-
Notifications
You must be signed in to change notification settings - Fork 46
Update AWF to v0.13.0 and enable --enable-chroot #12827
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
… flag Co-authored-by: Mossaka <5447827+Mossaka@users.noreply.github.com>
🔍 PR Triage ResultsCategory: chore | Risk: medium | Priority: 45/100 Scores Breakdown
📋 Recommended Action: batch_reviewThis PR is part of Batch #4: Chore Updates (batch-chore-001) along with PR #12815. Review together for configuration consistency. Batch Review Strategy: Verify compatibility and test for regressions. Next Steps:
Triaged by PR Triage Agent on 2026-01-31 | Run #21540069309
|
🔍 PR Triage ResultsCategory: chore | Risk: high | Priority: 55/100 Scores Breakdown
📋 Recommended Action: Batch ReviewThis PR is recommended for batch review with similar PRs. Triaged by PR Triage Agent on 2026-01-31 12:17 UTC
|
🔍 PR Triage ResultsCategory: chore | Risk: high | Priority: 37/100 Scores Breakdown
📋 Recommended Action: batch_reviewBatch: batch-chore-001 (with PR #12574) This PR should be reviewed together with #12574 to assess combined infrastructure impact. Both PRs modify workflow generation and execution patterns. Blockers:
Strengths:
Review Notes:
Triaged by PR Triage Agent on 2026-01-31T18:14:11Z
|
🔍 PR Triage ResultsCategory: chore | Risk: high | Priority: 40/100 Scores Breakdown
📋 Recommended Action: batch_reviewWhy: High-risk infrastructure change needing careful review. Part of batch-chore-001 for coordinated infrastructure updates. Batch: batch-chore-001 (Infrastructure Updates) Next steps:
Triaged by PR Triage Agent on 2026-02-01
|
🔍 PR Triage ResultsCategory: chore | Risk: high | Priority: 43/100 Scores Breakdown
📋 Recommended Action: Fast-trackThis PR updates critical security infrastructure (AWF to v0.13.0) and enables chroot for transparent host binary execution. High-risk change requiring careful review. Next Steps:
Merge Conflict Status: Batch Info: Part of Triaged by PR Triage Agent on 2026-02-01
|
🔍 PR Triage ResultsCategory: chore | Risk: high | Priority: 62/100 Scores Breakdown
📋 Recommended Action: fast_trackThis PR requires priority review. The AWF version update to v0.13.0 with chroot enablement is a significant security enhancement that should be expedited once CI passes. Next steps:
Triaged by PR Triage Agent on 2026-02-01 - Run #21567753665
|
🔍 PR Triage ResultsCategory: chore | Risk: high | Priority: 65/100 Scores Breakdown
📋 Recommended Action: fast-trackImportant security enhancement - enables Review needed to validate security implications and test coverage. Triaged by PR Triage Agent on 2026-02-02
|
🔍 PR Triage ResultsCategory: Chore | Risk: HIGH | Priority: 42/100 Scores Breakdown
📋 Recommended Action: BATCH REVIEWBatch Review Recommendation:
Triaged by PR Triage Agent on 2026-02-02
|
|
@copilot merge main and regenerate |
With AWF v0.13.0's --enable-chroot support, the container can access
host binaries transparently via chroot /host. This makes individual
binary mounts and directory mounts redundant.
Remove from all engines (Copilot, Claude, Codex):
- 16 individual binary mounts (/usr/bin/cat, /usr/bin/curl, etc.)
- Copilot binary mount (/usr/local/bin/copilot)
- /opt/hostedtoolcache mount
- /opt/gh-aw mount
Keep essential mounts that need specific permissions:
- /tmp:/tmp:rw (temp files)
- ${HOME}/.cache:${HOME}/.cache:rw (build caches)
- ${GITHUB_WORKSPACE}:${GITHUB_WORKSPACE}:rw (workspace)
- /home/runner/.copilot:/home/runner/.copilot:rw (Copilot only)
This reduces AWF command line from ~25 mounts to 3-4 mounts.
Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
Recompiled all lock.yml files with simplified AWF mounts. Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
6f2eaa1 to
e0e750c
Compare
🔍 PR Triage ResultsCategory: chore | Risk: high | Priority: 54/100 Scores Breakdown
📋 Recommended Action: batch_reviewThis PR updates the AWF (Agentic Workflow Firewall) to v0.13.0 and enables the chroot feature. The large scope (154 files) indicates substantial lock file regeneration. Batch review recommended for thorough validation across all affected workflows. Batch: This PR is part of batch-chore-001 for efficient group review. Triaged by PR Triage Agent on 2026-02-02
|
pkg/constants/constants.gopkg/constants/constants_test.go--enable-chrootflag to AWF commands in copilot engine (copilot_engine_execution.go)--enable-chrootflag to AWF commands in claude engine (claude_engine.go)--enable-chrootflag to AWF commands in codex engine (codex_engine.go)--enable-chrootflag in firewall args testSecurity Summary
No new security vulnerabilities introduced. CodeQL analysis found 0 alerts.
Original prompt
💬 We'd love your input! Share your thoughts on Copilot coding agent in our 2 minute survey.