Allow Chaos PR Bundle Fuzzer to modify tests/chaos/** in safe-output PR creation#33553
Merged
Conversation
Co-authored-by: pelikhan <4175913+pelikhan@users.noreply.github.com>
Co-authored-by: pelikhan <4175913+pelikhan@users.noreply.github.com>
Copilot
AI
changed the title
[WIP] Fix Chaos PR Bundle Fuzzer workflow failure
Allow Chaos PR Bundle Fuzzer to modify May 20, 2026
tests/chaos/** in safe-output PR creation
Contributor
There was a problem hiding this comment.
Pull request overview
This PR updates the Chaos PR Bundle Fuzzer safe-output configuration so its generated patches can legally modify tests/chaos/**, resolving failures caused by allowed-files enforcement rejecting all create_pull_request outputs.
Changes:
- Expand
safe-outputs.create-pull-request.allowed-filesinchaos-pr-bundle-fuzzer.mdto includetests/chaos/**, and align the scenario instructions accordingly. - Regenerate
chaos-pr-bundle-fuzzer.lock.ymlso the runtime safe-outputs config includes the updated allowlist. - Multiple workflow lockfiles also update their network allowlists to include
patch-diff.githubusercontent.com(broadening outbound access).
Show a summary per file
| File | Description |
|---|---|
| .github/workflows/weekly-safe-outputs-spec-review.lock.yml | Adds patch-diff.githubusercontent.com to allowed domains in the embedded AWF config/env. |
| .github/workflows/ubuntu-image-analyzer.lock.yml | Adds patch-diff.githubusercontent.com to allowed domains in the embedded AWF config/env. |
| .github/workflows/technical-doc-writer.lock.yml | Adds patch-diff.githubusercontent.com to allowed domains in the embedded AWF config/env. |
| .github/workflows/step-name-alignment.lock.yml | Adds patch-diff.githubusercontent.com to allowed domains in the embedded AWF config/env. |
| .github/workflows/spec-librarian.lock.yml | Adds patch-diff.githubusercontent.com to allowed domains in the embedded AWF config/env. |
| .github/workflows/spec-extractor.lock.yml | Adds patch-diff.githubusercontent.com to allowed domains in the embedded AWF config/env. |
| .github/workflows/smoke-workflow-call.lock.yml | Adds patch-diff.githubusercontent.com to allowed domains in the embedded AWF config/env. |
| .github/workflows/smoke-workflow-call-with-inputs.lock.yml | Adds patch-diff.githubusercontent.com to allowed domains in the embedded AWF config/env. |
| .github/workflows/smoke-temporary-id.lock.yml | Adds patch-diff.githubusercontent.com to allowed domains in the embedded AWF config/env. |
| .github/workflows/smoke-multi-pr.lock.yml | Adds patch-diff.githubusercontent.com to allowed domains in the embedded AWF config/env. |
| .github/workflows/smoke-call-workflow.lock.yml | Adds patch-diff.githubusercontent.com to allowed domains in the embedded AWF config/env (plus regenerated heredoc labels). |
| .github/workflows/outcome-collector.lock.yml | Adds patch-diff.githubusercontent.com to allowed domains in the embedded AWF config/env. |
| .github/workflows/layout-spec-maintainer.lock.yml | Adds patch-diff.githubusercontent.com to allowed domains in the embedded AWF config/env. |
| .github/workflows/dependabot-campaign.lock.yml | Adds patch-diff.githubusercontent.com to allowed domains in the embedded AWF config/env. |
| .github/workflows/delight.lock.yml | Adds patch-diff.githubusercontent.com to allowed domains in the embedded AWF config/env. |
| .github/workflows/daily-subagent-optimizer.lock.yml | Adds patch-diff.githubusercontent.com to allowed domains in the embedded AWF config/env. |
| .github/workflows/daily-sentrux-report.lock.yml | Adds patch-diff.githubusercontent.com to allowed domains in the embedded AWF config/env. |
| .github/workflows/copilot-pr-merged-report.lock.yml | Adds patch-diff.githubusercontent.com to allowed domains in the embedded AWF config/env. |
| .github/workflows/copilot-opt.lock.yml | Adds patch-diff.githubusercontent.com to allowed domains in the embedded AWF config/env. |
| .github/workflows/copilot-cli-deep-research.lock.yml | Adds patch-diff.githubusercontent.com to allowed domains in the embedded AWF config/env. |
| .github/workflows/copilot-agent-analysis.lock.yml | Adds patch-diff.githubusercontent.com to allowed domains in the embedded AWF config/env. |
| .github/workflows/claude-code-user-docs-review.lock.yml | Adds patch-diff.githubusercontent.com to allowed domains in the embedded AWF config/env. |
| .github/workflows/chaos-pr-bundle-fuzzer.md | Adds tests/chaos/** to allowed-files and updates scenario instructions to match. |
| .github/workflows/chaos-pr-bundle-fuzzer.lock.yml | Regenerates safe-outputs runtime config to include tests/chaos/** in allowed_files. |
| .github/workflows/aw-portfolio-yield.lock.yml | Adds patch-diff.githubusercontent.com to allowed domains in the embedded AWF config/env. |
Copilot's findings
Tip
Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.
- Files reviewed: 67/67 changed files
- Comments generated: 1
| export COPILOT_API_KEY="$COPILOT_DUMMY_BYOK" | ||
| (umask 177 && touch /tmp/gh-aw/agent-stdio.log) | ||
| printf '%s\n' '{"$schema":"https://github.com/github/gh-aw-firewall/releases/download/v0.25.49/awf-config.schema.json","network":{"allowDomains":["*.githubusercontent.com","*.grafana.net","*.sentry.io","api.business.githubcopilot.com","api.enterprise.githubcopilot.com","api.github.com","api.githubcopilot.com","api.individual.githubcopilot.com","api.snapcraft.io","archive.ubuntu.com","azure.archive.ubuntu.com","codeload.github.com","crl.geotrust.com","crl.globalsign.com","crl.identrust.com","crl.sectigo.com","crl.thawte.com","crl.usertrust.com","crl.verisign.com","crl3.digicert.com","crl4.digicert.com","crls.ssl.com","docs.github.com","github-cloud.githubusercontent.com","github-cloud.s3.amazonaws.com","github.blog","github.com","github.githubassets.com","host.docker.internal","json-schema.org","json.schemastore.org","keyserver.ubuntu.com","lfs.github.com","objects.githubusercontent.com","ocsp.digicert.com","ocsp.geotrust.com","ocsp.globalsign.com","ocsp.identrust.com","ocsp.sectigo.com","ocsp.ssl.com","ocsp.thawte.com","ocsp.usertrust.com","ocsp.verisign.com","packagecloud.io","packages.cloud.google.com","packages.microsoft.com","ppa.launchpad.net","raw.githubusercontent.com","registry.npmjs.org","s.symcb.com","s.symcd.com","security.ubuntu.com","telemetry.enterprise.githubcopilot.com","ts-crl.ws.symantec.com","ts-ocsp.ws.symantec.com","www.googleapis.com"]},"apiProxy":{"enabled":true,"enableTokenSteering":true,"maxRuns":500,"maxEffectiveTokens":25000000,"models":{"agent":["sonnet-6x","gpt-5.4","gpt-5","gemini-pro","haiku","any"],"any":["copilot/*","anthropic/*","openai/*","google/*","gemini/*"],"auto":["large"],"claude":["agent","sonnet-6x","haiku","any"],"codex":["agent","gpt-5-codex","gpt-5","any"],"coding":["copilot/gpt-5*codex*","openai/gpt-5*codex*","gpt-5-codex"],"copilot":["agent","gpt-5.4","sonnet","gpt-5","any"],"deep-research":["copilot/deep-research*","copilot/o3-deep-research*","copilot/o4-mini-deep-research*","google/deep-research*","gemini/deep-research*","openai/o3-deep-research*","openai/o4-mini-deep-research*"],"gemini":["agent","gemini-pro","gemini-flash","any"],"gemini-flash":["copilot/gemini-*flash*","google/gemini-*flash*","gemini/gemini-*flash*"],"gemini-flash-lite":["copilot/gemini-*flash*lite*","google/gemini-*flash*lite*","gemini/gemini-*flash*lite*"],"gemini-pro":["copilot/gemini-*pro*","google/gemini-*pro*","gemini/gemini-*pro*"],"gemma":["copilot/gemma*","google/gemma*","gemini/gemma*"],"gpt-4.1":["copilot/gpt-4.1*","openai/gpt-4.1*"],"gpt-5":["copilot/gpt-5*","openai/gpt-5*"],"gpt-5-codex":["copilot/gpt-5*codex*","openai/gpt-5*codex*"],"gpt-5-mini":["copilot/gpt-5*mini*","openai/gpt-5*mini*"],"gpt-5-nano":["copilot/gpt-5*nano*","openai/gpt-5*nano*"],"gpt-5-pro":["copilot/gpt-5*pro*","openai/gpt-5*pro*"],"haiku":["copilot/*haiku*","anthropic/*haiku*"],"large":["sonnet","gpt-5-pro","gpt-5","gemini-pro"],"mini":["haiku","gpt-5-mini","gpt-5-nano","gemini-flash-lite","copilot/raptor*mini*"],"opus":["copilot/*opus*","anthropic/*opus*"],"reasoning":["copilot/o1*","copilot/o3*","copilot/o4*","openai/o1*","openai/o3*","openai/o4*"],"small":["mini"],"sonnet":["copilot/*sonnet*","anthropic/*sonnet*"],"sonnet-6x":["copilot/*sonnet-4.5*","copilot/*sonnet-4-5*","anthropic/*sonnet-4.5*","anthropic/*sonnet-4-5*","copilot/*sonnet-3.7*","copilot/*sonnet-3-7*","anthropic/*sonnet-3.7*","anthropic/*sonnet-3-7*","copilot/*sonnet-3.5*","copilot/*sonnet-3-5*","anthropic/*sonnet-3.5*","anthropic/*sonnet-3-5*"],"vision":["copilot/gemini-*image*","gemini/gemini-*image*","copilot/gemini-*flash*","gemini/gemini-*flash*"]}},"container":{"imageTag":"0.25.49"}}' > "${RUNNER_TEMP}/gh-aw/awf-config.json" | ||
| printf '%s\n' '{"$schema":"https://github.com/github/gh-aw-firewall/releases/download/v0.25.49/awf-config.schema.json","network":{"allowDomains":["*.githubusercontent.com","*.grafana.net","*.sentry.io","api.business.githubcopilot.com","api.enterprise.githubcopilot.com","api.github.com","api.githubcopilot.com","api.individual.githubcopilot.com","api.snapcraft.io","archive.ubuntu.com","azure.archive.ubuntu.com","codeload.github.com","crl.geotrust.com","crl.globalsign.com","crl.identrust.com","crl.sectigo.com","crl.thawte.com","crl.usertrust.com","crl.verisign.com","crl3.digicert.com","crl4.digicert.com","crls.ssl.com","docs.github.com","github-cloud.githubusercontent.com","github-cloud.s3.amazonaws.com","github.blog","github.com","github.githubassets.com","host.docker.internal","json-schema.org","json.schemastore.org","keyserver.ubuntu.com","lfs.github.com","objects.githubusercontent.com","ocsp.digicert.com","ocsp.geotrust.com","ocsp.globalsign.com","ocsp.identrust.com","ocsp.sectigo.com","ocsp.ssl.com","ocsp.thawte.com","ocsp.usertrust.com","ocsp.verisign.com","packagecloud.io","packages.cloud.google.com","packages.microsoft.com","patch-diff.githubusercontent.com","ppa.launchpad.net","raw.githubusercontent.com","registry.npmjs.org","s.symcb.com","s.symcd.com","security.ubuntu.com","telemetry.enterprise.githubcopilot.com","ts-crl.ws.symantec.com","ts-ocsp.ws.symantec.com","www.googleapis.com"]},"apiProxy":{"enabled":true,"enableTokenSteering":true,"maxRuns":500,"maxEffectiveTokens":25000000,"models":{"agent":["sonnet-6x","gpt-5.4","gpt-5","gemini-pro","haiku","any"],"any":["copilot/*","anthropic/*","openai/*","google/*","gemini/*"],"auto":["large"],"claude":["agent","sonnet-6x","haiku","any"],"codex":["agent","gpt-5-codex","gpt-5","any"],"coding":["copilot/gpt-5*codex*","openai/gpt-5*codex*","gpt-5-codex"],"copilot":["agent","gpt-5.4","sonnet","gpt-5","any"],"deep-research":["copilot/deep-research*","copilot/o3-deep-research*","copilot/o4-mini-deep-research*","google/deep-research*","gemini/deep-research*","openai/o3-deep-research*","openai/o4-mini-deep-research*"],"gemini":["agent","gemini-pro","gemini-flash","any"],"gemini-flash":["copilot/gemini-*flash*","google/gemini-*flash*","gemini/gemini-*flash*"],"gemini-flash-lite":["copilot/gemini-*flash*lite*","google/gemini-*flash*lite*","gemini/gemini-*flash*lite*"],"gemini-pro":["copilot/gemini-*pro*","google/gemini-*pro*","gemini/gemini-*pro*"],"gemma":["copilot/gemma*","google/gemma*","gemini/gemma*"],"gpt-4.1":["copilot/gpt-4.1*","openai/gpt-4.1*"],"gpt-5":["copilot/gpt-5*","openai/gpt-5*"],"gpt-5-codex":["copilot/gpt-5*codex*","openai/gpt-5*codex*"],"gpt-5-mini":["copilot/gpt-5*mini*","openai/gpt-5*mini*"],"gpt-5-nano":["copilot/gpt-5*nano*","openai/gpt-5*nano*"],"gpt-5-pro":["copilot/gpt-5*pro*","openai/gpt-5*pro*"],"haiku":["copilot/*haiku*","anthropic/*haiku*"],"large":["sonnet","gpt-5-pro","gpt-5","gemini-pro"],"mini":["haiku","gpt-5-mini","gpt-5-nano","gemini-flash-lite","copilot/raptor*mini*"],"opus":["copilot/*opus*","anthropic/*opus*"],"reasoning":["copilot/o1*","copilot/o3*","copilot/o4*","openai/o1*","openai/o3*","openai/o4*"],"small":["mini"],"sonnet":["copilot/*sonnet*","anthropic/*sonnet*"],"sonnet-6x":["copilot/*sonnet-4.5*","copilot/*sonnet-4-5*","anthropic/*sonnet-4.5*","anthropic/*sonnet-4-5*","copilot/*sonnet-3.7*","copilot/*sonnet-3-7*","anthropic/*sonnet-3.7*","anthropic/*sonnet-3-7*","copilot/*sonnet-3.5*","copilot/*sonnet-3-5*","anthropic/*sonnet-3.5*","anthropic/*sonnet-3-5*"],"vision":["copilot/gemini-*image*","gemini/gemini-*image*","copilot/gemini-*flash*","gemini/gemini-*flash*"]}},"container":{"imageTag":"0.25.49"}}' > "${RUNNER_TEMP}/gh-aw/awf-config.json" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
The Chaos PR Bundle Fuzzer run failed because all
create_pull_requestsafe outputs were rejected byallowed-filesenforcement. The generated patches modifiedtests/chaos/**, but that path was not in the workflow allowlist.Problem alignment
tests/chaos/**), removing the mismatch that caused all 5 PR creations to fail.Workflow source update
chaos-pr-bundle-fuzzer.md, addedtests/chaos/**undersafe-outputs.create-pull-request.allowed-files.Compiled workflow sync
chaos-pr-bundle-fuzzer.lock.ymlso runtime safe-output config reflects the new allowlist entry.