workflows/weekly-issue-summary.lock.yml +++ b/.github/workflows/weekly-issue-summary.lock.yml @@ -3786,6 +3786,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains '*.pythonhosted.org,anaconda.org,api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.npms.io,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,binstar.org,bootstrap.pypa.io,bun.sh,conda.anaconda.org,conda.binstar.org,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,deb.nodesource.com,deno.land,files.pythonhosted.org,get.pnpm.io,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,nodejs.org,npm.pkg.github.com,npmjs.com,npmjs.org,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,pip.pypa.io,ppa.launchpad.net,pypi.org,pypi.python.org,raw.githubusercontent.com,registry.bower.io,registry.npmjs.com,registry.npmjs.org,registry.yarnpkg.com,repo.anaconda.com,repo.continuum.io,repo.yarnpkg.com,s.symcb.com,s.symcd.com,security.ubuntu.com,skimdb.npmjs.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com,www.npmjs.com,www.npmjs.org,yarnpkg.com' --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --add-dir /tmp/gh-aw/cache-memory/ --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -4907,6 +4914,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -8233,6 +8241,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/pkg/workflow/copilot_engine.go b/pkg/workflow/copilot_engine.go index ef871e7d279..c35bb084369 100644 --- a/pkg/workflow/copilot_engine.go +++ b/pkg/workflow/copilot_engine.go @@ -12,6 +12,8 @@ import ( var copilotLog = logger.New("workflow:copilot_engine") const logsFolder = "/tmp/gh-aw/sandbox/agent/logs/" +const sessionStateFile = "/tmp/gh-aw/sandbox/agent/session-state.txt" +const sessionStateSource = "/home/runner/.copilot/session-state" // CopilotEngine represents the GitHub Copilot CLI agentic engine type CopilotEngine struct { @@ -150,7 +152,7 @@ func (e *CopilotEngine) GetInstallationSteps(workflowData *WorkflowData) []GitHu } func (e *CopilotEngine) GetDeclaredOutputFiles() []string { - return []string{logsFolder} + return []string{logsFolder, sessionStateFile} } // extractAddDirPaths extracts all directory paths from copilot args that follow --add-dir flags @@ -345,7 +347,14 @@ func (e *CopilotEngine) GetExecutionSteps(workflowData *WorkflowData, logFile st // Build the command with custom SRT command // The custom command should handle wrapping copilot with SRT command = fmt.Sprintf(`set -o pipefail -%s %s -- %s 2>&1 | tee %s`, agentConfig.Command, shellJoinArgs(srtArgs), copilotCommand, shellEscapeArg(logFile)) +%s %s -- %s 2>&1 | tee %s + +# Copy session-state file to agent output location +if [ -f %s ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname %s)" + cp %s %s || true +fi`, agentConfig.Command, shellJoinArgs(srtArgs), copilotCommand, shellEscapeArg(logFile), shellEscapeArg(sessionStateSource), shellEscapeArg(sessionStateFile), shellEscapeArg(sessionStateSource), shellEscapeArg(sessionStateFile)) } else { // Create the Node.js wrapper script for SRT (standard installation) srtWrapperScript := generateSRTWrapperScript(copilotCommand, srtConfigJSON, logFile, logsFolder) @@ -435,12 +444,26 @@ func (e *CopilotEngine) GetExecutionSteps(workflowData *WorkflowData, logFile st command = fmt.Sprintf(`set -o pipefail %s %s \ -- %s \ - 2>&1 | tee %s`, awfCommand, shellJoinArgs(awfArgs), copilotCommand, shellEscapeArg(logFile)) + 2>&1 | tee %s + +# Copy session-state file to agent output location +if [ -f %s ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname %s)" + cp %s %s || true +fi`, awfCommand, shellJoinArgs(awfArgs), copilotCommand, shellEscapeArg(logFile), shellEscapeArg(sessionStateSource), shellEscapeArg(sessionStateFile), shellEscapeArg(sessionStateSource), shellEscapeArg(sessionStateFile)) } else { // Run copilot command without AWF wrapper command = fmt.Sprintf(`set -o pipefail COPILOT_CLI_INSTRUCTION="$(cat /tmp/gh-aw/aw-prompts/prompt.txt)" -%s%s 2>&1 | tee %s`, mkdirCommands.String(), copilotCommand, logFile) +%s%s 2>&1 | tee %s + +# Copy session-state file to agent output location +if [ -f %s ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname %s)" + cp %s %s || true +fi`, mkdirCommands.String(), copilotCommand, logFile, shellEscapeArg(sessionStateSource), shellEscapeArg(sessionStateFile), shellEscapeArg(sessionStateSource), shellEscapeArg(sessionStateFile)) } // Use COPILOT_GITHUB_TOKEN @@ -1318,7 +1341,14 @@ if [ -n "$COPILOT_LOGS_DIR" ] && [ -d "$COPILOT_LOGS_DIR" ]; then mkdir -p %s mv "$COPILOT_LOGS_DIR"/* %s || true rmdir "$COPILOT_LOGS_DIR" || true -fi`, escapedConfigJSON, escapedCopilotCommand, shellEscapeArg(logFile), shellEscapeArg(logsFolder), shellEscapeArg(logsFolder), shellEscapeArg(logsFolder)) +fi + +# Copy session-state file to agent output location +if [ -f %s ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname %s)" + cp %s %s || true +fi`, escapedConfigJSON, escapedCopilotCommand, shellEscapeArg(logFile), shellEscapeArg(logsFolder), shellEscapeArg(logsFolder), shellEscapeArg(logsFolder), shellEscapeArg(sessionStateSource), shellEscapeArg(sessionStateFile), shellEscapeArg(sessionStateSource), shellEscapeArg(sessionStateFile)) return script } From 463b2760f0c58669b901c475300a79a6791ad0b5 Mon Sep 17 00:00:00 2001 From: "copilot-swe-agent[bot]" <198982749+Copilot@users.noreply.github.com> Date: Thu, 11 Dec 2025 17:06:26 +0000 Subject: [PATCH 4/9] Complete implementation - session-state file added to agent outputs - All unit tests pass successfully - Integration tests verified - Session-state file will be copied and uploaded as part of agent_outputs artifact Co-authored-by: pelikhan <4175913+pelikhan@users.noreply.github.com> --- .github/workflows/archie.lock.yml | 2 +- .github/workflows/brave.lock.yml | 2 +- .github/workflows/ci-doctor.lock.yml | 2 +- .github/workflows/cloclo.lock.yml | 2 +- .github/workflows/craft.lock.yml | 2 +- .github/workflows/daily-assign-issue-to-user.lock.yml | 2 +- .github/workflows/daily-fact.lock.yml | 2 +- .github/workflows/dev-hawk.lock.yml | 2 +- .github/workflows/grumpy-reviewer.lock.yml | 2 +- .github/workflows/issue-monster.lock.yml | 2 +- .github/workflows/pdf-summary.lock.yml | 2 +- .github/workflows/poem-bot.lock.yml | 2 +- .github/workflows/pr-nitpick-reviewer.lock.yml | 2 +- .github/workflows/q.lock.yml | 2 +- .github/workflows/scout.lock.yml | 2 +- .github/workflows/smoke-claude.lock.yml | 2 +- .github/workflows/smoke-codex.lock.yml | 2 +- .github/workflows/smoke-copilot-no-firewall.lock.yml | 2 +- .github/workflows/smoke-copilot-playwright.lock.yml | 2 +- .github/workflows/smoke-copilot-safe-inputs.lock.yml | 2 +- .github/workflows/smoke-copilot.lock.yml | 2 +- .github/workflows/smoke-detector.lock.yml | 2 +- .github/workflows/speckit-dispatcher.lock.yml | 2 +- .github/workflows/technical-doc-writer.lock.yml | 2 +- .github/workflows/test-hide-older-comments.lock.yml | 2 +- .github/workflows/unbloat-docs.lock.yml | 2 +- pkg/workflow/js/add_comment.cjs | 2 +- 27 files changed, 27 insertions(+), 27 deletions(-) diff --git a/.github/workflows/archie.lock.yml b/.github/workflows/archie.lock.yml index e4b5ac53ce3..99796e36996 100644 --- a/.github/workflows/archie.lock.yml +++ b/.github/workflows/archie.lock.yml @@ -1641,7 +1641,7 @@ jobs: let hiddenCount = 0; for (const comment of comments) { try { - const nodeId = isDiscussion ? String(comment.id) : (comment).node_id; + const nodeId = isDiscussion ? String(comment.id) : comment.node_id; core.info(`Hiding comment: ${nodeId}`); await minimizeComment(github, nodeId, normalizedReason); hiddenCount++; diff --git a/.github/workflows/brave.lock.yml b/.github/workflows/brave.lock.yml index f5801008d0d..58d8a8fa9e2 100644 --- a/.github/workflows/brave.lock.yml +++ b/.github/workflows/brave.lock.yml @@ -1538,7 +1538,7 @@ jobs: let hiddenCount = 0; for (const comment of comments) { try { - const nodeId = isDiscussion ? String(comment.id) : (comment).node_id; + const nodeId = isDiscussion ? String(comment.id) : comment.node_id; core.info(`Hiding comment: ${nodeId}`); await minimizeComment(github, nodeId, normalizedReason); hiddenCount++; diff --git a/.github/workflows/ci-doctor.lock.yml b/.github/workflows/ci-doctor.lock.yml index 4e71c01339e..f10c21181a4 100644 --- a/.github/workflows/ci-doctor.lock.yml +++ b/.github/workflows/ci-doctor.lock.yml @@ -828,7 +828,7 @@ jobs: let hiddenCount = 0; for (const comment of comments) { try { - const nodeId = isDiscussion ? String(comment.id) : (comment).node_id; + const nodeId = isDiscussion ? String(comment.id) : comment.node_id; core.info(`Hiding comment: ${nodeId}`); await minimizeComment(github, nodeId, normalizedReason); hiddenCount++; diff --git a/.github/workflows/cloclo.lock.yml b/.github/workflows/cloclo.lock.yml index a9f5c24f485..70aa347c5f3 100644 --- a/.github/workflows/cloclo.lock.yml +++ b/.github/workflows/cloclo.lock.yml @@ -1749,7 +1749,7 @@ jobs: let hiddenCount = 0; for (const comment of comments) { try { - const nodeId = isDiscussion ? String(comment.id) : (comment).node_id; + const nodeId = isDiscussion ? String(comment.id) : comment.node_id; core.info(`Hiding comment: ${nodeId}`); await minimizeComment(github, nodeId, normalizedReason); hiddenCount++; diff --git a/.github/workflows/craft.lock.yml b/.github/workflows/craft.lock.yml index bfb391f09a0..1c629a0d00a 100644 --- a/.github/workflows/craft.lock.yml +++ b/.github/workflows/craft.lock.yml @@ -1696,7 +1696,7 @@ jobs: let hiddenCount = 0; for (const comment of comments) { try { - const nodeId = isDiscussion ? String(comment.id) : (comment).node_id; + const nodeId = isDiscussion ? String(comment.id) : comment.node_id; core.info(`Hiding comment: ${nodeId}`); await minimizeComment(github, nodeId, normalizedReason); hiddenCount++; diff --git a/.github/workflows/daily-assign-issue-to-user.lock.yml b/.github/workflows/daily-assign-issue-to-user.lock.yml index 7213aa96251..07e2b1ba10a 100644 --- a/.github/workflows/daily-assign-issue-to-user.lock.yml +++ b/.github/workflows/daily-assign-issue-to-user.lock.yml @@ -635,7 +635,7 @@ jobs: let hiddenCount = 0; for (const comment of comments) { try { - const nodeId = isDiscussion ? String(comment.id) : (comment).node_id; + const nodeId = isDiscussion ? String(comment.id) : comment.node_id; core.info(`Hiding comment: ${nodeId}`); await minimizeComment(github, nodeId, normalizedReason); hiddenCount++; diff --git a/.github/workflows/daily-fact.lock.yml b/.github/workflows/daily-fact.lock.yml index eb7c92d3248..13806c639fe 100644 --- a/.github/workflows/daily-fact.lock.yml +++ b/.github/workflows/daily-fact.lock.yml @@ -698,7 +698,7 @@ jobs: let hiddenCount = 0; for (const comment of comments) { try { - const nodeId = isDiscussion ? String(comment.id) : (comment).node_id; + const nodeId = isDiscussion ? String(comment.id) : comment.node_id; core.info(`Hiding comment: ${nodeId}`); await minimizeComment(github, nodeId, normalizedReason); hiddenCount++; diff --git a/.github/workflows/dev-hawk.lock.yml b/.github/workflows/dev-hawk.lock.yml index 4ddb0936e7a..4167ec8fb16 100644 --- a/.github/workflows/dev-hawk.lock.yml +++ b/.github/workflows/dev-hawk.lock.yml @@ -754,7 +754,7 @@ jobs: let hiddenCount = 0; for (const comment of comments) { try { - const nodeId = isDiscussion ? String(comment.id) : (comment).node_id; + const nodeId = isDiscussion ? String(comment.id) : comment.node_id; core.info(`Hiding comment: ${nodeId}`); await minimizeComment(github, nodeId, normalizedReason); hiddenCount++; diff --git a/.github/workflows/grumpy-reviewer.lock.yml b/.github/workflows/grumpy-reviewer.lock.yml index 347b91f5340..a7e0a681099 100644 --- a/.github/workflows/grumpy-reviewer.lock.yml +++ b/.github/workflows/grumpy-reviewer.lock.yml @@ -1577,7 +1577,7 @@ jobs: let hiddenCount = 0; for (const comment of comments) { try { - const nodeId = isDiscussion ? String(comment.id) : (comment).node_id; + const nodeId = isDiscussion ? String(comment.id) : comment.node_id; core.info(`Hiding comment: ${nodeId}`); await minimizeComment(github, nodeId, normalizedReason); hiddenCount++; diff --git a/.github/workflows/issue-monster.lock.yml b/.github/workflows/issue-monster.lock.yml index a922dbcd057..fcce28341b1 100644 --- a/.github/workflows/issue-monster.lock.yml +++ b/.github/workflows/issue-monster.lock.yml @@ -864,7 +864,7 @@ jobs: let hiddenCount = 0; for (const comment of comments) { try { - const nodeId = isDiscussion ? String(comment.id) : (comment).node_id; + const nodeId = isDiscussion ? String(comment.id) : comment.node_id; core.info(`Hiding comment: ${nodeId}`); await minimizeComment(github, nodeId, normalizedReason); hiddenCount++; diff --git a/.github/workflows/pdf-summary.lock.yml b/.github/workflows/pdf-summary.lock.yml index ea38ad735ec..10c1ceafc85 100644 --- a/.github/workflows/pdf-summary.lock.yml +++ b/.github/workflows/pdf-summary.lock.yml @@ -1629,7 +1629,7 @@ jobs: let hiddenCount = 0; for (const comment of comments) { try { - const nodeId = isDiscussion ? String(comment.id) : (comment).node_id; + const nodeId = isDiscussion ? String(comment.id) : comment.node_id; core.info(`Hiding comment: ${nodeId}`); await minimizeComment(github, nodeId, normalizedReason); hiddenCount++; diff --git a/.github/workflows/poem-bot.lock.yml b/.github/workflows/poem-bot.lock.yml index 2241606eef1..a2c57d95ade 100644 --- a/.github/workflows/poem-bot.lock.yml +++ b/.github/workflows/poem-bot.lock.yml @@ -1669,7 +1669,7 @@ jobs: let hiddenCount = 0; for (const comment of comments) { try { - const nodeId = isDiscussion ? String(comment.id) : (comment).node_id; + const nodeId = isDiscussion ? String(comment.id) : comment.node_id; core.info(`Hiding comment: ${nodeId}`); await minimizeComment(github, nodeId, normalizedReason); hiddenCount++; diff --git a/.github/workflows/pr-nitpick-reviewer.lock.yml b/.github/workflows/pr-nitpick-reviewer.lock.yml index 7885d22cc7d..930d997e269 100644 --- a/.github/workflows/pr-nitpick-reviewer.lock.yml +++ b/.github/workflows/pr-nitpick-reviewer.lock.yml @@ -1523,7 +1523,7 @@ jobs: let hiddenCount = 0; for (const comment of comments) { try { - const nodeId = isDiscussion ? String(comment.id) : (comment).node_id; + const nodeId = isDiscussion ? String(comment.id) : comment.node_id; core.info(`Hiding comment: ${nodeId}`); await minimizeComment(github, nodeId, normalizedReason); hiddenCount++; diff --git a/.github/workflows/q.lock.yml b/.github/workflows/q.lock.yml index 799f9233e86..b08d8b5387d 100644 --- a/.github/workflows/q.lock.yml +++ b/.github/workflows/q.lock.yml @@ -1870,7 +1870,7 @@ jobs: let hiddenCount = 0; for (const comment of comments) { try { - const nodeId = isDiscussion ? String(comment.id) : (comment).node_id; + const nodeId = isDiscussion ? String(comment.id) : comment.node_id; core.info(`Hiding comment: ${nodeId}`); await minimizeComment(github, nodeId, normalizedReason); hiddenCount++; diff --git a/.github/workflows/scout.lock.yml b/.github/workflows/scout.lock.yml index f84ca7d8723..160aa3d34cd 100644 --- a/.github/workflows/scout.lock.yml +++ b/.github/workflows/scout.lock.yml @@ -1828,7 +1828,7 @@ jobs: let hiddenCount = 0; for (const comment of comments) { try { - const nodeId = isDiscussion ? String(comment.id) : (comment).node_id; + const nodeId = isDiscussion ? String(comment.id) : comment.node_id; core.info(`Hiding comment: ${nodeId}`); await minimizeComment(github, nodeId, normalizedReason); hiddenCount++; diff --git a/.github/workflows/smoke-claude.lock.yml b/.github/workflows/smoke-claude.lock.yml index e7013a393e9..8c2f194d0ec 100644 --- a/.github/workflows/smoke-claude.lock.yml +++ b/.github/workflows/smoke-claude.lock.yml @@ -1228,7 +1228,7 @@ jobs: let hiddenCount = 0; for (const comment of comments) { try { - const nodeId = isDiscussion ? String(comment.id) : (comment).node_id; + const nodeId = isDiscussion ? String(comment.id) : comment.node_id; core.info(`Hiding comment: ${nodeId}`); await minimizeComment(github, nodeId, normalizedReason); hiddenCount++; diff --git a/.github/workflows/smoke-codex.lock.yml b/.github/workflows/smoke-codex.lock.yml index e5908d0b16c..13d423914f0 100644 --- a/.github/workflows/smoke-codex.lock.yml +++ b/.github/workflows/smoke-codex.lock.yml @@ -1112,7 +1112,7 @@ jobs: let hiddenCount = 0; for (const comment of comments) { try { - const nodeId = isDiscussion ? String(comment.id) : (comment).node_id; + const nodeId = isDiscussion ? String(comment.id) : comment.node_id; core.info(`Hiding comment: ${nodeId}`); await minimizeComment(github, nodeId, normalizedReason); hiddenCount++; diff --git a/.github/workflows/smoke-copilot-no-firewall.lock.yml b/.github/workflows/smoke-copilot-no-firewall.lock.yml index e4d9778c5a9..1bc9b5caac6 100644 --- a/.github/workflows/smoke-copilot-no-firewall.lock.yml +++ b/.github/workflows/smoke-copilot-no-firewall.lock.yml @@ -1142,7 +1142,7 @@ jobs: let hiddenCount = 0; for (const comment of comments) { try { - const nodeId = isDiscussion ? String(comment.id) : (comment).node_id; + const nodeId = isDiscussion ? String(comment.id) : comment.node_id; core.info(`Hiding comment: ${nodeId}`); await minimizeComment(github, nodeId, normalizedReason); hiddenCount++; diff --git a/.github/workflows/smoke-copilot-playwright.lock.yml b/.github/workflows/smoke-copilot-playwright.lock.yml index 7938a37e106..78283524180 100644 --- a/.github/workflows/smoke-copilot-playwright.lock.yml +++ b/.github/workflows/smoke-copilot-playwright.lock.yml @@ -1191,7 +1191,7 @@ jobs: let hiddenCount = 0; for (const comment of comments) { try { - const nodeId = isDiscussion ? String(comment.id) : (comment).node_id; + const nodeId = isDiscussion ? String(comment.id) : comment.node_id; core.info(`Hiding comment: ${nodeId}`); await minimizeComment(github, nodeId, normalizedReason); hiddenCount++; diff --git a/.github/workflows/smoke-copilot-safe-inputs.lock.yml b/.github/workflows/smoke-copilot-safe-inputs.lock.yml index 2c361cda9b6..c53a693e987 100644 --- a/.github/workflows/smoke-copilot-safe-inputs.lock.yml +++ b/.github/workflows/smoke-copilot-safe-inputs.lock.yml @@ -1119,7 +1119,7 @@ jobs: let hiddenCount = 0; for (const comment of comments) { try { - const nodeId = isDiscussion ? String(comment.id) : (comment).node_id; + const nodeId = isDiscussion ? String(comment.id) : comment.node_id; core.info(`Hiding comment: ${nodeId}`); await minimizeComment(github, nodeId, normalizedReason); hiddenCount++; diff --git a/.github/workflows/smoke-copilot.lock.yml b/.github/workflows/smoke-copilot.lock.yml index 79cdb62a19b..d2a710363f1 100644 --- a/.github/workflows/smoke-copilot.lock.yml +++ b/.github/workflows/smoke-copilot.lock.yml @@ -1099,7 +1099,7 @@ jobs: let hiddenCount = 0; for (const comment of comments) { try { - const nodeId = isDiscussion ? String(comment.id) : (comment).node_id; + const nodeId = isDiscussion ? String(comment.id) : comment.node_id; core.info(`Hiding comment: ${nodeId}`); await minimizeComment(github, nodeId, normalizedReason); hiddenCount++; diff --git a/.github/workflows/smoke-detector.lock.yml b/.github/workflows/smoke-detector.lock.yml index 889d67591ed..d6e503d530b 100644 --- a/.github/workflows/smoke-detector.lock.yml +++ b/.github/workflows/smoke-detector.lock.yml @@ -1434,7 +1434,7 @@ jobs: let hiddenCount = 0; for (const comment of comments) { try { - const nodeId = isDiscussion ? String(comment.id) : (comment).node_id; + const nodeId = isDiscussion ? String(comment.id) : comment.node_id; core.info(`Hiding comment: ${nodeId}`); await minimizeComment(github, nodeId, normalizedReason); hiddenCount++; diff --git a/.github/workflows/speckit-dispatcher.lock.yml b/.github/workflows/speckit-dispatcher.lock.yml index 45a8d17bad9..a99e282953b 100644 --- a/.github/workflows/speckit-dispatcher.lock.yml +++ b/.github/workflows/speckit-dispatcher.lock.yml @@ -1848,7 +1848,7 @@ jobs: let hiddenCount = 0; for (const comment of comments) { try { - const nodeId = isDiscussion ? String(comment.id) : (comment).node_id; + const nodeId = isDiscussion ? String(comment.id) : comment.node_id; core.info(`Hiding comment: ${nodeId}`); await minimizeComment(github, nodeId, normalizedReason); hiddenCount++; diff --git a/.github/workflows/technical-doc-writer.lock.yml b/.github/workflows/technical-doc-writer.lock.yml index 0c7cee75a53..59810a5cdc3 100644 --- a/.github/workflows/technical-doc-writer.lock.yml +++ b/.github/workflows/technical-doc-writer.lock.yml @@ -1088,7 +1088,7 @@ jobs: let hiddenCount = 0; for (const comment of comments) { try { - const nodeId = isDiscussion ? String(comment.id) : (comment).node_id; + const nodeId = isDiscussion ? String(comment.id) : comment.node_id; core.info(`Hiding comment: ${nodeId}`); await minimizeComment(github, nodeId, normalizedReason); hiddenCount++; diff --git a/.github/workflows/test-hide-older-comments.lock.yml b/.github/workflows/test-hide-older-comments.lock.yml index f986c3fd88b..dc865cb2e95 100644 --- a/.github/workflows/test-hide-older-comments.lock.yml +++ b/.github/workflows/test-hide-older-comments.lock.yml @@ -626,7 +626,7 @@ jobs: let hiddenCount = 0; for (const comment of comments) { try { - const nodeId = isDiscussion ? String(comment.id) : (comment).node_id; + const nodeId = isDiscussion ? String(comment.id) : comment.node_id; core.info(`Hiding comment: ${nodeId}`); await minimizeComment(github, nodeId, normalizedReason); hiddenCount++; diff --git a/.github/workflows/unbloat-docs.lock.yml b/.github/workflows/unbloat-docs.lock.yml index ea387e9a594..8f8e32714c1 100644 --- a/.github/workflows/unbloat-docs.lock.yml +++ b/.github/workflows/unbloat-docs.lock.yml @@ -1456,7 +1456,7 @@ jobs: let hiddenCount = 0; for (const comment of comments) { try { - const nodeId = isDiscussion ? String(comment.id) : (comment).node_id; + const nodeId = isDiscussion ? String(comment.id) : comment.node_id; core.info(`Hiding comment: ${nodeId}`); await minimizeComment(github, nodeId, normalizedReason); hiddenCount++; diff --git a/pkg/workflow/js/add_comment.cjs b/pkg/workflow/js/add_comment.cjs index 82980a0f21b..e2de202274d 100644 --- a/pkg/workflow/js/add_comment.cjs +++ b/pkg/workflow/js/add_comment.cjs @@ -198,7 +198,7 @@ async function hideOlderComments(github, owner, repo, itemNumber, workflowId, is let hiddenCount = 0; for (const comment of comments) { try { - const nodeId = isDiscussion ? String(comment.id) : /** @type {{node_id: string}} */(comment).node_id; + const nodeId = isDiscussion ? String(comment.id) : /** @type {{node_id: string}} */ comment.node_id; core.info(`Hiding comment: ${nodeId}`); await minimizeComment(github, nodeId, normalizedReason); hiddenCount++; From 35856e85f989c3022b7601b9b90ca579677d10e2 Mon Sep 17 00:00:00 2001 From: "copilot-swe-agent[bot]" <198982749+Copilot@users.noreply.github.com> Date: Thu, 11 Dec 2025 17:22:35 +0000 Subject: [PATCH 5/9] Change session-state file extension from .txt to .json - Session state file is JSON format, use .json extension - File is already downloaded by logs downloader as part of agent_outputs artifact - All unit tests pass Co-authored-by: pelikhan <4175913+pelikhan@users.noreply.github.com> --- .github/workflows/ai-moderator.lock.yml | 6 +++--- .github/workflows/archie.lock.yml | 10 +++++----- .github/workflows/artifacts-summary.lock.yml | 10 +++++----- .github/workflows/brave.lock.yml | 10 +++++----- .../workflows/breaking-change-checker.lock.yml | 10 +++++----- .github/workflows/ci-coach.lock.yml | 10 +++++----- .github/workflows/ci-doctor.lock.yml | 10 +++++----- .../workflows/cli-consistency-checker.lock.yml | 10 +++++----- .../workflows/copilot-pr-merged-report.lock.yml | 10 +++++----- .../workflows/copilot-pr-nlp-analysis.lock.yml | 10 +++++----- .../workflows/copilot-pr-prompt-analysis.lock.yml | 10 +++++----- .github/workflows/craft.lock.yml | 10 +++++----- .../workflows/daily-assign-issue-to-user.lock.yml | 10 +++++----- .../workflows/daily-copilot-token-report.lock.yml | 10 +++++----- .github/workflows/daily-firewall-report.lock.yml | 10 +++++----- .../workflows/daily-malicious-code-scan.lock.yml | 6 +++--- .github/workflows/daily-news.lock.yml | 10 +++++----- .github/workflows/daily-repo-chronicle.lock.yml | 10 +++++----- .github/workflows/daily-team-status.lock.yml | 15 +++++++++++++++ .github/workflows/daily-workflow-updater.lock.yml | 10 +++++----- .github/workflows/dependabot-go-checker.lock.yml | 10 +++++----- .github/workflows/dev-hawk.lock.yml | 10 +++++----- .github/workflows/dev.lock.yml | 10 +++++----- .github/workflows/dictation-prompt.lock.yml | 10 +++++----- .github/workflows/docs-noob-tester.lock.yml | 10 +++++----- .../example-permissions-warning.lock.yml | 6 +++--- .github/workflows/firewall-escape.lock.yml | 6 +++--- .github/workflows/firewall.lock.yml | 6 +++--- .github/workflows/glossary-maintainer.lock.yml | 10 +++++----- .github/workflows/grumpy-reviewer.lock.yml | 10 +++++----- .github/workflows/hourly-ci-cleaner.lock.yml | 10 +++++----- .github/workflows/issue-monster.lock.yml | 10 +++++----- .github/workflows/issue-triage-agent.lock.yml | 10 +++++----- .github/workflows/layout-spec-maintainer.lock.yml | 10 +++++----- .github/workflows/mcp-inspector.lock.yml | 10 +++++----- .github/workflows/mergefest.lock.yml | 10 +++++----- .github/workflows/notion-issue-summary.lock.yml | 10 +++++----- .github/workflows/org-health-report.lock.yml | 10 +++++----- .github/workflows/pdf-summary.lock.yml | 10 +++++----- .github/workflows/plan.lock.yml | 10 +++++----- .github/workflows/poem-bot.lock.yml | 10 +++++----- .github/workflows/portfolio-analyst.lock.yml | 10 +++++----- .github/workflows/pr-nitpick-reviewer.lock.yml | 10 +++++----- .github/workflows/python-data-charts.lock.yml | 10 +++++----- .github/workflows/q.lock.yml | 10 +++++----- .github/workflows/release.lock.yml | 10 +++++----- .github/workflows/repo-tree-map.lock.yml | 10 +++++----- .../repository-quality-improver.lock.yml | 10 +++++----- .github/workflows/research.lock.yml | 10 +++++----- .../workflows/smoke-copilot-no-firewall.lock.yml | 10 +++++----- .../workflows/smoke-copilot-playwright.lock.yml | 10 +++++----- .../workflows/smoke-copilot-safe-inputs.lock.yml | 10 +++++----- .github/workflows/smoke-copilot.lock.yml | 10 +++++----- .../workflows/smoke-srt-custom-config.lock.yml | 6 +++--- .github/workflows/smoke-srt.lock.yml | 10 +++++----- .github/workflows/spec-kit-execute.lock.yml | 10 +++++----- .github/workflows/spec-kit-executor.lock.yml | 10 +++++----- .github/workflows/speckit-dispatcher.lock.yml | 10 +++++----- .github/workflows/stale-repo-identifier.lock.yml | 10 +++++----- .github/workflows/super-linter.lock.yml | 10 +++++----- .github/workflows/technical-doc-writer.lock.yml | 10 +++++----- .../workflows/test-discussion-expires.lock.yml | 10 +++++----- .../workflows/test-hide-older-comments.lock.yml | 10 +++++----- .github/workflows/test-python-safe-input.lock.yml | 10 +++++----- .github/workflows/tidy.lock.yml | 10 +++++----- .github/workflows/video-analyzer.lock.yml | 10 +++++----- .github/workflows/weekly-issue-summary.lock.yml | 10 +++++----- pkg/workflow/copilot_engine.go | 2 +- 68 files changed, 334 insertions(+), 319 deletions(-) diff --git a/.github/workflows/ai-moderator.lock.yml b/.github/workflows/ai-moderator.lock.yml index ecb8109c95f..432f25d94e8 100644 --- a/.github/workflows/ai-moderator.lock.yml +++ b/.github/workflows/ai-moderator.lock.yml @@ -3706,8 +3706,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -4826,7 +4826,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs diff --git a/.github/workflows/archie.lock.yml b/.github/workflows/archie.lock.yml index 99796e36996..74c3c19c903 100644 --- a/.github/workflows/archie.lock.yml +++ b/.github/workflows/archie.lock.yml @@ -4435,8 +4435,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -5557,7 +5557,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -8148,8 +8148,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/artifacts-summary.lock.yml b/.github/workflows/artifacts-summary.lock.yml index aa25f878a68..1b6e58b04f0 100644 --- a/.github/workflows/artifacts-summary.lock.yml +++ b/.github/workflows/artifacts-summary.lock.yml @@ -2717,8 +2717,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -3838,7 +3838,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7197,8 +7197,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/brave.lock.yml b/.github/workflows/brave.lock.yml index 58d8a8fa9e2..78cdcef5f93 100644 --- a/.github/workflows/brave.lock.yml +++ b/.github/workflows/brave.lock.yml @@ -4224,8 +4224,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -5347,7 +5347,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7938,8 +7938,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/breaking-change-checker.lock.yml b/.github/workflows/breaking-change-checker.lock.yml index 3164d786ec2..7705b4f1545 100644 --- a/.github/workflows/breaking-change-checker.lock.yml +++ b/.github/workflows/breaking-change-checker.lock.yml @@ -2801,8 +2801,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -3922,7 +3922,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7564,8 +7564,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/ci-coach.lock.yml b/.github/workflows/ci-coach.lock.yml index 8316fd31cfc..2884b718592 100644 --- a/.github/workflows/ci-coach.lock.yml +++ b/.github/workflows/ci-coach.lock.yml @@ -4003,8 +4003,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -5124,7 +5124,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -8440,8 +8440,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/ci-doctor.lock.yml b/.github/workflows/ci-doctor.lock.yml index f10c21181a4..87549b04a87 100644 --- a/.github/workflows/ci-doctor.lock.yml +++ b/.github/workflows/ci-doctor.lock.yml @@ -3665,8 +3665,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -4786,7 +4786,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -8020,8 +8020,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/cli-consistency-checker.lock.yml b/.github/workflows/cli-consistency-checker.lock.yml index c21e7588fd1..73983924d93 100644 --- a/.github/workflows/cli-consistency-checker.lock.yml +++ b/.github/workflows/cli-consistency-checker.lock.yml @@ -2798,8 +2798,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -3919,7 +3919,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7137,8 +7137,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/copilot-pr-merged-report.lock.yml b/.github/workflows/copilot-pr-merged-report.lock.yml index d21baa843bd..e5d63a14abc 100644 --- a/.github/workflows/copilot-pr-merged-report.lock.yml +++ b/.github/workflows/copilot-pr-merged-report.lock.yml @@ -4239,8 +4239,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -5360,7 +5360,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -8679,8 +8679,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/copilot-pr-nlp-analysis.lock.yml b/.github/workflows/copilot-pr-nlp-analysis.lock.yml index ea5efec619d..d86fca5b858 100644 --- a/.github/workflows/copilot-pr-nlp-analysis.lock.yml +++ b/.github/workflows/copilot-pr-nlp-analysis.lock.yml @@ -4335,8 +4335,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -5459,7 +5459,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -8786,8 +8786,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/copilot-pr-prompt-analysis.lock.yml b/.github/workflows/copilot-pr-prompt-analysis.lock.yml index 8c6310da82d..38fb05a4b31 100644 --- a/.github/workflows/copilot-pr-prompt-analysis.lock.yml +++ b/.github/workflows/copilot-pr-prompt-analysis.lock.yml @@ -3361,8 +3361,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -4482,7 +4482,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7801,8 +7801,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/craft.lock.yml b/.github/workflows/craft.lock.yml index 1c629a0d00a..758aadeb016 100644 --- a/.github/workflows/craft.lock.yml +++ b/.github/workflows/craft.lock.yml @@ -4569,8 +4569,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -5691,7 +5691,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -8291,8 +8291,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/daily-assign-issue-to-user.lock.yml b/.github/workflows/daily-assign-issue-to-user.lock.yml index 07e2b1ba10a..3797fbd3ab7 100644 --- a/.github/workflows/daily-assign-issue-to-user.lock.yml +++ b/.github/workflows/daily-assign-issue-to-user.lock.yml @@ -3169,8 +3169,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -4290,7 +4290,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7443,8 +7443,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/daily-copilot-token-report.lock.yml b/.github/workflows/daily-copilot-token-report.lock.yml index fe66ae30fbf..05415875d5e 100644 --- a/.github/workflows/daily-copilot-token-report.lock.yml +++ b/.github/workflows/daily-copilot-token-report.lock.yml @@ -4504,8 +4504,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -5628,7 +5628,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -8959,8 +8959,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/daily-firewall-report.lock.yml b/.github/workflows/daily-firewall-report.lock.yml index 4cc62774c20..07a33d637e6 100644 --- a/.github/workflows/daily-firewall-report.lock.yml +++ b/.github/workflows/daily-firewall-report.lock.yml @@ -3789,8 +3789,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -4913,7 +4913,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -8254,8 +8254,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/daily-malicious-code-scan.lock.yml b/.github/workflows/daily-malicious-code-scan.lock.yml index 82e06fd0737..241cb2eaf38 100644 --- a/.github/workflows/daily-malicious-code-scan.lock.yml +++ b/.github/workflows/daily-malicious-code-scan.lock.yml @@ -3036,8 +3036,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -4157,7 +4157,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs diff --git a/.github/workflows/daily-news.lock.yml b/.github/workflows/daily-news.lock.yml index dae1e137072..cba4f89e89e 100644 --- a/.github/workflows/daily-news.lock.yml +++ b/.github/workflows/daily-news.lock.yml @@ -4261,8 +4261,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -5387,7 +5387,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -8718,8 +8718,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/daily-repo-chronicle.lock.yml b/.github/workflows/daily-repo-chronicle.lock.yml index 20e70ebf323..c8ef0592cc1 100644 --- a/.github/workflows/daily-repo-chronicle.lock.yml +++ b/.github/workflows/daily-repo-chronicle.lock.yml @@ -3937,8 +3937,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -5061,7 +5061,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -8392,8 +8392,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/daily-team-status.lock.yml b/.github/workflows/daily-team-status.lock.yml index 285356fa2c2..32b591cf12b 100644 --- a/.github/workflows/daily-team-status.lock.yml +++ b/.github/workflows/daily-team-status.lock.yml @@ -2560,6 +2560,13 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeoutputs --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -3678,6 +3685,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ + /tmp/gh-aw/sandbox/agent/session-state.txt /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -6996,6 +7004,13 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log + + # Copy session-state file to agent output location + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} diff --git a/.github/workflows/daily-workflow-updater.lock.yml b/.github/workflows/daily-workflow-updater.lock.yml index 4a7972639d4..e484208de43 100644 --- a/.github/workflows/daily-workflow-updater.lock.yml +++ b/.github/workflows/daily-workflow-updater.lock.yml @@ -2728,8 +2728,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -3849,7 +3849,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7159,8 +7159,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/dependabot-go-checker.lock.yml b/.github/workflows/dependabot-go-checker.lock.yml index a24ec103595..d9bec73316e 100644 --- a/.github/workflows/dependabot-go-checker.lock.yml +++ b/.github/workflows/dependabot-go-checker.lock.yml @@ -3331,8 +3331,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -4452,7 +4452,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7751,8 +7751,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/dev-hawk.lock.yml b/.github/workflows/dev-hawk.lock.yml index 4167ec8fb16..3c45f80f808 100644 --- a/.github/workflows/dev-hawk.lock.yml +++ b/.github/workflows/dev-hawk.lock.yml @@ -3449,8 +3449,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -4570,7 +4570,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7163,8 +7163,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/dev.lock.yml b/.github/workflows/dev.lock.yml index 2759a192c6e..fa7028d29b0 100644 --- a/.github/workflows/dev.lock.yml +++ b/.github/workflows/dev.lock.yml @@ -3418,8 +3418,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -4539,7 +4539,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7850,8 +7850,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/dictation-prompt.lock.yml b/.github/workflows/dictation-prompt.lock.yml index 76da726087f..d3b02daa60d 100644 --- a/.github/workflows/dictation-prompt.lock.yml +++ b/.github/workflows/dictation-prompt.lock.yml @@ -2671,8 +2671,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -3792,7 +3792,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7098,8 +7098,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/docs-noob-tester.lock.yml b/.github/workflows/docs-noob-tester.lock.yml index aa047e730e9..fe826c30f72 100644 --- a/.github/workflows/docs-noob-tester.lock.yml +++ b/.github/workflows/docs-noob-tester.lock.yml @@ -2807,8 +2807,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -3931,7 +3931,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7250,8 +7250,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/example-permissions-warning.lock.yml b/.github/workflows/example-permissions-warning.lock.yml index 03f227c2ea5..dea35615070 100644 --- a/.github/workflows/example-permissions-warning.lock.yml +++ b/.github/workflows/example-permissions-warning.lock.yml @@ -787,8 +787,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -924,7 +924,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs diff --git a/.github/workflows/firewall-escape.lock.yml b/.github/workflows/firewall-escape.lock.yml index 163a2291199..6a63d6baed7 100644 --- a/.github/workflows/firewall-escape.lock.yml +++ b/.github/workflows/firewall-escape.lock.yml @@ -1207,8 +1207,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -1344,7 +1344,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs diff --git a/.github/workflows/firewall.lock.yml b/.github/workflows/firewall.lock.yml index d8e3f307c02..92f2802e1c8 100644 --- a/.github/workflows/firewall.lock.yml +++ b/.github/workflows/firewall.lock.yml @@ -902,8 +902,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -1039,7 +1039,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs diff --git a/.github/workflows/glossary-maintainer.lock.yml b/.github/workflows/glossary-maintainer.lock.yml index 4537dfd9ba3..40951029176 100644 --- a/.github/workflows/glossary-maintainer.lock.yml +++ b/.github/workflows/glossary-maintainer.lock.yml @@ -3829,8 +3829,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -4950,7 +4950,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -8263,8 +8263,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/grumpy-reviewer.lock.yml b/.github/workflows/grumpy-reviewer.lock.yml index a7e0a681099..7231a10d82f 100644 --- a/.github/workflows/grumpy-reviewer.lock.yml +++ b/.github/workflows/grumpy-reviewer.lock.yml @@ -4374,8 +4374,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -5496,7 +5496,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -8462,8 +8462,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/hourly-ci-cleaner.lock.yml b/.github/workflows/hourly-ci-cleaner.lock.yml index 2d128dbdab3..124c8fe0c25 100644 --- a/.github/workflows/hourly-ci-cleaner.lock.yml +++ b/.github/workflows/hourly-ci-cleaner.lock.yml @@ -3147,8 +3147,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -4268,7 +4268,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7577,8 +7577,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/issue-monster.lock.yml b/.github/workflows/issue-monster.lock.yml index fcce28341b1..124d3bf5739 100644 --- a/.github/workflows/issue-monster.lock.yml +++ b/.github/workflows/issue-monster.lock.yml @@ -3608,8 +3608,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -4729,7 +4729,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7885,8 +7885,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/issue-triage-agent.lock.yml b/.github/workflows/issue-triage-agent.lock.yml index f721f414483..64c9bf87b44 100644 --- a/.github/workflows/issue-triage-agent.lock.yml +++ b/.github/workflows/issue-triage-agent.lock.yml @@ -2903,8 +2903,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -4024,7 +4024,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -6614,8 +6614,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/layout-spec-maintainer.lock.yml b/.github/workflows/layout-spec-maintainer.lock.yml index 53dbac847ec..4e29f5f1f1d 100644 --- a/.github/workflows/layout-spec-maintainer.lock.yml +++ b/.github/workflows/layout-spec-maintainer.lock.yml @@ -2962,8 +2962,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -4083,7 +4083,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7393,8 +7393,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/mcp-inspector.lock.yml b/.github/workflows/mcp-inspector.lock.yml index 3760a45f224..f3b97a549f3 100644 --- a/.github/workflows/mcp-inspector.lock.yml +++ b/.github/workflows/mcp-inspector.lock.yml @@ -3326,8 +3326,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -4463,7 +4463,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7783,8 +7783,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/mergefest.lock.yml b/.github/workflows/mergefest.lock.yml index bc57e673b67..e8ff6cebd0a 100644 --- a/.github/workflows/mergefest.lock.yml +++ b/.github/workflows/mergefest.lock.yml @@ -3513,8 +3513,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -4635,7 +4635,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7232,8 +7232,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/notion-issue-summary.lock.yml b/.github/workflows/notion-issue-summary.lock.yml index 8c12aaba364..3cb2fb991a1 100644 --- a/.github/workflows/notion-issue-summary.lock.yml +++ b/.github/workflows/notion-issue-summary.lock.yml @@ -2405,8 +2405,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -3527,7 +3527,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -6117,8 +6117,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/org-health-report.lock.yml b/.github/workflows/org-health-report.lock.yml index f45b0c3ae4e..3a573e91abe 100644 --- a/.github/workflows/org-health-report.lock.yml +++ b/.github/workflows/org-health-report.lock.yml @@ -4198,8 +4198,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -5322,7 +5322,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -8648,8 +8648,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/pdf-summary.lock.yml b/.github/workflows/pdf-summary.lock.yml index 10c1ceafc85..d2d0297045c 100644 --- a/.github/workflows/pdf-summary.lock.yml +++ b/.github/workflows/pdf-summary.lock.yml @@ -4399,8 +4399,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -5521,7 +5521,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -8119,8 +8119,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/plan.lock.yml b/.github/workflows/plan.lock.yml index 62317d10607..934b2e7dbf0 100644 --- a/.github/workflows/plan.lock.yml +++ b/.github/workflows/plan.lock.yml @@ -3686,8 +3686,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -4808,7 +4808,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -8399,8 +8399,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/poem-bot.lock.yml b/.github/workflows/poem-bot.lock.yml index a2c57d95ade..064e9bb3f23 100644 --- a/.github/workflows/poem-bot.lock.yml +++ b/.github/workflows/poem-bot.lock.yml @@ -5448,8 +5448,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -6573,7 +6573,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -11957,8 +11957,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/portfolio-analyst.lock.yml b/.github/workflows/portfolio-analyst.lock.yml index 917dad725d6..d89ab5b2d13 100644 --- a/.github/workflows/portfolio-analyst.lock.yml +++ b/.github/workflows/portfolio-analyst.lock.yml @@ -3566,8 +3566,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -4687,7 +4687,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -8003,8 +8003,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/pr-nitpick-reviewer.lock.yml b/.github/workflows/pr-nitpick-reviewer.lock.yml index 930d997e269..63d1a4f423d 100644 --- a/.github/workflows/pr-nitpick-reviewer.lock.yml +++ b/.github/workflows/pr-nitpick-reviewer.lock.yml @@ -4682,8 +4682,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -5804,7 +5804,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -9492,8 +9492,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/python-data-charts.lock.yml b/.github/workflows/python-data-charts.lock.yml index ccf3e05d6e8..bec1b096f29 100644 --- a/.github/workflows/python-data-charts.lock.yml +++ b/.github/workflows/python-data-charts.lock.yml @@ -4571,8 +4571,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -5695,7 +5695,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -9020,8 +9020,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/q.lock.yml b/.github/workflows/q.lock.yml index b08d8b5387d..1264d66f861 100644 --- a/.github/workflows/q.lock.yml +++ b/.github/workflows/q.lock.yml @@ -4981,8 +4981,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -6105,7 +6105,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -9473,8 +9473,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/release.lock.yml b/.github/workflows/release.lock.yml index 9fbfe0fd302..52b1400ddf4 100644 --- a/.github/workflows/release.lock.yml +++ b/.github/workflows/release.lock.yml @@ -2864,8 +2864,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -3985,7 +3985,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -6573,8 +6573,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/repo-tree-map.lock.yml b/.github/workflows/repo-tree-map.lock.yml index 686131d9517..5bd56828b50 100644 --- a/.github/workflows/repo-tree-map.lock.yml +++ b/.github/workflows/repo-tree-map.lock.yml @@ -2745,8 +2745,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -3866,7 +3866,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7177,8 +7177,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/repository-quality-improver.lock.yml b/.github/workflows/repository-quality-improver.lock.yml index 270d2a9e3a0..0e3a22c25b9 100644 --- a/.github/workflows/repository-quality-improver.lock.yml +++ b/.github/workflows/repository-quality-improver.lock.yml @@ -3782,8 +3782,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -4903,7 +4903,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -8221,8 +8221,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/research.lock.yml b/.github/workflows/research.lock.yml index 6b4696c2d59..da7790ca1e4 100644 --- a/.github/workflows/research.lock.yml +++ b/.github/workflows/research.lock.yml @@ -2657,8 +2657,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -3780,7 +3780,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7090,8 +7090,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/smoke-copilot-no-firewall.lock.yml b/.github/workflows/smoke-copilot-no-firewall.lock.yml index 1bc9b5caac6..aab93e739f7 100644 --- a/.github/workflows/smoke-copilot-no-firewall.lock.yml +++ b/.github/workflows/smoke-copilot-no-firewall.lock.yml @@ -5852,8 +5852,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -6974,7 +6974,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -10208,8 +10208,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/smoke-copilot-playwright.lock.yml b/.github/workflows/smoke-copilot-playwright.lock.yml index 78283524180..e2deeeee231 100644 --- a/.github/workflows/smoke-copilot-playwright.lock.yml +++ b/.github/workflows/smoke-copilot-playwright.lock.yml @@ -5831,8 +5831,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -6954,7 +6954,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -10199,8 +10199,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/smoke-copilot-safe-inputs.lock.yml b/.github/workflows/smoke-copilot-safe-inputs.lock.yml index c53a693e987..56d627bb594 100644 --- a/.github/workflows/smoke-copilot-safe-inputs.lock.yml +++ b/.github/workflows/smoke-copilot-safe-inputs.lock.yml @@ -5558,8 +5558,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -6679,7 +6679,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -9905,8 +9905,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/smoke-copilot.lock.yml b/.github/workflows/smoke-copilot.lock.yml index d2a710363f1..463139492f6 100644 --- a/.github/workflows/smoke-copilot.lock.yml +++ b/.github/workflows/smoke-copilot.lock.yml @@ -4383,8 +4383,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -5504,7 +5504,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -8730,8 +8730,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/smoke-srt-custom-config.lock.yml b/.github/workflows/smoke-srt-custom-config.lock.yml index 85e1ef1ccc8..0330661a718 100644 --- a/.github/workflows/smoke-srt-custom-config.lock.yml +++ b/.github/workflows/smoke-srt-custom-config.lock.yml @@ -1086,8 +1086,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -1223,7 +1223,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs diff --git a/.github/workflows/smoke-srt.lock.yml b/.github/workflows/smoke-srt.lock.yml index 0be60bef750..7c48147e4e6 100644 --- a/.github/workflows/smoke-srt.lock.yml +++ b/.github/workflows/smoke-srt.lock.yml @@ -2555,8 +2555,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -3676,7 +3676,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -5963,8 +5963,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/spec-kit-execute.lock.yml b/.github/workflows/spec-kit-execute.lock.yml index 902bc5cd3be..e46f9f16a7c 100644 --- a/.github/workflows/spec-kit-execute.lock.yml +++ b/.github/workflows/spec-kit-execute.lock.yml @@ -3273,8 +3273,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -4394,7 +4394,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7772,8 +7772,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/spec-kit-executor.lock.yml b/.github/workflows/spec-kit-executor.lock.yml index 095392aa7b3..1a613e8dba3 100644 --- a/.github/workflows/spec-kit-executor.lock.yml +++ b/.github/workflows/spec-kit-executor.lock.yml @@ -2963,8 +2963,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -4084,7 +4084,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7462,8 +7462,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/speckit-dispatcher.lock.yml b/.github/workflows/speckit-dispatcher.lock.yml index a99e282953b..fd5e1abdac5 100644 --- a/.github/workflows/speckit-dispatcher.lock.yml +++ b/.github/workflows/speckit-dispatcher.lock.yml @@ -4894,8 +4894,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -6016,7 +6016,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -9235,8 +9235,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/stale-repo-identifier.lock.yml b/.github/workflows/stale-repo-identifier.lock.yml index b3fbd20cc12..5d1eb0cd7c6 100644 --- a/.github/workflows/stale-repo-identifier.lock.yml +++ b/.github/workflows/stale-repo-identifier.lock.yml @@ -4434,8 +4434,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -5558,7 +5558,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -8793,8 +8793,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/super-linter.lock.yml b/.github/workflows/super-linter.lock.yml index b7caa6440f0..bd4cb383b15 100644 --- a/.github/workflows/super-linter.lock.yml +++ b/.github/workflows/super-linter.lock.yml @@ -2960,8 +2960,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -4081,7 +4081,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7306,8 +7306,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/technical-doc-writer.lock.yml b/.github/workflows/technical-doc-writer.lock.yml index 59810a5cdc3..30f9f758c21 100644 --- a/.github/workflows/technical-doc-writer.lock.yml +++ b/.github/workflows/technical-doc-writer.lock.yml @@ -4183,8 +4183,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -5307,7 +5307,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -8683,8 +8683,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/test-discussion-expires.lock.yml b/.github/workflows/test-discussion-expires.lock.yml index 32910c6afcf..a21aa9776f8 100644 --- a/.github/workflows/test-discussion-expires.lock.yml +++ b/.github/workflows/test-discussion-expires.lock.yml @@ -2344,8 +2344,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -3465,7 +3465,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -6777,8 +6777,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/test-hide-older-comments.lock.yml b/.github/workflows/test-hide-older-comments.lock.yml index dc865cb2e95..03e565e7370 100644 --- a/.github/workflows/test-hide-older-comments.lock.yml +++ b/.github/workflows/test-hide-older-comments.lock.yml @@ -3118,8 +3118,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -4239,7 +4239,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -6829,8 +6829,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/test-python-safe-input.lock.yml b/.github/workflows/test-python-safe-input.lock.yml index 42d2b73b35c..9a1f2154d4a 100644 --- a/.github/workflows/test-python-safe-input.lock.yml +++ b/.github/workflows/test-python-safe-input.lock.yml @@ -3957,8 +3957,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -5078,7 +5078,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -8303,8 +8303,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/tidy.lock.yml b/.github/workflows/tidy.lock.yml index 083ee8d1469..3d69aae4fc7 100644 --- a/.github/workflows/tidy.lock.yml +++ b/.github/workflows/tidy.lock.yml @@ -3086,8 +3086,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -4208,7 +4208,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7567,8 +7567,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/video-analyzer.lock.yml b/.github/workflows/video-analyzer.lock.yml index 129427dc05c..29f3713be57 100644 --- a/.github/workflows/video-analyzer.lock.yml +++ b/.github/workflows/video-analyzer.lock.yml @@ -3001,8 +3001,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -4122,7 +4122,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7340,8 +7340,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/.github/workflows/weekly-issue-summary.lock.yml b/.github/workflows/weekly-issue-summary.lock.yml index 69c44e4083f..c99812d9449 100644 --- a/.github/workflows/weekly-issue-summary.lock.yml +++ b/.github/workflows/weekly-issue-summary.lock.yml @@ -3790,8 +3790,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE @@ -4914,7 +4914,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -8245,8 +8245,8 @@ jobs: # Copy session-state file to agent output location if [ -f /home/runner/.copilot/session-state ]; then echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE diff --git a/pkg/workflow/copilot_engine.go b/pkg/workflow/copilot_engine.go index c35bb084369..5df4afc2b9b 100644 --- a/pkg/workflow/copilot_engine.go +++ b/pkg/workflow/copilot_engine.go @@ -12,7 +12,7 @@ import ( var copilotLog = logger.New("workflow:copilot_engine") const logsFolder = "/tmp/gh-aw/sandbox/agent/logs/" -const sessionStateFile = "/tmp/gh-aw/sandbox/agent/session-state.txt" +const sessionStateFile = "/tmp/gh-aw/sandbox/agent/session-state.json" const sessionStateSource = "/home/runner/.copilot/session-state" // CopilotEngine represents the GitHub Copilot CLI agentic engine From 68863bc419591fe9156847e977768513f0195a11 Mon Sep 17 00:00:00 2001 From: "github-actions[bot]" Date: Thu, 11 Dec 2025 17:30:48 +0000 Subject: [PATCH 6/9] Add changeset [skip-ci] --- .changeset/patch-include-copilot-session-state.md | 11 +++++++++++ 1 file changed, 11 insertions(+) create mode 100644 .changeset/patch-include-copilot-session-state.md diff --git a/.changeset/patch-include-copilot-session-state.md b/.changeset/patch-include-copilot-session-state.md new file mode 100644 index 00000000000..126f1d15330 --- /dev/null +++ b/.changeset/patch-include-copilot-session-state.md @@ -0,0 +1,11 @@ +--- +"gh-aw": patch +--- + +Include Copilot session-state file in agent output artifacts + +The Copilot CLI session-state file at `~/.copilot/session-state` is now copied +to `/tmp/gh-aw/sandbox/agent/session-state.json` and included in the +`agent_outputs` artifact. This improves debugging and allows inspection of +Copilot session state alongside agent logs. + From a58b8c80af82d030b022141619d0367244a8016a Mon Sep 17 00:00:00 2001 From: "copilot-swe-agent[bot]" <198982749+Copilot@users.noreply.github.com> Date: Thu, 11 Dec 2025 17:57:18 +0000 Subject: [PATCH 7/9] Move session-state copy to separate step - Extracted session-state file copy logic into separate step - Removed inline copy commands from all execution paths (SRT, AWF, non-sandbox) - Added generateCopySessionStateStep() function - Updated tests to expect 2 steps for Copilot (only Copilot has the copy step) - All unit tests pass Co-authored-by: pelikhan <4175913+pelikhan@users.noreply.github.com> --- .github/workflows/ai-moderator.lock.yml | 16 +++--- .github/workflows/archie.lock.yml | 32 ++++++----- .github/workflows/artifacts-summary.lock.yml | 32 ++++++----- .github/workflows/brave.lock.yml | 32 ++++++----- .../breaking-change-checker.lock.yml | 32 ++++++----- .github/workflows/ci-coach.lock.yml | 32 ++++++----- .github/workflows/ci-doctor.lock.yml | 32 ++++++----- .../cli-consistency-checker.lock.yml | 32 ++++++----- .../copilot-pr-merged-report.lock.yml | 32 ++++++----- .../copilot-pr-nlp-analysis.lock.yml | 32 ++++++----- .../copilot-pr-prompt-analysis.lock.yml | 32 ++++++----- .github/workflows/craft.lock.yml | 32 ++++++----- .../daily-assign-issue-to-user.lock.yml | 32 ++++++----- .../daily-copilot-token-report.lock.yml | 32 ++++++----- .../workflows/daily-firewall-report.lock.yml | 32 ++++++----- .../daily-malicious-code-scan.lock.yml | 16 +++--- .github/workflows/daily-news.lock.yml | 32 ++++++----- .../workflows/daily-repo-chronicle.lock.yml | 32 ++++++----- .github/workflows/daily-team-status.lock.yml | 34 ++++++----- .../workflows/daily-workflow-updater.lock.yml | 32 ++++++----- .../workflows/dependabot-go-checker.lock.yml | 32 ++++++----- .github/workflows/dev-hawk.lock.yml | 32 ++++++----- .github/workflows/dev.lock.yml | 32 ++++++----- .github/workflows/dictation-prompt.lock.yml | 32 ++++++----- .github/workflows/docs-noob-tester.lock.yml | 32 ++++++----- .../example-permissions-warning.lock.yml | 16 +++--- .github/workflows/firewall-escape.lock.yml | 16 +++--- .github/workflows/firewall.lock.yml | 16 +++--- .../workflows/glossary-maintainer.lock.yml | 32 ++++++----- .github/workflows/grumpy-reviewer.lock.yml | 32 ++++++----- .github/workflows/hourly-ci-cleaner.lock.yml | 32 ++++++----- .github/workflows/issue-monster.lock.yml | 32 ++++++----- .github/workflows/issue-triage-agent.lock.yml | 32 ++++++----- .../workflows/layout-spec-maintainer.lock.yml | 32 ++++++----- .github/workflows/mcp-inspector.lock.yml | 32 ++++++----- .github/workflows/mergefest.lock.yml | 32 ++++++----- .../workflows/notion-issue-summary.lock.yml | 32 ++++++----- .github/workflows/org-health-report.lock.yml | 32 ++++++----- .github/workflows/pdf-summary.lock.yml | 32 ++++++----- .github/workflows/plan.lock.yml | 32 ++++++----- .github/workflows/poem-bot.lock.yml | 32 ++++++----- .github/workflows/portfolio-analyst.lock.yml | 32 ++++++----- .../workflows/pr-nitpick-reviewer.lock.yml | 32 ++++++----- .github/workflows/python-data-charts.lock.yml | 32 ++++++----- .github/workflows/q.lock.yml | 32 ++++++----- .github/workflows/release.lock.yml | 32 ++++++----- .github/workflows/repo-tree-map.lock.yml | 32 ++++++----- .../repository-quality-improver.lock.yml | 32 ++++++----- .github/workflows/research.lock.yml | 32 ++++++----- .../smoke-copilot-no-firewall.lock.yml | 32 ++++++----- .../smoke-copilot-playwright.lock.yml | 32 ++++++----- .../smoke-copilot-safe-inputs.lock.yml | 32 ++++++----- .github/workflows/smoke-copilot.lock.yml | 32 ++++++----- .../smoke-srt-custom-config.lock.yml | 16 +++--- .github/workflows/smoke-srt.lock.yml | 32 ++++++----- .github/workflows/spec-kit-execute.lock.yml | 32 ++++++----- .github/workflows/spec-kit-executor.lock.yml | 32 ++++++----- .github/workflows/speckit-dispatcher.lock.yml | 32 ++++++----- .../workflows/stale-repo-identifier.lock.yml | 32 ++++++----- .github/workflows/super-linter.lock.yml | 32 ++++++----- .../workflows/technical-doc-writer.lock.yml | 32 ++++++----- .../test-discussion-expires.lock.yml | 32 ++++++----- .../test-hide-older-comments.lock.yml | 32 ++++++----- .../workflows/test-python-safe-input.lock.yml | 32 ++++++----- .github/workflows/tidy.lock.yml | 32 ++++++----- .github/workflows/video-analyzer.lock.yml | 32 ++++++----- .../workflows/weekly-issue-summary.lock.yml | 32 ++++++----- pkg/workflow/copilot_engine.go | 56 ++++++++----------- pkg/workflow/copilot_engine_test.go | 24 ++++---- pkg/workflow/engine_agent_import_test.go | 8 +-- 70 files changed, 1193 insertions(+), 945 deletions(-) diff --git a/.github/workflows/ai-moderator.lock.yml b/.github/workflows/ai-moderator.lock.yml index 432f25d94e8..595b3d2ae6d 100644 --- a/.github/workflows/ai-moderator.lock.yml +++ b/.github/workflows/ai-moderator.lock.yml @@ -3702,13 +3702,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --model gpt-5-mini --allow-tool github --allow-tool safeoutputs --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)" \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -3721,6 +3714,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/archie.lock.yml b/.github/workflows/archie.lock.yml index 74c3c19c903..4930f1e4e22 100644 --- a/.github/workflows/archie.lock.yml +++ b/.github/workflows/archie.lock.yml @@ -4431,13 +4431,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeoutputs --allow-tool 'shell(cat)' --allow-tool 'shell(date)' --allow-tool 'shell(echo)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(ls)' --allow-tool 'shell(pwd)' --allow-tool 'shell(sort)' --allow-tool 'shell(tail)' --allow-tool 'shell(uniq)' --allow-tool 'shell(wc)' --allow-tool 'shell(yq)' --allow-tool write --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -4451,6 +4444,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -8144,13 +8146,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -8161,6 +8156,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/artifacts-summary.lock.yml b/.github/workflows/artifacts-summary.lock.yml index 1b6e58b04f0..f79a0c9f732 100644 --- a/.github/workflows/artifacts-summary.lock.yml +++ b/.github/workflows/artifacts-summary.lock.yml @@ -2713,13 +2713,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.npms.io,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,bun.sh,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,deb.nodesource.com,deno.land,get.pnpm.io,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,nodejs.org,npm.pkg.github.com,npmjs.com,npmjs.org,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,ppa.launchpad.net,raw.githubusercontent.com,registry.bower.io,registry.npmjs.com,registry.npmjs.org,registry.yarnpkg.com,repo.yarnpkg.com,s.symcb.com,s.symcd.com,security.ubuntu.com,skimdb.npmjs.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com,www.npmjs.com,www.npmjs.org,yarnpkg.com --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeoutputs --allow-tool 'shell(cat)' --allow-tool 'shell(date)' --allow-tool 'shell(echo)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(ls)' --allow-tool 'shell(pwd)' --allow-tool 'shell(sort)' --allow-tool 'shell(tail)' --allow-tool 'shell(uniq)' --allow-tool 'shell(wc)' --allow-tool 'shell(yq)' --allow-tool write --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -2733,6 +2726,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7193,13 +7195,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -7210,6 +7205,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/brave.lock.yml b/.github/workflows/brave.lock.yml index 78cdcef5f93..0eaeb3168c5 100644 --- a/.github/workflows/brave.lock.yml +++ b/.github/workflows/brave.lock.yml @@ -4220,13 +4220,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool brave-search --allow-tool 'brave-search(*)' --allow-tool github --allow-tool safeoutputs --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -4240,6 +4233,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7934,13 +7936,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -7951,6 +7946,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/breaking-change-checker.lock.yml b/.github/workflows/breaking-change-checker.lock.yml index 7705b4f1545..15ecb0e669a 100644 --- a/.github/workflows/breaking-change-checker.lock.yml +++ b/.github/workflows/breaking-change-checker.lock.yml @@ -2797,13 +2797,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeoutputs --allow-tool 'shell(cat)' --allow-tool 'shell(cat:*)' --allow-tool 'shell(date)' --allow-tool 'shell(echo)' --allow-tool 'shell(git diff:*)' --allow-tool 'shell(git log:*)' --allow-tool 'shell(git show:*)' --allow-tool 'shell(grep)' --allow-tool 'shell(grep:*)' --allow-tool 'shell(head)' --allow-tool 'shell(ls)' --allow-tool 'shell(pwd)' --allow-tool 'shell(sort)' --allow-tool 'shell(tail)' --allow-tool 'shell(uniq)' --allow-tool 'shell(wc)' --allow-tool 'shell(yq)' --allow-tool write --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -2817,6 +2810,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7560,13 +7562,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -7577,6 +7572,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/ci-coach.lock.yml b/.github/workflows/ci-coach.lock.yml index 2884b718592..67ca3fa384e 100644 --- a/.github/workflows/ci-coach.lock.yml +++ b/.github/workflows/ci-coach.lock.yml @@ -3999,13 +3999,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --add-dir /tmp/gh-aw/cache-memory/ --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -4019,6 +4012,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -8436,13 +8438,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -8453,6 +8448,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/ci-doctor.lock.yml b/.github/workflows/ci-doctor.lock.yml index 87549b04a87..d68c3a65fba 100644 --- a/.github/workflows/ci-doctor.lock.yml +++ b/.github/workflows/ci-doctor.lock.yml @@ -3661,13 +3661,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeoutputs --allow-tool web-fetch --add-dir /tmp/gh-aw/cache-memory/ --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -3681,6 +3674,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -8016,13 +8018,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -8033,6 +8028,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/cli-consistency-checker.lock.yml b/.github/workflows/cli-consistency-checker.lock.yml index 73983924d93..ffd07e8d8d5 100644 --- a/.github/workflows/cli-consistency-checker.lock.yml +++ b/.github/workflows/cli-consistency-checker.lock.yml @@ -2794,13 +2794,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.npms.io,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,bun.sh,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,deb.nodesource.com,deno.land,get.pnpm.io,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,nodejs.org,npm.pkg.github.com,npmjs.com,npmjs.org,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,ppa.launchpad.net,raw.githubusercontent.com,registry.bower.io,registry.npmjs.com,registry.npmjs.org,registry.yarnpkg.com,repo.yarnpkg.com,s.symcb.com,s.symcd.com,security.ubuntu.com,skimdb.npmjs.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com,www.npmjs.com,www.npmjs.org,yarnpkg.com --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -2814,6 +2807,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7133,13 +7135,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -7150,6 +7145,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/copilot-pr-merged-report.lock.yml b/.github/workflows/copilot-pr-merged-report.lock.yml index e5d63a14abc..6b9356a6684 100644 --- a/.github/workflows/copilot-pr-merged-report.lock.yml +++ b/.github/workflows/copilot-pr-merged-report.lock.yml @@ -4235,13 +4235,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains '*.githubusercontent.com,api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,codeload.github.com,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,github-cloud.githubusercontent.com,github-cloud.s3.amazonaws.com,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,lfs.github.com,objects.githubusercontent.com,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,ppa.launchpad.net,raw.githubusercontent.com,registry.npmjs.org,s.symcb.com,s.symcd.com,security.ubuntu.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com' --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -4255,6 +4248,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -8675,13 +8677,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -8692,6 +8687,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/copilot-pr-nlp-analysis.lock.yml b/.github/workflows/copilot-pr-nlp-analysis.lock.yml index d86fca5b858..2774fdda74e 100644 --- a/.github/workflows/copilot-pr-nlp-analysis.lock.yml +++ b/.github/workflows/copilot-pr-nlp-analysis.lock.yml @@ -4331,13 +4331,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains '*.pythonhosted.org,anaconda.org,api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.npms.io,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,binstar.org,bootstrap.pypa.io,bun.sh,conda.anaconda.org,conda.binstar.org,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,deb.nodesource.com,deno.land,files.pythonhosted.org,get.pnpm.io,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,nodejs.org,npm.pkg.github.com,npmjs.com,npmjs.org,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,pip.pypa.io,ppa.launchpad.net,pypi.org,pypi.python.org,raw.githubusercontent.com,registry.bower.io,registry.npmjs.com,registry.npmjs.org,registry.yarnpkg.com,repo.anaconda.com,repo.continuum.io,repo.yarnpkg.com,s.symcb.com,s.symcd.com,security.ubuntu.com,skimdb.npmjs.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com,www.npmjs.com,www.npmjs.org,yarnpkg.com' --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --add-dir /tmp/gh-aw/cache-memory/ --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -4354,6 +4347,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -8782,13 +8784,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -8799,6 +8794,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/copilot-pr-prompt-analysis.lock.yml b/.github/workflows/copilot-pr-prompt-analysis.lock.yml index 38fb05a4b31..f84e131378f 100644 --- a/.github/workflows/copilot-pr-prompt-analysis.lock.yml +++ b/.github/workflows/copilot-pr-prompt-analysis.lock.yml @@ -3357,13 +3357,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.npms.io,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,bun.sh,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,deb.nodesource.com,deno.land,get.pnpm.io,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,nodejs.org,npm.pkg.github.com,npmjs.com,npmjs.org,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,ppa.launchpad.net,raw.githubusercontent.com,registry.bower.io,registry.npmjs.com,registry.npmjs.org,registry.yarnpkg.com,repo.yarnpkg.com,s.symcb.com,s.symcd.com,security.ubuntu.com,skimdb.npmjs.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com,www.npmjs.com,www.npmjs.org,yarnpkg.com --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --add-dir /tmp/gh-aw/cache-memory/ --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -3377,6 +3370,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7797,13 +7799,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -7814,6 +7809,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/craft.lock.yml b/.github/workflows/craft.lock.yml index 758aadeb016..d2614e51a41 100644 --- a/.github/workflows/craft.lock.yml +++ b/.github/workflows/craft.lock.yml @@ -4565,13 +4565,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -4585,6 +4578,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -8287,13 +8289,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -8304,6 +8299,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/daily-assign-issue-to-user.lock.yml b/.github/workflows/daily-assign-issue-to-user.lock.yml index 3797fbd3ab7..53dbecff8e8 100644 --- a/.github/workflows/daily-assign-issue-to-user.lock.yml +++ b/.github/workflows/daily-assign-issue-to-user.lock.yml @@ -3165,13 +3165,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeoutputs --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -3185,6 +3178,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7439,13 +7441,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -7456,6 +7451,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/daily-copilot-token-report.lock.yml b/.github/workflows/daily-copilot-token-report.lock.yml index 05415875d5e..c99381d6e7e 100644 --- a/.github/workflows/daily-copilot-token-report.lock.yml +++ b/.github/workflows/daily-copilot-token-report.lock.yml @@ -4500,13 +4500,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,ppa.launchpad.net,raw.githubusercontent.com,registry.npmjs.org,s.symcb.com,s.symcd.com,security.ubuntu.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --add-dir /tmp/gh-aw/cache-memory/ --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -4523,6 +4516,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -8955,13 +8957,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -8972,6 +8967,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/daily-firewall-report.lock.yml b/.github/workflows/daily-firewall-report.lock.yml index 07a33d637e6..f473bfa90db 100644 --- a/.github/workflows/daily-firewall-report.lock.yml +++ b/.github/workflows/daily-firewall-report.lock.yml @@ -3785,13 +3785,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --add-dir /tmp/gh-aw/cache-memory/ --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -3808,6 +3801,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -8250,13 +8252,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -8267,6 +8262,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/daily-malicious-code-scan.lock.yml b/.github/workflows/daily-malicious-code-scan.lock.yml index 241cb2eaf38..cb63e82f3f9 100644 --- a/.github/workflows/daily-malicious-code-scan.lock.yml +++ b/.github/workflows/daily-malicious-code-scan.lock.yml @@ -3032,13 +3032,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeoutputs --allow-tool 'shell(cat)' --allow-tool 'shell(date)' --allow-tool 'shell(echo)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(ls)' --allow-tool 'shell(pwd)' --allow-tool 'shell(sort)' --allow-tool 'shell(tail)' --allow-tool 'shell(uniq)' --allow-tool 'shell(wc)' --allow-tool 'shell(yq)' --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -3052,6 +3045,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/daily-news.lock.yml b/.github/workflows/daily-news.lock.yml index cba4f89e89e..0e1f04e5cec 100644 --- a/.github/workflows/daily-news.lock.yml +++ b/.github/workflows/daily-news.lock.yml @@ -4257,13 +4257,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains '*.pythonhosted.org,anaconda.org,api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.npms.io,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,binstar.org,bootstrap.pypa.io,bun.sh,conda.anaconda.org,conda.binstar.org,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,deb.nodesource.com,deno.land,files.pythonhosted.org,get.pnpm.io,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,nodejs.org,npm.pkg.github.com,npmjs.com,npmjs.org,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,pip.pypa.io,ppa.launchpad.net,pypi.org,pypi.python.org,raw.githubusercontent.com,registry.bower.io,registry.npmjs.com,registry.npmjs.org,registry.yarnpkg.com,repo.anaconda.com,repo.continuum.io,repo.yarnpkg.com,s.symcb.com,s.symcd.com,security.ubuntu.com,skimdb.npmjs.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com,www.npmjs.com,www.npmjs.org,yarnpkg.com' --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --add-dir /tmp/gh-aw/cache-memory/ --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -4281,6 +4274,15 @@ jobs: GITHUB_WORKSPACE: ${{ github.workspace }} TAVILY_API_KEY: ${{ secrets.TAVILY_API_KEY }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -8714,13 +8716,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -8731,6 +8726,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/daily-repo-chronicle.lock.yml b/.github/workflows/daily-repo-chronicle.lock.yml index c8ef0592cc1..f730ffcf68d 100644 --- a/.github/workflows/daily-repo-chronicle.lock.yml +++ b/.github/workflows/daily-repo-chronicle.lock.yml @@ -3933,13 +3933,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains '*.pythonhosted.org,anaconda.org,api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.npms.io,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,binstar.org,bootstrap.pypa.io,bun.sh,conda.anaconda.org,conda.binstar.org,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,deb.nodesource.com,deno.land,files.pythonhosted.org,get.pnpm.io,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,nodejs.org,npm.pkg.github.com,npmjs.com,npmjs.org,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,pip.pypa.io,ppa.launchpad.net,pypi.org,pypi.python.org,raw.githubusercontent.com,registry.bower.io,registry.npmjs.com,registry.npmjs.org,registry.yarnpkg.com,repo.anaconda.com,repo.continuum.io,repo.yarnpkg.com,s.symcb.com,s.symcd.com,security.ubuntu.com,skimdb.npmjs.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com,www.npmjs.com,www.npmjs.org,yarnpkg.com' --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --add-dir /tmp/gh-aw/cache-memory/ --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -3956,6 +3949,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -8388,13 +8390,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -8405,6 +8400,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/daily-team-status.lock.yml b/.github/workflows/daily-team-status.lock.yml index 32b591cf12b..5ef9c4db00f 100644 --- a/.github/workflows/daily-team-status.lock.yml +++ b/.github/workflows/daily-team-status.lock.yml @@ -2560,13 +2560,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeoutputs --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -2580,6 +2573,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -3685,7 +3687,7 @@ jobs: name: agent_outputs path: | /tmp/gh-aw/sandbox/agent/logs/ - /tmp/gh-aw/sandbox/agent/session-state.txt + /tmp/gh-aw/sandbox/agent/session-state.json /tmp/gh-aw/redacted-urls.log if-no-files-found: ignore - name: Upload MCP logs @@ -7004,13 +7006,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.txt)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.txt || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -7021,6 +7016,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/daily-workflow-updater.lock.yml b/.github/workflows/daily-workflow-updater.lock.yml index e484208de43..52565163673 100644 --- a/.github/workflows/daily-workflow-updater.lock.yml +++ b/.github/workflows/daily-workflow-updater.lock.yml @@ -2724,13 +2724,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains '*.githubusercontent.com,api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,codeload.github.com,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,github-cloud.githubusercontent.com,github-cloud.s3.amazonaws.com,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,lfs.github.com,objects.githubusercontent.com,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,ppa.launchpad.net,raw.githubusercontent.com,registry.npmjs.org,s.symcb.com,s.symcd.com,security.ubuntu.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com' --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeoutputs --allow-tool 'shell(cat)' --allow-tool 'shell(date)' --allow-tool 'shell(echo)' --allow-tool 'shell(gh aw update --verbose)' --allow-tool 'shell(git add .github/aw/actions-lock.json)' --allow-tool 'shell(git add:*)' --allow-tool 'shell(git branch:*)' --allow-tool 'shell(git checkout:*)' --allow-tool 'shell(git commit)' --allow-tool 'shell(git commit:*)' --allow-tool 'shell(git diff .github/aw/actions-lock.json)' --allow-tool 'shell(git merge:*)' --allow-tool 'shell(git push)' --allow-tool 'shell(git rm:*)' --allow-tool 'shell(git status)' --allow-tool 'shell(git switch:*)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(ls)' --allow-tool 'shell(pwd)' --allow-tool 'shell(sort)' --allow-tool 'shell(tail)' --allow-tool 'shell(uniq)' --allow-tool 'shell(wc)' --allow-tool 'shell(yq)' --allow-tool write --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -2744,6 +2737,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7155,13 +7157,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -7172,6 +7167,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/dependabot-go-checker.lock.yml b/.github/workflows/dependabot-go-checker.lock.yml index d9bec73316e..49844b817bf 100644 --- a/.github/workflows/dependabot-go-checker.lock.yml +++ b/.github/workflows/dependabot-go-checker.lock.yml @@ -3327,13 +3327,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -3347,6 +3340,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7747,13 +7749,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -7764,6 +7759,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/dev-hawk.lock.yml b/.github/workflows/dev-hawk.lock.yml index 3c45f80f808..7b0a3119eb2 100644 --- a/.github/workflows/dev-hawk.lock.yml +++ b/.github/workflows/dev-hawk.lock.yml @@ -3445,13 +3445,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool gh-aw --allow-tool github --allow-tool safeoutputs --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -3465,6 +3458,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7159,13 +7161,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -7176,6 +7171,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/dev.lock.yml b/.github/workflows/dev.lock.yml index fa7028d29b0..69e4725e01d 100644 --- a/.github/workflows/dev.lock.yml +++ b/.github/workflows/dev.lock.yml @@ -3414,13 +3414,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,ppa.launchpad.net,raw.githubusercontent.com,registry.npmjs.org,s.symcb.com,s.symcd.com,security.ubuntu.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -3434,6 +3427,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7846,13 +7848,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -7863,6 +7858,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/dictation-prompt.lock.yml b/.github/workflows/dictation-prompt.lock.yml index d3b02daa60d..1c9d130c6c5 100644 --- a/.github/workflows/dictation-prompt.lock.yml +++ b/.github/workflows/dictation-prompt.lock.yml @@ -2667,13 +2667,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -2687,6 +2680,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7094,13 +7096,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -7111,6 +7106,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/docs-noob-tester.lock.yml b/.github/workflows/docs-noob-tester.lock.yml index fe826c30f72..68981589f67 100644 --- a/.github/workflows/docs-noob-tester.lock.yml +++ b/.github/workflows/docs-noob-tester.lock.yml @@ -2803,13 +2803,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.npms.io,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,bun.sh,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,deb.nodesource.com,deno.land,get.pnpm.io,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,nodejs.org,npm.pkg.github.com,npmjs.com,npmjs.org,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,ppa.launchpad.net,raw.githubusercontent.com,registry.bower.io,registry.npmjs.com,registry.npmjs.org,registry.yarnpkg.com,repo.yarnpkg.com,s.symcb.com,s.symcd.com,security.ubuntu.com,skimdb.npmjs.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com,www.npmjs.com,www.npmjs.org,yarnpkg.com --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -2826,6 +2819,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7246,13 +7248,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -7263,6 +7258,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/example-permissions-warning.lock.yml b/.github/workflows/example-permissions-warning.lock.yml index dea35615070..d34eb38172e 100644 --- a/.github/workflows/example-permissions-warning.lock.yml +++ b/.github/workflows/example-permissions-warning.lock.yml @@ -783,13 +783,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -802,6 +795,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/firewall-escape.lock.yml b/.github/workflows/firewall-escape.lock.yml index 6a63d6baed7..4e3009bbf26 100644 --- a/.github/workflows/firewall-escape.lock.yml +++ b/.github/workflows/firewall-escape.lock.yml @@ -1203,13 +1203,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.npms.io,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,bun.sh,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,deb.nodesource.com,deno.land,get.pnpm.io,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,nodejs.org,npm.pkg.github.com,npmjs.com,npmjs.org,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,ppa.launchpad.net,raw.githubusercontent.com,registry.bower.io,registry.npmjs.com,registry.npmjs.org,registry.yarnpkg.com,repo.yarnpkg.com,s.symcb.com,s.symcd.com,security.ubuntu.com,skimdb.npmjs.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com,www.npmjs.com,www.npmjs.org,yarnpkg.com --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --add-dir /tmp/gh-aw/cache-memory/ --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -1222,6 +1215,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/firewall.lock.yml b/.github/workflows/firewall.lock.yml index 92f2802e1c8..2577c067cc5 100644 --- a/.github/workflows/firewall.lock.yml +++ b/.github/workflows/firewall.lock.yml @@ -898,13 +898,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.npms.io,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,bun.sh,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,deb.nodesource.com,deno.land,get.pnpm.io,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,nodejs.org,npm.pkg.github.com,npmjs.com,npmjs.org,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,ppa.launchpad.net,raw.githubusercontent.com,registry.bower.io,registry.npmjs.com,registry.npmjs.org,registry.yarnpkg.com,repo.yarnpkg.com,s.symcb.com,s.symcd.com,security.ubuntu.com,skimdb.npmjs.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com,www.npmjs.com,www.npmjs.org,yarnpkg.com --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool web-fetch --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -917,6 +910,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/glossary-maintainer.lock.yml b/.github/workflows/glossary-maintainer.lock.yml index 40951029176..9fe604cc295 100644 --- a/.github/workflows/glossary-maintainer.lock.yml +++ b/.github/workflows/glossary-maintainer.lock.yml @@ -3825,13 +3825,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains '*.githubusercontent.com,api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,codeload.github.com,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,github-cloud.githubusercontent.com,github-cloud.s3.amazonaws.com,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,lfs.github.com,objects.githubusercontent.com,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,ppa.launchpad.net,raw.githubusercontent.com,registry.npmjs.org,s.symcb.com,s.symcd.com,security.ubuntu.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com' --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --agent technical-doc-writer --allow-tool github --allow-tool safeoutputs --allow-tool 'shell(cat)' --allow-tool 'shell(date)' --allow-tool 'shell(echo)' --allow-tool 'shell(find docs -name '\''*.md'\'')' --allow-tool 'shell(git add:*)' --allow-tool 'shell(git branch:*)' --allow-tool 'shell(git checkout:*)' --allow-tool 'shell(git commit:*)' --allow-tool 'shell(git log --since='\''24 hours ago'\'' --oneline)' --allow-tool 'shell(git log --since='\''7 days ago'\'' --oneline)' --allow-tool 'shell(git merge:*)' --allow-tool 'shell(git rm:*)' --allow-tool 'shell(git status)' --allow-tool 'shell(git switch:*)' --allow-tool 'shell(grep -r '\''*'\'' docs)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(ls)' --allow-tool 'shell(pwd)' --allow-tool 'shell(sort)' --allow-tool 'shell(tail)' --allow-tool 'shell(uniq)' --allow-tool 'shell(wc)' --allow-tool 'shell(yq)' --allow-tool write --add-dir /tmp/gh-aw/cache-memory/ --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -3845,6 +3838,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -8259,13 +8261,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -8276,6 +8271,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/grumpy-reviewer.lock.yml b/.github/workflows/grumpy-reviewer.lock.yml index 7231a10d82f..ef17bd07b42 100644 --- a/.github/workflows/grumpy-reviewer.lock.yml +++ b/.github/workflows/grumpy-reviewer.lock.yml @@ -4370,13 +4370,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeoutputs --add-dir /tmp/gh-aw/cache-memory/ --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -4390,6 +4383,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -8458,13 +8460,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -8475,6 +8470,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/hourly-ci-cleaner.lock.yml b/.github/workflows/hourly-ci-cleaner.lock.yml index 124c8fe0c25..128015ac4a7 100644 --- a/.github/workflows/hourly-ci-cleaner.lock.yml +++ b/.github/workflows/hourly-ci-cleaner.lock.yml @@ -3143,13 +3143,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --agent ci-cleaner --allow-all-tools --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -3163,6 +3156,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7573,13 +7575,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -7590,6 +7585,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/issue-monster.lock.yml b/.github/workflows/issue-monster.lock.yml index 124d3bf5739..e0f988fadb9 100644 --- a/.github/workflows/issue-monster.lock.yml +++ b/.github/workflows/issue-monster.lock.yml @@ -3604,13 +3604,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeoutputs --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -3624,6 +3617,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7881,13 +7883,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -7898,6 +7893,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/issue-triage-agent.lock.yml b/.github/workflows/issue-triage-agent.lock.yml index 64c9bf87b44..da640e6eddd 100644 --- a/.github/workflows/issue-triage-agent.lock.yml +++ b/.github/workflows/issue-triage-agent.lock.yml @@ -2899,13 +2899,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeoutputs --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -2919,6 +2912,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -6610,13 +6612,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -6627,6 +6622,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/layout-spec-maintainer.lock.yml b/.github/workflows/layout-spec-maintainer.lock.yml index 4e29f5f1f1d..5356d8fc31b 100644 --- a/.github/workflows/layout-spec-maintainer.lock.yml +++ b/.github/workflows/layout-spec-maintainer.lock.yml @@ -2958,13 +2958,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains '*.githubusercontent.com,api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,codeload.github.com,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,github-cloud.githubusercontent.com,github-cloud.s3.amazonaws.com,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,lfs.github.com,objects.githubusercontent.com,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,ppa.launchpad.net,raw.githubusercontent.com,registry.npmjs.org,s.symcb.com,s.symcd.com,security.ubuntu.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com' --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeoutputs --allow-tool 'shell(cat specs/layout.md)' --allow-tool 'shell(cat)' --allow-tool 'shell(date)' --allow-tool 'shell(echo)' --allow-tool 'shell(find .github/workflows -name '\''*.lock.yml'\'')' --allow-tool 'shell(git add:*)' --allow-tool 'shell(git branch:*)' --allow-tool 'shell(git checkout:*)' --allow-tool 'shell(git commit:*)' --allow-tool 'shell(git diff specs/layout.md)' --allow-tool 'shell(git merge:*)' --allow-tool 'shell(git rm:*)' --allow-tool 'shell(git status)' --allow-tool 'shell(git switch:*)' --allow-tool 'shell(grep -r '\''.*'\'' pkg/workflow/*.go)' --allow-tool 'shell(grep -r '\''.*'\'' pkg/workflow/js/)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(ls)' --allow-tool 'shell(pwd)' --allow-tool 'shell(sort)' --allow-tool 'shell(tail)' --allow-tool 'shell(uniq)' --allow-tool 'shell(wc)' --allow-tool 'shell(yq '\''.*'\'' .github/workflows/*.lock.yml)' --allow-tool 'shell(yq)' --allow-tool write --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -2978,6 +2971,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7389,13 +7391,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -7406,6 +7401,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/mcp-inspector.lock.yml b/.github/workflows/mcp-inspector.lock.yml index f3b97a549f3..c67cbc54521 100644 --- a/.github/workflows/mcp-inspector.lock.yml +++ b/.github/workflows/mcp-inspector.lock.yml @@ -3322,13 +3322,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains '*.docker.com,*.docker.io,api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.npms.io,api.snapcraft.io,archive.ubuntu.com,auth.docker.io,azure.archive.ubuntu.com,bun.sh,cdn.jsdelivr.net,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,deb.nodesource.com,deno.land,dl.k8s.io,fonts.googleapis.com,fonts.gstatic.com,gcr.io,get.pnpm.io,ghcr.io,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,mcr.microsoft.com,nodejs.org,npm.pkg.github.com,npmjs.com,npmjs.org,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,pkgs.k8s.io,ppa.launchpad.net,production.cloudflare.docker.com,quay.io,raw.githubusercontent.com,registry.bower.io,registry.hub.docker.com,registry.npmjs.com,registry.npmjs.org,registry.yarnpkg.com,repo.yarnpkg.com,s.symcb.com,s.symcd.com,security.ubuntu.com,skimdb.npmjs.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com,www.npmjs.com,www.npmjs.org,yarnpkg.com' --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool arxiv --allow-tool 'arxiv(get_paper_details)' --allow-tool 'arxiv(get_paper_pdf)' --allow-tool 'arxiv(search_arxiv)' --allow-tool ast-grep --allow-tool 'ast-grep(*)' --allow-tool brave-search --allow-tool 'brave-search(*)' --allow-tool context7 --allow-tool 'context7(get-library-docs)' --allow-tool 'context7(resolve-library-id)' --allow-tool datadog --allow-tool 'datadog(get_datadog_metric)' --allow-tool 'datadog(search_datadog_dashboards)' --allow-tool 'datadog(search_datadog_metrics)' --allow-tool 'datadog(search_datadog_slos)' --allow-tool deepwiki --allow-tool 'deepwiki(ask_question)' --allow-tool 'deepwiki(read_wiki_contents)' --allow-tool 'deepwiki(read_wiki_structure)' --allow-tool fabric-rti --allow-tool 'fabric-rti(get_eventstream)' --allow-tool 'fabric-rti(get_eventstream_definition)' --allow-tool 'fabric-rti(kusto_get_entities_schema)' --allow-tool 'fabric-rti(kusto_get_function_schema)' --allow-tool 'fabric-rti(kusto_get_shots)' --allow-tool 'fabric-rti(kusto_get_table_schema)' --allow-tool 'fabric-rti(kusto_known_services)' --allow-tool 'fabric-rti(kusto_list_databases)' --allow-tool 'fabric-rti(kusto_list_tables)' --allow-tool 'fabric-rti(kusto_query)' --allow-tool 'fabric-rti(kusto_sample_function_data)' --allow-tool 'fabric-rti(kusto_sample_table_data)' --allow-tool 'fabric-rti(list_eventstreams)' --allow-tool gh-aw --allow-tool github --allow-tool markitdown --allow-tool 'markitdown(*)' --allow-tool memory --allow-tool 'memory(delete_memory)' --allow-tool 'memory(list_memories)' --allow-tool 'memory(retrieve_memory)' --allow-tool 'memory(store_memory)' --allow-tool microsoftdocs --allow-tool 'microsoftdocs(*)' --allow-tool notion --allow-tool 'notion(get_database)' --allow-tool 'notion(get_page)' --allow-tool 'notion(query_database)' --allow-tool 'notion(search_pages)' --allow-tool safeoutputs --allow-tool sentry --allow-tool 'sentry(analyze_issue_with_seer)' --allow-tool 'sentry(find_dsns)' --allow-tool 'sentry(find_organizations)' --allow-tool 'sentry(find_projects)' --allow-tool 'sentry(find_releases)' --allow-tool 'sentry(find_teams)' --allow-tool 'sentry(get_doc)' --allow-tool 'sentry(get_event_attachment)' --allow-tool 'sentry(get_issue_details)' --allow-tool 'sentry(get_trace_details)' --allow-tool 'sentry(search_docs requires SENTRY_OPENAI_API_KEY)' --allow-tool 'sentry(search_events)' --allow-tool 'sentry(search_issues)' --allow-tool 'sentry(whoami)' --allow-tool 'shell(cat)' --allow-tool 'shell(date)' --allow-tool 'shell(echo)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(ls)' --allow-tool 'shell(pwd)' --allow-tool 'shell(sort)' --allow-tool 'shell(tail)' --allow-tool 'shell(uniq)' --allow-tool 'shell(wc)' --allow-tool 'shell(yq)' --allow-tool tavily --allow-tool 'tavily(*)' --allow-tool write --add-dir /tmp/gh-aw/cache-memory/ --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -3346,6 +3339,15 @@ jobs: GITHUB_WORKSPACE: ${{ github.workspace }} TAVILY_API_KEY: ${{ secrets.TAVILY_API_KEY }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7779,13 +7781,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -7796,6 +7791,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/mergefest.lock.yml b/.github/workflows/mergefest.lock.yml index e8ff6cebd0a..4cd3bef16f5 100644 --- a/.github/workflows/mergefest.lock.yml +++ b/.github/workflows/mergefest.lock.yml @@ -3509,13 +3509,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeoutputs --allow-tool 'shell(cat)' --allow-tool 'shell(date)' --allow-tool 'shell(echo)' --allow-tool 'shell(git add)' --allow-tool 'shell(git add:*)' --allow-tool 'shell(git branch)' --allow-tool 'shell(git branch:*)' --allow-tool 'shell(git checkout)' --allow-tool 'shell(git checkout:*)' --allow-tool 'shell(git commit)' --allow-tool 'shell(git commit:*)' --allow-tool 'shell(git config)' --allow-tool 'shell(git diff)' --allow-tool 'shell(git fetch)' --allow-tool 'shell(git log)' --allow-tool 'shell(git merge)' --allow-tool 'shell(git merge:*)' --allow-tool 'shell(git pull)' --allow-tool 'shell(git reset)' --allow-tool 'shell(git rev-parse)' --allow-tool 'shell(git rm:*)' --allow-tool 'shell(git status)' --allow-tool 'shell(git switch:*)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(ls)' --allow-tool 'shell(make fmt)' --allow-tool 'shell(make lint)' --allow-tool 'shell(make recompile)' --allow-tool 'shell(make test-unit)' --allow-tool 'shell(pwd)' --allow-tool 'shell(sort)' --allow-tool 'shell(tail)' --allow-tool 'shell(uniq)' --allow-tool 'shell(wc)' --allow-tool 'shell(yq)' --allow-tool write --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -3529,6 +3522,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7228,13 +7230,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -7245,6 +7240,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/notion-issue-summary.lock.yml b/.github/workflows/notion-issue-summary.lock.yml index 3cb2fb991a1..422f642f0c3 100644 --- a/.github/workflows/notion-issue-summary.lock.yml +++ b/.github/workflows/notion-issue-summary.lock.yml @@ -2401,13 +2401,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool notion --allow-tool 'notion(get_database)' --allow-tool 'notion(get_page)' --allow-tool 'notion(query_database)' --allow-tool 'notion(search_pages)' --allow-tool safeoutputs --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -2421,6 +2414,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -6113,13 +6115,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -6130,6 +6125,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/org-health-report.lock.yml b/.github/workflows/org-health-report.lock.yml index 3a573e91abe..b342ec84d7f 100644 --- a/.github/workflows/org-health-report.lock.yml +++ b/.github/workflows/org-health-report.lock.yml @@ -4194,13 +4194,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains '*.pythonhosted.org,anaconda.org,api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,binstar.org,bootstrap.pypa.io,conda.anaconda.org,conda.binstar.org,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,files.pythonhosted.org,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,pip.pypa.io,ppa.launchpad.net,pypi.org,pypi.python.org,raw.githubusercontent.com,registry.npmjs.org,repo.anaconda.com,repo.continuum.io,s.symcb.com,s.symcd.com,security.ubuntu.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com' --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --add-dir /tmp/gh-aw/cache-memory/ --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -4217,6 +4210,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -8644,13 +8646,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -8661,6 +8656,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/pdf-summary.lock.yml b/.github/workflows/pdf-summary.lock.yml index d2d0297045c..5f2b874a9fe 100644 --- a/.github/workflows/pdf-summary.lock.yml +++ b/.github/workflows/pdf-summary.lock.yml @@ -4395,13 +4395,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool markitdown --allow-tool 'markitdown(*)' --allow-tool safeoutputs --add-dir /tmp/gh-aw/cache-memory/ --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -4415,6 +4408,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -8115,13 +8117,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -8132,6 +8127,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/plan.lock.yml b/.github/workflows/plan.lock.yml index 934b2e7dbf0..8e11a326198 100644 --- a/.github/workflows/plan.lock.yml +++ b/.github/workflows/plan.lock.yml @@ -3682,13 +3682,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeoutputs --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -3702,6 +3695,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -8395,13 +8397,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -8412,6 +8407,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/poem-bot.lock.yml b/.github/workflows/poem-bot.lock.yml index 064e9bb3f23..10f329a12f2 100644 --- a/.github/workflows/poem-bot.lock.yml +++ b/.github/workflows/poem-bot.lock.yml @@ -5444,13 +5444,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --model gpt-5 --allow-tool github --allow-tool safeoutputs --allow-tool 'shell(cat)' --allow-tool 'shell(date)' --allow-tool 'shell(echo)' --allow-tool 'shell(git add:*)' --allow-tool 'shell(git branch:*)' --allow-tool 'shell(git checkout:*)' --allow-tool 'shell(git commit:*)' --allow-tool 'shell(git merge:*)' --allow-tool 'shell(git rm:*)' --allow-tool 'shell(git status)' --allow-tool 'shell(git switch:*)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(ls)' --allow-tool 'shell(pwd)' --allow-tool 'shell(sort)' --allow-tool 'shell(tail)' --allow-tool 'shell(uniq)' --allow-tool 'shell(wc)' --allow-tool 'shell(yq)' --allow-tool write --add-dir /tmp/gh-aw/cache-memory/ --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)" \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -5467,6 +5460,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -11953,13 +11955,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --model gpt-5 --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION" 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -11969,6 +11964,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/portfolio-analyst.lock.yml b/.github/workflows/portfolio-analyst.lock.yml index d89ab5b2d13..62c7dfd3fc5 100644 --- a/.github/workflows/portfolio-analyst.lock.yml +++ b/.github/workflows/portfolio-analyst.lock.yml @@ -3562,13 +3562,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -3582,6 +3575,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7999,13 +8001,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -8016,6 +8011,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/pr-nitpick-reviewer.lock.yml b/.github/workflows/pr-nitpick-reviewer.lock.yml index 63d1a4f423d..f031864086d 100644 --- a/.github/workflows/pr-nitpick-reviewer.lock.yml +++ b/.github/workflows/pr-nitpick-reviewer.lock.yml @@ -4678,13 +4678,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeoutputs --add-dir /tmp/gh-aw/cache-memory/ --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -4698,6 +4691,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -9488,13 +9490,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -9505,6 +9500,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/python-data-charts.lock.yml b/.github/workflows/python-data-charts.lock.yml index bec1b096f29..46830c62606 100644 --- a/.github/workflows/python-data-charts.lock.yml +++ b/.github/workflows/python-data-charts.lock.yml @@ -4567,13 +4567,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,ppa.launchpad.net,raw.githubusercontent.com,registry.npmjs.org,s.symcb.com,s.symcd.com,security.ubuntu.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --add-dir /tmp/gh-aw/cache-memory/ --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -4590,6 +4583,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -9016,13 +9018,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -9033,6 +9028,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/q.lock.yml b/.github/workflows/q.lock.yml index 1264d66f861..d1b2baeddca 100644 --- a/.github/workflows/q.lock.yml +++ b/.github/workflows/q.lock.yml @@ -4977,13 +4977,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool gh-aw --allow-tool github --allow-tool safeoutputs --allow-tool shell --allow-tool tavily --allow-tool 'tavily(*)' --allow-tool write --add-dir /tmp/gh-aw/cache-memory/ --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -4998,6 +4991,15 @@ jobs: GITHUB_WORKSPACE: ${{ github.workspace }} TAVILY_API_KEY: ${{ secrets.TAVILY_API_KEY }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -9469,13 +9471,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -9486,6 +9481,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/release.lock.yml b/.github/workflows/release.lock.yml index 52b1400ddf4..aa26458e6dd 100644 --- a/.github/workflows/release.lock.yml +++ b/.github/workflows/release.lock.yml @@ -2860,13 +2860,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.npms.io,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,bun.sh,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,deb.nodesource.com,deno.land,get.pnpm.io,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,nodejs.org,npm.pkg.github.com,npmjs.com,npmjs.org,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,ppa.launchpad.net,raw.githubusercontent.com,registry.bower.io,registry.npmjs.com,registry.npmjs.org,registry.yarnpkg.com,repo.yarnpkg.com,s.symcb.com,s.symcd.com,security.ubuntu.com,skimdb.npmjs.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com,www.npmjs.com,www.npmjs.org,yarnpkg.com --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -2880,6 +2873,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -6569,13 +6571,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -6586,6 +6581,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/repo-tree-map.lock.yml b/.github/workflows/repo-tree-map.lock.yml index 5bd56828b50..b756d194fdd 100644 --- a/.github/workflows/repo-tree-map.lock.yml +++ b/.github/workflows/repo-tree-map.lock.yml @@ -2741,13 +2741,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -2761,6 +2754,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7173,13 +7175,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -7190,6 +7185,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/repository-quality-improver.lock.yml b/.github/workflows/repository-quality-improver.lock.yml index 0e3a22c25b9..8cb029b6032 100644 --- a/.github/workflows/repository-quality-improver.lock.yml +++ b/.github/workflows/repository-quality-improver.lock.yml @@ -3778,13 +3778,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --add-dir /tmp/gh-aw/cache-memory-focus-areas/ --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -3798,6 +3791,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -8217,13 +8219,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -8234,6 +8229,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/research.lock.yml b/.github/workflows/research.lock.yml index da7790ca1e4..0f2bf9014ed 100644 --- a/.github/workflows/research.lock.yml +++ b/.github/workflows/research.lock.yml @@ -2653,13 +2653,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.npms.io,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,bun.sh,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,deb.nodesource.com,deno.land,get.pnpm.io,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,nodejs.org,npm.pkg.github.com,npmjs.com,npmjs.org,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,ppa.launchpad.net,raw.githubusercontent.com,registry.bower.io,registry.npmjs.com,registry.npmjs.org,registry.yarnpkg.com,repo.yarnpkg.com,s.symcb.com,s.symcd.com,security.ubuntu.com,skimdb.npmjs.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com,www.npmjs.com,www.npmjs.org,yarnpkg.com --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeoutputs --allow-tool tavily --allow-tool 'tavily(*)' --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -2674,6 +2667,15 @@ jobs: GITHUB_WORKSPACE: ${{ github.workspace }} TAVILY_API_KEY: ${{ secrets.TAVILY_API_KEY }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7086,13 +7088,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -7103,6 +7098,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/smoke-copilot-no-firewall.lock.yml b/.github/workflows/smoke-copilot-no-firewall.lock.yml index aab93e739f7..c534a89b9bd 100644 --- a/.github/workflows/smoke-copilot-no-firewall.lock.yml +++ b/.github/workflows/smoke-copilot-no-firewall.lock.yml @@ -5848,13 +5848,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains '*.githubusercontent.com,api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.npms.io,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,bun.sh,cdn.playwright.dev,codeload.github.com,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,deb.nodesource.com,deno.land,get.pnpm.io,github-cloud.githubusercontent.com,github-cloud.s3.amazonaws.com,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,lfs.github.com,nodejs.org,npm.pkg.github.com,npmjs.com,npmjs.org,objects.githubusercontent.com,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,playwright.download.prss.microsoft.com,ppa.launchpad.net,raw.githubusercontent.com,registry.bower.io,registry.npmjs.com,registry.npmjs.org,registry.yarnpkg.com,repo.yarnpkg.com,s.symcb.com,s.symcd.com,security.ubuntu.com,skimdb.npmjs.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com,www.npmjs.com,www.npmjs.org,yarnpkg.com' --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --add-dir /tmp/gh-aw/cache-memory/ --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -5869,6 +5862,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -10204,13 +10206,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -10221,6 +10216,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/smoke-copilot-playwright.lock.yml b/.github/workflows/smoke-copilot-playwright.lock.yml index e2deeeee231..3f7d3acefc4 100644 --- a/.github/workflows/smoke-copilot-playwright.lock.yml +++ b/.github/workflows/smoke-copilot-playwright.lock.yml @@ -5827,13 +5827,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains '*.githubusercontent.com,accounts.google.com,android.clients.google.com,api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.npms.io,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,bun.sh,cdn.playwright.dev,clients2.google.com,codeload.github.com,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,deb.nodesource.com,deno.land,get.pnpm.io,github-cloud.githubusercontent.com,github-cloud.s3.amazonaws.com,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,lfs.github.com,nodejs.org,npm.pkg.github.com,npmjs.com,npmjs.org,objects.githubusercontent.com,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,playwright.download.prss.microsoft.com,ppa.launchpad.net,raw.githubusercontent.com,registry.bower.io,registry.npmjs.com,registry.npmjs.org,registry.yarnpkg.com,repo.yarnpkg.com,s.symcb.com,s.symcd.com,security.ubuntu.com,skimdb.npmjs.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com,www.google.com,www.npmjs.com,www.npmjs.org,yarnpkg.com' --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --add-dir /tmp/gh-aw/cache-memory/ --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -5849,6 +5842,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -10195,13 +10197,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -10213,6 +10208,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/smoke-copilot-safe-inputs.lock.yml b/.github/workflows/smoke-copilot-safe-inputs.lock.yml index 56d627bb594..7a5378e53ec 100644 --- a/.github/workflows/smoke-copilot-safe-inputs.lock.yml +++ b/.github/workflows/smoke-copilot-safe-inputs.lock.yml @@ -5554,13 +5554,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains '*.githubusercontent.com,api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.npms.io,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,bun.sh,codeload.github.com,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,deb.nodesource.com,deno.land,get.pnpm.io,github-cloud.githubusercontent.com,github-cloud.s3.amazonaws.com,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,lfs.github.com,nodejs.org,npm.pkg.github.com,npmjs.com,npmjs.org,objects.githubusercontent.com,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,ppa.launchpad.net,raw.githubusercontent.com,registry.bower.io,registry.npmjs.com,registry.npmjs.org,registry.yarnpkg.com,repo.yarnpkg.com,s.symcb.com,s.symcd.com,security.ubuntu.com,skimdb.npmjs.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com,www.npmjs.com,www.npmjs.org,yarnpkg.com' --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -5574,6 +5567,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -9901,13 +9903,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -9918,6 +9913,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/smoke-copilot.lock.yml b/.github/workflows/smoke-copilot.lock.yml index 463139492f6..5c9ec6f899f 100644 --- a/.github/workflows/smoke-copilot.lock.yml +++ b/.github/workflows/smoke-copilot.lock.yml @@ -4379,13 +4379,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains '*.githubusercontent.com,api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.npms.io,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,bun.sh,codeload.github.com,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,deb.nodesource.com,deno.land,get.pnpm.io,github-cloud.githubusercontent.com,github-cloud.s3.amazonaws.com,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,lfs.github.com,nodejs.org,npm.pkg.github.com,npmjs.com,npmjs.org,objects.githubusercontent.com,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,ppa.launchpad.net,raw.githubusercontent.com,registry.bower.io,registry.npmjs.com,registry.npmjs.org,registry.yarnpkg.com,repo.yarnpkg.com,s.symcb.com,s.symcd.com,security.ubuntu.com,skimdb.npmjs.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com,www.npmjs.com,www.npmjs.org,yarnpkg.com' --log-level debug --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --add-dir /tmp/gh-aw/cache-memory/ --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -4399,6 +4392,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -8726,13 +8728,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -8743,6 +8738,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/smoke-srt-custom-config.lock.yml b/.github/workflows/smoke-srt-custom-config.lock.yml index 0330661a718..5ccba7a5013 100644 --- a/.github/workflows/smoke-srt-custom-config.lock.yml +++ b/.github/workflows/smoke-srt-custom-config.lock.yml @@ -1082,13 +1082,6 @@ jobs: mv "$COPILOT_LOGS_DIR"/* /tmp/gh-aw/sandbox/agent/logs/ || true rmdir "$COPILOT_LOGS_DIR" || true fi - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -1101,6 +1094,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/smoke-srt.lock.yml b/.github/workflows/smoke-srt.lock.yml index 7c48147e4e6..637f5dcb3ce 100644 --- a/.github/workflows/smoke-srt.lock.yml +++ b/.github/workflows/smoke-srt.lock.yml @@ -2551,13 +2551,6 @@ jobs: mv "$COPILOT_LOGS_DIR"/* /tmp/gh-aw/sandbox/agent/logs/ || true rmdir "$COPILOT_LOGS_DIR" || true fi - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -2571,6 +2564,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -5959,13 +5961,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -5976,6 +5971,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/spec-kit-execute.lock.yml b/.github/workflows/spec-kit-execute.lock.yml index e46f9f16a7c..fc6a54f342c 100644 --- a/.github/workflows/spec-kit-execute.lock.yml +++ b/.github/workflows/spec-kit-execute.lock.yml @@ -3269,13 +3269,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeoutputs --allow-tool 'shell(cat .specify/memory/constitution.md)' --allow-tool 'shell(cat .specify/specs/*/plan.md)' --allow-tool 'shell(cat .specify/specs/*/spec.md)' --allow-tool 'shell(cat .specify/specs/*/tasks.md)' --allow-tool 'shell(cat)' --allow-tool 'shell(date)' --allow-tool 'shell(echo)' --allow-tool 'shell(find .specify/specs -type f -name '\''*.md'\'')' --allow-tool 'shell(git add:*)' --allow-tool 'shell(git branch)' --allow-tool 'shell(git branch:*)' --allow-tool 'shell(git checkout:*)' --allow-tool 'shell(git commit:*)' --allow-tool 'shell(git diff)' --allow-tool 'shell(git merge:*)' --allow-tool 'shell(git rm:*)' --allow-tool 'shell(git status)' --allow-tool 'shell(git switch:*)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(ls -la .specify/specs/)' --allow-tool 'shell(ls)' --allow-tool 'shell(make build)' --allow-tool 'shell(make fmt)' --allow-tool 'shell(make lint)' --allow-tool 'shell(make test)' --allow-tool 'shell(make test-unit)' --allow-tool 'shell(pwd)' --allow-tool 'shell(sort)' --allow-tool 'shell(tail)' --allow-tool 'shell(uniq)' --allow-tool 'shell(wc)' --allow-tool 'shell(yq)' --allow-tool write --add-dir /tmp/gh-aw/cache-memory/ --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -3289,6 +3282,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7768,13 +7770,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -7785,6 +7780,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/spec-kit-executor.lock.yml b/.github/workflows/spec-kit-executor.lock.yml index 1a613e8dba3..454cb850a36 100644 --- a/.github/workflows/spec-kit-executor.lock.yml +++ b/.github/workflows/spec-kit-executor.lock.yml @@ -2959,13 +2959,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains '*.githubusercontent.com,api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,codeload.github.com,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,github-cloud.githubusercontent.com,github-cloud.s3.amazonaws.com,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,lfs.github.com,objects.githubusercontent.com,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,ppa.launchpad.net,raw.githubusercontent.com,registry.npmjs.org,s.symcb.com,s.symcd.com,security.ubuntu.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com' --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeoutputs --allow-tool 'shell(bash .specify/scripts/bash/check-prerequisites.sh)' --allow-tool 'shell(bash .specify/scripts/bash/create-new-feature.sh)' --allow-tool 'shell(cat .specify/memory/constitution.md)' --allow-tool 'shell(cat specs/*/plan.md)' --allow-tool 'shell(cat specs/*/tasks.md)' --allow-tool 'shell(cat)' --allow-tool 'shell(date)' --allow-tool 'shell(echo)' --allow-tool 'shell(find specs -type f -name '\''*.md'\'')' --allow-tool 'shell(git add:*)' --allow-tool 'shell(git branch)' --allow-tool 'shell(git branch:*)' --allow-tool 'shell(git checkout:*)' --allow-tool 'shell(git commit:*)' --allow-tool 'shell(git diff)' --allow-tool 'shell(git merge:*)' --allow-tool 'shell(git rm:*)' --allow-tool 'shell(git status)' --allow-tool 'shell(git switch:*)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(ls -la .specify/)' --allow-tool 'shell(ls)' --allow-tool 'shell(make build)' --allow-tool 'shell(make fmt)' --allow-tool 'shell(make lint)' --allow-tool 'shell(make test)' --allow-tool 'shell(pwd)' --allow-tool 'shell(sort)' --allow-tool 'shell(tail)' --allow-tool 'shell(uniq)' --allow-tool 'shell(wc)' --allow-tool 'shell(yq)' --allow-tool write --add-dir /tmp/gh-aw/cache-memory/ --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -2979,6 +2972,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7458,13 +7460,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -7475,6 +7470,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/speckit-dispatcher.lock.yml b/.github/workflows/speckit-dispatcher.lock.yml index fd5e1abdac5..1418c032f7d 100644 --- a/.github/workflows/speckit-dispatcher.lock.yml +++ b/.github/workflows/speckit-dispatcher.lock.yml @@ -4890,13 +4890,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --agent speckit-dispatcher --allow-tool github --allow-tool safeoutputs --allow-tool 'shell(cat .specify/memory/constitution.md)' --allow-tool 'shell(cat)' --allow-tool 'shell(date)' --allow-tool 'shell(echo)' --allow-tool 'shell(find specs -name '\''plan.md'\'' -exec cat {} \;)' --allow-tool 'shell(find specs -name '\''spec.md'\'' -exec cat {} \;)' --allow-tool 'shell(find specs -name '\''tasks.md'\'' -exec cat {} \;)' --allow-tool 'shell(find specs -type f -name '\''*.md'\'')' --allow-tool 'shell(git branch)' --allow-tool 'shell(git status)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(ls -la .specify/)' --allow-tool 'shell(ls -la specs/)' --allow-tool 'shell(ls)' --allow-tool 'shell(pwd)' --allow-tool 'shell(sort)' --allow-tool 'shell(tail)' --allow-tool 'shell(uniq)' --allow-tool 'shell(wc)' --allow-tool 'shell(yq)' --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -4910,6 +4903,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -9231,13 +9233,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -9248,6 +9243,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/stale-repo-identifier.lock.yml b/.github/workflows/stale-repo-identifier.lock.yml index 5d1eb0cd7c6..de561bf86e1 100644 --- a/.github/workflows/stale-repo-identifier.lock.yml +++ b/.github/workflows/stale-repo-identifier.lock.yml @@ -4430,13 +4430,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains '*.githubusercontent.com,*.pythonhosted.org,anaconda.org,api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,binstar.org,bootstrap.pypa.io,codeload.github.com,conda.anaconda.org,conda.binstar.org,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,files.pythonhosted.org,github-cloud.githubusercontent.com,github-cloud.s3.amazonaws.com,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,lfs.github.com,objects.githubusercontent.com,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,pip.pypa.io,ppa.launchpad.net,pypi.org,pypi.python.org,raw.githubusercontent.com,registry.npmjs.org,repo.anaconda.com,repo.continuum.io,s.symcb.com,s.symcd.com,security.ubuntu.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com' --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --add-dir /tmp/gh-aw/cache-memory/ --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -4453,6 +4446,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -8789,13 +8791,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -8806,6 +8801,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/super-linter.lock.yml b/.github/workflows/super-linter.lock.yml index bd4cb383b15..c10de8469af 100644 --- a/.github/workflows/super-linter.lock.yml +++ b/.github/workflows/super-linter.lock.yml @@ -2956,13 +2956,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --add-dir /tmp/gh-aw/cache-memory/ --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -2976,6 +2969,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7302,13 +7304,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -7319,6 +7314,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/technical-doc-writer.lock.yml b/.github/workflows/technical-doc-writer.lock.yml index 30f9f758c21..564ebc60785 100644 --- a/.github/workflows/technical-doc-writer.lock.yml +++ b/.github/workflows/technical-doc-writer.lock.yml @@ -4179,13 +4179,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains '*.githubusercontent.com,api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,codeload.github.com,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,github-cloud.githubusercontent.com,github-cloud.s3.amazonaws.com,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,lfs.github.com,objects.githubusercontent.com,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,ppa.launchpad.net,raw.githubusercontent.com,registry.npmjs.org,s.symcb.com,s.symcd.com,security.ubuntu.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com' --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --agent technical-doc-writer --allow-tool github --allow-tool safeoutputs --allow-tool shell --allow-tool write --add-dir /tmp/gh-aw/cache-memory/ --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -4202,6 +4195,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -8679,13 +8681,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -8696,6 +8691,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/test-discussion-expires.lock.yml b/.github/workflows/test-discussion-expires.lock.yml index a21aa9776f8..2341697ce64 100644 --- a/.github/workflows/test-discussion-expires.lock.yml +++ b/.github/workflows/test-discussion-expires.lock.yml @@ -2340,13 +2340,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeoutputs --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -2360,6 +2353,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -6773,13 +6775,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -6790,6 +6785,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/test-hide-older-comments.lock.yml b/.github/workflows/test-hide-older-comments.lock.yml index 03e565e7370..e4dfb00335a 100644 --- a/.github/workflows/test-hide-older-comments.lock.yml +++ b/.github/workflows/test-hide-older-comments.lock.yml @@ -3114,13 +3114,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeoutputs --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -3134,6 +3127,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -6825,13 +6827,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -6842,6 +6837,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/test-python-safe-input.lock.yml b/.github/workflows/test-python-safe-input.lock.yml index 9a1f2154d4a..0eab13cfab9 100644 --- a/.github/workflows/test-python-safe-input.lock.yml +++ b/.github/workflows/test-python-safe-input.lock.yml @@ -3953,13 +3953,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeinputs --allow-tool safeoutputs --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -3973,6 +3966,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -8299,13 +8301,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -8316,6 +8311,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/tidy.lock.yml b/.github/workflows/tidy.lock.yml index 3d69aae4fc7..bed09ccb69b 100644 --- a/.github/workflows/tidy.lock.yml +++ b/.github/workflows/tidy.lock.yml @@ -3082,13 +3082,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeoutputs --allow-tool 'shell(cat)' --allow-tool 'shell(date)' --allow-tool 'shell(echo)' --allow-tool 'shell(git add:*)' --allow-tool 'shell(git branch:*)' --allow-tool 'shell(git checkout:*)' --allow-tool 'shell(git commit:*)' --allow-tool 'shell(git merge:*)' --allow-tool 'shell(git restore:*)' --allow-tool 'shell(git rm:*)' --allow-tool 'shell(git status)' --allow-tool 'shell(git switch:*)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(ls)' --allow-tool 'shell(make:*)' --allow-tool 'shell(pwd)' --allow-tool 'shell(sort)' --allow-tool 'shell(tail)' --allow-tool 'shell(uniq)' --allow-tool 'shell(wc)' --allow-tool 'shell(yq)' --allow-tool write --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -3102,6 +3095,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7563,13 +7565,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -7580,6 +7575,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/video-analyzer.lock.yml b/.github/workflows/video-analyzer.lock.yml index 29f3713be57..0943734c452 100644 --- a/.github/workflows/video-analyzer.lock.yml +++ b/.github/workflows/video-analyzer.lock.yml @@ -2997,13 +2997,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,github.com,host.docker.internal,raw.githubusercontent.com,registry.npmjs.org --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-tool github --allow-tool safeoutputs --allow-tool 'shell(cat)' --allow-tool 'shell(date)' --allow-tool 'shell(echo)' --allow-tool 'shell(ffmpeg *)' --allow-tool 'shell(ffprobe *)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(ls)' --allow-tool 'shell(pwd)' --allow-tool 'shell(sort)' --allow-tool 'shell(tail)' --allow-tool 'shell(uniq)' --allow-tool 'shell(wc)' --allow-tool 'shell(yq)' --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -3017,6 +3010,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7336,13 +7338,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -7353,6 +7348,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/weekly-issue-summary.lock.yml b/.github/workflows/weekly-issue-summary.lock.yml index c99812d9449..e469f26469f 100644 --- a/.github/workflows/weekly-issue-summary.lock.yml +++ b/.github/workflows/weekly-issue-summary.lock.yml @@ -3786,13 +3786,6 @@ jobs: sudo -E awf --env-all --container-workdir "${GITHUB_WORKSPACE}" --mount /tmp:/tmp:rw --mount "${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw" --mount /usr/bin/date:/usr/bin/date:ro --mount /usr/bin/gh:/usr/bin/gh:ro --mount /usr/bin/yq:/usr/bin/yq:ro --allow-domains '*.pythonhosted.org,anaconda.org,api.business.githubcopilot.com,api.enterprise.githubcopilot.com,api.github.com,api.individual.githubcopilot.com,api.npms.io,api.snapcraft.io,archive.ubuntu.com,azure.archive.ubuntu.com,binstar.org,bootstrap.pypa.io,bun.sh,conda.anaconda.org,conda.binstar.org,crl.geotrust.com,crl.globalsign.com,crl.identrust.com,crl.sectigo.com,crl.thawte.com,crl.usertrust.com,crl.verisign.com,crl3.digicert.com,crl4.digicert.com,crls.ssl.com,deb.nodesource.com,deno.land,files.pythonhosted.org,get.pnpm.io,github.com,host.docker.internal,json-schema.org,json.schemastore.org,keyserver.ubuntu.com,nodejs.org,npm.pkg.github.com,npmjs.com,npmjs.org,ocsp.digicert.com,ocsp.geotrust.com,ocsp.globalsign.com,ocsp.identrust.com,ocsp.sectigo.com,ocsp.ssl.com,ocsp.thawte.com,ocsp.usertrust.com,ocsp.verisign.com,packagecloud.io,packages.cloud.google.com,packages.microsoft.com,pip.pypa.io,ppa.launchpad.net,pypi.org,pypi.python.org,raw.githubusercontent.com,registry.bower.io,registry.npmjs.com,registry.npmjs.org,registry.yarnpkg.com,repo.anaconda.com,repo.continuum.io,repo.yarnpkg.com,s.symcb.com,s.symcd.com,security.ubuntu.com,skimdb.npmjs.com,ts-crl.ws.symantec.com,ts-ocsp.ws.symantec.com,www.npmjs.com,www.npmjs.org,yarnpkg.com' --log-level info --proxy-logs-dir /tmp/gh-aw/sandbox/firewall/logs \ -- npx -y @github/copilot@0.0.368 --add-dir /tmp/gh-aw/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --add-dir "${GITHUB_WORKSPACE}" --disable-builtin-mcps --allow-all-tools --add-dir /tmp/gh-aw/cache-memory/ --allow-all-paths --prompt "$(cat /tmp/gh-aw/aw-prompts/prompt.txt)"${GH_AW_MODEL_AGENT_COPILOT:+ --model "$GH_AW_MODEL_AGENT_COPILOT"} \ 2>&1 | tee /tmp/gh-aw/agent-stdio.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -3809,6 +3802,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -8241,13 +8243,6 @@ jobs: mkdir -p /tmp/gh-aw/agent/ mkdir -p /tmp/gh-aw/sandbox/agent/logs/ copilot --add-dir /tmp/ --add-dir /tmp/gh-aw/ --add-dir /tmp/gh-aw/agent/ --log-level all --log-dir /tmp/gh-aw/sandbox/agent/logs/ --disable-builtin-mcps --allow-tool 'shell(cat)' --allow-tool 'shell(grep)' --allow-tool 'shell(head)' --allow-tool 'shell(jq)' --allow-tool 'shell(ls)' --allow-tool 'shell(tail)' --allow-tool 'shell(wc)' --prompt "$COPILOT_CLI_INSTRUCTION"${GH_AW_MODEL_DETECTION_COPILOT:+ --model "$GH_AW_MODEL_DETECTION_COPILOT"} 2>&1 | tee /tmp/gh-aw/threat-detection/detection.log - - # Copy session-state file to agent output location - if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true - fi env: COPILOT_AGENT_RUNNER_TYPE: STANDALONE COPILOT_GITHUB_TOKEN: ${{ secrets.COPILOT_GITHUB_TOKEN }} @@ -8258,6 +8253,15 @@ jobs: GITHUB_STEP_SUMMARY: ${{ env.GITHUB_STEP_SUMMARY }} GITHUB_WORKSPACE: ${{ github.workspace }} XDG_CONFIG_HOME: /home/runner + - name: Copy Copilot session-state file + if: always() + continue-on-error: true + run: | + if [ -f /home/runner/.copilot/session-state ]; then + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + fi - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/pkg/workflow/copilot_engine.go b/pkg/workflow/copilot_engine.go index 5df4afc2b9b..5948c54d102 100644 --- a/pkg/workflow/copilot_engine.go +++ b/pkg/workflow/copilot_engine.go @@ -347,14 +347,7 @@ func (e *CopilotEngine) GetExecutionSteps(workflowData *WorkflowData, logFile st // Build the command with custom SRT command // The custom command should handle wrapping copilot with SRT command = fmt.Sprintf(`set -o pipefail -%s %s -- %s 2>&1 | tee %s - -# Copy session-state file to agent output location -if [ -f %s ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname %s)" - cp %s %s || true -fi`, agentConfig.Command, shellJoinArgs(srtArgs), copilotCommand, shellEscapeArg(logFile), shellEscapeArg(sessionStateSource), shellEscapeArg(sessionStateFile), shellEscapeArg(sessionStateSource), shellEscapeArg(sessionStateFile)) +%s %s -- %s 2>&1 | tee %s`, agentConfig.Command, shellJoinArgs(srtArgs), copilotCommand, shellEscapeArg(logFile)) } else { // Create the Node.js wrapper script for SRT (standard installation) srtWrapperScript := generateSRTWrapperScript(copilotCommand, srtConfigJSON, logFile, logsFolder) @@ -444,26 +437,12 @@ fi`, agentConfig.Command, shellJoinArgs(srtArgs), copilotCommand, shellEscapeArg command = fmt.Sprintf(`set -o pipefail %s %s \ -- %s \ - 2>&1 | tee %s - -# Copy session-state file to agent output location -if [ -f %s ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname %s)" - cp %s %s || true -fi`, awfCommand, shellJoinArgs(awfArgs), copilotCommand, shellEscapeArg(logFile), shellEscapeArg(sessionStateSource), shellEscapeArg(sessionStateFile), shellEscapeArg(sessionStateSource), shellEscapeArg(sessionStateFile)) + 2>&1 | tee %s`, awfCommand, shellJoinArgs(awfArgs), copilotCommand, shellEscapeArg(logFile)) } else { // Run copilot command without AWF wrapper command = fmt.Sprintf(`set -o pipefail COPILOT_CLI_INSTRUCTION="$(cat /tmp/gh-aw/aw-prompts/prompt.txt)" -%s%s 2>&1 | tee %s - -# Copy session-state file to agent output location -if [ -f %s ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname %s)" - cp %s %s || true -fi`, mkdirCommands.String(), copilotCommand, logFile, shellEscapeArg(sessionStateSource), shellEscapeArg(sessionStateFile), shellEscapeArg(sessionStateSource), shellEscapeArg(sessionStateFile)) +%s%s 2>&1 | tee %s`, mkdirCommands.String(), copilotCommand, logFile) } // Use COPILOT_GITHUB_TOKEN @@ -598,6 +577,10 @@ fi`, mkdirCommands.String(), copilotCommand, logFile, shellEscapeArg(sessionStat steps = append(steps, GitHubActionStep(stepLines)) + // Add separate step to copy session-state file + copySessionStateStep := e.generateCopySessionStateStep() + steps = append(steps, copySessionStateStep) + return steps } @@ -608,6 +591,22 @@ func (e *CopilotEngine) GetFirewallLogsCollectionStep(workflowData *WorkflowData return []GitHubActionStep{} } +// generateCopySessionStateStep creates a separate step to copy the Copilot session-state file +func (e *CopilotEngine) generateCopySessionStateStep() GitHubActionStep { + stepLines := []string{ + " - name: Copy Copilot session-state file", + " if: always()", + " continue-on-error: true", + " run: |", + fmt.Sprintf(" if [ -f %s ]; then", shellEscapeArg(sessionStateSource)), + " echo \"Copying Copilot session-state file\"", + fmt.Sprintf(" mkdir -p \"$(dirname %s)\"", shellEscapeArg(sessionStateFile)), + fmt.Sprintf(" cp %s %s || true", shellEscapeArg(sessionStateSource), shellEscapeArg(sessionStateFile)), + " fi", + } + return GitHubActionStep(stepLines) +} + // GetSquidLogsSteps returns the steps for uploading and parsing Squid logs (after secret redaction) func (e *CopilotEngine) GetSquidLogsSteps(workflowData *WorkflowData) []GitHubActionStep { var steps []GitHubActionStep @@ -1341,14 +1340,7 @@ if [ -n "$COPILOT_LOGS_DIR" ] && [ -d "$COPILOT_LOGS_DIR" ]; then mkdir -p %s mv "$COPILOT_LOGS_DIR"/* %s || true rmdir "$COPILOT_LOGS_DIR" || true -fi - -# Copy session-state file to agent output location -if [ -f %s ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname %s)" - cp %s %s || true -fi`, escapedConfigJSON, escapedCopilotCommand, shellEscapeArg(logFile), shellEscapeArg(logsFolder), shellEscapeArg(logsFolder), shellEscapeArg(logsFolder), shellEscapeArg(sessionStateSource), shellEscapeArg(sessionStateFile), shellEscapeArg(sessionStateSource), shellEscapeArg(sessionStateFile)) +fi`, escapedConfigJSON, escapedCopilotCommand, shellEscapeArg(logFile), shellEscapeArg(logsFolder), shellEscapeArg(logsFolder), shellEscapeArg(logsFolder)) return script } diff --git a/pkg/workflow/copilot_engine_test.go b/pkg/workflow/copilot_engine_test.go index 6e0c7b2fe21..57fe207a87a 100644 --- a/pkg/workflow/copilot_engine_test.go +++ b/pkg/workflow/copilot_engine_test.go @@ -100,8 +100,8 @@ func TestCopilotEngineExecutionSteps(t *testing.T) { steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") // GetExecutionSteps only returns the execution step, not Squid logs or cleanup - if len(steps) != 1 { - t.Fatalf("Expected 1 step (copilot execution), got %d", len(steps)) + if len(steps) != 2 { + t.Fatalf("Expected 2 steps (copilot execution and session-state copy), got %d", len(steps)) } // Check the execution step @@ -171,8 +171,8 @@ func TestCopilotEngineExecutionStepsWithOutput(t *testing.T) { steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") // GetExecutionSteps only returns the execution step - if len(steps) != 1 { - t.Fatalf("Expected 1 step (copilot execution), got %d", len(steps)) + if len(steps) != 2 { + t.Fatalf("Expected 2 steps (copilot execution and session-state copy), got %d", len(steps)) } // Check the execution step @@ -468,8 +468,8 @@ func TestCopilotEngineExecutionStepsWithToolArguments(t *testing.T) { steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") // GetExecutionSteps only returns the execution step - if len(steps) != 1 { - t.Fatalf("Expected 1 step (copilot execution), got %d", len(steps)) + if len(steps) != 2 { + t.Fatalf("Expected 2 steps (copilot execution and session-state copy), got %d", len(steps)) } // Check the execution step contains tool arguments @@ -554,7 +554,7 @@ func TestCopilotEngineEditToolAddsAllowAllPaths(t *testing.T) { steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") // GetExecutionSteps only returns the execution step - if len(steps) != 1 { + if len(steps) != 2 { t.Fatalf("Expected 1 step, got %d", len(steps)) } @@ -601,7 +601,7 @@ func TestCopilotEngineShellEscaping(t *testing.T) { steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") // GetExecutionSteps only returns the execution step - if len(steps) != 1 { + if len(steps) != 2 { t.Fatalf("Expected 1 step, got %d", len(steps)) } @@ -648,7 +648,7 @@ func TestCopilotEngineInstructionPromptNotEscaped(t *testing.T) { steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") // GetExecutionSteps only returns the execution step - if len(steps) != 1 { + if len(steps) != 2 { t.Fatalf("Expected 1 step, got %d", len(steps)) } @@ -870,7 +870,7 @@ func TestCopilotEngineGitHubToolsShellEscaping(t *testing.T) { steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") // GetExecutionSteps only returns the execution step - if len(steps) != 1 { + if len(steps) != 2 { t.Fatalf("Expected 1 step, got %d", len(steps)) } @@ -1030,7 +1030,7 @@ func TestCopilotEngineExecutionStepsWithCacheMemory(t *testing.T) { steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") // GetExecutionSteps only returns the execution step - if len(steps) != 1 { + if len(steps) != 2 { t.Fatalf("Expected 1 step, got %d", len(steps)) } @@ -1070,7 +1070,7 @@ func TestCopilotEngineExecutionStepsWithCustomAddDirArgs(t *testing.T) { steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") // GetExecutionSteps only returns the execution step - if len(steps) != 1 { + if len(steps) != 2 { t.Fatalf("Expected 1 step, got %d", len(steps)) } diff --git a/pkg/workflow/engine_agent_import_test.go b/pkg/workflow/engine_agent_import_test.go index cb10d95b1e1..9fd8d697c0d 100644 --- a/pkg/workflow/engine_agent_import_test.go +++ b/pkg/workflow/engine_agent_import_test.go @@ -20,8 +20,8 @@ func TestCopilotEngineWithAgentFromImports(t *testing.T) { steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") - if len(steps) != 1 { - t.Fatalf("Expected 1 execution step, got %d", len(steps)) + if len(steps) != 2 { + t.Fatalf("Expected 2 execution steps, got %d", len(steps)) } stepContent := strings.Join([]string(steps[0]), "\n") @@ -44,8 +44,8 @@ func TestCopilotEngineWithoutAgentFlag(t *testing.T) { steps := engine.GetExecutionSteps(workflowData, "/tmp/gh-aw/test.log") - if len(steps) != 1 { - t.Fatalf("Expected 1 execution step, got %d", len(steps)) + if len(steps) != 2 { + t.Fatalf("Expected 2 execution steps, got %d", len(steps)) } stepContent := strings.Join([]string(steps[0]), "\n") From de6e00b3e404a24ce1029211e5b3b3e3e48e9678 Mon Sep 17 00:00:00 2001 From: "copilot-swe-agent[bot]" <198982749+Copilot@users.noreply.github.com> Date: Thu, 11 Dec 2025 18:06:29 +0000 Subject: [PATCH 8/9] Add fallback search for session-state file with failure on not found - If session-state not found at expected location, search in ~ and /tmp - Print the path where session-state file is found - Fail with clear error message if not found anywhere - Removed continue-on-error to ensure failures are caught - Search uses find with maxdepth 3 for performance Co-authored-by: pelikhan <4175913+pelikhan@users.noreply.github.com> --- .github/workflows/ai-moderator.lock.yml | 27 ++++++++-- .github/workflows/archie.lock.yml | 54 ++++++++++++++++--- .github/workflows/artifacts-summary.lock.yml | 54 ++++++++++++++++--- .github/workflows/brave.lock.yml | 54 ++++++++++++++++--- .../breaking-change-checker.lock.yml | 54 ++++++++++++++++--- .github/workflows/ci-coach.lock.yml | 54 ++++++++++++++++--- .github/workflows/ci-doctor.lock.yml | 54 ++++++++++++++++--- .../cli-consistency-checker.lock.yml | 54 ++++++++++++++++--- .../copilot-pr-merged-report.lock.yml | 54 ++++++++++++++++--- .../copilot-pr-nlp-analysis.lock.yml | 54 ++++++++++++++++--- .../copilot-pr-prompt-analysis.lock.yml | 54 ++++++++++++++++--- .github/workflows/craft.lock.yml | 54 ++++++++++++++++--- .../daily-assign-issue-to-user.lock.yml | 54 ++++++++++++++++--- .../daily-copilot-token-report.lock.yml | 54 ++++++++++++++++--- .../workflows/daily-firewall-report.lock.yml | 54 ++++++++++++++++--- .../daily-malicious-code-scan.lock.yml | 27 ++++++++-- .github/workflows/daily-news.lock.yml | 54 ++++++++++++++++--- .../workflows/daily-repo-chronicle.lock.yml | 54 ++++++++++++++++--- .github/workflows/daily-team-status.lock.yml | 54 ++++++++++++++++--- .../workflows/daily-workflow-updater.lock.yml | 54 ++++++++++++++++--- .../workflows/dependabot-go-checker.lock.yml | 54 ++++++++++++++++--- .github/workflows/dev-hawk.lock.yml | 54 ++++++++++++++++--- .github/workflows/dev.lock.yml | 54 ++++++++++++++++--- .github/workflows/dictation-prompt.lock.yml | 54 ++++++++++++++++--- .github/workflows/docs-noob-tester.lock.yml | 54 ++++++++++++++++--- .../example-permissions-warning.lock.yml | 27 ++++++++-- .github/workflows/firewall-escape.lock.yml | 27 ++++++++-- .github/workflows/firewall.lock.yml | 27 ++++++++-- .../workflows/glossary-maintainer.lock.yml | 54 ++++++++++++++++--- .github/workflows/grumpy-reviewer.lock.yml | 54 ++++++++++++++++--- .github/workflows/hourly-ci-cleaner.lock.yml | 54 ++++++++++++++++--- .github/workflows/issue-monster.lock.yml | 54 ++++++++++++++++--- .github/workflows/issue-triage-agent.lock.yml | 54 ++++++++++++++++--- .../workflows/layout-spec-maintainer.lock.yml | 54 ++++++++++++++++--- .github/workflows/mcp-inspector.lock.yml | 54 ++++++++++++++++--- .github/workflows/mergefest.lock.yml | 54 ++++++++++++++++--- .../workflows/notion-issue-summary.lock.yml | 54 ++++++++++++++++--- .github/workflows/org-health-report.lock.yml | 54 ++++++++++++++++--- .github/workflows/pdf-summary.lock.yml | 54 ++++++++++++++++--- .github/workflows/plan.lock.yml | 54 ++++++++++++++++--- .github/workflows/poem-bot.lock.yml | 54 ++++++++++++++++--- .github/workflows/portfolio-analyst.lock.yml | 54 ++++++++++++++++--- .../workflows/pr-nitpick-reviewer.lock.yml | 54 ++++++++++++++++--- .github/workflows/python-data-charts.lock.yml | 54 ++++++++++++++++--- .github/workflows/q.lock.yml | 54 ++++++++++++++++--- .github/workflows/release.lock.yml | 54 ++++++++++++++++--- .github/workflows/repo-tree-map.lock.yml | 54 ++++++++++++++++--- .../repository-quality-improver.lock.yml | 54 ++++++++++++++++--- .github/workflows/research.lock.yml | 54 ++++++++++++++++--- .../smoke-copilot-no-firewall.lock.yml | 54 ++++++++++++++++--- .../smoke-copilot-playwright.lock.yml | 54 ++++++++++++++++--- .../smoke-copilot-safe-inputs.lock.yml | 54 ++++++++++++++++--- .github/workflows/smoke-copilot.lock.yml | 54 ++++++++++++++++--- .../smoke-srt-custom-config.lock.yml | 27 ++++++++-- .github/workflows/smoke-srt.lock.yml | 54 ++++++++++++++++--- .github/workflows/spec-kit-execute.lock.yml | 54 ++++++++++++++++--- .github/workflows/spec-kit-executor.lock.yml | 54 ++++++++++++++++--- .github/workflows/speckit-dispatcher.lock.yml | 54 ++++++++++++++++--- .../workflows/stale-repo-identifier.lock.yml | 54 ++++++++++++++++--- .github/workflows/super-linter.lock.yml | 54 ++++++++++++++++--- .../workflows/technical-doc-writer.lock.yml | 54 ++++++++++++++++--- .../test-discussion-expires.lock.yml | 54 ++++++++++++++++--- .../test-hide-older-comments.lock.yml | 54 ++++++++++++++++--- .../workflows/test-python-safe-input.lock.yml | 54 ++++++++++++++++--- .github/workflows/tidy.lock.yml | 54 ++++++++++++++++--- .github/workflows/video-analyzer.lock.yml | 54 ++++++++++++++++--- .../workflows/weekly-issue-summary.lock.yml | 54 ++++++++++++++++--- pkg/workflow/copilot_engine.go | 27 ++++++++-- 68 files changed, 2967 insertions(+), 516 deletions(-) diff --git a/.github/workflows/ai-moderator.lock.yml b/.github/workflows/ai-moderator.lock.yml index 595b3d2ae6d..ed2095d6f8f 100644 --- a/.github/workflows/ai-moderator.lock.yml +++ b/.github/workflows/ai-moderator.lock.yml @@ -3716,13 +3716,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/archie.lock.yml b/.github/workflows/archie.lock.yml index 4930f1e4e22..fe4e85ade36 100644 --- a/.github/workflows/archie.lock.yml +++ b/.github/workflows/archie.lock.yml @@ -4446,13 +4446,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -8158,13 +8177,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/artifacts-summary.lock.yml b/.github/workflows/artifacts-summary.lock.yml index f79a0c9f732..91050385eae 100644 --- a/.github/workflows/artifacts-summary.lock.yml +++ b/.github/workflows/artifacts-summary.lock.yml @@ -2728,13 +2728,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7207,13 +7226,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/brave.lock.yml b/.github/workflows/brave.lock.yml index 0eaeb3168c5..757423955fb 100644 --- a/.github/workflows/brave.lock.yml +++ b/.github/workflows/brave.lock.yml @@ -4235,13 +4235,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7948,13 +7967,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/breaking-change-checker.lock.yml b/.github/workflows/breaking-change-checker.lock.yml index 15ecb0e669a..343d0dc9b44 100644 --- a/.github/workflows/breaking-change-checker.lock.yml +++ b/.github/workflows/breaking-change-checker.lock.yml @@ -2812,13 +2812,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7574,13 +7593,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/ci-coach.lock.yml b/.github/workflows/ci-coach.lock.yml index 67ca3fa384e..ca3bb001baa 100644 --- a/.github/workflows/ci-coach.lock.yml +++ b/.github/workflows/ci-coach.lock.yml @@ -4014,13 +4014,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -8450,13 +8469,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/ci-doctor.lock.yml b/.github/workflows/ci-doctor.lock.yml index d68c3a65fba..7c15612b367 100644 --- a/.github/workflows/ci-doctor.lock.yml +++ b/.github/workflows/ci-doctor.lock.yml @@ -3676,13 +3676,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -8030,13 +8049,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/cli-consistency-checker.lock.yml b/.github/workflows/cli-consistency-checker.lock.yml index ffd07e8d8d5..eb45b789327 100644 --- a/.github/workflows/cli-consistency-checker.lock.yml +++ b/.github/workflows/cli-consistency-checker.lock.yml @@ -2809,13 +2809,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7147,13 +7166,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/copilot-pr-merged-report.lock.yml b/.github/workflows/copilot-pr-merged-report.lock.yml index 6b9356a6684..f7f663ab908 100644 --- a/.github/workflows/copilot-pr-merged-report.lock.yml +++ b/.github/workflows/copilot-pr-merged-report.lock.yml @@ -4250,13 +4250,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -8689,13 +8708,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/copilot-pr-nlp-analysis.lock.yml b/.github/workflows/copilot-pr-nlp-analysis.lock.yml index 2774fdda74e..40ebc71e81e 100644 --- a/.github/workflows/copilot-pr-nlp-analysis.lock.yml +++ b/.github/workflows/copilot-pr-nlp-analysis.lock.yml @@ -4349,13 +4349,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -8796,13 +8815,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/copilot-pr-prompt-analysis.lock.yml b/.github/workflows/copilot-pr-prompt-analysis.lock.yml index f84e131378f..2102088252b 100644 --- a/.github/workflows/copilot-pr-prompt-analysis.lock.yml +++ b/.github/workflows/copilot-pr-prompt-analysis.lock.yml @@ -3372,13 +3372,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7811,13 +7830,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/craft.lock.yml b/.github/workflows/craft.lock.yml index d2614e51a41..f8991ccff45 100644 --- a/.github/workflows/craft.lock.yml +++ b/.github/workflows/craft.lock.yml @@ -4580,13 +4580,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -8301,13 +8320,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/daily-assign-issue-to-user.lock.yml b/.github/workflows/daily-assign-issue-to-user.lock.yml index 53dbecff8e8..2045c037c14 100644 --- a/.github/workflows/daily-assign-issue-to-user.lock.yml +++ b/.github/workflows/daily-assign-issue-to-user.lock.yml @@ -3180,13 +3180,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7453,13 +7472,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/daily-copilot-token-report.lock.yml b/.github/workflows/daily-copilot-token-report.lock.yml index c99381d6e7e..bfcbd95ee13 100644 --- a/.github/workflows/daily-copilot-token-report.lock.yml +++ b/.github/workflows/daily-copilot-token-report.lock.yml @@ -4518,13 +4518,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -8969,13 +8988,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/daily-firewall-report.lock.yml b/.github/workflows/daily-firewall-report.lock.yml index f473bfa90db..d22055ab0d5 100644 --- a/.github/workflows/daily-firewall-report.lock.yml +++ b/.github/workflows/daily-firewall-report.lock.yml @@ -3803,13 +3803,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -8264,13 +8283,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/daily-malicious-code-scan.lock.yml b/.github/workflows/daily-malicious-code-scan.lock.yml index cb63e82f3f9..4b50a060221 100644 --- a/.github/workflows/daily-malicious-code-scan.lock.yml +++ b/.github/workflows/daily-malicious-code-scan.lock.yml @@ -3047,13 +3047,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/daily-news.lock.yml b/.github/workflows/daily-news.lock.yml index 0e1f04e5cec..6d39fd04d78 100644 --- a/.github/workflows/daily-news.lock.yml +++ b/.github/workflows/daily-news.lock.yml @@ -4276,13 +4276,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -8728,13 +8747,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/daily-repo-chronicle.lock.yml b/.github/workflows/daily-repo-chronicle.lock.yml index f730ffcf68d..a405800bbd9 100644 --- a/.github/workflows/daily-repo-chronicle.lock.yml +++ b/.github/workflows/daily-repo-chronicle.lock.yml @@ -3951,13 +3951,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -8402,13 +8421,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/daily-team-status.lock.yml b/.github/workflows/daily-team-status.lock.yml index 5ef9c4db00f..312e36467e2 100644 --- a/.github/workflows/daily-team-status.lock.yml +++ b/.github/workflows/daily-team-status.lock.yml @@ -2575,13 +2575,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7018,13 +7037,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/daily-workflow-updater.lock.yml b/.github/workflows/daily-workflow-updater.lock.yml index 52565163673..821f9a62f21 100644 --- a/.github/workflows/daily-workflow-updater.lock.yml +++ b/.github/workflows/daily-workflow-updater.lock.yml @@ -2739,13 +2739,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7169,13 +7188,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/dependabot-go-checker.lock.yml b/.github/workflows/dependabot-go-checker.lock.yml index 49844b817bf..e619fbaaf2d 100644 --- a/.github/workflows/dependabot-go-checker.lock.yml +++ b/.github/workflows/dependabot-go-checker.lock.yml @@ -3342,13 +3342,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7761,13 +7780,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/dev-hawk.lock.yml b/.github/workflows/dev-hawk.lock.yml index 7b0a3119eb2..c50d4a171ce 100644 --- a/.github/workflows/dev-hawk.lock.yml +++ b/.github/workflows/dev-hawk.lock.yml @@ -3460,13 +3460,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7173,13 +7192,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/dev.lock.yml b/.github/workflows/dev.lock.yml index 69e4725e01d..98b66cae64d 100644 --- a/.github/workflows/dev.lock.yml +++ b/.github/workflows/dev.lock.yml @@ -3429,13 +3429,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7860,13 +7879,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/dictation-prompt.lock.yml b/.github/workflows/dictation-prompt.lock.yml index 1c9d130c6c5..3edfb51ad59 100644 --- a/.github/workflows/dictation-prompt.lock.yml +++ b/.github/workflows/dictation-prompt.lock.yml @@ -2682,13 +2682,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7108,13 +7127,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/docs-noob-tester.lock.yml b/.github/workflows/docs-noob-tester.lock.yml index 68981589f67..51c90eccc65 100644 --- a/.github/workflows/docs-noob-tester.lock.yml +++ b/.github/workflows/docs-noob-tester.lock.yml @@ -2821,13 +2821,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7260,13 +7279,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/example-permissions-warning.lock.yml b/.github/workflows/example-permissions-warning.lock.yml index d34eb38172e..f08d45523bb 100644 --- a/.github/workflows/example-permissions-warning.lock.yml +++ b/.github/workflows/example-permissions-warning.lock.yml @@ -797,13 +797,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/firewall-escape.lock.yml b/.github/workflows/firewall-escape.lock.yml index 4e3009bbf26..9589d969eb2 100644 --- a/.github/workflows/firewall-escape.lock.yml +++ b/.github/workflows/firewall-escape.lock.yml @@ -1217,13 +1217,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/firewall.lock.yml b/.github/workflows/firewall.lock.yml index 2577c067cc5..379a14c7242 100644 --- a/.github/workflows/firewall.lock.yml +++ b/.github/workflows/firewall.lock.yml @@ -912,13 +912,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/glossary-maintainer.lock.yml b/.github/workflows/glossary-maintainer.lock.yml index 9fe604cc295..c7d74bc75b7 100644 --- a/.github/workflows/glossary-maintainer.lock.yml +++ b/.github/workflows/glossary-maintainer.lock.yml @@ -3840,13 +3840,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -8273,13 +8292,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/grumpy-reviewer.lock.yml b/.github/workflows/grumpy-reviewer.lock.yml index ef17bd07b42..6eb40ef8f28 100644 --- a/.github/workflows/grumpy-reviewer.lock.yml +++ b/.github/workflows/grumpy-reviewer.lock.yml @@ -4385,13 +4385,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -8472,13 +8491,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/hourly-ci-cleaner.lock.yml b/.github/workflows/hourly-ci-cleaner.lock.yml index 128015ac4a7..67726417c77 100644 --- a/.github/workflows/hourly-ci-cleaner.lock.yml +++ b/.github/workflows/hourly-ci-cleaner.lock.yml @@ -3158,13 +3158,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7587,13 +7606,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/issue-monster.lock.yml b/.github/workflows/issue-monster.lock.yml index e0f988fadb9..52ebf8c0a78 100644 --- a/.github/workflows/issue-monster.lock.yml +++ b/.github/workflows/issue-monster.lock.yml @@ -3619,13 +3619,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7895,13 +7914,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/issue-triage-agent.lock.yml b/.github/workflows/issue-triage-agent.lock.yml index da640e6eddd..3852e03bf74 100644 --- a/.github/workflows/issue-triage-agent.lock.yml +++ b/.github/workflows/issue-triage-agent.lock.yml @@ -2914,13 +2914,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -6624,13 +6643,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/layout-spec-maintainer.lock.yml b/.github/workflows/layout-spec-maintainer.lock.yml index 5356d8fc31b..1073bd9ee30 100644 --- a/.github/workflows/layout-spec-maintainer.lock.yml +++ b/.github/workflows/layout-spec-maintainer.lock.yml @@ -2973,13 +2973,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7403,13 +7422,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/mcp-inspector.lock.yml b/.github/workflows/mcp-inspector.lock.yml index c67cbc54521..5b4ee962b0b 100644 --- a/.github/workflows/mcp-inspector.lock.yml +++ b/.github/workflows/mcp-inspector.lock.yml @@ -3341,13 +3341,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7793,13 +7812,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/mergefest.lock.yml b/.github/workflows/mergefest.lock.yml index 4cd3bef16f5..594e0347b9c 100644 --- a/.github/workflows/mergefest.lock.yml +++ b/.github/workflows/mergefest.lock.yml @@ -3524,13 +3524,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7242,13 +7261,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/notion-issue-summary.lock.yml b/.github/workflows/notion-issue-summary.lock.yml index 422f642f0c3..d41d8901e04 100644 --- a/.github/workflows/notion-issue-summary.lock.yml +++ b/.github/workflows/notion-issue-summary.lock.yml @@ -2416,13 +2416,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -6127,13 +6146,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/org-health-report.lock.yml b/.github/workflows/org-health-report.lock.yml index b342ec84d7f..6fa6fc08cb1 100644 --- a/.github/workflows/org-health-report.lock.yml +++ b/.github/workflows/org-health-report.lock.yml @@ -4212,13 +4212,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -8658,13 +8677,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/pdf-summary.lock.yml b/.github/workflows/pdf-summary.lock.yml index 5f2b874a9fe..528df972d2b 100644 --- a/.github/workflows/pdf-summary.lock.yml +++ b/.github/workflows/pdf-summary.lock.yml @@ -4410,13 +4410,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -8129,13 +8148,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/plan.lock.yml b/.github/workflows/plan.lock.yml index 8e11a326198..475a1028562 100644 --- a/.github/workflows/plan.lock.yml +++ b/.github/workflows/plan.lock.yml @@ -3697,13 +3697,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -8409,13 +8428,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/poem-bot.lock.yml b/.github/workflows/poem-bot.lock.yml index 10f329a12f2..c6cb115cbdc 100644 --- a/.github/workflows/poem-bot.lock.yml +++ b/.github/workflows/poem-bot.lock.yml @@ -5462,13 +5462,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -11966,13 +11985,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/portfolio-analyst.lock.yml b/.github/workflows/portfolio-analyst.lock.yml index 62c7dfd3fc5..ed0a6dfc884 100644 --- a/.github/workflows/portfolio-analyst.lock.yml +++ b/.github/workflows/portfolio-analyst.lock.yml @@ -3577,13 +3577,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -8013,13 +8032,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/pr-nitpick-reviewer.lock.yml b/.github/workflows/pr-nitpick-reviewer.lock.yml index f031864086d..bad231f9025 100644 --- a/.github/workflows/pr-nitpick-reviewer.lock.yml +++ b/.github/workflows/pr-nitpick-reviewer.lock.yml @@ -4693,13 +4693,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -9502,13 +9521,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/python-data-charts.lock.yml b/.github/workflows/python-data-charts.lock.yml index 46830c62606..2e7d0fd369a 100644 --- a/.github/workflows/python-data-charts.lock.yml +++ b/.github/workflows/python-data-charts.lock.yml @@ -4585,13 +4585,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -9030,13 +9049,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/q.lock.yml b/.github/workflows/q.lock.yml index d1b2baeddca..36c35c03cdd 100644 --- a/.github/workflows/q.lock.yml +++ b/.github/workflows/q.lock.yml @@ -4993,13 +4993,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -9483,13 +9502,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/release.lock.yml b/.github/workflows/release.lock.yml index aa26458e6dd..67e2a4fd358 100644 --- a/.github/workflows/release.lock.yml +++ b/.github/workflows/release.lock.yml @@ -2875,13 +2875,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -6583,13 +6602,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/repo-tree-map.lock.yml b/.github/workflows/repo-tree-map.lock.yml index b756d194fdd..08217940937 100644 --- a/.github/workflows/repo-tree-map.lock.yml +++ b/.github/workflows/repo-tree-map.lock.yml @@ -2756,13 +2756,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7187,13 +7206,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/repository-quality-improver.lock.yml b/.github/workflows/repository-quality-improver.lock.yml index 8cb029b6032..fe707b2ff1f 100644 --- a/.github/workflows/repository-quality-improver.lock.yml +++ b/.github/workflows/repository-quality-improver.lock.yml @@ -3793,13 +3793,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -8231,13 +8250,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/research.lock.yml b/.github/workflows/research.lock.yml index 0f2bf9014ed..9923aa6bb88 100644 --- a/.github/workflows/research.lock.yml +++ b/.github/workflows/research.lock.yml @@ -2669,13 +2669,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7100,13 +7119,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/smoke-copilot-no-firewall.lock.yml b/.github/workflows/smoke-copilot-no-firewall.lock.yml index c534a89b9bd..d837d8b9c38 100644 --- a/.github/workflows/smoke-copilot-no-firewall.lock.yml +++ b/.github/workflows/smoke-copilot-no-firewall.lock.yml @@ -5864,13 +5864,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -10218,13 +10237,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/smoke-copilot-playwright.lock.yml b/.github/workflows/smoke-copilot-playwright.lock.yml index 3f7d3acefc4..839e6938d8c 100644 --- a/.github/workflows/smoke-copilot-playwright.lock.yml +++ b/.github/workflows/smoke-copilot-playwright.lock.yml @@ -5844,13 +5844,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -10210,13 +10229,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/smoke-copilot-safe-inputs.lock.yml b/.github/workflows/smoke-copilot-safe-inputs.lock.yml index 7a5378e53ec..d7b4c319919 100644 --- a/.github/workflows/smoke-copilot-safe-inputs.lock.yml +++ b/.github/workflows/smoke-copilot-safe-inputs.lock.yml @@ -5569,13 +5569,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -9915,13 +9934,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/smoke-copilot.lock.yml b/.github/workflows/smoke-copilot.lock.yml index 5c9ec6f899f..42063eaedc2 100644 --- a/.github/workflows/smoke-copilot.lock.yml +++ b/.github/workflows/smoke-copilot.lock.yml @@ -4394,13 +4394,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -8740,13 +8759,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/smoke-srt-custom-config.lock.yml b/.github/workflows/smoke-srt-custom-config.lock.yml index 5ccba7a5013..c849e307152 100644 --- a/.github/workflows/smoke-srt-custom-config.lock.yml +++ b/.github/workflows/smoke-srt-custom-config.lock.yml @@ -1096,13 +1096,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/smoke-srt.lock.yml b/.github/workflows/smoke-srt.lock.yml index 637f5dcb3ce..955d6dd7325 100644 --- a/.github/workflows/smoke-srt.lock.yml +++ b/.github/workflows/smoke-srt.lock.yml @@ -2566,13 +2566,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -5973,13 +5992,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/spec-kit-execute.lock.yml b/.github/workflows/spec-kit-execute.lock.yml index fc6a54f342c..09aec10a5fd 100644 --- a/.github/workflows/spec-kit-execute.lock.yml +++ b/.github/workflows/spec-kit-execute.lock.yml @@ -3284,13 +3284,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7782,13 +7801,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/spec-kit-executor.lock.yml b/.github/workflows/spec-kit-executor.lock.yml index 454cb850a36..f663b7cc71b 100644 --- a/.github/workflows/spec-kit-executor.lock.yml +++ b/.github/workflows/spec-kit-executor.lock.yml @@ -2974,13 +2974,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7472,13 +7491,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/speckit-dispatcher.lock.yml b/.github/workflows/speckit-dispatcher.lock.yml index 1418c032f7d..e2d4731035e 100644 --- a/.github/workflows/speckit-dispatcher.lock.yml +++ b/.github/workflows/speckit-dispatcher.lock.yml @@ -4905,13 +4905,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -9245,13 +9264,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/stale-repo-identifier.lock.yml b/.github/workflows/stale-repo-identifier.lock.yml index de561bf86e1..c4ed5528e1a 100644 --- a/.github/workflows/stale-repo-identifier.lock.yml +++ b/.github/workflows/stale-repo-identifier.lock.yml @@ -4448,13 +4448,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -8803,13 +8822,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/super-linter.lock.yml b/.github/workflows/super-linter.lock.yml index c10de8469af..2ba8f88a516 100644 --- a/.github/workflows/super-linter.lock.yml +++ b/.github/workflows/super-linter.lock.yml @@ -2971,13 +2971,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7316,13 +7335,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/technical-doc-writer.lock.yml b/.github/workflows/technical-doc-writer.lock.yml index 564ebc60785..0996889e6d6 100644 --- a/.github/workflows/technical-doc-writer.lock.yml +++ b/.github/workflows/technical-doc-writer.lock.yml @@ -4197,13 +4197,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -8693,13 +8712,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/test-discussion-expires.lock.yml b/.github/workflows/test-discussion-expires.lock.yml index 2341697ce64..af0b2399dd6 100644 --- a/.github/workflows/test-discussion-expires.lock.yml +++ b/.github/workflows/test-discussion-expires.lock.yml @@ -2355,13 +2355,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -6787,13 +6806,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/test-hide-older-comments.lock.yml b/.github/workflows/test-hide-older-comments.lock.yml index e4dfb00335a..7e2f2f6cdc5 100644 --- a/.github/workflows/test-hide-older-comments.lock.yml +++ b/.github/workflows/test-hide-older-comments.lock.yml @@ -3129,13 +3129,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -6839,13 +6858,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/test-python-safe-input.lock.yml b/.github/workflows/test-python-safe-input.lock.yml index 0eab13cfab9..0fad86b07b6 100644 --- a/.github/workflows/test-python-safe-input.lock.yml +++ b/.github/workflows/test-python-safe-input.lock.yml @@ -3968,13 +3968,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -8313,13 +8332,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/tidy.lock.yml b/.github/workflows/tidy.lock.yml index bed09ccb69b..9f6b16dab97 100644 --- a/.github/workflows/tidy.lock.yml +++ b/.github/workflows/tidy.lock.yml @@ -3097,13 +3097,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7577,13 +7596,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/video-analyzer.lock.yml b/.github/workflows/video-analyzer.lock.yml index 0943734c452..a3d5682fea2 100644 --- a/.github/workflows/video-analyzer.lock.yml +++ b/.github/workflows/video-analyzer.lock.yml @@ -3012,13 +3012,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -7350,13 +7369,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/.github/workflows/weekly-issue-summary.lock.yml b/.github/workflows/weekly-issue-summary.lock.yml index e469f26469f..4d5f036ad6a 100644 --- a/.github/workflows/weekly-issue-summary.lock.yml +++ b/.github/workflows/weekly-issue-summary.lock.yml @@ -3804,13 +3804,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Redact secrets in logs if: always() uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 @@ -8255,13 +8274,32 @@ jobs: XDG_CONFIG_HOME: /home/runner - name: Copy Copilot session-state file if: always() - continue-on-error: true run: | + # Search for session-state file in multiple locations if [ -f /home/runner/.copilot/session-state ]; then - echo "Copying Copilot session-state file" - mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" - cp /home/runner/.copilot/session-state /tmp/gh-aw/sandbox/agent/session-state.json || true + SESSION_STATE_PATH=/home/runner/.copilot/session-state + echo "Found session-state file at: $SESSION_STATE_PATH" + else + # Search in home directory + SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + if [ -z "$SESSION_STATE_PATH" ]; then + # Search in /tmp directory + SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1) + fi + if [ -z "$SESSION_STATE_PATH" ]; then + echo "Error: session-state file not found in expected locations" + echo "Searched locations:" + echo " - /home/runner/.copilot/session-state" + echo " - ~ (home directory)" + echo " - /tmp" + exit 1 + else + echo "Found session-state file at: $SESSION_STATE_PATH" + fi fi + echo "Copying Copilot session-state file" + mkdir -p "$(dirname /tmp/gh-aw/sandbox/agent/session-state.json)" + cp "$SESSION_STATE_PATH" /tmp/gh-aw/sandbox/agent/session-state.json - name: Parse threat detection results id: parse_results uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # v8 diff --git a/pkg/workflow/copilot_engine.go b/pkg/workflow/copilot_engine.go index 5948c54d102..9c949de7a06 100644 --- a/pkg/workflow/copilot_engine.go +++ b/pkg/workflow/copilot_engine.go @@ -596,13 +596,32 @@ func (e *CopilotEngine) generateCopySessionStateStep() GitHubActionStep { stepLines := []string{ " - name: Copy Copilot session-state file", " if: always()", - " continue-on-error: true", " run: |", + " # Search for session-state file in multiple locations", fmt.Sprintf(" if [ -f %s ]; then", shellEscapeArg(sessionStateSource)), - " echo \"Copying Copilot session-state file\"", - fmt.Sprintf(" mkdir -p \"$(dirname %s)\"", shellEscapeArg(sessionStateFile)), - fmt.Sprintf(" cp %s %s || true", shellEscapeArg(sessionStateSource), shellEscapeArg(sessionStateFile)), + fmt.Sprintf(" SESSION_STATE_PATH=%s", shellEscapeArg(sessionStateSource)), + fmt.Sprintf(" echo \"Found session-state file at: $SESSION_STATE_PATH\""), + " else", + " # Search in home directory", + " SESSION_STATE_PATH=$(find ~ -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1)", + " if [ -z \"$SESSION_STATE_PATH\" ]; then", + " # Search in /tmp directory", + " SESSION_STATE_PATH=$(find /tmp -maxdepth 3 -name 'session-state' -type f 2>/dev/null | head -1)", + " fi", + " if [ -z \"$SESSION_STATE_PATH\" ]; then", + " echo \"Error: session-state file not found in expected locations\"", + " echo \"Searched locations:\"", + fmt.Sprintf(" echo \" - %s\"", shellEscapeArg(sessionStateSource)), + " echo \" - ~ (home directory)\"", + " echo \" - /tmp\"", + " exit 1", + " else", + " echo \"Found session-state file at: $SESSION_STATE_PATH\"", + " fi", " fi", + " echo \"Copying Copilot session-state file\"", + fmt.Sprintf(" mkdir -p \"$(dirname %s)\"", shellEscapeArg(sessionStateFile)), + fmt.Sprintf(" cp \"$SESSION_STATE_PATH\" %s", shellEscapeArg(sessionStateFile)), } return GitHubActionStep(stepLines) } From 9d3e72fdf4e4cb28cd66d5415b370294b15af897 Mon Sep 17 00:00:00 2001 From: "github-actions[bot]" Date: Thu, 11 Dec 2025 18:15:40 +0000 Subject: [PATCH 9/9] Add changeset [skip-ci] --- .changeset/patch-include-copilot-session-state.md | 7 +------ 1 file changed, 1 insertion(+), 6 deletions(-) diff --git a/.changeset/patch-include-copilot-session-state.md b/.changeset/patch-include-copilot-session-state.md index 126f1d15330..3c3e44d1ce5 100644 --- a/.changeset/patch-include-copilot-session-state.md +++ b/.changeset/patch-include-copilot-session-state.md @@ -2,10 +2,5 @@ "gh-aw": patch --- -Include Copilot session-state file in agent output artifacts - -The Copilot CLI session-state file at `~/.copilot/session-state` is now copied -to `/tmp/gh-aw/sandbox/agent/session-state.json` and included in the -`agent_outputs` artifact. This improves debugging and allows inspection of -Copilot session state alongside agent logs. +Include Copilot session-state file in agent output artifacts. The Copilot CLI session-state at `~/.copilot/session-state` is copied to `/tmp/gh-aw/sandbox/agent/session-state.json` and uploaded as part of the `agent_outputs` artifact to improve debugging and state inspection.