Summary
Bump the default Agent Workflow Firewall (AWF) version from v0.25.42 to v0.25.43.
Changes Required
File: pkg/constants/version_constants.go
// Before
const DefaultFirewallVersion Version = "v0.25.42"
// After
const DefaultFirewallVersion Version = "v0.25.43"
Changelog (since v0.25.41)
New features
ARC/DinD support
Bug fixes & refactoring
New Frontmatter / Config Fields for gh-aw Compiler
The following new AWF config properties should be considered for exposure through gh-aw workflow frontmatter:
1. container.dockerHostPathPrefix (string)
container:
dockerHostPathPrefix: /host
CLI: --docker-host-path-prefix /host
Prefixes all AWF bind-mount source paths so a Docker daemon with a separate filesystem can resolve them. Essential for ARC DinD sidecar runners. Kernel virtual filesystems (/dev, /sys, /proc) are automatically excluded.
Frontmatter suggestion: firewall.container.dockerHostPathPrefix or a simpler firewall.arc-dind-prefix.
2. apiProxy.maxRuns (integer)
CLI: --max-runs 100
Hard cap on the number of LLM API invocations per workflow run. Complements the existing maxEffectiveTokens budget guard. Returns HTTP 429 with max_runs_exceeded error type when exceeded.
Frontmatter suggestion: firewall.apiProxy.maxRuns — useful for cost-control guardrails in agentic workflows.
3. apiProxy.auth (object)
apiProxy:
auth:
type: github-oidc
provider: azure
azureTenantId: "..."
azureClientId: "..."
Enables OIDC-based credential exchange — agents can reach Azure OpenAI, AWS Bedrock, or GCP Vertex AI without static API keys by exchanging GitHub OIDC tokens for cloud provider tokens.
Frontmatter suggestion: firewall.apiProxy.auth.* — enables keyless LLM access in enterprise environments. Requires id-token: write permission.
Checklist
References
Summary
Bump the default Agent Workflow Firewall (AWF) version from
v0.25.42tov0.25.43.Changes Required
File:
pkg/constants/version_constants.goChangelog (since v0.25.41)
New features
--docker-host-path-prefix <prefix>— Prefix bind-mount source paths so the Docker daemon can resolve runner filesystem paths. Required for ARC DinD sidecar runners where the runner and daemon have separate filesystems. Kernel virtual filesystems (/dev,/sys,/proc) are automatically excluded from prefixing. (Treat under-provisioned permissions as warnings in non-strict mode #2843)apiProxy.maxRuns(--max-runs) — Absolute maximum number of LLM invocations allowed per run. When reached, API proxy returns HTTP 429 withmax_runs_exceeded. (Prettify permissions validation error messages #2798)apiProxy.auth— OIDC-based credential exchange configuration for Azure, AWS, and GCP. Enables GitHub OIDC → cloud provider token exchange so agents can reach cloud-hosted LLM endpoints without static API keys. ([smoke-detector] 🔍 Smoke Test Investigation - Smoke OpenCode Run #51: OpenCode Agent Execution Failure #2772)container.dockerHostPathPrefix— Config-file equivalent of--docker-host-path-prefix. (Treat under-provisioned permissions as warnings in non-strict mode #2843)ARC/DinD support
DOCKER_HOSTsockets for DinD mounts on ARC runners — whenDOCKER_HOSTpoints to a non-default Unix socket (e.g./run/dind/docker.sock), AWF now exposes that socket inside the agent container instead of assuming/var/run/docker.sock. (🔑 Add flag for using local secrets during workflow execution #2841)normalizeDockerHostPathPrefix()andtranslateBindMountHostPath()with kernel VFS passthrough (/dev,/sys,/proc). (Treat under-provisioned permissions as warnings in non-strict mode #2843)hidepid=2to procfs mount at/host/proc— prevents agent from reading PID 1/proc/1/environ(credential isolation against race window). (Treat under-provisioned permissions as warnings in non-strict mode #2843)Bug fixes & refactoring
COPILOT_PROVIDER_WIRE_API=responsesfor GPT-5-family Copilot BYOK runs ([test-coverage] Add comprehensive tests for console renderSlice function (+56.2% function coverage, +0.1% overall) #2842)--ignore-scriptsfor engine CLI installs in lock files (🔍 Agentic Workflow Audit Report - October 31, 2025 #2840)New Frontmatter / Config Fields for gh-aw Compiler
The following new AWF config properties should be considered for exposure through gh-aw workflow frontmatter:
1.
container.dockerHostPathPrefix(string)CLI:
--docker-host-path-prefix /hostPrefixes all AWF bind-mount source paths so a Docker daemon with a separate filesystem can resolve them. Essential for ARC DinD sidecar runners. Kernel virtual filesystems (
/dev,/sys,/proc) are automatically excluded.Frontmatter suggestion:
firewall.container.dockerHostPathPrefixor a simplerfirewall.arc-dind-prefix.2.
apiProxy.maxRuns(integer)CLI:
--max-runs 100Hard cap on the number of LLM API invocations per workflow run. Complements the existing
maxEffectiveTokensbudget guard. Returns HTTP 429 withmax_runs_exceedederror type when exceeded.Frontmatter suggestion:
firewall.apiProxy.maxRuns— useful for cost-control guardrails in agentic workflows.3.
apiProxy.auth(object)Enables OIDC-based credential exchange — agents can reach Azure OpenAI, AWS Bedrock, or GCP Vertex AI without static API keys by exchanging GitHub OIDC tokens for cloud provider tokens.
Frontmatter suggestion:
firewall.apiProxy.auth.*— enables keyless LLM access in enterprise environments. Requiresid-token: writepermission.Checklist
DefaultFirewallVersioninpkg/constants/version_constants.gomake buildto rebuild the binarymake recompileto regenerate all lock files with the new versionmake agent-finishto validatedockerHostPathPrefix,maxRuns,auth) for frontmatter exposureReferences