Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 2 additions & 2 deletions pkg/cli/logs_command.go
Original file line number Diff line number Diff line change
Expand Up @@ -75,7 +75,7 @@ Examples:
` + string(constants.CLIExtensionPrefix) + ` logs --safe-output report-incomplete # Filter logs with report-incomplete messages
` + string(constants.CLIExtensionPrefix) + ` logs --ref main # Filter logs by branch or tag
` + string(constants.CLIExtensionPrefix) + ` logs --ref feature-xyz # Filter logs by feature branch
` + string(constants.CLIExtensionPrefix) + ` logs --filtered-integrity # Filter logs with DIFC (data integrity flow control) integrity-filtered items in the gateway logs
` + string(constants.CLIExtensionPrefix) + ` logs --filtered-integrity # Filter logs containing items that were filtered by gateway integrity checks
Copy link

Copilot AI Apr 24, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The updated help text for --filtered-integrity mentions only “gateway integrity checks”, but the underlying filter checks for any DIFC_FILTERED events, which include both integrity- and secrecy-filtered events (see runHasDifcFilteredItems comment in pkg/cli/logs_run_processor.go). Consider adjusting the example text to reflect both integrity and secrecy (or use a more general phrasing like “gateway policy checks”).

This issue also appears on line 210 of the same file.

Suggested change
` + string(constants.CLIExtensionPrefix) + ` logs --filtered-integrity # Filter logs containing items that were filtered by gateway integrity checks
` + string(constants.CLIExtensionPrefix) + ` logs --filtered-integrity # Filter logs containing items that were filtered by gateway policy checks

Copilot uses AI. Check for mistakes.
` + string(constants.CLIExtensionPrefix) + ` logs --no-staged # Exclude staged workflow runs from results

# Run ID range filtering
Expand Down Expand Up @@ -208,7 +208,7 @@ Examples:
logsCmd.Flags().Bool("firewall", false, "Filter to only runs with firewall enabled")
logsCmd.Flags().Bool("no-firewall", false, "Filter to only runs without firewall enabled")
logsCmd.Flags().String("safe-output", "", "Filter to runs containing a specific safe output type (e.g., create-issue, missing-tool, missing-data, noop, report-incomplete)")
logsCmd.Flags().Bool("filtered-integrity", false, "Filter to runs with DIFC (data integrity flow control) integrity-filtered items in the gateway logs")
logsCmd.Flags().Bool("filtered-integrity", false, "Filter to runs containing items that were filtered by gateway integrity checks")
logsCmd.Flags().Bool("parse", false, "Run JavaScript parsers on agent logs and firewall logs, writing Markdown to log.md and firewall.md")
addJSONFlag(logsCmd)
logsCmd.Flags().Int("timeout", 0, "Download timeout in minutes (0 = no timeout)")
Expand Down
2 changes: 0 additions & 2 deletions pkg/cli/tokens_bootstrap.go
Original file line number Diff line number Diff line change
Expand Up @@ -26,8 +26,6 @@ prompt for any missing required secrets.

Only required secrets are prompted for. Optional secrets are not shown.

Documentation:
https://cli.github.com/manual/gh_auth_login
Examples:
gh aw secrets bootstrap # Check and set up all required secrets
gh aw secrets bootstrap --non-interactive # Display missing secrets without prompting
Expand Down
6 changes: 3 additions & 3 deletions pkg/cli/trial_command.go
Original file line number Diff line number Diff line change
Expand Up @@ -30,14 +30,14 @@ Workflows from different repositories:
` + string(constants.CLIExtensionPrefix) + ` trial githubnext/agentics/daily-plan myorg/myrepo/custom-workflow

Repository mode examples:
` + string(constants.CLIExtensionPrefix) + ` trial githubnext/agentics/my-workflow --host-repo myorg/myrepo # Use myorg/myrepo as host for trial execution
` + string(constants.CLIExtensionPrefix) + ` trial githubnext/agentics/my-workflow --host-repo myorg/myrepo # Use myorg/myrepo as host for trial execution
` + string(constants.CLIExtensionPrefix) + ` trial githubnext/agentics/my-workflow --logical-repo myorg/myrepo # Simulate running against myorg/myrepo
` + string(constants.CLIExtensionPrefix) + ` trial githubnext/agentics/my-workflow --clone-repo myorg/myrepo # Clone myorg/myrepo contents into host
` + string(constants.CLIExtensionPrefix) + ` trial githubnext/agentics/my-workflow --clone-repo myorg/myrepo # Clone myorg/myrepo contents into host

Repeat and cleanup examples:
` + string(constants.CLIExtensionPrefix) + ` trial githubnext/agentics/my-workflow --repeat 3 # Run 4 times total (1 initial + 3 repeats)
` + string(constants.CLIExtensionPrefix) + ` trial githubnext/agentics/my-workflow --delete-host-repo-after # Delete repo after completion
` + string(constants.CLIExtensionPrefix) + ` trial githubnext/agentics/my-workflow --host-repo my-trial # Custom host repo
` + string(constants.CLIExtensionPrefix) + ` trial githubnext/agentics/my-workflow --host-repo my-trial # Custom host repo
` + string(constants.CLIExtensionPrefix) + ` trial githubnext/agentics/my-workflow --dry-run # Show what would be done without changes

Auto-merge examples:
Expand Down
1 change: 0 additions & 1 deletion pkg/cli/validate_command.go
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,6 @@ func NewValidateCommand(validateEngine func(string) error) *cobra.Command {
Short: "Validate agentic workflows without generating lock files",
Long: `Validate one or more agentic workflows by compiling and running all linters without
generating lock files. This is equivalent to:

gh aw compile --validate --no-emit --zizmor --actionlint --poutine

If no workflows are specified, all Markdown files in .github/workflows will be validated.
Expand Down
Loading