chore(deps): update github/gh-aw action to v0.65.5#8109
Open
release-workflows[bot] wants to merge 1 commit intomainfrom
Open
chore(deps): update github/gh-aw action to v0.65.5#8109release-workflows[bot] wants to merge 1 commit intomainfrom
release-workflows[bot] wants to merge 1 commit intomainfrom
Conversation
c42b1d6 to
2e684f8
Compare
2e684f8 to
ee9d01e
Compare
ee9d01e to
ecda65f
Compare
ecda65f to
0ab8e8b
Compare
0ab8e8b to
a9fbf11
Compare
a9fbf11 to
4a778e8
Compare
4a778e8 to
e615234
Compare
e615234 to
19e5e59
Compare
19e5e59 to
7135245
Compare
7135245 to
abab8e0
Compare
abab8e0 to
be0c80f
Compare
be0c80f to
62f4b32
Compare
62f4b32 to
60ef078
Compare
60ef078 to
d35bed6
Compare
d35bed6 to
d6b5920
Compare
b2b4fe3 to
be66276
Compare
be66276 to
7bb6e08
Compare
7bb6e08 to
d345213
Compare
d345213 to
cddd18c
Compare
cddd18c to
314ac7c
Compare
314ac7c to
d8f76f8
Compare
d8f76f8 to
bac0698
Compare
bac0698 to
3b1e802
Compare
3b1e802 to
84850c5
Compare
84850c5 to
63dd3c5
Compare
63dd3c5 to
8c30f9c
Compare
8c30f9c to
e46061e
Compare
e46061e to
b2300f9
Compare
b2300f9 to
dcac731
Compare
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v0.43.18→v0.65.5Release Notes
github/gh-aw (github/gh-aw)
v0.65.5Compare Source
🌟 Release Highlights
This release focuses on security hardening, observability improvements, and setup performance — with a meaningful reduction in firewall install time and new token usage visibility for AI cost tracking.
✨ What's New
Token Usage Visibility — The Agentic Workflow Firewall now logs per-model token consumption to
token-usage.jsonl.gh aw auditandgh aw logssurface a full breakdown (input, output, cache read/write tokens, cache hit %, avg request duration) per model. A new step summary step appends a markdown table to your workflow run's summary page. (#23943)140× Faster Firewall Install — AWF v0.25.10 ships a single
awf-bundle.jsfile (~357 KB). On GitHub-hosted runners with Node.js ≥ 20 (the default), setup now downloads 357 KB instead of ~50 MB — a 140× reduction. Self-hosted runners without Node.js ≥ 20 automatically fall back to the platform binary. (#23993)Richer Threat Detection Context — The detection job now performs a conditional repository checkout when a patch is present, giving the threat detection engine full codebase context to review code changes. Previously, the engine saw diffs in isolation without surrounding source files. (#23961)
GitHub Actions Expression Support —
timeout-minutes,engine.version,tools.timeout, andtools.startup-timeoutnow accept GitHub Actions expressions (e.g.,$\{\{ inputs.timeout }}), enabling reusableworkflow_callworkflows where callers can customize these values without forking the workflow. (docs)🐛 Bug Fixes & Improvements
Session Logs Now Collected —
events.jsonlfiles written by Copilot CLI inside session subdirectories were silently missed by the log-copy step (flat glob only matched the top level). Fixed with a recursivefind-based copy that preserves session IDs in filenames. (#23992)Security: Git Hook Injection Prevented — Cache-memory git repos now have
.git/hooks/cleared andcore.hooksPathset to/dev/nullon every setup. Previously, a compromised run could plant executable hooks that fired on the host runner before the AWF sandbox was active. (#23929)gh aw add-wizardNo Longer Loses Work on Push Failure — If the branch push failed after downloading workflow files, the command previously rolled back everything and left users with nothing. Files and the local commit are now preserved, with actionable recovery instructions printed to the console. (#23926)Label Pagination Fixed for Large Repos —
create_discussionandupdate_discussionsilently dropped any labels beyond the first 100 when resolving label names to IDs. The paginated fetch now loops until all labels are loaded. (#23915)CLI Help Text Fixes — Dynamic column width in root command usage (fixing truncated
hash-frontmatter), correctedlogs --timeoutflag description, and improvedmcp addhelp text. (#23912)📚 Documentation
frontmatter.md,engines.md, andtools.md— including new "Tool Timeout Configuration" section.common-issues.md(−49 lines, −8%).🌍 Community Contributions
A huge thank you to the community members who reported issues that were resolved in this release!
@ajfeldman6@yskopetsFor complete details, see CHANGELOG.
What's Changed
Full Changelog: github/gh-aw@v0.65.4...v0.65.5
v0.65.4Compare Source
🌟 Release Highlights
This release focuses on workflow parameterization for
workflow_callreuse, automatic service container access, and a strong set of community-driven bug fixes and features.✨ What's New
Expression parameterization for
workflow_call— Multiple frontmatter fields now accept GitHub Actions expressions, enabling reusable workflows to customize behavior at call time:timeout-minutes: $\{\{ inputs.timeout }}engine.version: $\{\{ inputs.engine-version }}tools.timeout,tools.startup-timeout, andtools.playwright.versionAuto-generate
--allow-host-service-portsfromservices:mappings — Workflows using GitHub Actions service containers (PostgreSQL, Redis, etc.) no longer need manual port configuration. The compiler now extracts declared port mappings and emits runtime$\{\{ job.services.<name>.ports['<port>'] }}expressions automatically, so agents can reach service containers out of the box.Step templating support — Workflows can now use templating patterns for steps, enabling more expressive and reusable workflow definitions.
Restrict Copilot CLI built-in tools via frontmatter — Fine-grained control over which Copilot CLI built-in tools are available to agents in a workflow.
Discussion post commenting and editing — Workflows can now comment on and edit posts within GitHub Discussions, expanding discussion interaction capabilities.
🐛 Bug Fixes & Improvements
ERR_CONFIGwhen workflows run cross-repo via organization rulesets.<safe-output-tools>prompt expression inlining resolved — Compiled prompts no longer inline$\{\{ }}expressions verbatim, which was re-triggering the expression-size limit.create-code-scanning-alertsafe-output fixed — The code scanning alert safe-output handler now works correctly for all supported alert configurations.gh aw addno longer rewrites\{\\{\#import shared/X.md}}with an incorrect path; imports now resolve from.github/workflows/as expected.gh aw auditnow surfaces token/turn metrics and firewall-blocked domain root causes for failed Codex runs.📚 Documentation
⚡ Dependency Updates
page.screencast), Browser Interoperability (browser.bind()), Observability Dashboard, and CLI debugger for agents./healthendpoint, embedded config schema.🌍 Community Contributions
A huge thank you to the community members who reported issues that were resolved in this release!
@corygehr@deyaaeldeen@ericstj@jaroslawgajewski@johnpreed@kbreit-insight@strawgateFor complete details, see CHANGELOG.
What's Changed
${{ }}expressions from<safe-output-tools>max: values to avoid 21KB heredoc limit by @Copilot in #23812tokeninstead ofgithub-tokenforupload-sarifaction by @Copilot in #23837timeout-minutesto accept GitHub Actions expressions by @Copilot in #23863Full Changelog: github/gh-aw@v0.65.3...v0.65.4
v0.65.3Compare Source
🌟 Release Highlights
This release focuses on improving the
gh aw updateexperience, prerelease handling, and release channel management — with important fixes for import path preservation and service container documentation.releases.jsonaliases and stable release channel have been removed. If you were pinned to thestablechannel, switch tolatest. Theupdate-stable-release.ymlworkflow has also been removed.✨ What's New
gh aw updatenow skips prerelease versions when resolving the latest release, so you'll always land on a stable release by default.🐛 Bug Fixes & Improvements
gh aw updateno longer rewrites local imports (#23809): Fixed a bug where runninggh aw updatewould overwrite local relativeimports:paths with cross-repo paths that fail at runtime.📚 Documentation
services:are bound to the runner host and must be reached from the agent container usinghost.docker.internal:<port>— notlocalhost.🌍 Community Contributions
A huge thank you to the community members who reported issues that were resolved in this release!
@johnpreedgh aw updaterewrites localimports:to cross-repo paths that fail at runtime (direct issue)@srgibbs99services:(direct issue)For complete details, see CHANGELOG.
What's Changed
Full Changelog: github/gh-aw@v0.65.2...v0.65.3
v0.65.2Compare Source
🌟 Release Highlights
This patch release brings a new configurability option for pull request workflows, a reliable fix for external-repository checkout scenarios, and a round of CLI consistency improvements — plus three community-reported issues resolved.
✨ What's New
create-pull-requestauto-close behavior — Thecreate-pull-requestsafe-output now lets you control whether the triggering issue is automatically closed when the PR is merged. Previously this was always-on; now it can be tuned per workflow. (Requested by the community — see #23736)🐛 Bug Fixes & Improvements
Restore
actions/setupafter external root checkout — When a workflow checks out an external repository to the workspace root (nopath:specified),actions/checkoutwas overwriting$GITHUB_WORKSPACEand deleting the locally checked-outactions/setupdirectory, causing a post-step failure (Can't find 'action.yml'). The compiler now appends aRestore actions folderstep (if: always()) in dev mode when this pattern is detected. (#23751)CLI consistency improvements — Addressed redundant flags, unexplained jargon, and discrepancies between help text and documentation to make the CLI more approachable. (#23750)
MCP table output routing —
mcp list-toolsandmcp inspectnow route table output through explicitconsole.RenderTable()calls with unambiguous stdout routing, aligning with the established pattern inmcp list. (#23752)WASM golden files updated for firewall v0.25.5 (#23743)
Release tooling — New releases are now created as pre-releases by default, preventing automated releases from being promoted to "latest" without explicit maintainer action. (#23754)
🌍 Community Contributions
A huge thank you to the community members who reported issues that were resolved in this release!
@abillingsleycreate-pull-requestauto-close issue behavior configurable (direct issue)@Rubyj@strawgateFor complete details, see CHANGELOG.
What's Changed
create-pull-requestauto-close issue behavior configurable by @Copilot in #23738Full Changelog: github/gh-aw@v0.65.1...v0.65.2
v0.65.1Compare Source
What's Changed
integrityLevelOrdervariable to fix lint by @Copilot in #23721Full Changelog: github/gh-aw@v0.65.0...v0.65.1
v0.65.0Compare Source
🌟 Release Highlights
v0.65.0 is a feature-rich release focused on MCP Gateway security controls, GitHub App org-level API access, and workflow lifecycle management — alongside a new Microsoft APM shared workflow and significant compiled output improvements.
✨ What's New
🔐 GitHub App Token: Org-Level Permissions
You can now grant org-scoped API access (e.g.
members: read,organization-administration: read) directly in your workflow frontmatter — no more silentnullresponses when calling org-level GitHub APIs:🛡️ MCP Gateway: Trusted Users & OIDC Authentication
Two powerful new MCP Gateway security features ship in this release:
trusted-users— Elevate specific GitHub usernames toapprovedintegrity without lowering the globalmin-integritypolicy. Useful for contractors or partner developers who need elevated access without becoming repo collaborators.🔄 Version Update Check on Activation
Workflows now check at runtime whether the compiled
gh-awversion is still supported. Blocked versions fail fast; below-recommended versions emit a warning. This protects against running workflows compiled with revoked or outdated versions. Disable withcheck-for-updates: false(emits a compile-time warning).📦 Microsoft APM via
shared/apm.mdAPM package support is now available as a clean shared workflow import, replacing the deprecated
dependencies:field:🧹 Cleaner Compiled Lock Files
The prompt heredoc consolidation refactor reduces compiled
.lock.ymloutput by ~900 lines across the repo, making diffs dramatically easier to review when prompt content changes.🐛 Bug Fixes & Improvements
actions/setuprestore after cross-repo checkout insafe_outputsandupload_assetsjobs — prevents runner post-step failures in dev mode (#23587, #23604)add_labelsschema —labelsfield is now correctly markedrequiredin the safe-outputs inputSchema, preventing silent omission by JSONL-mode agents (#23610)cookie-labeled issues (filed by automation workflows) are now surfaced correctly withapproval-labels: [cookie](#23613)pkg/constantsand CI checks (#23624)📚 Documentation
sitemap-index.xml) and RSS feed (blog/rss.xml) 404s on the docs site (#23585)🌍 Community Contributions
A huge thank you to the community members who reported issues that were resolved in this release!
@bbonafed@dholmesFor complete details, see CHANGELOG.
What's Changed
Setup <component>convention by @Copilot in #23586tools.github.github-apptoken for org-level API access by @Copilot in #23600required: ["labels"]toadd_labelsinputSchema by @Copilot in #23610Full Changelog: github/gh-aw@v0.64.5...v0.65.0
v0.64.5Compare Source
🌟 Release Highlights
This release focuses on compiler correctness and reliability — fixing several community-reported bugs around permissions, roles, and memory operations, while also hardening lock file security.
🐛 Bug Fixes & Improvements
Permissions preserved with
read-all+copilot-requests— When combiningpermissions: read-allwithfeatures: copilot-requests: true, the agent job was silently losing allread-allscopes and the detection job received no permissions block at all. This caused checkout failures, GraphQL API errors, and Copilot CLI auth failures. Both jobs now receive the correct permission sets. (#23574)roles: [read]now accepted by the compiler — Thereadrole was documented as a valid permission level but was incorrectly rejected by the compiler with a validation error. This is now fully supported and the documentation has been aligned. (#23570)push_repo_memoryno longer fails on sparse-checkout orphan branches — On the first run when creating an orphan branch in a sparse-checkout repository,git addwould fail. The fix usesgit add --sparseto handle this case correctly. (#23571)Lock file integrity hardened — The timestamp check has been removed from lock file validation; integrity is now verified solely via the frontmatter hash. This eliminates false-positive integrity failures caused by timestamp drift while maintaining strong tamper detection. (#23561)
🔧 Internal
🌍 Community Contributions
A huge thank you to the community members who reported issues that were resolved in this release!
@jaroslawgajewski@pholleran@PureWeenroles: [read]documented as available but rejected by compiler (direct issue)For complete details, see CHANGELOG.
What's Changed
git add --sparseto handle sparse-checkout on orphan branch first run by @Copilot in #23571readrole support to compiler; align docs with compiler behavior by @Copilot in #23570Full Changelog: github/gh-aw@v0.64.4...v0.64.5
v0.64.4Compare Source
🌟 Release Highlights
This release delivers safe-output tooling improvements, sibling import resolution, and enhanced runner flexibility — driven largely by community feedback from
@j-srodka.✨ What's New
runs-on-slimfor compile-stable jobs — Override the runner forcompile-stableframework jobs using the newruns-on-slimkey, giving you precise control over job execution environments (#23490)needs:ordering on custom safe-output jobs at compile time, catching dependency misconfigurations before they reach runtime (#23486)difc-proxyfeature flag gates DIFC proxy emission, enabling opt-in integrity enforcement for supported environments (#23471)🐛 Bug Fixes & Improvements
./file.mdimports now resolve relative to the parent file's directory, fixing broken modular workflow imports (#23475)<safe-output-tools>prompt — Custom jobs, scripts, and actions are now surfaced in the<safe-output-tools>prompt block so agents are aware of all available safe-output mechanisms (#23487)📚 Documentation
🌍 Community Contributions
A huge thank you to the community members who reported issues that were resolved in this release!
@j-srodkaFor complete details, see CHANGELOG.
What's Changed
difc-proxyfeature flag by @Copilot in #23471<safe-output-tools>prompt block by @Copilot in [#234Configuration
📅 Schedule: (UTC)
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Renovate Bot.