diff --git a/.github/workflows/ace-editor.lock.yml b/.github/workflows/ace-editor.lock.yml index 5ac9b68bc45..533497fe090 100644 --- a/.github/workflows/ace-editor.lock.yml +++ b/.github/workflows/ace-editor.lock.yml @@ -275,6 +275,10 @@ jobs: env: GH_AW_WORKFLOW_ID_SANITIZED: aceeditor outputs: + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} steps: @@ -423,6 +427,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} diff --git a/.github/workflows/agent-performance-analyzer.lock.yml b/.github/workflows/agent-performance-analyzer.lock.yml index 2a819181f40..b7b857b985e 100644 --- a/.github/workflows/agent-performance-analyzer.lock.yml +++ b/.github/workflows/agent-performance-analyzer.lock.yml @@ -276,6 +276,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -940,6 +944,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1285,6 +1294,10 @@ jobs: GH_AW_WORKFLOW_ID: "agent-performance-analyzer" GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CREATE_DISCUSSION_ERRORS: ${{ needs.safe_outputs.outputs.create_discussion_errors }} GH_AW_CREATE_DISCUSSION_ERROR_COUNT: ${{ needs.safe_outputs.outputs.create_discussion_error_count }} GH_AW_PUSH_REPO_MEMORY_RESULT: ${{ needs.push_repo_memory.result }} diff --git a/.github/workflows/agent-persona-explorer.lock.yml b/.github/workflows/agent-persona-explorer.lock.yml index bc4873d17df..29bb40f7a11 100644 --- a/.github/workflows/agent-persona-explorer.lock.yml +++ b/.github/workflows/agent-persona-explorer.lock.yml @@ -274,6 +274,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -793,6 +797,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1144,6 +1153,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CREATE_DISCUSSION_ERRORS: ${{ needs.safe_outputs.outputs.create_discussion_errors }} GH_AW_CREATE_DISCUSSION_ERROR_COUNT: ${{ needs.safe_outputs.outputs.create_discussion_error_count }} GH_AW_GROUP_REPORTS: "false" diff --git a/.github/workflows/archie.lock.yml b/.github/workflows/archie.lock.yml index ee2494c770f..795c31f8fa7 100644 --- a/.github/workflows/archie.lock.yml +++ b/.github/workflows/archie.lock.yml @@ -323,6 +323,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -761,6 +765,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1097,6 +1106,10 @@ jobs: GH_AW_WORKFLOW_ID: "archie" GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_SAFE_OUTPUT_MESSAGES: "{\"footer\":\"\\u003e 📊 *Diagram rendered by [{workflow_name}]({run_url})*{history_link}\",\"footerWorkflowRecompile\":\"\\u003e 🔧 *Workflow sync report by [{workflow_name}]({run_url}) for {repository}*\",\"footerWorkflowRecompileComment\":\"\\u003e 🔄 *Update from [{workflow_name}]({run_url}) for {repository}*\",\"runStarted\":\"📐 [{workflow_name}]({run_url}) is analyzing the architecture for this {event_type}...\",\"runSuccess\":\"🎨 [{workflow_name}]({run_url}) has completed the architecture visualization. ✅\",\"runFailure\":\"📐 [{workflow_name}]({run_url}) encountered an issue and could not complete the architecture diagram. Check the [run logs]({run_url}) for details.\"}" GH_AW_GROUP_REPORTS: "false" GH_AW_FAILURE_REPORT_AS_ISSUE: "true" diff --git a/.github/workflows/artifacts-summary.lock.yml b/.github/workflows/artifacts-summary.lock.yml index 04cd2f57ca3..4dd8e9b107b 100644 --- a/.github/workflows/artifacts-summary.lock.yml +++ b/.github/workflows/artifacts-summary.lock.yml @@ -260,6 +260,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -695,6 +699,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1029,6 +1038,10 @@ jobs: GH_AW_WORKFLOW_ID: "artifacts-summary" GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CREATE_DISCUSSION_ERRORS: ${{ needs.safe_outputs.outputs.create_discussion_errors }} GH_AW_CREATE_DISCUSSION_ERROR_COUNT: ${{ needs.safe_outputs.outputs.create_discussion_error_count }} GH_AW_GROUP_REPORTS: "false" diff --git a/.github/workflows/auto-triage-issues.lock.yml b/.github/workflows/auto-triage-issues.lock.yml index 658b29535b4..c3d80d18304 100644 --- a/.github/workflows/auto-triage-issues.lock.yml +++ b/.github/workflows/auto-triage-issues.lock.yml @@ -273,6 +273,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -772,6 +776,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1107,6 +1116,10 @@ jobs: GH_AW_WORKFLOW_ID: "auto-triage-issues" GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CREATE_DISCUSSION_ERRORS: ${{ needs.safe_outputs.outputs.create_discussion_errors }} GH_AW_CREATE_DISCUSSION_ERROR_COUNT: ${{ needs.safe_outputs.outputs.create_discussion_error_count }} GH_AW_GROUP_REPORTS: "false" diff --git a/.github/workflows/bot-detection.lock.yml b/.github/workflows/bot-detection.lock.yml index 21d8d62c10c..aabb09b63ad 100644 --- a/.github/workflows/bot-detection.lock.yml +++ b/.github/workflows/bot-detection.lock.yml @@ -274,6 +274,10 @@ jobs: GH_AW_WORKFLOW_ID_SANITIZED: botdetection outputs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -864,6 +868,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1074,6 +1083,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_GROUP_REPORTS: "false" GH_AW_FAILURE_REPORT_AS_ISSUE: "true" GH_AW_TIMEOUT_MINUTES: "10" diff --git a/.github/workflows/brave.lock.yml b/.github/workflows/brave.lock.yml index e7daf9d15c2..27d4a8f4d4d 100644 --- a/.github/workflows/brave.lock.yml +++ b/.github/workflows/brave.lock.yml @@ -307,6 +307,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -748,6 +752,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1085,6 +1094,10 @@ jobs: GH_AW_WORKFLOW_ID: "brave" GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_SAFE_OUTPUT_MESSAGES: "{\"footer\":\"\\u003e 🦁 *Search results brought to you by [{workflow_name}]({run_url})*{history_link}\",\"footerWorkflowRecompile\":\"\\u003e 🔄 *Maintenance report by [{workflow_name}]({run_url}) for {repository}*\",\"runStarted\":\"🔍 Brave Search activated! [{workflow_name}]({run_url}) is venturing into the web on this {event_type}...\",\"runSuccess\":\"🦁 Mission accomplished! [{workflow_name}]({run_url}) has returned with the findings. Knowledge acquired! 🏆\",\"runFailure\":\"🔍 Search interrupted! [{workflow_name}]({run_url}) {status}. The web remains unexplored...\"}" GH_AW_GROUP_REPORTS: "false" GH_AW_FAILURE_REPORT_AS_ISSUE: "true" diff --git a/.github/workflows/breaking-change-checker.lock.yml b/.github/workflows/breaking-change-checker.lock.yml index eecc25407d7..a242cc7993d 100644 --- a/.github/workflows/breaking-change-checker.lock.yml +++ b/.github/workflows/breaking-change-checker.lock.yml @@ -266,6 +266,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -743,6 +747,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1079,6 +1088,10 @@ jobs: GH_AW_WORKFLOW_ID: "breaking-change-checker" GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_SAFE_OUTPUT_MESSAGES: "{\"footer\":\"\\u003e ⚠️ *Compatibility report by [{workflow_name}]({run_url})*{history_link}\",\"footerWorkflowRecompile\":\"\\u003e 🛠️ *Workflow maintenance by [{workflow_name}]({run_url}) for {repository}*\",\"runStarted\":\"🔬 Breaking Change Checker online! [{workflow_name}]({run_url}) is analyzing API compatibility on this {event_type}...\",\"runSuccess\":\"✅ Analysis complete! [{workflow_name}]({run_url}) has reviewed all changes. Compatibility verdict delivered! 📋\",\"runFailure\":\"🔬 Analysis interrupted! [{workflow_name}]({run_url}) {status}. Compatibility status unknown...\"}" GH_AW_GROUP_REPORTS: "false" GH_AW_FAILURE_REPORT_AS_ISSUE: "true" diff --git a/.github/workflows/chroma-issue-indexer.lock.yml b/.github/workflows/chroma-issue-indexer.lock.yml index 01538694b3b..2f183f4c394 100644 --- a/.github/workflows/chroma-issue-indexer.lock.yml +++ b/.github/workflows/chroma-issue-indexer.lock.yml @@ -250,6 +250,10 @@ jobs: GH_AW_WORKFLOW_ID_SANITIZED: chromaissueindexer outputs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} steps: @@ -447,6 +451,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} diff --git a/.github/workflows/ci-coach.lock.yml b/.github/workflows/ci-coach.lock.yml index 54840ba8277..7ae68ead72e 100644 --- a/.github/workflows/ci-coach.lock.yml +++ b/.github/workflows/ci-coach.lock.yml @@ -283,6 +283,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -792,6 +796,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1137,6 +1146,10 @@ jobs: GH_AW_WORKFLOW_ID: "ci-coach" GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CODE_PUSH_FAILURE_ERRORS: ${{ needs.safe_outputs.outputs.code_push_failure_errors }} GH_AW_CODE_PUSH_FAILURE_COUNT: ${{ needs.safe_outputs.outputs.code_push_failure_count }} GH_AW_GROUP_REPORTS: "false" diff --git a/.github/workflows/ci-doctor.lock.yml b/.github/workflows/ci-doctor.lock.yml index c4b5978128a..2fba4ef5eba 100644 --- a/.github/workflows/ci-doctor.lock.yml +++ b/.github/workflows/ci-doctor.lock.yml @@ -303,6 +303,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -965,6 +969,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1323,6 +1332,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_SAFE_OUTPUT_MESSAGES: "{\"footer\":\"\\u003e 🩺 *Diagnosis provided by [{workflow_name}]({run_url})*{history_link}\",\"runStarted\":\"🏥 CI Doctor reporting for duty! [{workflow_name}]({run_url}) is examining the patient on this {event_type}...\",\"runSuccess\":\"🩺 Examination complete! [{workflow_name}]({run_url}) has delivered the diagnosis. Prescription issued! 💊\",\"runFailure\":\"🏥 Medical emergency! [{workflow_name}]({run_url}) {status}. Doctor needs assistance...\"}" GH_AW_GROUP_REPORTS: "false" GH_AW_FAILURE_REPORT_AS_ISSUE: "true" diff --git a/.github/workflows/cli-consistency-checker.lock.yml b/.github/workflows/cli-consistency-checker.lock.yml index 0e42842c6fc..cbec55c2965 100644 --- a/.github/workflows/cli-consistency-checker.lock.yml +++ b/.github/workflows/cli-consistency-checker.lock.yml @@ -251,6 +251,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -708,6 +712,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1041,6 +1050,10 @@ jobs: GH_AW_WORKFLOW_ID: "cli-consistency-checker" GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_GROUP_REPORTS: "false" GH_AW_FAILURE_REPORT_AS_ISSUE: "true" GH_AW_TIMEOUT_MINUTES: "20" diff --git a/.github/workflows/code-scanning-fixer.lock.yml b/.github/workflows/code-scanning-fixer.lock.yml index cd1c67d1cfd..de2793aab88 100644 --- a/.github/workflows/code-scanning-fixer.lock.yml +++ b/.github/workflows/code-scanning-fixer.lock.yml @@ -271,6 +271,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -815,6 +819,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1167,6 +1176,10 @@ jobs: GH_AW_WORKFLOW_ID: "code-scanning-fixer" GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CODE_PUSH_FAILURE_ERRORS: ${{ needs.safe_outputs.outputs.code_push_failure_errors }} GH_AW_CODE_PUSH_FAILURE_COUNT: ${{ needs.safe_outputs.outputs.code_push_failure_count }} GH_AW_PUSH_REPO_MEMORY_RESULT: ${{ needs.push_repo_memory.result }} diff --git a/.github/workflows/code-simplifier.lock.yml b/.github/workflows/code-simplifier.lock.yml index 5233658201e..71b24c1f5fd 100644 --- a/.github/workflows/code-simplifier.lock.yml +++ b/.github/workflows/code-simplifier.lock.yml @@ -275,6 +275,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -742,6 +746,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1090,6 +1099,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CODE_PUSH_FAILURE_ERRORS: ${{ needs.safe_outputs.outputs.code_push_failure_errors }} GH_AW_CODE_PUSH_FAILURE_COUNT: ${{ needs.safe_outputs.outputs.code_push_failure_count }} GH_AW_GROUP_REPORTS: "false" diff --git a/.github/workflows/constraint-solving-potd.lock.yml b/.github/workflows/constraint-solving-potd.lock.yml index edc29f33d1b..7eb49c56154 100644 --- a/.github/workflows/constraint-solving-potd.lock.yml +++ b/.github/workflows/constraint-solving-potd.lock.yml @@ -258,6 +258,10 @@ jobs: outputs: detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -696,6 +700,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1047,6 +1056,10 @@ jobs: GH_AW_WORKFLOW_ID: "constraint-solving-potd" GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CREATE_DISCUSSION_ERRORS: ${{ needs.safe_outputs.outputs.create_discussion_errors }} GH_AW_CREATE_DISCUSSION_ERROR_COUNT: ${{ needs.safe_outputs.outputs.create_discussion_error_count }} GH_AW_GROUP_REPORTS: "false" diff --git a/.github/workflows/contribution-check.lock.yml b/.github/workflows/contribution-check.lock.yml index 472c28f9a24..dafe21c4a3b 100644 --- a/.github/workflows/contribution-check.lock.yml +++ b/.github/workflows/contribution-check.lock.yml @@ -261,6 +261,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -816,6 +820,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1161,6 +1170,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_GROUP_REPORTS: "false" GH_AW_FAILURE_REPORT_AS_ISSUE: "true" GH_AW_TIMEOUT_MINUTES: "20" diff --git a/.github/workflows/copilot-cli-deep-research.lock.yml b/.github/workflows/copilot-cli-deep-research.lock.yml index 7c3f6ed23ae..cee8032e55c 100644 --- a/.github/workflows/copilot-cli-deep-research.lock.yml +++ b/.github/workflows/copilot-cli-deep-research.lock.yml @@ -275,6 +275,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -757,6 +761,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1101,6 +1110,10 @@ jobs: GH_AW_WORKFLOW_ID: "copilot-cli-deep-research" GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CREATE_DISCUSSION_ERRORS: ${{ needs.safe_outputs.outputs.create_discussion_errors }} GH_AW_CREATE_DISCUSSION_ERROR_COUNT: ${{ needs.safe_outputs.outputs.create_discussion_error_count }} GH_AW_PUSH_REPO_MEMORY_RESULT: ${{ needs.push_repo_memory.result }} diff --git a/.github/workflows/copilot-pr-merged-report.lock.yml b/.github/workflows/copilot-pr-merged-report.lock.yml index 2b5e4b820fc..84518e4e558 100644 --- a/.github/workflows/copilot-pr-merged-report.lock.yml +++ b/.github/workflows/copilot-pr-merged-report.lock.yml @@ -281,6 +281,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -848,6 +852,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1199,6 +1208,10 @@ jobs: GH_AW_WORKFLOW_ID: "copilot-pr-merged-report" GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CREATE_DISCUSSION_ERRORS: ${{ needs.safe_outputs.outputs.create_discussion_errors }} GH_AW_CREATE_DISCUSSION_ERROR_COUNT: ${{ needs.safe_outputs.outputs.create_discussion_error_count }} GH_AW_GROUP_REPORTS: "false" diff --git a/.github/workflows/copilot-pr-nlp-analysis.lock.yml b/.github/workflows/copilot-pr-nlp-analysis.lock.yml index 4a932f8df26..6bafa3156ca 100644 --- a/.github/workflows/copilot-pr-nlp-analysis.lock.yml +++ b/.github/workflows/copilot-pr-nlp-analysis.lock.yml @@ -297,6 +297,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -844,6 +848,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1205,6 +1214,10 @@ jobs: GH_AW_WORKFLOW_ID: "copilot-pr-nlp-analysis" GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CREATE_DISCUSSION_ERRORS: ${{ needs.safe_outputs.outputs.create_discussion_errors }} GH_AW_CREATE_DISCUSSION_ERROR_COUNT: ${{ needs.safe_outputs.outputs.create_discussion_error_count }} GH_AW_PUSH_REPO_MEMORY_RESULT: ${{ needs.push_repo_memory.result }} diff --git a/.github/workflows/copilot-pr-prompt-analysis.lock.yml b/.github/workflows/copilot-pr-prompt-analysis.lock.yml index 5d9e098c9f8..e5bfb490136 100644 --- a/.github/workflows/copilot-pr-prompt-analysis.lock.yml +++ b/.github/workflows/copilot-pr-prompt-analysis.lock.yml @@ -292,6 +292,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -770,6 +774,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1121,6 +1130,10 @@ jobs: GH_AW_WORKFLOW_ID: "copilot-pr-prompt-analysis" GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CREATE_DISCUSSION_ERRORS: ${{ needs.safe_outputs.outputs.create_discussion_errors }} GH_AW_CREATE_DISCUSSION_ERROR_COUNT: ${{ needs.safe_outputs.outputs.create_discussion_error_count }} GH_AW_PUSH_REPO_MEMORY_RESULT: ${{ needs.push_repo_memory.result }} diff --git a/.github/workflows/craft.lock.yml b/.github/workflows/craft.lock.yml index 396983624e4..71a3c27a707 100644 --- a/.github/workflows/craft.lock.yml +++ b/.github/workflows/craft.lock.yml @@ -300,6 +300,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -791,6 +795,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1128,6 +1137,10 @@ jobs: GH_AW_WORKFLOW_ID: "craft" GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CODE_PUSH_FAILURE_ERRORS: ${{ needs.safe_outputs.outputs.code_push_failure_errors }} GH_AW_CODE_PUSH_FAILURE_COUNT: ${{ needs.safe_outputs.outputs.code_push_failure_count }} GH_AW_SAFE_OUTPUT_MESSAGES: "{\"footer\":\"\\u003e ⚒️ *Crafted with care by [{workflow_name}]({run_url})*{history_link}\",\"runStarted\":\"🛠️ Master Crafter at work! [{workflow_name}]({run_url}) is forging a new workflow on this {event_type}...\",\"runSuccess\":\"⚒️ Masterpiece complete! [{workflow_name}]({run_url}) has crafted your workflow. May it serve you well! 🎖️\",\"runFailure\":\"🛠️ Forge cooling down! [{workflow_name}]({run_url}) {status}. The anvil awaits another attempt...\"}" diff --git a/.github/workflows/daily-architecture-diagram.lock.yml b/.github/workflows/daily-architecture-diagram.lock.yml index 2d75ca37d4d..7d2b45419ba 100644 --- a/.github/workflows/daily-architecture-diagram.lock.yml +++ b/.github/workflows/daily-architecture-diagram.lock.yml @@ -266,6 +266,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -818,6 +822,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1160,6 +1169,10 @@ jobs: GH_AW_WORKFLOW_ID: "daily-architecture-diagram" GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CODE_PUSH_FAILURE_ERRORS: ${{ needs.safe_outputs.outputs.code_push_failure_errors }} GH_AW_CODE_PUSH_FAILURE_COUNT: ${{ needs.safe_outputs.outputs.code_push_failure_count }} GH_AW_GROUP_REPORTS: "false" diff --git a/.github/workflows/daily-assign-issue-to-user.lock.yml b/.github/workflows/daily-assign-issue-to-user.lock.yml index 579f919fd46..a8ab2bd4be9 100644 --- a/.github/workflows/daily-assign-issue-to-user.lock.yml +++ b/.github/workflows/daily-assign-issue-to-user.lock.yml @@ -248,6 +248,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -739,6 +743,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1074,6 +1083,10 @@ jobs: GH_AW_WORKFLOW_ID: "daily-assign-issue-to-user" GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_GROUP_REPORTS: "false" GH_AW_FAILURE_REPORT_AS_ISSUE: "true" GH_AW_TIMEOUT_MINUTES: "10" diff --git a/.github/workflows/daily-cli-performance.lock.yml b/.github/workflows/daily-cli-performance.lock.yml index 8bcd7ee6e18..f4c707f88f1 100644 --- a/.github/workflows/daily-cli-performance.lock.yml +++ b/.github/workflows/daily-cli-performance.lock.yml @@ -280,6 +280,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -951,6 +955,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1309,6 +1318,10 @@ jobs: GH_AW_WORKFLOW_ID: "daily-cli-performance" GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_PUSH_REPO_MEMORY_RESULT: ${{ needs.push_repo_memory.result }} GH_AW_REPO_MEMORY_VALIDATION_FAILED_default: ${{ needs.push_repo_memory.outputs.validation_failed_default }} GH_AW_REPO_MEMORY_VALIDATION_ERROR_default: ${{ needs.push_repo_memory.outputs.validation_error_default }} diff --git a/.github/workflows/daily-cli-tools-tester.lock.yml b/.github/workflows/daily-cli-tools-tester.lock.yml index 37cd4bafadd..c34821c0883 100644 --- a/.github/workflows/daily-cli-tools-tester.lock.yml +++ b/.github/workflows/daily-cli-tools-tester.lock.yml @@ -264,6 +264,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -795,6 +799,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1138,6 +1147,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_GROUP_REPORTS: "false" GH_AW_FAILURE_REPORT_AS_ISSUE: "true" GH_AW_TIMEOUT_MINUTES: "60" diff --git a/.github/workflows/daily-compiler-quality.lock.yml b/.github/workflows/daily-compiler-quality.lock.yml index 0ea68e1933f..13ad3e84b4b 100644 --- a/.github/workflows/daily-compiler-quality.lock.yml +++ b/.github/workflows/daily-compiler-quality.lock.yml @@ -269,6 +269,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -743,6 +747,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1087,6 +1096,10 @@ jobs: GH_AW_WORKFLOW_ID: "daily-compiler-quality" GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CREATE_DISCUSSION_ERRORS: ${{ needs.safe_outputs.outputs.create_discussion_errors }} GH_AW_CREATE_DISCUSSION_ERROR_COUNT: ${{ needs.safe_outputs.outputs.create_discussion_error_count }} GH_AW_GROUP_REPORTS: "false" diff --git a/.github/workflows/daily-copilot-token-report.lock.yml b/.github/workflows/daily-copilot-token-report.lock.yml index 06a5928d87b..2c7497c9351 100644 --- a/.github/workflows/daily-copilot-token-report.lock.yml +++ b/.github/workflows/daily-copilot-token-report.lock.yml @@ -285,6 +285,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -852,6 +856,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1216,6 +1225,10 @@ jobs: GH_AW_WORKFLOW_ID: "daily-copilot-token-report" GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CREATE_DISCUSSION_ERRORS: ${{ needs.safe_outputs.outputs.create_discussion_errors }} GH_AW_CREATE_DISCUSSION_ERROR_COUNT: ${{ needs.safe_outputs.outputs.create_discussion_error_count }} GH_AW_PUSH_REPO_MEMORY_RESULT: ${{ needs.push_repo_memory.result }} diff --git a/.github/workflows/daily-file-diet.lock.yml b/.github/workflows/daily-file-diet.lock.yml index cf66e4345fd..755a4ffdd6a 100644 --- a/.github/workflows/daily-file-diet.lock.yml +++ b/.github/workflows/daily-file-diet.lock.yml @@ -274,6 +274,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -761,6 +765,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1097,6 +1106,10 @@ jobs: GH_AW_WORKFLOW_ID: "daily-file-diet" GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_GROUP_REPORTS: "false" GH_AW_FAILURE_REPORT_AS_ISSUE: "true" GH_AW_TIMEOUT_MINUTES: "20" diff --git a/.github/workflows/daily-firewall-report.lock.yml b/.github/workflows/daily-firewall-report.lock.yml index 7036253a5f4..87452d1db8d 100644 --- a/.github/workflows/daily-firewall-report.lock.yml +++ b/.github/workflows/daily-firewall-report.lock.yml @@ -277,6 +277,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -859,6 +863,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1223,6 +1232,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CREATE_DISCUSSION_ERRORS: ${{ needs.safe_outputs.outputs.create_discussion_errors }} GH_AW_CREATE_DISCUSSION_ERROR_COUNT: ${{ needs.safe_outputs.outputs.create_discussion_error_count }} GH_AW_GROUP_REPORTS: "false" diff --git a/.github/workflows/daily-malicious-code-scan.lock.yml b/.github/workflows/daily-malicious-code-scan.lock.yml index 415b5fa9354..12201659b85 100644 --- a/.github/workflows/daily-malicious-code-scan.lock.yml +++ b/.github/workflows/daily-malicious-code-scan.lock.yml @@ -255,6 +255,10 @@ jobs: GH_AW_WORKFLOW_ID_SANITIZED: dailymaliciouscodescan outputs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -731,6 +735,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -942,6 +951,10 @@ jobs: GH_AW_WORKFLOW_ID: "daily-malicious-code-scan" GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_GROUP_REPORTS: "false" GH_AW_FAILURE_REPORT_AS_ISSUE: "true" GH_AW_TIMEOUT_MINUTES: "15" diff --git a/.github/workflows/daily-mcp-concurrency-analysis.lock.yml b/.github/workflows/daily-mcp-concurrency-analysis.lock.yml index b191750a898..2f67357e3cb 100644 --- a/.github/workflows/daily-mcp-concurrency-analysis.lock.yml +++ b/.github/workflows/daily-mcp-concurrency-analysis.lock.yml @@ -268,6 +268,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -805,6 +809,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1148,6 +1157,10 @@ jobs: GH_AW_WORKFLOW_ID: "daily-mcp-concurrency-analysis" GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_GROUP_REPORTS: "false" GH_AW_FAILURE_REPORT_AS_ISSUE: "true" GH_AW_TIMEOUT_MINUTES: "45" diff --git a/.github/workflows/daily-news.lock.yml b/.github/workflows/daily-news.lock.yml index 330d238cf7f..b9ec203ef58 100644 --- a/.github/workflows/daily-news.lock.yml +++ b/.github/workflows/daily-news.lock.yml @@ -296,6 +296,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -912,6 +916,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1277,6 +1286,10 @@ jobs: GH_AW_WORKFLOW_ID: "daily-news" GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CREATE_DISCUSSION_ERRORS: ${{ needs.safe_outputs.outputs.create_discussion_errors }} GH_AW_CREATE_DISCUSSION_ERROR_COUNT: ${{ needs.safe_outputs.outputs.create_discussion_error_count }} GH_AW_PUSH_REPO_MEMORY_RESULT: ${{ needs.push_repo_memory.result }} diff --git a/.github/workflows/daily-performance-summary.lock.yml b/.github/workflows/daily-performance-summary.lock.yml index fcd634a5b39..aa6cf058093 100644 --- a/.github/workflows/daily-performance-summary.lock.yml +++ b/.github/workflows/daily-performance-summary.lock.yml @@ -282,6 +282,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -1333,6 +1337,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1707,6 +1716,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CREATE_DISCUSSION_ERRORS: ${{ needs.safe_outputs.outputs.create_discussion_errors }} GH_AW_CREATE_DISCUSSION_ERROR_COUNT: ${{ needs.safe_outputs.outputs.create_discussion_error_count }} GH_AW_GROUP_REPORTS: "false" diff --git a/.github/workflows/daily-regulatory.lock.yml b/.github/workflows/daily-regulatory.lock.yml index e019bd85954..553963d1b68 100644 --- a/.github/workflows/daily-regulatory.lock.yml +++ b/.github/workflows/daily-regulatory.lock.yml @@ -269,6 +269,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -1247,6 +1251,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1604,6 +1613,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CREATE_DISCUSSION_ERRORS: ${{ needs.safe_outputs.outputs.create_discussion_errors }} GH_AW_CREATE_DISCUSSION_ERROR_COUNT: ${{ needs.safe_outputs.outputs.create_discussion_error_count }} GH_AW_GROUP_REPORTS: "false" diff --git a/.github/workflows/daily-repo-chronicle.lock.yml b/.github/workflows/daily-repo-chronicle.lock.yml index 63e596d431a..4d641e6dbbc 100644 --- a/.github/workflows/daily-repo-chronicle.lock.yml +++ b/.github/workflows/daily-repo-chronicle.lock.yml @@ -274,6 +274,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -782,6 +786,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1136,6 +1145,10 @@ jobs: GH_AW_WORKFLOW_ID: "daily-repo-chronicle" GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CREATE_DISCUSSION_ERRORS: ${{ needs.safe_outputs.outputs.create_discussion_errors }} GH_AW_CREATE_DISCUSSION_ERROR_COUNT: ${{ needs.safe_outputs.outputs.create_discussion_error_count }} GH_AW_GROUP_REPORTS: "false" diff --git a/.github/workflows/daily-secrets-analysis.lock.yml b/.github/workflows/daily-secrets-analysis.lock.yml index f669f909879..234430011c2 100644 --- a/.github/workflows/daily-secrets-analysis.lock.yml +++ b/.github/workflows/daily-secrets-analysis.lock.yml @@ -259,6 +259,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -763,6 +767,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1100,6 +1109,10 @@ jobs: GH_AW_WORKFLOW_ID: "daily-secrets-analysis" GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CREATE_DISCUSSION_ERRORS: ${{ needs.safe_outputs.outputs.create_discussion_errors }} GH_AW_CREATE_DISCUSSION_ERROR_COUNT: ${{ needs.safe_outputs.outputs.create_discussion_error_count }} GH_AW_GROUP_REPORTS: "false" diff --git a/.github/workflows/daily-semgrep-scan.lock.yml b/.github/workflows/daily-semgrep-scan.lock.yml index 97c4798ef1f..a5220289c93 100644 --- a/.github/workflows/daily-semgrep-scan.lock.yml +++ b/.github/workflows/daily-semgrep-scan.lock.yml @@ -262,6 +262,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -758,6 +762,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1101,6 +1110,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_GROUP_REPORTS: "false" GH_AW_FAILURE_REPORT_AS_ISSUE: "true" GH_AW_TIMEOUT_MINUTES: "20" diff --git a/.github/workflows/daily-syntax-error-quality.lock.yml b/.github/workflows/daily-syntax-error-quality.lock.yml index fd9f219436c..61a38d9014b 100644 --- a/.github/workflows/daily-syntax-error-quality.lock.yml +++ b/.github/workflows/daily-syntax-error-quality.lock.yml @@ -258,6 +258,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -737,6 +741,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1073,6 +1082,10 @@ jobs: GH_AW_WORKFLOW_ID: "daily-syntax-error-quality" GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_GROUP_REPORTS: "false" GH_AW_FAILURE_REPORT_AS_ISSUE: "true" GH_AW_TIMEOUT_MINUTES: "20" diff --git a/.github/workflows/daily-team-status.lock.yml b/.github/workflows/daily-team-status.lock.yml index b99cda0f228..952587e062d 100644 --- a/.github/workflows/daily-team-status.lock.yml +++ b/.github/workflows/daily-team-status.lock.yml @@ -272,6 +272,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -736,6 +740,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1088,6 +1097,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_GROUP_REPORTS: "false" GH_AW_FAILURE_REPORT_AS_ISSUE: "true" GH_AW_TIMEOUT_MINUTES: "10" diff --git a/.github/workflows/daily-testify-uber-super-expert.lock.yml b/.github/workflows/daily-testify-uber-super-expert.lock.yml index 76908d28e5d..d4549586a9d 100644 --- a/.github/workflows/daily-testify-uber-super-expert.lock.yml +++ b/.github/workflows/daily-testify-uber-super-expert.lock.yml @@ -289,6 +289,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -800,6 +804,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1146,6 +1155,10 @@ jobs: GH_AW_WORKFLOW_ID: "daily-testify-uber-super-expert" GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_PUSH_REPO_MEMORY_RESULT: ${{ needs.push_repo_memory.result }} GH_AW_REPO_MEMORY_VALIDATION_FAILED_default: ${{ needs.push_repo_memory.outputs.validation_failed_default }} GH_AW_REPO_MEMORY_VALIDATION_ERROR_default: ${{ needs.push_repo_memory.outputs.validation_error_default }} diff --git a/.github/workflows/daily-workflow-updater.lock.yml b/.github/workflows/daily-workflow-updater.lock.yml index cc4f69298fd..788d8b2cfd8 100644 --- a/.github/workflows/daily-workflow-updater.lock.yml +++ b/.github/workflows/daily-workflow-updater.lock.yml @@ -252,6 +252,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -712,6 +716,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1050,6 +1059,10 @@ jobs: GH_AW_WORKFLOW_ID: "daily-workflow-updater" GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CODE_PUSH_FAILURE_ERRORS: ${{ needs.safe_outputs.outputs.code_push_failure_errors }} GH_AW_CODE_PUSH_FAILURE_COUNT: ${{ needs.safe_outputs.outputs.code_push_failure_count }} GH_AW_GROUP_REPORTS: "false" diff --git a/.github/workflows/dead-code-remover.lock.yml b/.github/workflows/dead-code-remover.lock.yml index e286dfc042e..f16fa6f4b5b 100644 --- a/.github/workflows/dead-code-remover.lock.yml +++ b/.github/workflows/dead-code-remover.lock.yml @@ -277,6 +277,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -758,6 +762,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1100,6 +1109,10 @@ jobs: GH_AW_WORKFLOW_ID: "dead-code-remover" GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CODE_PUSH_FAILURE_ERRORS: ${{ needs.safe_outputs.outputs.code_push_failure_errors }} GH_AW_CODE_PUSH_FAILURE_COUNT: ${{ needs.safe_outputs.outputs.code_push_failure_count }} GH_AW_GROUP_REPORTS: "false" diff --git a/.github/workflows/delight.lock.yml b/.github/workflows/delight.lock.yml index f536314e9f4..42e05c37269 100644 --- a/.github/workflows/delight.lock.yml +++ b/.github/workflows/delight.lock.yml @@ -277,6 +277,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -845,6 +849,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1192,6 +1201,10 @@ jobs: GH_AW_WORKFLOW_ID: "delight" GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CREATE_DISCUSSION_ERRORS: ${{ needs.safe_outputs.outputs.create_discussion_errors }} GH_AW_CREATE_DISCUSSION_ERROR_COUNT: ${{ needs.safe_outputs.outputs.create_discussion_error_count }} GH_AW_SAFE_OUTPUT_MESSAGES: "{\"footer\":\"\\u003e 📊 *User experience analysis by [{workflow_name}]({run_url})*{history_link}\",\"runStarted\":\"📊 Delight Agent starting! [{workflow_name}]({run_url}) is analyzing user-facing aspects for improvement opportunities...\",\"runSuccess\":\"✅ Analysis complete! [{workflow_name}]({run_url}) has identified targeted improvements for user experience.\",\"runFailure\":\"⚠️ Analysis interrupted! [{workflow_name}]({run_url}) {status}. Please review the logs...\"}" diff --git a/.github/workflows/dependabot-burner.lock.yml b/.github/workflows/dependabot-burner.lock.yml index 686567cdee8..d4d1f9789b5 100644 --- a/.github/workflows/dependabot-burner.lock.yml +++ b/.github/workflows/dependabot-burner.lock.yml @@ -264,6 +264,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -728,6 +732,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1071,6 +1080,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_GROUP_REPORTS: "false" GH_AW_FAILURE_REPORT_AS_ISSUE: "true" GH_AW_TIMEOUT_MINUTES: "20" diff --git a/.github/workflows/dependabot-go-checker.lock.yml b/.github/workflows/dependabot-go-checker.lock.yml index a8119bc3b4f..0020edb4b56 100644 --- a/.github/workflows/dependabot-go-checker.lock.yml +++ b/.github/workflows/dependabot-go-checker.lock.yml @@ -263,6 +263,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -777,6 +781,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1120,6 +1129,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_GROUP_REPORTS: "false" GH_AW_FAILURE_REPORT_AS_ISSUE: "true" GH_AW_TIMEOUT_MINUTES: "20" diff --git a/.github/workflows/dev-hawk.lock.yml b/.github/workflows/dev-hawk.lock.yml index 527ea46e769..de301cfecad 100644 --- a/.github/workflows/dev-hawk.lock.yml +++ b/.github/workflows/dev-hawk.lock.yml @@ -286,6 +286,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -799,6 +803,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1134,6 +1143,10 @@ jobs: GH_AW_WORKFLOW_ID: "dev-hawk" GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_SAFE_OUTPUT_MESSAGES: "{\"footer\":\"\\u003e 🦅 *Observed from above by [{workflow_name}]({run_url})*{history_link}\",\"runStarted\":\"🦅 Dev Hawk circles the sky! [{workflow_name}]({run_url}) is monitoring this {event_type} from above...\",\"runSuccess\":\"🦅 Hawk eyes report! [{workflow_name}]({run_url}) has completed reconnaissance. Intel delivered! 🎯\",\"runFailure\":\"🦅 Hawk down! [{workflow_name}]({run_url}) {status}. The skies grow quiet...\"}" GH_AW_GROUP_REPORTS: "false" GH_AW_FAILURE_REPORT_AS_ISSUE: "true" diff --git a/.github/workflows/dev.lock.yml b/.github/workflows/dev.lock.yml index 26fe366a873..e16dc0173d5 100644 --- a/.github/workflows/dev.lock.yml +++ b/.github/workflows/dev.lock.yml @@ -248,6 +248,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -705,6 +709,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1038,6 +1047,10 @@ jobs: GH_AW_WORKFLOW_ID: "dev" GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_GROUP_REPORTS: "false" GH_AW_FAILURE_REPORT_AS_ISSUE: "true" GH_AW_TIMEOUT_MINUTES: "30" diff --git a/.github/workflows/dictation-prompt.lock.yml b/.github/workflows/dictation-prompt.lock.yml index 52050a9c2d6..aa4237b0da5 100644 --- a/.github/workflows/dictation-prompt.lock.yml +++ b/.github/workflows/dictation-prompt.lock.yml @@ -262,6 +262,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -848,6 +852,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1193,6 +1202,10 @@ jobs: GH_AW_WORKFLOW_ID: "dictation-prompt" GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CODE_PUSH_FAILURE_ERRORS: ${{ needs.safe_outputs.outputs.code_push_failure_errors }} GH_AW_CODE_PUSH_FAILURE_COUNT: ${{ needs.safe_outputs.outputs.code_push_failure_count }} GH_AW_GROUP_REPORTS: "false" diff --git a/.github/workflows/discussion-task-miner.lock.yml b/.github/workflows/discussion-task-miner.lock.yml index 3c37219bd98..734ff0300f6 100644 --- a/.github/workflows/discussion-task-miner.lock.yml +++ b/.github/workflows/discussion-task-miner.lock.yml @@ -278,6 +278,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -828,6 +832,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1176,6 +1185,10 @@ jobs: GH_AW_WORKFLOW_ID: "discussion-task-miner" GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_SAFE_OUTPUT_MESSAGES: "{\"footer\":\"\\u003e 🔍 *Task mining by [{workflow_name}]({run_url})*{history_link}\",\"runStarted\":\"🔍 Discussion Task Miner starting! [{workflow_name}]({run_url}) is scanning discussions for code quality improvements...\",\"runSuccess\":\"✅ Task mining complete! [{workflow_name}]({run_url}) has identified actionable code quality tasks. 📊\",\"runFailure\":\"⚠️ Task mining interrupted! [{workflow_name}]({run_url}) {status}. Please review the logs...\"}" GH_AW_PUSH_REPO_MEMORY_RESULT: ${{ needs.push_repo_memory.result }} GH_AW_REPO_MEMORY_VALIDATION_FAILED_default: ${{ needs.push_repo_memory.outputs.validation_failed_default }} diff --git a/.github/workflows/docs-noob-tester.lock.yml b/.github/workflows/docs-noob-tester.lock.yml index b3cbc60c27a..13121db44a1 100644 --- a/.github/workflows/docs-noob-tester.lock.yml +++ b/.github/workflows/docs-noob-tester.lock.yml @@ -265,6 +265,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -748,6 +752,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1092,6 +1101,10 @@ jobs: GH_AW_WORKFLOW_ID: "docs-noob-tester" GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CREATE_DISCUSSION_ERRORS: ${{ needs.safe_outputs.outputs.create_discussion_errors }} GH_AW_CREATE_DISCUSSION_ERROR_COUNT: ${{ needs.safe_outputs.outputs.create_discussion_error_count }} GH_AW_GROUP_REPORTS: "false" diff --git a/.github/workflows/draft-pr-cleanup.lock.yml b/.github/workflows/draft-pr-cleanup.lock.yml index 86ed5d2d856..635c8bf3ead 100644 --- a/.github/workflows/draft-pr-cleanup.lock.yml +++ b/.github/workflows/draft-pr-cleanup.lock.yml @@ -250,6 +250,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -794,6 +798,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1129,6 +1138,10 @@ jobs: GH_AW_WORKFLOW_ID: "draft-pr-cleanup" GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_SAFE_OUTPUT_MESSAGES: "{\"runStarted\":\"🧹 Starting draft PR cleanup... [{workflow_name}]({run_url}) is reviewing draft PRs for staleness\",\"runSuccess\":\"✅ Draft PR cleanup complete! [{workflow_name}]({run_url}) has reviewed and processed stale drafts.\",\"runFailure\":\"❌ Draft PR cleanup failed! [{workflow_name}]({run_url}) {status}. Some draft PRs may not be processed.\"}" GH_AW_GROUP_REPORTS: "false" GH_AW_FAILURE_REPORT_AS_ISSUE: "true" diff --git a/.github/workflows/example-permissions-warning.lock.yml b/.github/workflows/example-permissions-warning.lock.yml index 6413c1646f2..bded2236773 100644 --- a/.github/workflows/example-permissions-warning.lock.yml +++ b/.github/workflows/example-permissions-warning.lock.yml @@ -234,6 +234,10 @@ jobs: GH_AW_WORKFLOW_ID_SANITIZED: examplepermissionswarning outputs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} steps: @@ -396,6 +400,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} diff --git a/.github/workflows/firewall-escape.lock.yml b/.github/workflows/firewall-escape.lock.yml index 8bea34fba32..43131c7fb26 100644 --- a/.github/workflows/firewall-escape.lock.yml +++ b/.github/workflows/firewall-escape.lock.yml @@ -295,6 +295,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -765,6 +769,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1119,6 +1128,10 @@ jobs: GH_AW_WORKFLOW_ID: "firewall-escape" GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CREATE_DISCUSSION_ERRORS: ${{ needs.safe_outputs.outputs.create_discussion_errors }} GH_AW_CREATE_DISCUSSION_ERROR_COUNT: ${{ needs.safe_outputs.outputs.create_discussion_error_count }} GH_AW_PUSH_REPO_MEMORY_RESULT: ${{ needs.push_repo_memory.result }} diff --git a/.github/workflows/firewall.lock.yml b/.github/workflows/firewall.lock.yml index 11689cdd526..58cf8bb3cd2 100644 --- a/.github/workflows/firewall.lock.yml +++ b/.github/workflows/firewall.lock.yml @@ -236,6 +236,10 @@ jobs: GH_AW_WORKFLOW_ID_SANITIZED: firewall outputs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} steps: @@ -398,6 +402,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} diff --git a/.github/workflows/functional-pragmatist.lock.yml b/.github/workflows/functional-pragmatist.lock.yml index 800069cc5d8..c8f7e2039ba 100644 --- a/.github/workflows/functional-pragmatist.lock.yml +++ b/.github/workflows/functional-pragmatist.lock.yml @@ -265,6 +265,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -732,6 +736,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1080,6 +1089,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CODE_PUSH_FAILURE_ERRORS: ${{ needs.safe_outputs.outputs.code_push_failure_errors }} GH_AW_CODE_PUSH_FAILURE_COUNT: ${{ needs.safe_outputs.outputs.code_push_failure_count }} GH_AW_GROUP_REPORTS: "false" diff --git a/.github/workflows/github-remote-mcp-auth-test.lock.yml b/.github/workflows/github-remote-mcp-auth-test.lock.yml index 5f79200c6f2..22da13e90c4 100644 --- a/.github/workflows/github-remote-mcp-auth-test.lock.yml +++ b/.github/workflows/github-remote-mcp-auth-test.lock.yml @@ -260,6 +260,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -711,6 +715,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1055,6 +1064,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CREATE_DISCUSSION_ERRORS: ${{ needs.safe_outputs.outputs.create_discussion_errors }} GH_AW_CREATE_DISCUSSION_ERROR_COUNT: ${{ needs.safe_outputs.outputs.create_discussion_error_count }} GH_AW_GROUP_REPORTS: "false" diff --git a/.github/workflows/glossary-maintainer.lock.yml b/.github/workflows/glossary-maintainer.lock.yml index 5c71a0891ff..78bdcf59af0 100644 --- a/.github/workflows/glossary-maintainer.lock.yml +++ b/.github/workflows/glossary-maintainer.lock.yml @@ -297,6 +297,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -973,6 +977,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1345,6 +1354,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CODE_PUSH_FAILURE_ERRORS: ${{ needs.safe_outputs.outputs.code_push_failure_errors }} GH_AW_CODE_PUSH_FAILURE_COUNT: ${{ needs.safe_outputs.outputs.code_push_failure_count }} GH_AW_PUSH_REPO_MEMORY_RESULT: ${{ needs.push_repo_memory.result }} diff --git a/.github/workflows/gpclean.lock.yml b/.github/workflows/gpclean.lock.yml index 846f687f6a0..d982a360f96 100644 --- a/.github/workflows/gpclean.lock.yml +++ b/.github/workflows/gpclean.lock.yml @@ -269,6 +269,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -749,6 +753,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1099,6 +1108,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_GROUP_REPORTS: "false" GH_AW_FAILURE_REPORT_AS_ISSUE: "true" GH_AW_TIMEOUT_MINUTES: "30" diff --git a/.github/workflows/grumpy-reviewer.lock.yml b/.github/workflows/grumpy-reviewer.lock.yml index 932f0987f68..79364027bb8 100644 --- a/.github/workflows/grumpy-reviewer.lock.yml +++ b/.github/workflows/grumpy-reviewer.lock.yml @@ -315,6 +315,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -846,6 +850,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1197,6 +1206,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_SAFE_OUTPUT_MESSAGES: "{\"footer\":\"\\u003e 😤 *Reluctantly reviewed by [{workflow_name}]({run_url})*{history_link}\",\"runStarted\":\"😤 *sigh* [{workflow_name}]({run_url}) is begrudgingly looking at this {event_type}... This better be worth my time.\",\"runSuccess\":\"😤 Fine. [{workflow_name}]({run_url}) finished the review. It wasn't completely terrible. I guess. 🙄\",\"runFailure\":\"😤 Great. [{workflow_name}]({run_url}) {status}. As if my day couldn't get any worse...\"}" GH_AW_GROUP_REPORTS: "false" GH_AW_FAILURE_REPORT_AS_ISSUE: "true" diff --git a/.github/workflows/hourly-ci-cleaner.lock.yml b/.github/workflows/hourly-ci-cleaner.lock.yml index d8d916e8836..aad407f6468 100644 --- a/.github/workflows/hourly-ci-cleaner.lock.yml +++ b/.github/workflows/hourly-ci-cleaner.lock.yml @@ -282,6 +282,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -782,6 +786,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1179,6 +1188,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CODE_PUSH_FAILURE_ERRORS: ${{ needs.safe_outputs.outputs.code_push_failure_errors }} GH_AW_CODE_PUSH_FAILURE_COUNT: ${{ needs.safe_outputs.outputs.code_push_failure_count }} GH_AW_GROUP_REPORTS: "false" diff --git a/.github/workflows/issue-monster.lock.yml b/.github/workflows/issue-monster.lock.yml index 7db3b572862..be4f27fa73e 100644 --- a/.github/workflows/issue-monster.lock.yml +++ b/.github/workflows/issue-monster.lock.yml @@ -289,6 +289,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -780,6 +784,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1125,6 +1134,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_ASSIGNMENT_ERRORS: ${{ needs.safe_outputs.outputs.assign_to_agent_assignment_errors }} GH_AW_ASSIGNMENT_ERROR_COUNT: ${{ needs.safe_outputs.outputs.assign_to_agent_assignment_error_count }} GH_AW_SAFE_OUTPUT_MESSAGES: "{\"footer\":\"\\u003e 🍪 *Om nom nom by [{workflow_name}]({run_url})*{history_link}\",\"runStarted\":\"🍪 ISSUE! ISSUE! [{workflow_name}]({run_url}) hungry for issues on this {event_type}! Om nom nom...\",\"runSuccess\":\"🍪 YUMMY! [{workflow_name}]({run_url}) ate the issues! That was DELICIOUS! Me want MORE! 😋\",\"runFailure\":\"🍪 Aww... [{workflow_name}]({run_url}) {status}. No cookie for monster today... 😢\"}" diff --git a/.github/workflows/issue-triage-agent.lock.yml b/.github/workflows/issue-triage-agent.lock.yml index a993d258b64..84276b3be63 100644 --- a/.github/workflows/issue-triage-agent.lock.yml +++ b/.github/workflows/issue-triage-agent.lock.yml @@ -261,6 +261,10 @@ jobs: outputs: detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -721,6 +725,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1065,6 +1074,10 @@ jobs: GH_AW_WORKFLOW_ID: "issue-triage-agent" GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_GROUP_REPORTS: "false" GH_AW_FAILURE_REPORT_AS_ISSUE: "true" GH_AW_TIMEOUT_MINUTES: "5" diff --git a/.github/workflows/jsweep.lock.yml b/.github/workflows/jsweep.lock.yml index 5aa7c3814c3..b89a4458e11 100644 --- a/.github/workflows/jsweep.lock.yml +++ b/.github/workflows/jsweep.lock.yml @@ -267,6 +267,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -761,6 +765,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1116,6 +1125,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CODE_PUSH_FAILURE_ERRORS: ${{ needs.safe_outputs.outputs.code_push_failure_errors }} GH_AW_CODE_PUSH_FAILURE_COUNT: ${{ needs.safe_outputs.outputs.code_push_failure_count }} GH_AW_GROUP_REPORTS: "false" diff --git a/.github/workflows/layout-spec-maintainer.lock.yml b/.github/workflows/layout-spec-maintainer.lock.yml index 4c2cf3bd38f..90a614c74c1 100644 --- a/.github/workflows/layout-spec-maintainer.lock.yml +++ b/.github/workflows/layout-spec-maintainer.lock.yml @@ -258,6 +258,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -761,6 +765,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1109,6 +1118,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CODE_PUSH_FAILURE_ERRORS: ${{ needs.safe_outputs.outputs.code_push_failure_errors }} GH_AW_CODE_PUSH_FAILURE_COUNT: ${{ needs.safe_outputs.outputs.code_push_failure_count }} GH_AW_GROUP_REPORTS: "false" diff --git a/.github/workflows/mcp-inspector.lock.yml b/.github/workflows/mcp-inspector.lock.yml index 19a9bdc289e..c58e1bf9d05 100644 --- a/.github/workflows/mcp-inspector.lock.yml +++ b/.github/workflows/mcp-inspector.lock.yml @@ -329,6 +329,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -1097,6 +1101,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1462,6 +1471,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CREATE_DISCUSSION_ERRORS: ${{ needs.safe_outputs.outputs.create_discussion_errors }} GH_AW_CREATE_DISCUSSION_ERROR_COUNT: ${{ needs.safe_outputs.outputs.create_discussion_error_count }} GH_AW_GROUP_REPORTS: "false" diff --git a/.github/workflows/mergefest.lock.yml b/.github/workflows/mergefest.lock.yml index 16f85f3b954..2d6f0ff2bd1 100644 --- a/.github/workflows/mergefest.lock.yml +++ b/.github/workflows/mergefest.lock.yml @@ -301,6 +301,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -781,6 +785,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1126,6 +1135,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CODE_PUSH_FAILURE_ERRORS: ${{ needs.safe_outputs.outputs.code_push_failure_errors }} GH_AW_CODE_PUSH_FAILURE_COUNT: ${{ needs.safe_outputs.outputs.code_push_failure_count }} GH_AW_GROUP_REPORTS: "false" diff --git a/.github/workflows/metrics-collector.lock.yml b/.github/workflows/metrics-collector.lock.yml index ed1611af937..6354502e87d 100644 --- a/.github/workflows/metrics-collector.lock.yml +++ b/.github/workflows/metrics-collector.lock.yml @@ -260,6 +260,10 @@ jobs: GH_AW_WORKFLOW_ID_SANITIZED: metricscollector outputs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} steps: @@ -499,6 +503,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} diff --git a/.github/workflows/notion-issue-summary.lock.yml b/.github/workflows/notion-issue-summary.lock.yml index 78e7b83b182..e2698865718 100644 --- a/.github/workflows/notion-issue-summary.lock.yml +++ b/.github/workflows/notion-issue-summary.lock.yml @@ -263,6 +263,10 @@ jobs: GH_AW_WORKFLOW_ID_SANITIZED: notionissuesummary outputs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -676,6 +680,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -885,6 +894,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_GROUP_REPORTS: "false" GH_AW_FAILURE_REPORT_AS_ISSUE: "true" GH_AW_TIMEOUT_MINUTES: "5" diff --git a/.github/workflows/org-health-report.lock.yml b/.github/workflows/org-health-report.lock.yml index ac32f31d004..2a52be0c8f9 100644 --- a/.github/workflows/org-health-report.lock.yml +++ b/.github/workflows/org-health-report.lock.yml @@ -283,6 +283,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -789,6 +793,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1150,6 +1159,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CREATE_DISCUSSION_ERRORS: ${{ needs.safe_outputs.outputs.create_discussion_errors }} GH_AW_CREATE_DISCUSSION_ERROR_COUNT: ${{ needs.safe_outputs.outputs.create_discussion_error_count }} GH_AW_GROUP_REPORTS: "false" diff --git a/.github/workflows/pdf-summary.lock.yml b/.github/workflows/pdf-summary.lock.yml index 4377ded3636..60117178956 100644 --- a/.github/workflows/pdf-summary.lock.yml +++ b/.github/workflows/pdf-summary.lock.yml @@ -347,6 +347,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -861,6 +865,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1214,6 +1223,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CREATE_DISCUSSION_ERRORS: ${{ needs.safe_outputs.outputs.create_discussion_errors }} GH_AW_CREATE_DISCUSSION_ERROR_COUNT: ${{ needs.safe_outputs.outputs.create_discussion_error_count }} GH_AW_SAFE_OUTPUT_MESSAGES: "{\"footer\":\"\\u003e 📄 *Summary compiled by [{workflow_name}]({run_url})*{history_link}\",\"runStarted\":\"📖 Page by page! [{workflow_name}]({run_url}) is reading through this {event_type}...\",\"runSuccess\":\"📚 TL;DR ready! [{workflow_name}]({run_url}) has distilled the essence. Knowledge condensed! ✨\",\"runFailure\":\"📖 Reading interrupted! [{workflow_name}]({run_url}) {status}. The document remains unsummarized...\"}" diff --git a/.github/workflows/plan.lock.yml b/.github/workflows/plan.lock.yml index c90ce88f229..9ec2227d063 100644 --- a/.github/workflows/plan.lock.yml +++ b/.github/workflows/plan.lock.yml @@ -308,6 +308,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -829,6 +833,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1174,6 +1183,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_GROUP_REPORTS: "false" GH_AW_FAILURE_REPORT_AS_ISSUE: "true" GH_AW_TIMEOUT_MINUTES: "10" diff --git a/.github/workflows/poem-bot.lock.yml b/.github/workflows/poem-bot.lock.yml index 030a4f60ec8..516e41b1332 100644 --- a/.github/workflows/poem-bot.lock.yml +++ b/.github/workflows/poem-bot.lock.yml @@ -336,6 +336,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -1550,6 +1554,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1917,6 +1926,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CREATE_DISCUSSION_ERRORS: ${{ needs.safe_outputs.outputs.create_discussion_errors }} GH_AW_CREATE_DISCUSSION_ERROR_COUNT: ${{ needs.safe_outputs.outputs.create_discussion_error_count }} GH_AW_CODE_PUSH_FAILURE_ERRORS: ${{ needs.safe_outputs.outputs.code_push_failure_errors }} diff --git a/.github/workflows/portfolio-analyst.lock.yml b/.github/workflows/portfolio-analyst.lock.yml index a4135e7b4ec..310883fc284 100644 --- a/.github/workflows/portfolio-analyst.lock.yml +++ b/.github/workflows/portfolio-analyst.lock.yml @@ -280,6 +280,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -870,6 +874,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1234,6 +1243,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CREATE_DISCUSSION_ERRORS: ${{ needs.safe_outputs.outputs.create_discussion_errors }} GH_AW_CREATE_DISCUSSION_ERROR_COUNT: ${{ needs.safe_outputs.outputs.create_discussion_error_count }} GH_AW_GROUP_REPORTS: "false" diff --git a/.github/workflows/pr-nitpick-reviewer.lock.yml b/.github/workflows/pr-nitpick-reviewer.lock.yml index 2a65c8a417b..4c90067cb1e 100644 --- a/.github/workflows/pr-nitpick-reviewer.lock.yml +++ b/.github/workflows/pr-nitpick-reviewer.lock.yml @@ -345,6 +345,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -947,6 +951,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1300,6 +1309,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CREATE_DISCUSSION_ERRORS: ${{ needs.safe_outputs.outputs.create_discussion_errors }} GH_AW_CREATE_DISCUSSION_ERROR_COUNT: ${{ needs.safe_outputs.outputs.create_discussion_error_count }} GH_AW_SAFE_OUTPUT_MESSAGES: "{\"footer\":\"\\u003e 🔍 *Meticulously inspected by [{workflow_name}]({run_url})*{history_link}\",\"runStarted\":\"🔬 Adjusting monocle... [{workflow_name}]({run_url}) is scrutinizing every pixel of this {event_type}...\",\"runSuccess\":\"🔍 Nitpicks catalogued! [{workflow_name}]({run_url}) has documented all the tiny details. Perfection awaits! ✅\",\"runFailure\":\"🔬 Lens cracked! [{workflow_name}]({run_url}) {status}. Some nitpicks remain undetected...\"}" diff --git a/.github/workflows/pr-triage-agent.lock.yml b/.github/workflows/pr-triage-agent.lock.yml index 7cdebda0030..bfef0b88401 100644 --- a/.github/workflows/pr-triage-agent.lock.yml +++ b/.github/workflows/pr-triage-agent.lock.yml @@ -272,6 +272,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -853,6 +857,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1208,6 +1217,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_SAFE_OUTPUT_MESSAGES: "{\"runStarted\":\"🔍 Starting PR triage analysis... [{workflow_name}]({run_url}) is categorizing and prioritizing agent-created PRs\",\"runSuccess\":\"✅ PR triage complete! [{workflow_name}]({run_url}) has analyzed and categorized PRs. Check the issue for detailed report.\",\"runFailure\":\"❌ PR triage failed! [{workflow_name}]({run_url}) {status}. Some PRs may not be triaged.\"}" GH_AW_PUSH_REPO_MEMORY_RESULT: ${{ needs.push_repo_memory.result }} GH_AW_REPO_MEMORY_VALIDATION_FAILED_default: ${{ needs.push_repo_memory.outputs.validation_failed_default }} diff --git a/.github/workflows/python-data-charts.lock.yml b/.github/workflows/python-data-charts.lock.yml index e01d6151296..9072a6be59a 100644 --- a/.github/workflows/python-data-charts.lock.yml +++ b/.github/workflows/python-data-charts.lock.yml @@ -276,6 +276,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -858,6 +862,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1219,6 +1228,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CREATE_DISCUSSION_ERRORS: ${{ needs.safe_outputs.outputs.create_discussion_errors }} GH_AW_CREATE_DISCUSSION_ERROR_COUNT: ${{ needs.safe_outputs.outputs.create_discussion_error_count }} GH_AW_GROUP_REPORTS: "false" diff --git a/.github/workflows/q.lock.yml b/.github/workflows/q.lock.yml index 1e0229885c0..26fadc81443 100644 --- a/.github/workflows/q.lock.yml +++ b/.github/workflows/q.lock.yml @@ -364,6 +364,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -971,6 +975,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1325,6 +1334,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CODE_PUSH_FAILURE_ERRORS: ${{ needs.safe_outputs.outputs.code_push_failure_errors }} GH_AW_CODE_PUSH_FAILURE_COUNT: ${{ needs.safe_outputs.outputs.code_push_failure_count }} GH_AW_SAFE_OUTPUT_MESSAGES: "{\"footer\":\"\\u003e 🎩 *Equipped by [{workflow_name}]({run_url})*{history_link}\",\"runStarted\":\"🔧 Pay attention, 007! [{workflow_name}]({run_url}) is preparing your gadgets for this {event_type}...\",\"runSuccess\":\"🎩 Mission equipment ready! [{workflow_name}]({run_url}) has optimized your workflow. Use wisely, 007! 🔫\",\"runFailure\":\"🔧 Technical difficulties! [{workflow_name}]({run_url}) {status}. Even Q Branch has bad days...\"}" diff --git a/.github/workflows/refiner.lock.yml b/.github/workflows/refiner.lock.yml index ecfc2e2abe8..5fc50145f6a 100644 --- a/.github/workflows/refiner.lock.yml +++ b/.github/workflows/refiner.lock.yml @@ -291,6 +291,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -802,6 +806,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1148,6 +1157,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CODE_PUSH_FAILURE_ERRORS: ${{ needs.safe_outputs.outputs.code_push_failure_errors }} GH_AW_CODE_PUSH_FAILURE_COUNT: ${{ needs.safe_outputs.outputs.code_push_failure_count }} GH_AW_SAFE_OUTPUT_MESSAGES: "{\"runStarted\":\"🔍 Starting code refinement... [{workflow_name}]({run_url}) is analyzing PR #${{ github.event.pull_request.number }} for style alignment and security issues\",\"runSuccess\":\"✅ Refinement complete! [{workflow_name}]({run_url}) has created a PR with improvements for PR #${{ github.event.pull_request.number }}\",\"runFailure\":\"❌ Refinement failed! [{workflow_name}]({run_url}) {status} while processing PR #${{ github.event.pull_request.number }}\"}" diff --git a/.github/workflows/release.lock.yml b/.github/workflows/release.lock.yml index b1e0981b141..633ec717588 100644 --- a/.github/workflows/release.lock.yml +++ b/.github/workflows/release.lock.yml @@ -271,6 +271,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -725,6 +729,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1067,6 +1076,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_GROUP_REPORTS: "false" GH_AW_FAILURE_REPORT_AS_ISSUE: "true" GH_AW_TIMEOUT_MINUTES: "20" diff --git a/.github/workflows/repo-audit-analyzer.lock.yml b/.github/workflows/repo-audit-analyzer.lock.yml index b0d294d9863..6be23a76801 100644 --- a/.github/workflows/repo-audit-analyzer.lock.yml +++ b/.github/workflows/repo-audit-analyzer.lock.yml @@ -274,6 +274,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -727,6 +731,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1081,6 +1090,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CREATE_DISCUSSION_ERRORS: ${{ needs.safe_outputs.outputs.create_discussion_errors }} GH_AW_CREATE_DISCUSSION_ERROR_COUNT: ${{ needs.safe_outputs.outputs.create_discussion_error_count }} GH_AW_GROUP_REPORTS: "false" diff --git a/.github/workflows/repo-tree-map.lock.yml b/.github/workflows/repo-tree-map.lock.yml index 0e1d2ee6a92..7757463bdbd 100644 --- a/.github/workflows/repo-tree-map.lock.yml +++ b/.github/workflows/repo-tree-map.lock.yml @@ -261,6 +261,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -703,6 +707,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1047,6 +1056,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CREATE_DISCUSSION_ERRORS: ${{ needs.safe_outputs.outputs.create_discussion_errors }} GH_AW_CREATE_DISCUSSION_ERROR_COUNT: ${{ needs.safe_outputs.outputs.create_discussion_error_count }} GH_AW_GROUP_REPORTS: "false" diff --git a/.github/workflows/repository-quality-improver.lock.yml b/.github/workflows/repository-quality-improver.lock.yml index 98f25aa9e40..9bb9227596b 100644 --- a/.github/workflows/repository-quality-improver.lock.yml +++ b/.github/workflows/repository-quality-improver.lock.yml @@ -273,6 +273,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -734,6 +738,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1085,6 +1094,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CREATE_DISCUSSION_ERRORS: ${{ needs.safe_outputs.outputs.create_discussion_errors }} GH_AW_CREATE_DISCUSSION_ERROR_COUNT: ${{ needs.safe_outputs.outputs.create_discussion_error_count }} GH_AW_GROUP_REPORTS: "false" diff --git a/.github/workflows/research.lock.yml b/.github/workflows/research.lock.yml index d02ddf78ea2..2a90b8aea59 100644 --- a/.github/workflows/research.lock.yml +++ b/.github/workflows/research.lock.yml @@ -271,6 +271,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -728,6 +732,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1073,6 +1082,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CREATE_DISCUSSION_ERRORS: ${{ needs.safe_outputs.outputs.create_discussion_errors }} GH_AW_CREATE_DISCUSSION_ERROR_COUNT: ${{ needs.safe_outputs.outputs.create_discussion_error_count }} GH_AW_GROUP_REPORTS: "false" diff --git a/.github/workflows/security-compliance.lock.yml b/.github/workflows/security-compliance.lock.yml index 6fbe91f05df..9de4cc8c96a 100644 --- a/.github/workflows/security-compliance.lock.yml +++ b/.github/workflows/security-compliance.lock.yml @@ -299,6 +299,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -788,6 +792,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1141,6 +1150,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_PUSH_REPO_MEMORY_RESULT: ${{ needs.push_repo_memory.result }} GH_AW_REPO_MEMORY_VALIDATION_FAILED_default: ${{ needs.push_repo_memory.outputs.validation_failed_default }} GH_AW_REPO_MEMORY_VALIDATION_ERROR_default: ${{ needs.push_repo_memory.outputs.validation_error_default }} diff --git a/.github/workflows/security-review.lock.yml b/.github/workflows/security-review.lock.yml index 3a0b3d5bca8..d32bcd4c142 100644 --- a/.github/workflows/security-review.lock.yml +++ b/.github/workflows/security-review.lock.yml @@ -316,6 +316,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -925,6 +929,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1276,6 +1285,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_SAFE_OUTPUT_MESSAGES: "{\"footer\":\"\\u003e 🔒 *Security review by [{workflow_name}]({run_url})*{history_link}\",\"runStarted\":\"🔍 [{workflow_name}]({run_url}) is analyzing this {event_type} for security implications...\",\"runSuccess\":\"🔒 [{workflow_name}]({run_url}) completed the security review.\",\"runFailure\":\"⚠️ [{workflow_name}]({run_url}) {status} during security review.\"}" GH_AW_GROUP_REPORTS: "false" GH_AW_FAILURE_REPORT_AS_ISSUE: "true" diff --git a/.github/workflows/slide-deck-maintainer.lock.yml b/.github/workflows/slide-deck-maintainer.lock.yml index f5e836d05ed..b4e696cc7c1 100644 --- a/.github/workflows/slide-deck-maintainer.lock.yml +++ b/.github/workflows/slide-deck-maintainer.lock.yml @@ -292,6 +292,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -828,6 +832,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1183,6 +1192,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CODE_PUSH_FAILURE_ERRORS: ${{ needs.safe_outputs.outputs.code_push_failure_errors }} GH_AW_CODE_PUSH_FAILURE_COUNT: ${{ needs.safe_outputs.outputs.code_push_failure_count }} GH_AW_GROUP_REPORTS: "false" diff --git a/.github/workflows/smoke-copilot-arm.lock.yml b/.github/workflows/smoke-copilot-arm.lock.yml index 137f34a837a..472181b0ad7 100644 --- a/.github/workflows/smoke-copilot-arm.lock.yml +++ b/.github/workflows/smoke-copilot-arm.lock.yml @@ -335,6 +335,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -1814,6 +1818,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -2178,6 +2187,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CREATE_DISCUSSION_ERRORS: ${{ needs.safe_outputs.outputs.create_discussion_errors }} GH_AW_CREATE_DISCUSSION_ERROR_COUNT: ${{ needs.safe_outputs.outputs.create_discussion_error_count }} GH_AW_SAFE_OUTPUT_MESSAGES: "{\"footer\":\"\\u003e 📰 *BREAKING: Report filed by [{workflow_name}]({run_url})*{history_link}\",\"appendOnlyComments\":true,\"runStarted\":\"📰 BREAKING: [{workflow_name}]({run_url}) is now investigating this {event_type}. Sources say the story is developing...\",\"runSuccess\":\"📰 VERDICT: [{workflow_name}]({run_url}) has concluded. All systems operational. This is a developing story. 🎤\",\"runFailure\":\"📰 DEVELOPING STORY: [{workflow_name}]({run_url}) reports {status}. Our correspondents are investigating the incident...\"}" diff --git a/.github/workflows/smoke-copilot.lock.yml b/.github/workflows/smoke-copilot.lock.yml index 96d1031bd2c..6a2eacb26d6 100644 --- a/.github/workflows/smoke-copilot.lock.yml +++ b/.github/workflows/smoke-copilot.lock.yml @@ -338,6 +338,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -1929,6 +1933,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -2293,6 +2302,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CREATE_DISCUSSION_ERRORS: ${{ needs.safe_outputs.outputs.create_discussion_errors }} GH_AW_CREATE_DISCUSSION_ERROR_COUNT: ${{ needs.safe_outputs.outputs.create_discussion_error_count }} GH_AW_SAFE_OUTPUT_MESSAGES: "{\"footer\":\"\\u003e 📰 *BREAKING: Report filed by [{workflow_name}]({run_url})*{history_link}\",\"appendOnlyComments\":true,\"runStarted\":\"📰 BREAKING: [{workflow_name}]({run_url}) is now investigating this {event_type}. Sources say the story is developing...\",\"runSuccess\":\"📰 VERDICT: [{workflow_name}]({run_url}) has concluded. All systems operational. This is a developing story. 🎤\",\"runFailure\":\"📰 DEVELOPING STORY: [{workflow_name}]({run_url}) reports {status}. Our correspondents are investigating the incident...\"}" diff --git a/.github/workflows/smoke-create-cross-repo-pr.lock.yml b/.github/workflows/smoke-create-cross-repo-pr.lock.yml index b6e010f76e0..86a67303d6e 100644 --- a/.github/workflows/smoke-create-cross-repo-pr.lock.yml +++ b/.github/workflows/smoke-create-cross-repo-pr.lock.yml @@ -299,6 +299,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -903,6 +907,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1240,6 +1249,10 @@ jobs: GH_AW_WORKFLOW_ID: "smoke-create-cross-repo-pr" GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CODE_PUSH_FAILURE_ERRORS: ${{ needs.safe_outputs.outputs.code_push_failure_errors }} GH_AW_CODE_PUSH_FAILURE_COUNT: ${{ needs.safe_outputs.outputs.code_push_failure_count }} GH_AW_SAFE_OUTPUT_MESSAGES: "{\"footer\":\"\\u003e 🔬 *Cross-repo smoke test by [{workflow_name}]({run_url})*{history_link}\",\"runStarted\":\"🔬 [{workflow_name}]({run_url}) is testing cross-repo PR creation in githubnext/gh-aw-side-repo...\",\"runSuccess\":\"✅ [{workflow_name}]({run_url}) successfully created a cross-repo PR in githubnext/gh-aw-side-repo!\",\"runFailure\":\"❌ [{workflow_name}]({run_url}) failed to create a cross-repo PR: {status}\"}" diff --git a/.github/workflows/smoke-multi-pr.lock.yml b/.github/workflows/smoke-multi-pr.lock.yml index 594730f0849..91f545e93c7 100644 --- a/.github/workflows/smoke-multi-pr.lock.yml +++ b/.github/workflows/smoke-multi-pr.lock.yml @@ -308,6 +308,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -855,6 +859,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1201,6 +1210,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CODE_PUSH_FAILURE_ERRORS: ${{ needs.safe_outputs.outputs.code_push_failure_errors }} GH_AW_CODE_PUSH_FAILURE_COUNT: ${{ needs.safe_outputs.outputs.code_push_failure_count }} GH_AW_SAFE_OUTPUT_MESSAGES: "{\"footer\":\"\\u003e 🧪 *Multi PR smoke test by [{workflow_name}]({run_url})*{history_link}\",\"appendOnlyComments\":true,\"runStarted\":\"🧪 [{workflow_name}]({run_url}) is now testing multiple PR creation...\",\"runSuccess\":\"✅ [{workflow_name}]({run_url}) successfully created multiple PRs.\",\"runFailure\":\"❌ [{workflow_name}]({run_url}) failed to create multiple PRs. Check the logs.\"}" diff --git a/.github/workflows/smoke-project.lock.yml b/.github/workflows/smoke-project.lock.yml index d1cd4c58aa7..48c882f63f6 100644 --- a/.github/workflows/smoke-project.lock.yml +++ b/.github/workflows/smoke-project.lock.yml @@ -307,6 +307,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -1288,6 +1292,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1634,6 +1643,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CODE_PUSH_FAILURE_ERRORS: ${{ needs.safe_outputs.outputs.code_push_failure_errors }} GH_AW_CODE_PUSH_FAILURE_COUNT: ${{ needs.safe_outputs.outputs.code_push_failure_count }} GH_AW_SAFE_OUTPUT_MESSAGES: "{\"footer\":\"\\u003e 🧪 *Project smoke test report by [{workflow_name}]({run_url})*{history_link}\",\"appendOnlyComments\":true,\"runStarted\":\"🧪 [{workflow_name}]({run_url}) is now testing project operations...\",\"runSuccess\":\"✅ [{workflow_name}]({run_url}) completed successfully. All project operations validated.\",\"runFailure\":\"❌ [{workflow_name}]({run_url}) encountered failures. Check the logs for details.\"}" diff --git a/.github/workflows/smoke-temporary-id.lock.yml b/.github/workflows/smoke-temporary-id.lock.yml index a12c2f5ac0e..1d9b3ca31f9 100644 --- a/.github/workflows/smoke-temporary-id.lock.yml +++ b/.github/workflows/smoke-temporary-id.lock.yml @@ -303,6 +303,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -876,6 +880,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1221,6 +1230,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_SAFE_OUTPUT_MESSAGES: "{\"footer\":\"\\u003e 🧪 *Temporary ID smoke test by [{workflow_name}]({run_url})*{history_link}\",\"appendOnlyComments\":true,\"runStarted\":\"🧪 [{workflow_name}]({run_url}) is now testing temporary ID functionality...\",\"runSuccess\":\"✅ [{workflow_name}]({run_url}) completed successfully. Temporary ID validation passed.\",\"runFailure\":\"❌ [{workflow_name}]({run_url}) encountered failures. Check the logs for details.\"}" GH_AW_GROUP_REPORTS: "false" GH_AW_FAILURE_REPORT_AS_ISSUE: "true" diff --git a/.github/workflows/smoke-test-tools.lock.yml b/.github/workflows/smoke-test-tools.lock.yml index a5807b5e1a7..9f745788778 100644 --- a/.github/workflows/smoke-test-tools.lock.yml +++ b/.github/workflows/smoke-test-tools.lock.yml @@ -292,6 +292,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -754,6 +758,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1099,6 +1108,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_SAFE_OUTPUT_MESSAGES: "{\"footer\":\"\\u003e 🔧 *Tool validation by [{workflow_name}]({run_url})*{history_link}\",\"runStarted\":\"🔧 Starting tool validation... [{workflow_name}]({run_url}) is checking the agent container tools...\",\"runSuccess\":\"✅ All tools validated successfully! [{workflow_name}]({run_url}) confirms agent container is ready.\",\"runFailure\":\"❌ Tool validation failed! [{workflow_name}]({run_url}) detected missing tools: {status}\"}" GH_AW_GROUP_REPORTS: "false" GH_AW_FAILURE_REPORT_AS_ISSUE: "true" diff --git a/.github/workflows/smoke-update-cross-repo-pr.lock.yml b/.github/workflows/smoke-update-cross-repo-pr.lock.yml index 4b0892d3874..ce4e07e2ee5 100644 --- a/.github/workflows/smoke-update-cross-repo-pr.lock.yml +++ b/.github/workflows/smoke-update-cross-repo-pr.lock.yml @@ -306,6 +306,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -898,6 +902,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1242,6 +1251,10 @@ jobs: GH_AW_WORKFLOW_ID: "smoke-update-cross-repo-pr" GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CODE_PUSH_FAILURE_ERRORS: ${{ needs.safe_outputs.outputs.code_push_failure_errors }} GH_AW_CODE_PUSH_FAILURE_COUNT: ${{ needs.safe_outputs.outputs.code_push_failure_count }} GH_AW_SAFE_OUTPUT_MESSAGES: "{\"footer\":\"\\u003e 📜 *Cross-repo PR update smoke test by [{workflow_name}]({run_url})*{history_link}\",\"runStarted\":\"📜 [{workflow_name}]({run_url}) is adding the next Odyssey line to githubnext/gh-aw-side-repo PR #1...\",\"runSuccess\":\"✅ [{workflow_name}]({run_url}) successfully updated the cross-repo PR with a new Odyssey line!\",\"runFailure\":\"❌ [{workflow_name}]({run_url}) failed to update the cross-repo PR: {status}\"}" diff --git a/.github/workflows/smoke-workflow-call-with-inputs.lock.yml b/.github/workflows/smoke-workflow-call-with-inputs.lock.yml index e837e53f8ab..9bfcc4f0a4d 100644 --- a/.github/workflows/smoke-workflow-call-with-inputs.lock.yml +++ b/.github/workflows/smoke-workflow-call-with-inputs.lock.yml @@ -308,6 +308,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -788,6 +792,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1131,6 +1140,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_GROUP_REPORTS: "false" GH_AW_FAILURE_REPORT_AS_ISSUE: "true" GH_AW_TIMEOUT_MINUTES: "5" diff --git a/.github/workflows/smoke-workflow-call.lock.yml b/.github/workflows/smoke-workflow-call.lock.yml index 7dba9c88cb0..cdaa7557dd3 100644 --- a/.github/workflows/smoke-workflow-call.lock.yml +++ b/.github/workflows/smoke-workflow-call.lock.yml @@ -288,6 +288,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -745,6 +749,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1090,6 +1099,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_SAFE_OUTPUT_MESSAGES: "{\"footer\":\"\\u003e 🔁 *workflow_call smoke test by [{workflow_name}]({run_url})*{history_link}\",\"appendOnlyComments\":true,\"runStarted\":\"🔁 [{workflow_name}]({run_url}) is validating workflow_call checkout...\",\"runSuccess\":\"✅ [{workflow_name}]({run_url}) successfully validated workflow_call checkout.\",\"runFailure\":\"❌ [{workflow_name}]({run_url}) failed to validate workflow_call checkout. Check the logs.\"}" GH_AW_GROUP_REPORTS: "false" GH_AW_FAILURE_REPORT_AS_ISSUE: "true" diff --git a/.github/workflows/stale-repo-identifier.lock.yml b/.github/workflows/stale-repo-identifier.lock.yml index 57db6bddf62..db74be36585 100644 --- a/.github/workflows/stale-repo-identifier.lock.yml +++ b/.github/workflows/stale-repo-identifier.lock.yml @@ -300,6 +300,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -862,6 +866,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1222,6 +1231,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_SAFE_OUTPUT_MESSAGES: "{\"footer\":\"\\u003e 🔍 *Analysis by [{workflow_name}]({run_url})*{history_link}\",\"runStarted\":\"🔍 Stale Repository Identifier starting! [{workflow_name}]({run_url}) is analyzing repository activity...\",\"runSuccess\":\"✅ Analysis complete! [{workflow_name}]({run_url}) has finished analyzing stale repositories.\",\"runFailure\":\"⚠️ Analysis interrupted! [{workflow_name}]({run_url}) {status}.\"}" GH_AW_GROUP_REPORTS: "false" GH_AW_FAILURE_REPORT_AS_ISSUE: "true" diff --git a/.github/workflows/sub-issue-closer.lock.yml b/.github/workflows/sub-issue-closer.lock.yml index e86272f48f2..93dc83678f8 100644 --- a/.github/workflows/sub-issue-closer.lock.yml +++ b/.github/workflows/sub-issue-closer.lock.yml @@ -254,6 +254,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -817,6 +821,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1162,6 +1171,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_GROUP_REPORTS: "false" GH_AW_FAILURE_REPORT_AS_ISSUE: "true" GH_AW_TIMEOUT_MINUTES: "15" diff --git a/.github/workflows/super-linter.lock.yml b/.github/workflows/super-linter.lock.yml index 5dfee8c3b24..6acb3862da5 100644 --- a/.github/workflows/super-linter.lock.yml +++ b/.github/workflows/super-linter.lock.yml @@ -277,6 +277,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -757,6 +761,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1107,6 +1116,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_GROUP_REPORTS: "false" GH_AW_FAILURE_REPORT_AS_ISSUE: "true" GH_AW_TIMEOUT_MINUTES: "15" diff --git a/.github/workflows/technical-doc-writer.lock.yml b/.github/workflows/technical-doc-writer.lock.yml index 5f3a3101077..53d96f20f7f 100644 --- a/.github/workflows/technical-doc-writer.lock.yml +++ b/.github/workflows/technical-doc-writer.lock.yml @@ -299,6 +299,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -1043,6 +1047,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1426,6 +1435,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CODE_PUSH_FAILURE_ERRORS: ${{ needs.safe_outputs.outputs.code_push_failure_errors }} GH_AW_CODE_PUSH_FAILURE_COUNT: ${{ needs.safe_outputs.outputs.code_push_failure_count }} GH_AW_SAFE_OUTPUT_MESSAGES: "{\"footer\":\"\\u003e 📝 *Documentation by [{workflow_name}]({run_url})*{history_link}\",\"runStarted\":\"✍️ The Technical Writer begins! [{workflow_name}]({run_url}) is documenting this {event_type}...\",\"runSuccess\":\"📝 Documentation complete! [{workflow_name}]({run_url}) has written the docs. Clear as crystal! ✨\",\"runFailure\":\"✍️ Writer's block! [{workflow_name}]({run_url}) {status}. The page remains blank...\"}" diff --git a/.github/workflows/terminal-stylist.lock.yml b/.github/workflows/terminal-stylist.lock.yml index e4d52c23a28..dd9fec4b104 100644 --- a/.github/workflows/terminal-stylist.lock.yml +++ b/.github/workflows/terminal-stylist.lock.yml @@ -265,6 +265,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -715,6 +719,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1059,6 +1068,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CREATE_DISCUSSION_ERRORS: ${{ needs.safe_outputs.outputs.create_discussion_errors }} GH_AW_CREATE_DISCUSSION_ERROR_COUNT: ${{ needs.safe_outputs.outputs.create_discussion_error_count }} GH_AW_GROUP_REPORTS: "false" diff --git a/.github/workflows/test-dispatcher.lock.yml b/.github/workflows/test-dispatcher.lock.yml index c4699cb980a..8b7154f02c6 100644 --- a/.github/workflows/test-dispatcher.lock.yml +++ b/.github/workflows/test-dispatcher.lock.yml @@ -247,6 +247,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -647,6 +651,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -989,6 +998,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_GROUP_REPORTS: "false" GH_AW_FAILURE_REPORT_AS_ISSUE: "true" GH_AW_TIMEOUT_MINUTES: "20" diff --git a/.github/workflows/test-project-url-default.lock.yml b/.github/workflows/test-project-url-default.lock.yml index 032b9792ae4..c1ad36517fd 100644 --- a/.github/workflows/test-project-url-default.lock.yml +++ b/.github/workflows/test-project-url-default.lock.yml @@ -246,6 +246,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -906,6 +910,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1248,6 +1257,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_GROUP_REPORTS: "false" GH_AW_FAILURE_REPORT_AS_ISSUE: "true" GH_AW_TIMEOUT_MINUTES: "20" diff --git a/.github/workflows/test-workflow.lock.yml b/.github/workflows/test-workflow.lock.yml index 187dc998ecb..5639bf5428a 100644 --- a/.github/workflows/test-workflow.lock.yml +++ b/.github/workflows/test-workflow.lock.yml @@ -236,6 +236,10 @@ jobs: GH_AW_WORKFLOW_ID_SANITIZED: testworkflow outputs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} steps: @@ -398,6 +402,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} diff --git a/.github/workflows/tidy.lock.yml b/.github/workflows/tidy.lock.yml index c703393d0a0..e4795b92e0e 100644 --- a/.github/workflows/tidy.lock.yml +++ b/.github/workflows/tidy.lock.yml @@ -312,6 +312,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -874,6 +878,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1222,6 +1231,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CODE_PUSH_FAILURE_ERRORS: ${{ needs.safe_outputs.outputs.code_push_failure_errors }} GH_AW_CODE_PUSH_FAILURE_COUNT: ${{ needs.safe_outputs.outputs.code_push_failure_count }} GH_AW_GROUP_REPORTS: "false" diff --git a/.github/workflows/ubuntu-image-analyzer.lock.yml b/.github/workflows/ubuntu-image-analyzer.lock.yml index fe5610a7c7c..d353ecf1bb7 100644 --- a/.github/workflows/ubuntu-image-analyzer.lock.yml +++ b/.github/workflows/ubuntu-image-analyzer.lock.yml @@ -271,6 +271,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -764,6 +768,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1112,6 +1121,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CODE_PUSH_FAILURE_ERRORS: ${{ needs.safe_outputs.outputs.code_push_failure_errors }} GH_AW_CODE_PUSH_FAILURE_COUNT: ${{ needs.safe_outputs.outputs.code_push_failure_count }} GH_AW_GROUP_REPORTS: "false" diff --git a/.github/workflows/video-analyzer.lock.yml b/.github/workflows/video-analyzer.lock.yml index 95e7fb1eaf0..e87ba35faa9 100644 --- a/.github/workflows/video-analyzer.lock.yml +++ b/.github/workflows/video-analyzer.lock.yml @@ -267,6 +267,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -756,6 +760,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1099,6 +1108,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_GROUP_REPORTS: "false" GH_AW_FAILURE_REPORT_AS_ISSUE: "true" GH_AW_TIMEOUT_MINUTES: "15" diff --git a/.github/workflows/weekly-editors-health-check.lock.yml b/.github/workflows/weekly-editors-health-check.lock.yml index 6899960ef5b..213e7427213 100644 --- a/.github/workflows/weekly-editors-health-check.lock.yml +++ b/.github/workflows/weekly-editors-health-check.lock.yml @@ -261,6 +261,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -802,6 +806,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1160,6 +1169,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CODE_PUSH_FAILURE_ERRORS: ${{ needs.safe_outputs.outputs.code_push_failure_errors }} GH_AW_CODE_PUSH_FAILURE_COUNT: ${{ needs.safe_outputs.outputs.code_push_failure_count }} GH_AW_GROUP_REPORTS: "false" diff --git a/.github/workflows/weekly-issue-summary.lock.yml b/.github/workflows/weekly-issue-summary.lock.yml index 718e36b03b1..296f76c4051 100644 --- a/.github/workflows/weekly-issue-summary.lock.yml +++ b/.github/workflows/weekly-issue-summary.lock.yml @@ -279,6 +279,10 @@ jobs: outputs: detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -769,6 +773,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1132,6 +1141,10 @@ jobs: GH_AW_WORKFLOW_ID: "weekly-issue-summary" GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CREATE_DISCUSSION_ERRORS: ${{ needs.safe_outputs.outputs.create_discussion_errors }} GH_AW_CREATE_DISCUSSION_ERROR_COUNT: ${{ needs.safe_outputs.outputs.create_discussion_error_count }} GH_AW_GROUP_REPORTS: "false" diff --git a/.github/workflows/weekly-safe-outputs-spec-review.lock.yml b/.github/workflows/weekly-safe-outputs-spec-review.lock.yml index 8b7c3646de5..c4313d0131b 100644 --- a/.github/workflows/weekly-safe-outputs-spec-review.lock.yml +++ b/.github/workflows/weekly-safe-outputs-spec-review.lock.yml @@ -259,6 +259,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -715,6 +719,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1063,6 +1072,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CODE_PUSH_FAILURE_ERRORS: ${{ needs.safe_outputs.outputs.code_push_failure_errors }} GH_AW_CODE_PUSH_FAILURE_COUNT: ${{ needs.safe_outputs.outputs.code_push_failure_count }} GH_AW_GROUP_REPORTS: "false" diff --git a/.github/workflows/workflow-generator.lock.yml b/.github/workflows/workflow-generator.lock.yml index d5a87e92eea..995e0d28c1f 100644 --- a/.github/workflows/workflow-generator.lock.yml +++ b/.github/workflows/workflow-generator.lock.yml @@ -298,6 +298,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -860,6 +864,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1204,6 +1213,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_ASSIGNMENT_ERRORS: ${{ needs.safe_outputs.outputs.assign_to_agent_assignment_errors }} GH_AW_ASSIGNMENT_ERROR_COUNT: ${{ needs.safe_outputs.outputs.assign_to_agent_assignment_error_count }} GH_AW_GROUP_REPORTS: "false" diff --git a/.github/workflows/workflow-health-manager.lock.yml b/.github/workflows/workflow-health-manager.lock.yml index 21320a48714..1546c69a804 100644 --- a/.github/workflows/workflow-health-manager.lock.yml +++ b/.github/workflows/workflow-health-manager.lock.yml @@ -280,6 +280,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -950,6 +954,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1305,6 +1314,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_PUSH_REPO_MEMORY_RESULT: ${{ needs.push_repo_memory.result }} GH_AW_REPO_MEMORY_VALIDATION_FAILED_default: ${{ needs.push_repo_memory.outputs.validation_failed_default }} GH_AW_REPO_MEMORY_VALIDATION_ERROR_default: ${{ needs.push_repo_memory.outputs.validation_error_default }} diff --git a/.github/workflows/workflow-normalizer.lock.yml b/.github/workflows/workflow-normalizer.lock.yml index 9ed41fad368..edd11f274b8 100644 --- a/.github/workflows/workflow-normalizer.lock.yml +++ b/.github/workflows/workflow-normalizer.lock.yml @@ -263,6 +263,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -794,6 +798,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1140,6 +1149,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_GROUP_REPORTS: "false" GH_AW_FAILURE_REPORT_AS_ISSUE: "true" GH_AW_TIMEOUT_MINUTES: "30" diff --git a/.github/workflows/workflow-skill-extractor.lock.yml b/.github/workflows/workflow-skill-extractor.lock.yml index 9931e03a36f..81aa17f2da5 100644 --- a/.github/workflows/workflow-skill-extractor.lock.yml +++ b/.github/workflows/workflow-skill-extractor.lock.yml @@ -262,6 +262,10 @@ jobs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} detection_conclusion: ${{ steps.detection_conclusion.outputs.conclusion }} detection_success: ${{ steps.detection_conclusion.outputs.success }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} has_patch: ${{ steps.collect_output.outputs.has_patch }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} @@ -806,6 +810,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} @@ -1150,6 +1159,10 @@ jobs: GH_AW_SECRET_VERIFICATION_RESULT: ${{ needs.activation.outputs.secret_verification_result }} GH_AW_CHECKOUT_PR_SUCCESS: ${{ needs.agent.outputs.checkout_pr_success }} GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.agent.outputs.inference_access_error }} + GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.agent.outputs.ghes_token_exchange_403 }} + GH_AW_GHES_MODEL_LOADING_400: ${{ needs.agent.outputs.ghes_model_loading_400 }} + GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.agent.outputs.ghes_firewall_block }} + GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.agent.outputs.ghes_gh_cli_misconfigured }} GH_AW_CREATE_DISCUSSION_ERRORS: ${{ needs.safe_outputs.outputs.create_discussion_errors }} GH_AW_CREATE_DISCUSSION_ERROR_COUNT: ${{ needs.safe_outputs.outputs.create_discussion_error_count }} GH_AW_GROUP_REPORTS: "false" diff --git a/actions/setup/js/handle_agent_failure.cjs b/actions/setup/js/handle_agent_failure.cjs index c693a2c7014..871de216963 100644 --- a/actions/setup/js/handle_agent_failure.cjs +++ b/actions/setup/js/handle_agent_failure.cjs @@ -634,6 +634,45 @@ function buildInferenceAccessErrorContext(hasInferenceAccessError) { return "\n" + template; } +/** + * Build a context string when GHES-specific Copilot errors are detected. + * @param {Object} ghesErrors - Object containing GHES error flags + * @param {boolean} ghesErrors.tokenExchange403 - Whether a token exchange 403 error was detected + * @param {boolean} ghesErrors.modelLoading400 - Whether a model loading 400 error was detected + * @param {boolean} ghesErrors.firewallBlock - Whether a firewall block was detected + * @param {boolean} ghesErrors.ghCliMisconfigured - Whether gh CLI misconfiguration was detected + * @returns {string} Formatted context string, or empty string if no errors + */ +function buildGHESErrorContext(ghesErrors) { + const errorMessages = []; + + if (ghesErrors.tokenExchange403) { + const templatePath = "/opt/gh-aw/prompts/ghes_token_exchange_error.md"; + const template = fs.readFileSync(templatePath, "utf8"); + errorMessages.push(template); + } + + if (ghesErrors.modelLoading400) { + const templatePath = "/opt/gh-aw/prompts/ghes_model_loading_error.md"; + const template = fs.readFileSync(templatePath, "utf8"); + errorMessages.push(template); + } + + if (ghesErrors.firewallBlock) { + const templatePath = "/opt/gh-aw/prompts/ghes_firewall_block_error.md"; + const template = fs.readFileSync(templatePath, "utf8"); + errorMessages.push(template); + } + + if (ghesErrors.ghCliMisconfigured) { + const templatePath = "/opt/gh-aw/prompts/ghes_gh_cli_error.md"; + const template = fs.readFileSync(templatePath, "utf8"); + errorMessages.push(template); + } + + return errorMessages.length > 0 ? "\n" + errorMessages.join("\n\n") : ""; +} + /** * Handle agent job failure by creating or updating a failure tracking issue * This script is called from the conclusion job when the agent job has failed @@ -661,6 +700,14 @@ async function main() { const pushRepoMemoryResult = process.env.GH_AW_PUSH_REPO_MEMORY_RESULT || ""; const reportFailureAsIssue = process.env.GH_AW_FAILURE_REPORT_AS_ISSUE !== "false"; // Default to true + // GHES-specific Copilot error flags + const ghesErrors = { + tokenExchange403: process.env.GH_AW_GHES_TOKEN_EXCHANGE_403 === "true", + modelLoading400: process.env.GH_AW_GHES_MODEL_LOADING_400 === "true", + firewallBlock: process.env.GH_AW_GHES_FIREWALL_BLOCK === "true", + ghCliMisconfigured: process.env.GH_AW_GHES_GH_CLI_MISCONFIGURED === "true", + }; + // Collect repo-memory validation errors from all memory configurations const repoMemoryValidationErrors = []; const repoMemoryPatchSizeExceededIDs = []; @@ -887,6 +934,9 @@ async function main() { // Build inference access error context const inferenceAccessErrorContext = buildInferenceAccessErrorContext(inferenceAccessError); + // Build GHES-specific error context + const ghesErrorContext = buildGHESErrorContext(ghesErrors); + // Create template context const templateContext = { run_url: runUrl, @@ -909,6 +959,7 @@ async function main() { timeout_context: timeoutContext, fork_context: forkContext, inference_access_error_context: inferenceAccessErrorContext, + ghes_error_context: ghesErrorContext, }; // Render the comment template @@ -1011,6 +1062,9 @@ async function main() { // Build inference access error context const inferenceAccessErrorContext = buildInferenceAccessErrorContext(inferenceAccessError); + // Build GHES-specific error context + const ghesErrorContext = buildGHESErrorContext(ghesErrors); + // Create template context with sanitized workflow name const templateContext = { workflow_name: sanitizedWorkflowName, @@ -1034,6 +1088,7 @@ async function main() { timeout_context: timeoutContext, fork_context: forkContext, inference_access_error_context: inferenceAccessErrorContext, + ghes_error_context: ghesErrorContext, }; // Render the issue template diff --git a/actions/setup/md/agent_failure_comment.md b/actions/setup/md/agent_failure_comment.md index 1f491da4d79..627cc715c44 100644 --- a/actions/setup/md/agent_failure_comment.md +++ b/actions/setup/md/agent_failure_comment.md @@ -1,3 +1,3 @@ Agent job [{run_id}]({run_url}) failed. -{secret_verification_context}{inference_access_error_context}{assignment_errors_context}{create_discussion_errors_context}{code_push_failure_context}{repo_memory_validation_context}{push_repo_memory_failure_context}{missing_data_context}{missing_safe_outputs_context}{timeout_context}{fork_context} +{secret_verification_context}{inference_access_error_context}{ghes_error_context}{assignment_errors_context}{create_discussion_errors_context}{code_push_failure_context}{repo_memory_validation_context}{push_repo_memory_failure_context}{missing_data_context}{missing_safe_outputs_context}{timeout_context}{fork_context} diff --git a/actions/setup/md/agent_failure_issue.md b/actions/setup/md/agent_failure_issue.md index 1837481a6fb..4d1ab8669d5 100644 --- a/actions/setup/md/agent_failure_issue.md +++ b/actions/setup/md/agent_failure_issue.md @@ -1,10 +1,10 @@ ### Workflow Failure -**Workflow:** [{workflow_name}]({workflow_source_url}) -**Branch:** {branch} +**Workflow:** [{workflow_name}]({workflow_source_url}) +**Branch:** {branch} **Run:** {run_url}{pull_request_info} -{secret_verification_context}{inference_access_error_context}{assignment_errors_context}{create_discussion_errors_context}{code_push_failure_context}{repo_memory_validation_context}{push_repo_memory_failure_context}{missing_data_context}{missing_safe_outputs_context}{timeout_context}{fork_context} +{secret_verification_context}{inference_access_error_context}{ghes_error_context}{assignment_errors_context}{create_discussion_errors_context}{code_push_failure_context}{repo_memory_validation_context}{push_repo_memory_failure_context}{missing_data_context}{missing_safe_outputs_context}{timeout_context}{fork_context} ### Action Required diff --git a/actions/setup/md/ghes_firewall_block_error.md b/actions/setup/md/ghes_firewall_block_error.md new file mode 100644 index 00000000000..fff04883fe5 --- /dev/null +++ b/actions/setup/md/ghes_firewall_block_error.md @@ -0,0 +1,25 @@ + +**🔥 GHES API Domain Blocked by Firewall**: The workflow firewall is blocking access to your GHES API domain, preventing the Copilot CLI from communicating with the server. + +**Common causes:** +- GHES API domain `api.` is not in the firewall allowed domains list +- Network restrictions prevent access to the GHES instance +- Incorrect firewall configuration in the workflow + +**Resolution steps:** +1. Add your GHES API domain to the workflow's network.allowed list: + ```yaml + network: + allowed: + - api.your-ghes-host.com + ``` + +2. Alternatively, configure the engine API target: + ```yaml + engine: + api-target: https://api.your-ghes-host.com + ``` + +3. Ensure your GHES instance is reachable from GitHub Actions runners + +**Note:** The GHES API domain follows the pattern `api.`. For example, if your GHES instance is at `github.company.com`, the API domain is `api.github.company.com`. diff --git a/actions/setup/md/ghes_gh_cli_error.md b/actions/setup/md/ghes_gh_cli_error.md new file mode 100644 index 00000000000..a20b526ab12 --- /dev/null +++ b/actions/setup/md/ghes_gh_cli_error.md @@ -0,0 +1,25 @@ + +**🔧 gh CLI Misconfigured for GHES**: The gh CLI is targeting github.com instead of your GHES instance, causing repository resolution errors. + +**Common causes:** +- `GH_HOST` environment variable not set to your GHES hostname +- gh CLI not properly authenticated for GHES +- Workflow using github.com credentials instead of GHES credentials + +**Resolution steps:** +1. Ensure the `GH_HOST` environment variable is set in your workflow: + ```yaml + env: + GH_HOST: github.company.com + ``` + +2. Verify that the GitHub token is valid for your GHES instance (not a github.com token) + +3. Check that repository references use the correct hostname format + +**Example error:** +``` +Could not resolve to a Repository with the name 'owner/repo' +``` + +This error occurs when gh CLI commands try to resolve repositories on github.com when they should be querying your GHES instance. diff --git a/actions/setup/md/ghes_model_loading_error.md b/actions/setup/md/ghes_model_loading_error.md new file mode 100644 index 00000000000..52333908951 --- /dev/null +++ b/actions/setup/md/ghes_model_loading_error.md @@ -0,0 +1,18 @@ + +**⚠️ Copilot Model Loading Failed (GHES)**: The Copilot CLI received a 400 error when attempting to load available models. On GHES, this often indicates an API proxy routing issue. + +**Common causes:** +- GHES API proxy is routing requests to the wrong endpoint +- Copilot API endpoints not properly configured on GHES +- Upstream Copilot service connectivity issues from GHES + +**Resolution steps:** +1. Verify that the GHES API proxy is correctly configured for Copilot endpoints +2. Check GHES admin logs for API routing errors +3. Ensure GitHub Connect is properly configured and active +4. Test Copilot API connectivity from the GHES instance + +**Known issues:** +- See [github/gh-aw-firewall#1300](https://github.com/github/gh-aw-firewall/issues/1300) for API proxy routing issues + +**Note:** A 400 error during model loading may mask a deeper 403 authorization error. Check the token exchange status first. diff --git a/actions/setup/md/ghes_token_exchange_error.md b/actions/setup/md/ghes_token_exchange_error.md new file mode 100644 index 00000000000..09e6fa3a93f --- /dev/null +++ b/actions/setup/md/ghes_token_exchange_error.md @@ -0,0 +1,17 @@ + +**🔑 Copilot Token Exchange Failed (GHES)**: The Copilot CLI received a 403 error when attempting to exchange your GitHub token for a Copilot access token. This typically means Copilot is not licensed for your GitHub Enterprise Server instance. + +**Common causes:** +- Copilot is not enabled at the enterprise level on GHES +- Copilot seat not assigned to the token owner +- GitHub Connect not configured between GHES and GitHub.com + +**Resolution steps:** +1. Ask your GHES site administrator to verify that GitHub Connect is enabled +2. Ensure Copilot is enabled at the enterprise level in GHES admin settings +3. Verify that the token owner has been assigned a Copilot seat +4. Check the GHES admin logs for token exchange errors + +**Documentation:** +- [GHES Copilot setup guide](https://docs.github.com/en/enterprise-server/admin/copilot/managing-github-copilot-in-your-enterprise) +- [GitHub Connect configuration](https://docs.github.com/en/enterprise-server/admin/configuration/configuring-github-connect) diff --git a/actions/setup/sh/detect_ghes_copilot_errors.sh b/actions/setup/sh/detect_ghes_copilot_errors.sh new file mode 100644 index 00000000000..8c38ce5d488 --- /dev/null +++ b/actions/setup/sh/detect_ghes_copilot_errors.sh @@ -0,0 +1,60 @@ +#!/usr/bin/env bash +# +# detect_ghes_copilot_errors.sh - Detect GHES-specific Copilot errors +# +# Checks the agent stdio log for known error patterns specific to GitHub Enterprise Server (GHES) +# that indicate licensing, firewall, or configuration issues with Copilot on GHES. +# +# Sets GitHub Actions output variables: +# ghes_token_exchange_403=true if 403 on /copilot_internal/v2/token detected +# ghes_model_loading_400=true if 400 on model loading detected +# ghes_firewall_block=true if GHES API domain is blocked by firewall +# ghes_gh_cli_misconfigured=true if gh CLI resolution errors detected +# +# Exit codes: +# 0 - Always succeeds (uses continue-on-error in the workflow step) + +set -euo pipefail + +LOG_FILE="/tmp/gh-aw/agent-stdio.log" + +# Initialize all outputs to false +echo "ghes_token_exchange_403=false" >> "$GITHUB_OUTPUT" +echo "ghes_model_loading_400=false" >> "$GITHUB_OUTPUT" +echo "ghes_firewall_block=false" >> "$GITHUB_OUTPUT" +echo "ghes_gh_cli_misconfigured=false" >> "$GITHUB_OUTPUT" + +if [ ! -f "$LOG_FILE" ]; then + echo "Log file not found: $LOG_FILE" + exit 0 +fi + +# Check for 403 on Copilot token exchange endpoint +# Pattern: "403" + "copilot_internal/v2/token" or "Copilot token exchange failed" +if grep -qE "(403.*copilot_internal/v2/token|Copilot token exchange failed.*403)" "$LOG_FILE"; then + echo "Detected GHES Copilot token exchange 403 error" + echo "ghes_token_exchange_403=true" >> "$GITHUB_OUTPUT" +fi + +# Check for 400 on model loading +# Pattern: "400" + "model" or "Error loading models" + "400 Bad Request" +if grep -qE "(Error loading models.*400|400 Bad Request.*model|Failed to list models.*400)" "$LOG_FILE"; then + echo "Detected GHES Copilot model loading 400 error" + echo "ghes_model_loading_400=true" >> "$GITHUB_OUTPUT" +fi + +# Check for firewall blocking GHES API domain +# Pattern: "blocked" + "api." or "firewall" + "api." + hostname +if grep -qE "(blocked.*api\.|firewall.*api\.[^/]+|api\.[^/]+.*not.*allowed|api\.[^/]+.*firewall)" "$LOG_FILE"; then + echo "Detected GHES API domain blocked by firewall" + echo "ghes_firewall_block=true" >> "$GITHUB_OUTPUT" +fi + +# Check for gh CLI misconfiguration (targeting github.com instead of GHES) +# Pattern: "Could not resolve to a Repository" or "gh.*github.com" when GHES is expected +if grep -qE "(Could not resolve to a Repository|gh.*targeting.*github\.com|GH_HOST.*not set)" "$LOG_FILE"; then + echo "Detected gh CLI misconfiguration (targeting github.com instead of GHES)" + echo "ghes_gh_cli_misconfigured=true" >> "$GITHUB_OUTPUT" +fi + +echo "GHES error detection complete" diff --git a/pkg/workflow/compiler_main_job.go b/pkg/workflow/compiler_main_job.go index 11d72efa9a5..bb3bacfd6dd 100644 --- a/pkg/workflow/compiler_main_job.go +++ b/pkg/workflow/compiler_main_job.go @@ -171,6 +171,14 @@ func (c *Compiler) buildMainJob(data *WorkflowData, activationJobCreated bool) ( if _, ok := engine.(*CopilotEngine); ok { outputs["inference_access_error"] = "${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }}" compilerMainJobLog.Print("Added inference_access_error output (Copilot engine)") + + // Add GHES-specific error outputs for Copilot engine + // These outputs are set by the detect-ghes-errors step when GHES-specific errors are detected + outputs["ghes_token_exchange_403"] = "${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }}" + outputs["ghes_model_loading_400"] = "${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }}" + outputs["ghes_firewall_block"] = "${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }}" + outputs["ghes_gh_cli_misconfigured"] = "${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }}" + compilerMainJobLog.Print("Added GHES error outputs (Copilot engine)") } } diff --git a/pkg/workflow/compiler_yaml_main_job.go b/pkg/workflow/compiler_yaml_main_job.go index 48fdbe037aa..34d596280a3 100644 --- a/pkg/workflow/compiler_yaml_main_job.go +++ b/pkg/workflow/compiler_yaml_main_job.go @@ -323,6 +323,14 @@ func (c *Compiler) generateMainJobSteps(yaml *strings.Builder, data *WorkflowDat for _, line := range detectionStep { yaml.WriteString(line + "\n") } + + // Add GHES-specific error detection step for Copilot engine + // This step detects GHES-specific errors like token exchange failures, model loading errors, + // firewall blocks, and gh CLI misconfiguration + ghesDetectionStep := generateGHESErrorDetectionStep() + for _, line := range ghesDetectionStep { + yaml.WriteString(line + "\n") + } } // Mark that we've completed agent execution - step order validation starts from here diff --git a/pkg/workflow/copilot_engine_execution.go b/pkg/workflow/copilot_engine_execution.go index 7d13b1218c7..5633b55f275 100644 --- a/pkg/workflow/copilot_engine_execution.go +++ b/pkg/workflow/copilot_engine_execution.go @@ -417,6 +417,21 @@ func generateInferenceAccessErrorDetectionStep() GitHubActionStep { return GitHubActionStep(step) } +// generateGHESErrorDetectionStep generates a step that detects GHES-specific Copilot errors. +// This includes token exchange failures, model loading errors, firewall blocks, and gh CLI misconfiguration. +// The step always runs and checks the agent stdio log for known GHES error patterns. +func generateGHESErrorDetectionStep() GitHubActionStep { + var step []string + + step = append(step, " - name: Detect GHES-specific Copilot errors") + step = append(step, " id: detect-ghes-errors") + step = append(step, " if: always()") + step = append(step, " continue-on-error: true") + step = append(step, " run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh") + + return GitHubActionStep(step) +} + // extractAddDirPaths extracts all directory paths from copilot args that follow --add-dir flags func extractAddDirPaths(args []string) []string { var dirs []string diff --git a/pkg/workflow/ghes_copilot_errors_test.go b/pkg/workflow/ghes_copilot_errors_test.go new file mode 100644 index 00000000000..ca3abc5fca9 --- /dev/null +++ b/pkg/workflow/ghes_copilot_errors_test.go @@ -0,0 +1,169 @@ +//go:build !integration + +package workflow + +import ( + "os" + "path/filepath" + "strings" + "testing" + + "github.com/github/gh-aw/pkg/stringutil" + "github.com/github/gh-aw/pkg/testutil" +) + +// TestGHESErrorDetectionStep tests that a Copilot engine workflow includes +// the detect-ghes-errors step in the agent job. +func TestGHESErrorDetectionStep(t *testing.T) { + testDir := testutil.TempDir(t, "test-ghes-error-*") + workflowFile := filepath.Join(testDir, "test-workflow.md") + + workflow := `--- +on: workflow_dispatch +engine: copilot +--- + +Test workflow` + + if err := os.WriteFile(workflowFile, []byte(workflow), 0644); err != nil { + t.Fatalf("Failed to write test workflow: %v", err) + } + + compiler := NewCompiler() + if err := compiler.CompileWorkflow(workflowFile); err != nil { + t.Fatalf("Failed to compile workflow: %v", err) + } + + // Read the generated lock file + lockFile := stringutil.MarkdownToLockFile(workflowFile) + lockContent, err := os.ReadFile(lockFile) + if err != nil { + t.Fatalf("Failed to read lock file: %v", err) + } + + lockStr := string(lockContent) + + // Check that agent job has detect-ghes-errors step + if !strings.Contains(lockStr, "id: detect-ghes-errors") { + t.Error("Expected agent job to have detect-ghes-errors step") + } + + // Check that the detection step calls the shell script + if !strings.Contains(lockStr, "bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh") { + t.Error("Expected detect-ghes-errors step to call detect_ghes_copilot_errors.sh") + } + + // Check that the agent job exposes all GHES error outputs + ghesOutputs := []string{ + "ghes_token_exchange_403:", + "ghes_model_loading_400:", + "ghes_firewall_block:", + "ghes_gh_cli_misconfigured:", + } + + for _, output := range ghesOutputs { + if !strings.Contains(lockStr, output) { + t.Errorf("Expected agent job to have %s output", output) + } + } +} + +// TestGHESErrorsInConclusionJob tests that the conclusion job receives the GHES error +// env vars when the Copilot engine is used. +func TestGHESErrorsInConclusionJob(t *testing.T) { + testDir := testutil.TempDir(t, "test-ghes-error-conclusion-*") + workflowFile := filepath.Join(testDir, "test-workflow.md") + + workflow := `--- +on: workflow_dispatch +engine: copilot +safe-outputs: + add-comment: + max: 5 +--- + +Test workflow` + + if err := os.WriteFile(workflowFile, []byte(workflow), 0644); err != nil { + t.Fatalf("Failed to write test workflow: %v", err) + } + + compiler := NewCompiler() + if err := compiler.CompileWorkflow(workflowFile); err != nil { + t.Fatalf("Failed to compile workflow: %v", err) + } + + // Read the generated lock file + lockFile := stringutil.MarkdownToLockFile(workflowFile) + lockContent, err := os.ReadFile(lockFile) + if err != nil { + t.Fatalf("Failed to read lock file: %v", err) + } + + lockStr := string(lockContent) + + // Check that conclusion job receives all GHES error outputs from agent job + ghesEnvVars := []string{ + "GH_AW_GHES_TOKEN_EXCHANGE_403:", + "GH_AW_GHES_MODEL_LOADING_400:", + "GH_AW_GHES_FIREWALL_BLOCK:", + "GH_AW_GHES_GH_CLI_MISCONFIGURED:", + } + + for _, envVar := range ghesEnvVars { + if !strings.Contains(lockStr, envVar) { + t.Errorf("Expected conclusion job to receive %s from agent job", envVar) + } + } +} + +// TestGHESErrorsNotInNonCopilotEngine tests that non-Copilot engines +// do NOT include the detect-ghes-errors step. +func TestGHESErrorsNotInNonCopilotEngine(t *testing.T) { + testDir := testutil.TempDir(t, "test-ghes-error-claude-*") + workflowFile := filepath.Join(testDir, "test-workflow.md") + + workflow := `--- +on: workflow_dispatch +engine: claude +--- + +Test workflow` + + if err := os.WriteFile(workflowFile, []byte(workflow), 0644); err != nil { + t.Fatalf("Failed to write test workflow: %v", err) + } + + compiler := NewCompiler() + if err := compiler.CompileWorkflow(workflowFile); err != nil { + t.Fatalf("Failed to compile workflow: %v", err) + } + + // Read the generated lock file + lockFile := stringutil.MarkdownToLockFile(workflowFile) + lockContent, err := os.ReadFile(lockFile) + if err != nil { + t.Fatalf("Failed to read lock file: %v", err) + } + + lockStr := string(lockContent) + + // Check that non-Copilot engines do NOT have the detect-ghes-errors step + if strings.Contains(lockStr, "id: detect-ghes-errors") { + t.Error("Expected non-Copilot engine to NOT have detect-ghes-errors step") + } + + // Check that non-Copilot engines do NOT have the GHES error outputs + ghesOutputs := []string{ + "ghes_token_exchange_403:", + "ghes_model_loading_400:", + "ghes_firewall_block:", + "ghes_gh_cli_misconfigured:", + } + + for _, output := range ghesOutputs { + if strings.Contains(lockStr, output) { + t.Errorf("Expected non-Copilot engine to NOT have %s output", output) + } + } +} diff --git a/pkg/workflow/notify_comment.go b/pkg/workflow/notify_comment.go index e850f56acd3..b484bf2ff0f 100644 --- a/pkg/workflow/notify_comment.go +++ b/pkg/workflow/notify_comment.go @@ -154,6 +154,13 @@ func (c *Compiler) buildConclusionJob(data *WorkflowData, mainJobName string, sa // This detects when the Copilot CLI fails due to the token lacking inference access if _, ok := engine.(*CopilotEngine); ok { agentFailureEnvVars = append(agentFailureEnvVars, fmt.Sprintf(" GH_AW_INFERENCE_ACCESS_ERROR: ${{ needs.%s.outputs.inference_access_error }}\n", mainJobName)) + + // Pass GHES-specific error outputs for Copilot engine + // These detect GHES-specific failures like token exchange errors, model loading errors, etc. + agentFailureEnvVars = append(agentFailureEnvVars, fmt.Sprintf(" GH_AW_GHES_TOKEN_EXCHANGE_403: ${{ needs.%s.outputs.ghes_token_exchange_403 }}\n", mainJobName)) + agentFailureEnvVars = append(agentFailureEnvVars, fmt.Sprintf(" GH_AW_GHES_MODEL_LOADING_400: ${{ needs.%s.outputs.ghes_model_loading_400 }}\n", mainJobName)) + agentFailureEnvVars = append(agentFailureEnvVars, fmt.Sprintf(" GH_AW_GHES_FIREWALL_BLOCK: ${{ needs.%s.outputs.ghes_firewall_block }}\n", mainJobName)) + agentFailureEnvVars = append(agentFailureEnvVars, fmt.Sprintf(" GH_AW_GHES_GH_CLI_MISCONFIGURED: ${{ needs.%s.outputs.ghes_gh_cli_misconfigured }}\n", mainJobName)) } // Pass assignment error outputs from safe_outputs job if assign-to-agent is configured diff --git a/pkg/workflow/testdata/wasm_golden/TestWasmGolden_CompileFixtures/basic-copilot.golden b/pkg/workflow/testdata/wasm_golden/TestWasmGolden_CompileFixtures/basic-copilot.golden index 6cc7ad9a97d..41e167a076a 100644 --- a/pkg/workflow/testdata/wasm_golden/TestWasmGolden_CompileFixtures/basic-copilot.golden +++ b/pkg/workflow/testdata/wasm_golden/TestWasmGolden_CompileFixtures/basic-copilot.golden @@ -212,6 +212,10 @@ jobs: GH_AW_WORKFLOW_ID_SANITIZED: basiccopilot outputs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} steps: @@ -374,6 +378,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} diff --git a/pkg/workflow/testdata/wasm_golden/TestWasmGolden_CompileFixtures/smoke-copilot.golden b/pkg/workflow/testdata/wasm_golden/TestWasmGolden_CompileFixtures/smoke-copilot.golden index 7f50c3ca1b0..92268d4d7cc 100644 --- a/pkg/workflow/testdata/wasm_golden/TestWasmGolden_CompileFixtures/smoke-copilot.golden +++ b/pkg/workflow/testdata/wasm_golden/TestWasmGolden_CompileFixtures/smoke-copilot.golden @@ -300,6 +300,10 @@ jobs: GH_AW_WORKFLOW_ID_SANITIZED: smokecopilot outputs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} steps: @@ -552,6 +556,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }} diff --git a/pkg/workflow/testdata/wasm_golden/TestWasmGolden_CompileFixtures/with-imports.golden b/pkg/workflow/testdata/wasm_golden/TestWasmGolden_CompileFixtures/with-imports.golden index 43073782f92..241aa08edad 100644 --- a/pkg/workflow/testdata/wasm_golden/TestWasmGolden_CompileFixtures/with-imports.golden +++ b/pkg/workflow/testdata/wasm_golden/TestWasmGolden_CompileFixtures/with-imports.golden @@ -215,6 +215,10 @@ jobs: GH_AW_WORKFLOW_ID_SANITIZED: withimports outputs: checkout_pr_success: ${{ steps.checkout-pr.outputs.checkout_pr_success || 'true' }} + ghes_firewall_block: ${{ steps.detect-ghes-errors.outputs.ghes_firewall_block || 'false' }} + ghes_gh_cli_misconfigured: ${{ steps.detect-ghes-errors.outputs.ghes_gh_cli_misconfigured || 'false' }} + ghes_model_loading_400: ${{ steps.detect-ghes-errors.outputs.ghes_model_loading_400 || 'false' }} + ghes_token_exchange_403: ${{ steps.detect-ghes-errors.outputs.ghes_token_exchange_403 || 'false' }} inference_access_error: ${{ steps.detect-inference-error.outputs.inference_access_error || 'false' }} model: ${{ needs.activation.outputs.model }} steps: @@ -377,6 +381,11 @@ jobs: if: always() continue-on-error: true run: bash /opt/gh-aw/actions/detect_inference_access_error.sh + - name: Detect GHES-specific Copilot errors + id: detect-ghes-errors + if: always() + continue-on-error: true + run: bash /opt/gh-aw/actions/detect_ghes_copilot_errors.sh - name: Configure Git credentials env: REPO_NAME: ${{ github.repository }}