Conversation
Co-authored-by: pelikhan <4175913+pelikhan@users.noreply.github.com>
…ic schema Co-authored-by: pelikhan <4175913+pelikhan@users.noreply.github.com>
repos="public" and add guard-policies to stdio schema
|
@copilot add to smoke-copilot |
…opilot Co-authored-by: pelikhan <4175913+pelikhan@users.noreply.github.com>
Done in ee9c867. Added
|
repos="public" and add guard-policies to stdio schemarepos="public", add guard-policies to stdio schema, and smoke-test guard policy
|
✅ All tools validated successfully! Agent Container Smoke Test confirms agent container is ready. |
|
📰 BREAKING: Smoke Copilot is now investigating this pull request. Sources say the story is developing... |
|
🎬 THE END — Smoke Claude MISSION: ACCOMPLISHED! The hero saves the day! ✨ |
|
🌑 The shadows whisper... Smoke Codex failed. The oracle requires further meditation... |
Agent Container Tool Check
Result: 12/12 tools available ✅ Overall Status: PASS
|
Smoke Test Results — Run §23033417149
Overall: PARTIAL (15 ✅, 2
|
There was a problem hiding this comment.
💥 Automated smoke test review - all systems nominal!
💥 [THE END] — Illustrated by Smoke Claude
|
📰 VERDICT: Smoke Copilot has concluded. All systems operational. This is a developing story. 🎤 |
|
Review this error message:
Update compiler |
…id bare wildcard scope) Co-authored-by: pelikhan <4175913+pelikhan@users.noreply.github.com>
Fixed in 4b900f8. For Warning Firewall rules blocked me from connecting to one or more addresses (expand for details)I tried to connect to the following addresses, but was blocked by firewall rules:
If you need me to access, download, or install something from one of these locations, you can either:
|
repos="public", add guard-policies to stdio schema, and smoke-test guard policyrepos="public"/"all", add guard-policies to stdio schema, and smoke-test guard policy
Two bugs in the
repos/secrecy/min-integrityguard policy implementation for the GitHub tool, plus a smoke test to exercise the new guard policy feature.Issues
Invalid write-sink pattern for global
reposkeywords:repos="public"producedaccept: ["private:*"](and after an intermediate fix,accept: ["public:*"]) in the derived safe-outputs write-sink policy. However, the safeoutputs server requires owner-scoped patterns like"public:owner/*"or"public:owner/repo"— bare wildcards without an owner component are not valid scopes. The global string keywords"all"and"public"cannot be expressed as owner-scoped patterns, so no write-sink guard-policy should be derived for them.Schema gap:
stdioServerConfigin the public MCP gateway schema (docs/public/schemas/mcp-gateway-config.schema.json) hadadditionalProperties: falsebut noguard-policiesproperty, despite the compiler emitting it for local (Docker) mode.httpServerConfigalready had the field.Changes
mcp_github_config.go: FixderiveSafeOutputsGuardPolicyFromGitHubso that:repos="public"orrepos="all"→ no write-sink guard-policy derived (global keywords cannot be expressed as owner-scoped patterns; consistent with docs: "If you userepos: allorrepos: public, no safeoutputs guard-policy is derived")accept: ["private:owner/repo", "private:owner/*", ...](owner-scoped, unchanged)"owner/repo") →accept: ["private:owner/repo"](owner-scoped, unchanged)docs/public/schemas/mcp-gateway-config.schema.json: Addguard-policiestostdioServerConfigproperties, consistent withhttpServerConfig.safeoutputs_guard_policy_test.go: Update expected values —repos="public"andrepos="all"now expectnil(no policy derived)..github/workflows/smoke-copilot.md: Addrepos: publicandmin-integrity: approvedguard policy to the smoke-copilot workflow to exercise the feature end-to-end.Original prompt
💡 You can make Copilot smarter by setting up custom instructions, customizing its development environment and configuring Model Context Protocol (MCP) servers. Learn more Copilot coding agent tips in the docs.
✨ PR Review Safe Output Test - Run 23033417149