Skip to content

Dev

Dev #1013

Workflow file for this run

# This file was automatically generated by gh-aw. DO NOT EDIT.
# To update this file, edit the corresponding .md file and run:
# gh aw compile
# For more information: https://github.com/githubnext/gh-aw/blob/main/.github/instructions/github-agentic-workflows.instructions.md
name: "Dev"
"on":
push:
branches:
- copilot/*
workflow_dispatch: null
permissions: {}
concurrency:
group: "gh-aw-${{ github.workflow }}-${{ github.ref }}"
run-name: "Dev"
jobs:
check-membership:
runs-on: ubuntu-latest
outputs:
error_message: ${{ steps.check-membership.outputs.error_message }}
is_team_member: ${{ steps.check-membership.outputs.is_team_member }}
result: ${{ steps.check-membership.outputs.result }}
user_permission: ${{ steps.check-membership.outputs.user_permission }}
steps:
- name: Check team membership for workflow
id: check-membership
uses: actions/github-script@v8
env:
GITHUB_AW_REQUIRED_ROLES: admin,maintainer
with:
script: |
async function main() {
const { eventName } = context;
// skip check for safe events
const safeEvents = ["workflow_dispatch", "workflow_run", "schedule"];
if (safeEvents.includes(eventName)) {
core.info(`✅ Event ${eventName} does not require validation`);
core.setOutput("is_team_member", "true");
core.setOutput("result", "safe_event");
return;
}
const actor = context.actor;
const { owner, repo } = context.repo;
const requiredPermissionsEnv = process.env.GITHUB_AW_REQUIRED_ROLES;
const requiredPermissions = requiredPermissionsEnv ? requiredPermissionsEnv.split(",").filter(p => p.trim() !== "") : [];
if (!requiredPermissions || requiredPermissions.length === 0) {
core.warning("❌ Configuration error: Required permissions not specified. Contact repository administrator.");
core.setOutput("is_team_member", "false");
core.setOutput("result", "config_error");
core.setOutput("error_message", "Configuration error: Required permissions not specified");
return;
}
// Check if the actor has the required repository permissions
try {
core.debug(`Checking if user '${actor}' has required permissions for ${owner}/${repo}`);
core.debug(`Required permissions: ${requiredPermissions.join(", ")}`);
const repoPermission = await github.rest.repos.getCollaboratorPermissionLevel({
owner: owner,
repo: repo,
username: actor,
});
const permission = repoPermission.data.permission;
core.debug(`Repository permission level: ${permission}`);
// Check if user has one of the required permission levels
for (const requiredPerm of requiredPermissions) {
if (permission === requiredPerm || (requiredPerm === "maintainer" && permission === "maintain")) {
core.info(`✅ User has ${permission} access to repository`);
core.setOutput("is_team_member", "true");
core.setOutput("result", "authorized");
core.setOutput("user_permission", permission);
return;
}
}
core.warning(`User permission '${permission}' does not meet requirements: ${requiredPermissions.join(", ")}`);
core.setOutput("is_team_member", "false");
core.setOutput("result", "insufficient_permissions");
core.setOutput("user_permission", permission);
core.setOutput(
"error_message",
`Access denied: User '${actor}' is not authorized. Required permissions: ${requiredPermissions.join(", ")}`
);
} catch (repoError) {
const errorMessage = repoError instanceof Error ? repoError.message : String(repoError);
core.warning(`Repository permission check failed: ${errorMessage}`);
core.setOutput("is_team_member", "false");
core.setOutput("result", "api_error");
core.setOutput("error_message", `Repository permission check failed: ${errorMessage}`);
return;
}
}
await main();
activation:
needs: check-membership
if: needs.check-membership.outputs.is_team_member == 'true'
runs-on: ubuntu-latest
steps:
- run: echo "Activation success"
add_reaction:
needs: activation
if: >
github.event_name == 'issues' || github.event_name == 'issue_comment' || github.event_name == 'pull_request_comment' ||
github.event_name == 'pull_request_review_comment' || (github.event_name == 'pull_request') &&
(github.event.pull_request.head.repo.full_name == github.repository)
runs-on: ubuntu-latest
permissions:
issues: write
pull-requests: write
outputs:
reaction_id: ${{ steps.react.outputs.reaction-id }}
steps:
- name: Add eyes reaction to the triggering item
id: react
uses: actions/github-script@v8
env:
GITHUB_AW_REACTION: eyes
with:
script: |
async function main() {
const reaction = process.env.GITHUB_AW_REACTION || "eyes";
const command = process.env.GITHUB_AW_COMMAND;
const runId = context.runId;
const runUrl = context.payload.repository
? `${context.payload.repository.html_url}/actions/runs/${runId}`
: `https://github.com/${context.repo.owner}/${context.repo.repo}/actions/runs/${runId}`;
core.info(`Reaction type: ${reaction}`);
core.info(`Command name: ${command || "none"}`);
core.info(`Run ID: ${runId}`);
core.info(`Run URL: ${runUrl}`);
const validReactions = ["+1", "-1", "laugh", "confused", "heart", "hooray", "rocket", "eyes"];
if (!validReactions.includes(reaction)) {
core.setFailed(`Invalid reaction type: ${reaction}. Valid reactions are: ${validReactions.join(", ")}`);
return;
}
let reactionEndpoint;
let commentUpdateEndpoint;
let shouldEditComment = false;
const eventName = context.eventName;
const owner = context.repo.owner;
const repo = context.repo.repo;
try {
switch (eventName) {
case "issues":
const issueNumber = context.payload?.issue?.number;
if (!issueNumber) {
core.setFailed("Issue number not found in event payload");
return;
}
reactionEndpoint = `/repos/${owner}/${repo}/issues/${issueNumber}/reactions`;
shouldEditComment = false;
break;
case "issue_comment":
const commentId = context.payload?.comment?.id;
if (!commentId) {
core.setFailed("Comment ID not found in event payload");
return;
}
reactionEndpoint = `/repos/${owner}/${repo}/issues/comments/${commentId}/reactions`;
commentUpdateEndpoint = `/repos/${owner}/${repo}/issues/comments/${commentId}`;
shouldEditComment = command ? true : false;
break;
case "pull_request":
const prNumber = context.payload?.pull_request?.number;
if (!prNumber) {
core.setFailed("Pull request number not found in event payload");
return;
}
reactionEndpoint = `/repos/${owner}/${repo}/issues/${prNumber}/reactions`;
shouldEditComment = false;
break;
case "pull_request_review_comment":
const reviewCommentId = context.payload?.comment?.id;
if (!reviewCommentId) {
core.setFailed("Review comment ID not found in event payload");
return;
}
reactionEndpoint = `/repos/${owner}/${repo}/pulls/comments/${reviewCommentId}/reactions`;
commentUpdateEndpoint = `/repos/${owner}/${repo}/pulls/comments/${reviewCommentId}`;
shouldEditComment = command ? true : false;
break;
default:
core.setFailed(`Unsupported event type: ${eventName}`);
return;
}
core.info(`Reaction API endpoint: ${reactionEndpoint}`);
await addReaction(reactionEndpoint, reaction);
if (shouldEditComment && commentUpdateEndpoint) {
core.info(`Comment update endpoint: ${commentUpdateEndpoint}`);
await editCommentWithWorkflowLink(commentUpdateEndpoint, runUrl);
} else {
if (!command && commentUpdateEndpoint) {
core.info("Skipping comment edit - only available for command workflows");
} else {
core.info(`Skipping comment edit for event type: ${eventName}`);
}
}
} catch (error) {
const errorMessage = error instanceof Error ? error.message : String(error);
core.error(`Failed to process reaction and comment edit: ${errorMessage}`);
core.setFailed(`Failed to process reaction and comment edit: ${errorMessage}`);
}
}
async function addReaction(endpoint, reaction) {
const response = await github.request("POST " + endpoint, {
content: reaction,
headers: {
Accept: "application/vnd.github+json",
},
});
const reactionId = response.data?.id;
if (reactionId) {
core.info(`Successfully added reaction: ${reaction} (id: ${reactionId})`);
core.setOutput("reaction-id", reactionId.toString());
} else {
core.info(`Successfully added reaction: ${reaction}`);
core.setOutput("reaction-id", "");
}
}
async function editCommentWithWorkflowLink(endpoint, runUrl) {
try {
const getResponse = await github.request("GET " + endpoint, {
headers: {
Accept: "application/vnd.github+json",
},
});
const originalBody = getResponse.data.body || "";
const workflowLinkText = `\n\n---\n*🤖 [Workflow run](${runUrl}) triggered by this comment*`;
if (originalBody.includes("*🤖 [Workflow run](")) {
core.info("Comment already contains a workflow run link, skipping edit");
return;
}
const updatedBody = originalBody + workflowLinkText;
const updateResponse = await github.request("PATCH " + endpoint, {
body: updatedBody,
headers: {
Accept: "application/vnd.github+json",
},
});
core.info(`Successfully updated comment with workflow link`);
core.info(`Comment ID: ${updateResponse.data.id}`);
} catch (error) {
const errorMessage = error instanceof Error ? error.message : String(error);
core.warning(
"Failed to edit comment with workflow link (This is not critical - the reaction was still added successfully): " + errorMessage
);
}
}
await main();
agent:
needs: activation
runs-on: ubuntu-latest
permissions: read-all
outputs:
output: ${{ steps.collect_output.outputs.output }}
steps:
- name: Checkout repository
uses: actions/checkout@v5
- name: Generate Claude Settings
run: |
mkdir -p /tmp/.claude
cat > /tmp/.claude/settings.json << 'EOF'
{
"hooks": {
"PreToolUse": [
{
"matcher": "WebFetch|WebSearch",
"hooks": [
{
"type": "command",
"command": ".claude/hooks/network_permissions.py"
}
]
}
]
}
}
EOF
- name: Generate Network Permissions Hook
run: |
mkdir -p .claude/hooks
cat > .claude/hooks/network_permissions.py << 'EOF'
#!/usr/bin/env python3
"""
Network permissions validator for Claude Code engine.
Generated by gh-aw from engine network permissions configuration.
"""
import json
import sys
import urllib.parse
import re
# Domain allow-list (populated during generation)
ALLOWED_DOMAINS = ["crl3.digicert.com","crl4.digicert.com","ocsp.digicert.com","ts-crl.ws.symantec.com","ts-ocsp.ws.symantec.com","crl.geotrust.com","ocsp.geotrust.com","crl.thawte.com","ocsp.thawte.com","crl.verisign.com","ocsp.verisign.com","crl.globalsign.com","ocsp.globalsign.com","crls.ssl.com","ocsp.ssl.com","crl.identrust.com","ocsp.identrust.com","crl.sectigo.com","ocsp.sectigo.com","crl.usertrust.com","ocsp.usertrust.com","s.symcb.com","s.symcd.com","json-schema.org","json.schemastore.org","archive.ubuntu.com","security.ubuntu.com","ppa.launchpad.net","keyserver.ubuntu.com","azure.archive.ubuntu.com","api.snapcraft.io","packagecloud.io","packages.cloud.google.com","packages.microsoft.com"]
def extract_domain(url_or_query):
"""Extract domain from URL or search query."""
if not url_or_query:
return None
if url_or_query.startswith(('http://', 'https://')):
return urllib.parse.urlparse(url_or_query).netloc.lower()
# Check for domain patterns in search queries
match = re.search(r'site:([a-zA-Z0-9.-]+\.[a-zA-Z]{2,})', url_or_query)
if match:
return match.group(1).lower()
return None
def is_domain_allowed(domain):
"""Check if domain is allowed."""
if not domain:
# If no domain detected, allow only if not under deny-all policy
return bool(ALLOWED_DOMAINS) # False if empty list (deny-all), True if has domains
# Empty allowed domains means deny all
if not ALLOWED_DOMAINS:
return False
for pattern in ALLOWED_DOMAINS:
regex = pattern.replace('.', r'\.').replace('*', '.*')
if re.match(f'^{regex}$', domain):
return True
return False
# Main logic
try:
data = json.load(sys.stdin)
tool_name = data.get('tool_name', '')
tool_input = data.get('tool_input', {})
if tool_name not in ['WebFetch', 'WebSearch']:
sys.exit(0) # Allow other tools
target = tool_input.get('url') or tool_input.get('query', '')
domain = extract_domain(target)
# For WebSearch, apply domain restrictions consistently
# If no domain detected in search query, check if restrictions are in place
if tool_name == 'WebSearch' and not domain:
# Since this hook is only generated when network permissions are configured,
# empty ALLOWED_DOMAINS means deny-all policy
if not ALLOWED_DOMAINS: # Empty list means deny all
print(f"Network access blocked: deny-all policy in effect", file=sys.stderr)
print(f"No domains are allowed for WebSearch", file=sys.stderr)
sys.exit(2) # Block under deny-all policy
else:
print(f"Network access blocked for web-search: no specific domain detected", file=sys.stderr)
print(f"Allowed domains: {', '.join(ALLOWED_DOMAINS)}", file=sys.stderr)
sys.exit(2) # Block general searches when domain allowlist is configured
if not is_domain_allowed(domain):
print(f"Network access blocked for domain: {domain}", file=sys.stderr)
print(f"Allowed domains: {', '.join(ALLOWED_DOMAINS)}", file=sys.stderr)
sys.exit(2) # Block with feedback to Claude
sys.exit(0) # Allow
except Exception as e:
print(f"Network validation error: {e}", file=sys.stderr)
sys.exit(2) # Block on errors
EOF
chmod +x .claude/hooks/network_permissions.py
- name: Setup agent output
id: setup_agent_output
uses: actions/github-script@v8
with:
script: |
const fs = require("fs");
const crypto = require("crypto");
function main() {
const randomSuffix = crypto.randomBytes(8).toString("hex");
const outputFile = `/tmp/aw_output_${randomSuffix}.txt`;
fs.mkdirSync("/tmp", { recursive: true });
core.exportVariable("GITHUB_AW_SAFE_OUTPUTS", outputFile);
core.setOutput("output_file", outputFile);
}
main();
- name: Setup Safe Outputs Collector MCP
run: |
mkdir -p /tmp/safe-outputs
cat > /tmp/safe-outputs/mcp-server.cjs << 'EOF'
const fs = require("fs");
const path = require("path");
const crypto = require("crypto");
const encoder = new TextEncoder();
const configEnv = process.env.GITHUB_AW_SAFE_OUTPUTS_CONFIG;
if (!configEnv) throw new Error("GITHUB_AW_SAFE_OUTPUTS_CONFIG not set");
const safeOutputsConfigRaw = JSON.parse(configEnv);
const safeOutputsConfig = Object.fromEntries(Object.entries(safeOutputsConfigRaw).map(([k, v]) => [k.replace(/-/g, "_"), v]));
const outputFile = process.env.GITHUB_AW_SAFE_OUTPUTS;
if (!outputFile) throw new Error("GITHUB_AW_SAFE_OUTPUTS not set, no output file");
const SERVER_INFO = { name: "safe-outputs-mcp-server", version: "1.0.0" };
const debug = msg => process.stderr.write(`[${SERVER_INFO.name}] ${msg}\n`);
function writeMessage(obj) {
const json = JSON.stringify(obj);
debug(`send: ${json}`);
const message = json + "\n";
const bytes = encoder.encode(message);
fs.writeSync(1, bytes);
}
class ReadBuffer {
append(chunk) {
this._buffer = this._buffer ? Buffer.concat([this._buffer, chunk]) : chunk;
}
readMessage() {
if (!this._buffer) {
return null;
}
const index = this._buffer.indexOf("\n");
if (index === -1) {
return null;
}
const line = this._buffer.toString("utf8", 0, index).replace(/\r$/, "");
this._buffer = this._buffer.subarray(index + 1);
if (line.trim() === "") {
return this.readMessage();
}
try {
return JSON.parse(line);
} catch (error) {
throw new Error(`Parse error: ${error instanceof Error ? error.message : String(error)}`);
}
}
}
const readBuffer = new ReadBuffer();
function onData(chunk) {
readBuffer.append(chunk);
processReadBuffer();
}
function processReadBuffer() {
while (true) {
try {
const message = readBuffer.readMessage();
if (!message) {
break;
}
debug(`recv: ${JSON.stringify(message)}`);
handleMessage(message);
} catch (error) {
debug(`Parse error: ${error instanceof Error ? error.message : String(error)}`);
}
}
}
function replyResult(id, result) {
if (id === undefined || id === null) return;
const res = { jsonrpc: "2.0", id, result };
writeMessage(res);
}
function replyError(id, code, message, data) {
if (id === undefined || id === null) {
debug(`Error for notification: ${message}`);
return;
}
const error = { code, message };
if (data !== undefined) {
error.data = data;
}
const res = {
jsonrpc: "2.0",
id,
error,
};
writeMessage(res);
}
function appendSafeOutput(entry) {
if (!outputFile) throw new Error("No output file configured");
entry.type = entry.type.replace(/_/g, "-");
const jsonLine = JSON.stringify(entry) + "\n";
try {
fs.appendFileSync(outputFile, jsonLine);
} catch (error) {
throw new Error(`Failed to write to output file: ${error instanceof Error ? error.message : String(error)}`);
}
}
const defaultHandler = type => args => {
const entry = { ...(args || {}), type };
appendSafeOutput(entry);
return {
content: [
{
type: "text",
text: `success`,
},
],
};
};
const uploadAssetHandler = args => {
const branchName = process.env.GITHUB_AW_ASSETS_BRANCH;
if (!branchName) throw new Error("GITHUB_AW_ASSETS_BRANCH not set");
const { path: filePath } = args;
const absolutePath = path.resolve(filePath);
const workspaceDir = process.env.GITHUB_WORKSPACE || process.cwd();
const tmpDir = "/tmp";
const isInWorkspace = absolutePath.startsWith(path.resolve(workspaceDir));
const isInTmp = absolutePath.startsWith(tmpDir);
if (!isInWorkspace && !isInTmp) {
throw new Error(
`File path must be within workspace directory (${workspaceDir}) or /tmp directory. ` +
`Provided path: ${filePath} (resolved to: ${absolutePath})`
);
}
if (!fs.existsSync(filePath)) {
throw new Error(`File not found: ${filePath}`);
}
const stats = fs.statSync(filePath);
const sizeBytes = stats.size;
const sizeKB = Math.ceil(sizeBytes / 1024);
const maxSizeKB = process.env.GITHUB_AW_ASSETS_MAX_SIZE_KB ? parseInt(process.env.GITHUB_AW_ASSETS_MAX_SIZE_KB, 10) : 10240;
if (sizeKB > maxSizeKB) {
throw new Error(`File size ${sizeKB} KB exceeds maximum allowed size ${maxSizeKB} KB`);
}
const ext = path.extname(filePath).toLowerCase();
const allowedExts = process.env.GITHUB_AW_ASSETS_ALLOWED_EXTS
? process.env.GITHUB_AW_ASSETS_ALLOWED_EXTS.split(",").map(ext => ext.trim())
: [
".png",
".jpg",
".jpeg",
];
if (!allowedExts.includes(ext)) {
throw new Error(`File extension '${ext}' is not allowed. Allowed extensions: ${allowedExts.join(", ")}`);
}
const assetsDir = "/tmp/safe-outputs/assets";
if (!fs.existsSync(assetsDir)) {
fs.mkdirSync(assetsDir, { recursive: true });
}
const fileContent = fs.readFileSync(filePath);
const sha = crypto.createHash("sha256").update(fileContent).digest("hex");
const fileName = path.basename(filePath);
const fileExt = path.extname(fileName).toLowerCase();
const targetPath = path.join(assetsDir, fileName);
fs.copyFileSync(filePath, targetPath);
const targetFileName = (sha + fileExt).toLowerCase();
const githubServer = process.env.GITHUB_SERVER_URL || "https://github.com";
const repo = process.env.GITHUB_REPOSITORY || "owner/repo";
const url = `${githubServer.replace("github.com", "raw.githubusercontent.com")}/${repo}/${branchName}/${targetFileName}`;
const entry = {
type: "upload_asset",
path: filePath,
fileName: fileName,
sha: sha,
size: sizeBytes,
url: url,
targetFileName: targetFileName,
};
appendSafeOutput(entry);
return {
content: [
{
type: "text",
text: url,
},
],
};
};
const normTool = toolName => (toolName ? toolName.replace(/-/g, "_").toLowerCase() : undefined);
const ALL_TOOLS = [
{
name: "create_issue",
description: "Create a new GitHub issue",
inputSchema: {
type: "object",
required: ["title", "body"],
properties: {
title: { type: "string", description: "Issue title" },
body: { type: "string", description: "Issue body/description" },
labels: {
type: "array",
items: { type: "string" },
description: "Issue labels",
},
},
additionalProperties: false,
},
},
{
name: "create_discussion",
description: "Create a new GitHub discussion",
inputSchema: {
type: "object",
required: ["title", "body"],
properties: {
title: { type: "string", description: "Discussion title" },
body: { type: "string", description: "Discussion body/content" },
category: { type: "string", description: "Discussion category" },
},
additionalProperties: false,
},
},
{
name: "add_comment",
description: "Add a comment to a GitHub issue or pull request",
inputSchema: {
type: "object",
required: ["body"],
properties: {
body: { type: "string", description: "Comment body/content" },
issue_number: {
type: "number",
description: "Issue or PR number (optional for current context)",
},
},
additionalProperties: false,
},
},
{
name: "create_pull_request",
description: "Create a new GitHub pull request",
inputSchema: {
type: "object",
required: ["title", "body", "branch"],
properties: {
title: { type: "string", description: "Pull request title" },
body: {
type: "string",
description: "Pull request body/description",
},
branch: {
type: "string",
description: "Required branch name",
},
labels: {
type: "array",
items: { type: "string" },
description: "Optional labels to add to the PR",
},
},
additionalProperties: false,
},
},
{
name: "create_pull_request_review_comment",
description: "Create a review comment on a GitHub pull request",
inputSchema: {
type: "object",
required: ["path", "line", "body"],
properties: {
path: {
type: "string",
description: "File path for the review comment",
},
line: {
type: ["number", "string"],
description: "Line number for the comment",
},
body: { type: "string", description: "Comment body content" },
start_line: {
type: ["number", "string"],
description: "Optional start line for multi-line comments",
},
side: {
type: "string",
enum: ["LEFT", "RIGHT"],
description: "Optional side of the diff: LEFT or RIGHT",
},
},
additionalProperties: false,
},
},
{
name: "create_code_scanning_alert",
description: "Create a code scanning alert. severity MUST be one of 'error', 'warning', 'info', 'note'.",
inputSchema: {
type: "object",
required: ["file", "line", "severity", "message"],
properties: {
file: {
type: "string",
description: "File path where the issue was found",
},
line: {
type: ["number", "string"],
description: "Line number where the issue was found",
},
severity: {
type: "string",
enum: ["error", "warning", "info", "note"],
description:
' Security severity levels follow the industry-standard Common Vulnerability Scoring System (CVSS) that is also used for advisories in the GitHub Advisory Database and must be one of "error", "warning", "info", "note".',
},
message: {
type: "string",
description: "Alert message describing the issue",
},
column: {
type: ["number", "string"],
description: "Optional column number",
},
ruleIdSuffix: {
type: "string",
description: "Optional rule ID suffix for uniqueness",
},
},
additionalProperties: false,
},
},
{
name: "add_labels",
description: "Add labels to a GitHub issue or pull request",
inputSchema: {
type: "object",
required: ["labels"],
properties: {
labels: {
type: "array",
items: { type: "string" },
description: "Labels to add",
},
issue_number: {
type: "number",
description: "Issue or PR number (optional for current context)",
},
},
additionalProperties: false,
},
},
{
name: "update_issue",
description: "Update a GitHub issue",
inputSchema: {
type: "object",
properties: {
status: {
type: "string",
enum: ["open", "closed"],
description: "Optional new issue status",
},
title: { type: "string", description: "Optional new issue title" },
body: { type: "string", description: "Optional new issue body" },
issue_number: {
type: ["number", "string"],
description: "Optional issue number for target '*'",
},
},
additionalProperties: false,
},
},
{
name: "push_to_pull_request_branch",
description: "Push changes to a pull request branch",
inputSchema: {
type: "object",
required: ["branch", "message"],
properties: {
branch: {
type: "string",
description: "The name of the branch to push to, should be the branch name associated with the pull request",
},
message: { type: "string", description: "Commit message" },
pull_request_number: {
type: ["number", "string"],
description: "Optional pull request number for target '*'",
},
},
additionalProperties: false,
},
},
{
name: "upload_asset",
description: "Publish a file as a URL-addressable asset to an orphaned git branch",
inputSchema: {
type: "object",
required: ["path"],
properties: {
path: {
type: "string",
description:
"Path to the file to publish as an asset. Must be a file under the current workspace or /tmp directory. By default, images (.png, .jpg, .jpeg) are allowed, but can be configured via workflow settings.",
},
},
additionalProperties: false,
},
handler: uploadAssetHandler,
},
{
name: "missing_tool",
description: "Report a missing tool or functionality needed to complete tasks",
inputSchema: {
type: "object",
required: ["tool", "reason"],
properties: {
tool: { type: "string", description: "Name of the missing tool" },
reason: { type: "string", description: "Why this tool is needed" },
alternatives: {
type: "string",
description: "Possible alternatives or workarounds",
},
},
additionalProperties: false,
},
},
];
debug(`v${SERVER_INFO.version} ready on stdio`);
debug(` output file: ${outputFile}`);
debug(` config: ${JSON.stringify(safeOutputsConfig)}`);
const TOOLS = {};
ALL_TOOLS.forEach(tool => {
if (Object.keys(safeOutputsConfig).find(config => normTool(config) === tool.name)) {
TOOLS[tool.name] = tool;
}
});
Object.keys(safeOutputsConfig).forEach(configKey => {
const normalizedKey = normTool(configKey);
if (TOOLS[normalizedKey]) {
return;
}
if (!ALL_TOOLS.find(t => t.name === normalizedKey)) {
const jobConfig = safeOutputsConfig[configKey];
const dynamicTool = {
name: normalizedKey,
description: `Custom safe-job: ${configKey}`,
inputSchema: {
type: "object",
properties: {},
additionalProperties: true,
},
handler: args => {
const entry = {
type: normalizedKey,
...args,
};
const entryJSON = JSON.stringify(entry);
fs.appendFileSync(outputFile, entryJSON + "\n");
const outputText =
jobConfig && jobConfig.output
? jobConfig.output
: `Safe-job '${configKey}' executed successfully with arguments: ${JSON.stringify(args)}`;
return {
content: [
{
type: "text",
text: outputText,
},
],
};
},
};
if (jobConfig && jobConfig.inputs) {
dynamicTool.inputSchema.properties = {};
dynamicTool.inputSchema.required = [];
Object.keys(jobConfig.inputs).forEach(inputName => {
const inputDef = jobConfig.inputs[inputName];
const propSchema = {
type: inputDef.type || "string",
description: inputDef.description || `Input parameter: ${inputName}`,
};
if (inputDef.options && Array.isArray(inputDef.options)) {
propSchema.enum = inputDef.options;
}
dynamicTool.inputSchema.properties[inputName] = propSchema;
if (inputDef.required) {
dynamicTool.inputSchema.required.push(inputName);
}
});
}
TOOLS[normalizedKey] = dynamicTool;
}
});
debug(` tools: ${Object.keys(TOOLS).join(", ")}`);
if (!Object.keys(TOOLS).length) throw new Error("No tools enabled in configuration");
function handleMessage(req) {
if (!req || typeof req !== "object") {
debug(`Invalid message: not an object`);
return;
}
if (req.jsonrpc !== "2.0") {
debug(`Invalid message: missing or invalid jsonrpc field`);
return;
}
const { id, method, params } = req;
if (!method || typeof method !== "string") {
replyError(id, -32600, "Invalid Request: method must be a string");
return;
}
try {
if (method === "initialize") {
const clientInfo = params?.clientInfo ?? {};
console.error(`client info:`, clientInfo);
const protocolVersion = params?.protocolVersion ?? undefined;
const result = {
serverInfo: SERVER_INFO,
...(protocolVersion ? { protocolVersion } : {}),
capabilities: {
tools: {},
},
};
replyResult(id, result);
} else if (method === "tools/list") {
const list = [];
Object.values(TOOLS).forEach(tool => {
list.push({
name: tool.name,
description: tool.description,
inputSchema: tool.inputSchema,
});
});
replyResult(id, { tools: list });
} else if (method === "tools/call") {
const name = params?.name;
const args = params?.arguments ?? {};
if (!name || typeof name !== "string") {
replyError(id, -32602, "Invalid params: 'name' must be a string");
return;
}
const tool = TOOLS[normTool(name)];
if (!tool) {
replyError(id, -32601, `Tool not found: ${name} (${normTool(name)})`);
return;
}
const handler = tool.handler || defaultHandler(tool.name);
const requiredFields = tool.inputSchema && Array.isArray(tool.inputSchema.required) ? tool.inputSchema.required : [];
if (requiredFields.length) {
const missing = requiredFields.filter(f => {
const value = args[f];
return value === undefined || value === null || (typeof value === "string" && value.trim() === "");
});
if (missing.length) {
replyError(id, -32602, `Invalid arguments: missing or empty ${missing.map(m => `'${m}'`).join(", ")}`);
return;
}
}
const result = handler(args);
const content = result && result.content ? result.content : [];
replyResult(id, { content });
} else if (/^notifications\//.test(method)) {
debug(`ignore ${method}`);
} else {
replyError(id, -32601, `Method not found: ${method}`);
}
} catch (e) {
replyError(id, -32603, "Internal error", {
message: e instanceof Error ? e.message : String(e),
});
}
}
process.stdin.on("data", onData);
process.stdin.on("error", err => debug(`stdin error: ${err}`));
process.stdin.resume();
debug(`listening...`);
EOF
chmod +x /tmp/safe-outputs/mcp-server.cjs
- name: Setup MCPs
env:
GITHUB_AW_SAFE_OUTPUTS: ${{ env.GITHUB_AW_SAFE_OUTPUTS }}
GITHUB_AW_SAFE_OUTPUTS_CONFIG: "{\"print\":{\"inputs\":{\"message\":{\"description\":\"Message to print\",\"required\":true,\"type\":\"string\"}}}}"
run: |
mkdir -p /tmp/mcp-config
cat > /tmp/mcp-config/mcp-servers.json << 'EOF'
{
"mcpServers": {
"github": {
"command": "docker",
"args": [
"run",
"-i",
"--rm",
"-e",
"GITHUB_PERSONAL_ACCESS_TOKEN",
"ghcr.io/github/github-mcp-server:sha-09deac4"
],
"env": {
"GITHUB_PERSONAL_ACCESS_TOKEN": "${{ secrets.GITHUB_TOKEN }}"
}
},
"safe_outputs": {
"command": "node",
"args": ["/tmp/safe-outputs/mcp-server.cjs"],
"env": {
"GITHUB_AW_SAFE_OUTPUTS": "${{ env.GITHUB_AW_SAFE_OUTPUTS }}",
"GITHUB_AW_SAFE_OUTPUTS_CONFIG": ${{ toJSON(env.GITHUB_AW_SAFE_OUTPUTS_CONFIG) }},
"GITHUB_AW_ASSETS_BRANCH": "${{ env.GITHUB_AW_ASSETS_BRANCH }}",
"GITHUB_AW_ASSETS_MAX_SIZE_KB": "${{ env.GITHUB_AW_ASSETS_MAX_SIZE_KB }}",
"GITHUB_AW_ASSETS_ALLOWED_EXTS": "${{ env.GITHUB_AW_ASSETS_ALLOWED_EXTS }}"
}
}
}
}
EOF
- name: Create prompt
env:
GITHUB_AW_PROMPT: /tmp/aw-prompts/prompt.txt
GITHUB_AW_SAFE_OUTPUTS: ${{ env.GITHUB_AW_SAFE_OUTPUTS }}
run: |
mkdir -p $(dirname "$GITHUB_AW_PROMPT")
cat > $GITHUB_AW_PROMPT << 'EOF'
Summarize and use print the message using the `print` tool.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.
EOF
- name: Append safe outputs instructions to prompt
env:
GITHUB_AW_PROMPT: /tmp/aw-prompts/prompt.txt
run: |
cat >> $GITHUB_AW_PROMPT << 'EOF'
---
## Reporting Missing Tools or Functionality
**IMPORTANT**: To do the actions mentioned in the header of this section, use the **safe-outputs** tools, do NOT attempt to use `gh`, do NOT attempt to use the GitHub API. You don't have write access to the GitHub repo.
EOF
- name: Print prompt to step summary
env:
GITHUB_AW_PROMPT: /tmp/aw-prompts/prompt.txt
run: |
echo "## Generated Prompt" >> $GITHUB_STEP_SUMMARY
echo "" >> $GITHUB_STEP_SUMMARY
echo '``````markdown' >> $GITHUB_STEP_SUMMARY
cat $GITHUB_AW_PROMPT >> $GITHUB_STEP_SUMMARY
echo '``````' >> $GITHUB_STEP_SUMMARY
- name: Generate agentic run info
uses: actions/github-script@v8
with:
script: |
const fs = require('fs');
const awInfo = {
engine_id: "claude",
engine_name: "Claude Code",
model: "",
version: "",
workflow_name: "Dev",
experimental: false,
supports_tools_allowlist: true,
supports_http_transport: true,
run_id: context.runId,
run_number: context.runNumber,
run_attempt: process.env.GITHUB_RUN_ATTEMPT,
repository: context.repo.owner + '/' + context.repo.repo,
ref: context.ref,
sha: context.sha,
actor: context.actor,
event_name: context.eventName,
staged: true,
created_at: new Date().toISOString()
};
// Write to /tmp directory to avoid inclusion in PR
const tmpPath = '/tmp/aw_info.json';
fs.writeFileSync(tmpPath, JSON.stringify(awInfo, null, 2));
console.log('Generated aw_info.json at:', tmpPath);
console.log(JSON.stringify(awInfo, null, 2));
// Add agentic workflow run information to step summary
core.summary
.addRaw('## Agentic Run Information\n\n')
.addRaw('```json\n')
.addRaw(JSON.stringify(awInfo, null, 2))
.addRaw('\n```\n')
.write();
- name: Upload agentic run info
if: always()
uses: actions/upload-artifact@v4
with:
name: aw_info.json
path: /tmp/aw_info.json
if-no-files-found: warn
- name: Execute Claude Code CLI
id: agentic_execution
# Allowed tools (sorted):
# - ExitPlanMode
# - Glob
# - Grep
# - LS
# - NotebookRead
# - Read
# - Task
# - TodoWrite
# - Write
# - mcp__github__download_workflow_run_artifact
# - mcp__github__get_code_scanning_alert
# - mcp__github__get_commit
# - mcp__github__get_dependabot_alert
# - mcp__github__get_discussion
# - mcp__github__get_discussion_comments
# - mcp__github__get_file_contents
# - mcp__github__get_issue
# - mcp__github__get_issue_comments
# - mcp__github__get_job_logs
# - mcp__github__get_me
# - mcp__github__get_notification_details
# - mcp__github__get_pull_request
# - mcp__github__get_pull_request_comments
# - mcp__github__get_pull_request_diff
# - mcp__github__get_pull_request_files
# - mcp__github__get_pull_request_reviews
# - mcp__github__get_pull_request_status
# - mcp__github__get_secret_scanning_alert
# - mcp__github__get_tag
# - mcp__github__get_workflow_run
# - mcp__github__get_workflow_run_logs
# - mcp__github__get_workflow_run_usage
# - mcp__github__list_branches
# - mcp__github__list_code_scanning_alerts
# - mcp__github__list_commits
# - mcp__github__list_dependabot_alerts
# - mcp__github__list_discussion_categories
# - mcp__github__list_discussions
# - mcp__github__list_issues
# - mcp__github__list_notifications
# - mcp__github__list_pull_requests
# - mcp__github__list_secret_scanning_alerts
# - mcp__github__list_tags
# - mcp__github__list_workflow_jobs
# - mcp__github__list_workflow_run_artifacts
# - mcp__github__list_workflow_runs
# - mcp__github__list_workflows
# - mcp__github__search_code
# - mcp__github__search_issues
# - mcp__github__search_orgs
# - mcp__github__search_pull_requests
# - mcp__github__search_repositories
# - mcp__github__search_users
timeout-minutes: 5
run: |
set -o pipefail
# Execute Claude Code CLI with prompt from file
npx @anthropic-ai/claude-code@latest --print --mcp-config /tmp/mcp-config/mcp-servers.json --allowed-tools "ExitPlanMode,Glob,Grep,LS,NotebookRead,Read,Task,TodoWrite,Write,mcp__github__download_workflow_run_artifact,mcp__github__get_code_scanning_alert,mcp__github__get_commit,mcp__github__get_dependabot_alert,mcp__github__get_discussion,mcp__github__get_discussion_comments,mcp__github__get_file_contents,mcp__github__get_issue,mcp__github__get_issue_comments,mcp__github__get_job_logs,mcp__github__get_me,mcp__github__get_notification_details,mcp__github__get_pull_request,mcp__github__get_pull_request_comments,mcp__github__get_pull_request_diff,mcp__github__get_pull_request_files,mcp__github__get_pull_request_reviews,mcp__github__get_pull_request_status,mcp__github__get_secret_scanning_alert,mcp__github__get_tag,mcp__github__get_workflow_run,mcp__github__get_workflow_run_logs,mcp__github__get_workflow_run_usage,mcp__github__list_branches,mcp__github__list_code_scanning_alerts,mcp__github__list_commits,mcp__github__list_dependabot_alerts,mcp__github__list_discussion_categories,mcp__github__list_discussions,mcp__github__list_issues,mcp__github__list_notifications,mcp__github__list_pull_requests,mcp__github__list_secret_scanning_alerts,mcp__github__list_tags,mcp__github__list_workflow_jobs,mcp__github__list_workflow_run_artifacts,mcp__github__list_workflow_runs,mcp__github__list_workflows,mcp__github__search_code,mcp__github__search_issues,mcp__github__search_orgs,mcp__github__search_pull_requests,mcp__github__search_repositories,mcp__github__search_users" --debug --verbose --permission-mode bypassPermissions --output-format json --settings /tmp/.claude/settings.json "$(cat /tmp/aw-prompts/prompt.txt)" 2>&1 | tee /tmp/dev.log
env:
ANTHROPIC_API_KEY: ${{ secrets.ANTHROPIC_API_KEY }}
DISABLE_TELEMETRY: "1"
DISABLE_ERROR_REPORTING: "1"
DISABLE_BUG_COMMAND: "1"
GITHUB_AW_PROMPT: /tmp/aw-prompts/prompt.txt
GITHUB_AW_MCP_CONFIG: /tmp/mcp-config/mcp-servers.json
MCP_TIMEOUT: "60000"
GITHUB_AW_SAFE_OUTPUTS: ${{ env.GITHUB_AW_SAFE_OUTPUTS }}
GITHUB_AW_SAFE_OUTPUTS_STAGED: "true"
- name: Ensure log file exists
if: always()
run: |
# Ensure log file exists
touch /tmp/dev.log
# Show last few lines for debugging
echo "=== Last 10 lines of Claude execution log ==="
tail -10 /tmp/dev.log || echo "No log content available"
- name: Print Agent output
env:
GITHUB_AW_SAFE_OUTPUTS: ${{ env.GITHUB_AW_SAFE_OUTPUTS }}
run: |
echo "## Safe Outputs (JSONL)" >> $GITHUB_STEP_SUMMARY
echo "" >> $GITHUB_STEP_SUMMARY
echo '``````json' >> $GITHUB_STEP_SUMMARY
if [ -f ${{ env.GITHUB_AW_SAFE_OUTPUTS }} ]; then
cat ${{ env.GITHUB_AW_SAFE_OUTPUTS }} >> $GITHUB_STEP_SUMMARY
# Ensure there's a newline after the file content if it doesn't end with one
if [ -s ${{ env.GITHUB_AW_SAFE_OUTPUTS }} ] && [ "$(tail -c1 ${{ env.GITHUB_AW_SAFE_OUTPUTS }})" != "" ]; then
echo "" >> $GITHUB_STEP_SUMMARY
fi
else
echo "No agent output file found" >> $GITHUB_STEP_SUMMARY
fi
echo '``````' >> $GITHUB_STEP_SUMMARY
echo "" >> $GITHUB_STEP_SUMMARY
- name: Upload agentic output file
if: always()
uses: actions/upload-artifact@v4
with:
name: safe_output.jsonl
path: ${{ env.GITHUB_AW_SAFE_OUTPUTS }}
if-no-files-found: warn
- name: Ingest agent output
id: collect_output
uses: actions/github-script@v8
env:
GITHUB_AW_SAFE_OUTPUTS: ${{ env.GITHUB_AW_SAFE_OUTPUTS }}
GITHUB_AW_SAFE_OUTPUTS_CONFIG: "{\"print\":{\"inputs\":{\"message\":{\"description\":\"Message to print\",\"required\":true,\"type\":\"string\"}}}}"
with:
script: |
async function main() {
const fs = require("fs");
function sanitizeContent(content) {
if (!content || typeof content !== "string") {
return "";
}
const allowedDomainsEnv = process.env.GITHUB_AW_ALLOWED_DOMAINS;
const defaultAllowedDomains = ["github.com", "github.io", "githubusercontent.com", "githubassets.com", "github.dev", "codespaces.new"];
const allowedDomains = allowedDomainsEnv
? allowedDomainsEnv
.split(",")
.map(d => d.trim())
.filter(d => d)
: defaultAllowedDomains;
let sanitized = content;
sanitized = neutralizeMentions(sanitized);
sanitized = removeXmlComments(sanitized);
sanitized = sanitized.replace(/\x1b\[[0-9;]*[mGKH]/g, "");
sanitized = sanitized.replace(/[\x00-\x08\x0B\x0C\x0E-\x1F\x7F]/g, "");
sanitized = sanitizeUrlProtocols(sanitized);
sanitized = sanitizeUrlDomains(sanitized);
const maxLength = 524288;
if (sanitized.length > maxLength) {
sanitized = sanitized.substring(0, maxLength) + "\n[Content truncated due to length]";
}
const lines = sanitized.split("\n");
const maxLines = 65000;
if (lines.length > maxLines) {
sanitized = lines.slice(0, maxLines).join("\n") + "\n[Content truncated due to line count]";
}
sanitized = neutralizeBotTriggers(sanitized);
return sanitized.trim();
function sanitizeUrlDomains(s) {
return s.replace(/\bhttps:\/\/[^\s\])}'"<>&\x00-\x1f,;]+/gi, match => {
const urlAfterProtocol = match.slice(8);
const hostname = urlAfterProtocol.split(/[\/:\?#]/)[0].toLowerCase();
const isAllowed = allowedDomains.some(allowedDomain => {
const normalizedAllowed = allowedDomain.toLowerCase();
return hostname === normalizedAllowed || hostname.endsWith("." + normalizedAllowed);
});
return isAllowed ? match : "(redacted)";
});
}
function sanitizeUrlProtocols(s) {
return s.replace(/\b(\w+):\/\/[^\s\])}'"<>&\x00-\x1f]+/gi, (match, protocol) => {
return protocol.toLowerCase() === "https" ? match : "(redacted)";
});
}
function neutralizeMentions(s) {
return s.replace(
/(^|[^\w`])@([A-Za-z0-9](?:[A-Za-z0-9-]{0,37}[A-Za-z0-9])?(?:\/[A-Za-z0-9._-]+)?)/g,
(_m, p1, p2) => `${p1}\`@${p2}\``
);
}
function removeXmlComments(s) {
return s.replace(/<!--[\s\S]*?-->/g, "").replace(/<!--[\s\S]*?--!>/g, "");
}
function neutralizeBotTriggers(s) {
return s.replace(/\b(fixes?|closes?|resolves?|fix|close|resolve)\s+#(\w+)/gi, (match, action, ref) => `\`${action} #${ref}\``);
}
}
function getMaxAllowedForType(itemType, config) {
if (config && config[itemType] && typeof config[itemType] === "object" && config[itemType].max) {
return config[itemType].max;
}
switch (itemType) {
case "create-issue":
return 1;
case "add-comment":
return 1;
case "create-pull-request":
return 1;
case "create-pull-request-review-comment":
return 1;
case "add-labels":
return 5;
case "update-issue":
return 1;
case "push-to-pull-request-branch":
return 1;
case "create-discussion":
return 1;
case "missing-tool":
return 1000;
case "create-code-scanning-alert":
return 1000;
case "upload-asset":
return 10;
default:
return 1;
}
}
function repairJson(jsonStr) {
let repaired = jsonStr.trim();
const _ctrl = { 8: "\\b", 9: "\\t", 10: "\\n", 12: "\\f", 13: "\\r" };
repaired = repaired.replace(/[\u0000-\u001F]/g, ch => {
const c = ch.charCodeAt(0);
return _ctrl[c] || "\\u" + c.toString(16).padStart(4, "0");
});
repaired = repaired.replace(/'/g, '"');
repaired = repaired.replace(/([{,]\s*)([a-zA-Z_$][a-zA-Z0-9_$]*)\s*:/g, '$1"$2":');
repaired = repaired.replace(/"([^"\\]*)"/g, (match, content) => {
if (content.includes("\n") || content.includes("\r") || content.includes("\t")) {
const escaped = content.replace(/\\/g, "\\\\").replace(/\n/g, "\\n").replace(/\r/g, "\\r").replace(/\t/g, "\\t");
return `"${escaped}"`;
}
return match;
});
repaired = repaired.replace(/"([^"]*)"([^":,}\]]*)"([^"]*)"(\s*[,:}\]])/g, (match, p1, p2, p3, p4) => `"${p1}\\"${p2}\\"${p3}"${p4}`);
repaired = repaired.replace(/(\[\s*(?:"[^"]*"(?:\s*,\s*"[^"]*")*\s*),?)\s*}/g, "$1]");
const openBraces = (repaired.match(/\{/g) || []).length;
const closeBraces = (repaired.match(/\}/g) || []).length;
if (openBraces > closeBraces) {
repaired += "}".repeat(openBraces - closeBraces);
} else if (closeBraces > openBraces) {
repaired = "{".repeat(closeBraces - openBraces) + repaired;
}
const openBrackets = (repaired.match(/\[/g) || []).length;
const closeBrackets = (repaired.match(/\]/g) || []).length;
if (openBrackets > closeBrackets) {
repaired += "]".repeat(openBrackets - closeBrackets);
} else if (closeBrackets > openBrackets) {
repaired = "[".repeat(closeBrackets - openBrackets) + repaired;
}
repaired = repaired.replace(/,(\s*[}\]])/g, "$1");
return repaired;
}
function validatePositiveInteger(value, fieldName, lineNum) {
if (value === undefined || value === null) {
if (fieldName.includes("create-code-scanning-alert 'line'")) {
return {
isValid: false,
error: `Line ${lineNum}: create-code-scanning-alert requires a 'line' field (number or string)`,
};
}
if (fieldName.includes("create-pull-request-review-comment 'line'")) {
return {
isValid: false,
error: `Line ${lineNum}: create-pull-request-review-comment requires a 'line' number`,
};
}
return {
isValid: false,
error: `Line ${lineNum}: ${fieldName} is required`,
};
}
if (typeof value !== "number" && typeof value !== "string") {
if (fieldName.includes("create-code-scanning-alert 'line'")) {
return {
isValid: false,
error: `Line ${lineNum}: create-code-scanning-alert requires a 'line' field (number or string)`,
};
}
if (fieldName.includes("create-pull-request-review-comment 'line'")) {
return {
isValid: false,
error: `Line ${lineNum}: create-pull-request-review-comment requires a 'line' number or string field`,
};
}
return {
isValid: false,
error: `Line ${lineNum}: ${fieldName} must be a number or string`,
};
}
const parsed = typeof value === "string" ? parseInt(value, 10) : value;
if (isNaN(parsed) || parsed <= 0 || !Number.isInteger(parsed)) {
if (fieldName.includes("create-code-scanning-alert 'line'")) {
return {
isValid: false,
error: `Line ${lineNum}: create-code-scanning-alert 'line' must be a valid positive integer (got: ${value})`,
};
}
if (fieldName.includes("create-pull-request-review-comment 'line'")) {
return {
isValid: false,
error: `Line ${lineNum}: create-pull-request-review-comment 'line' must be a positive integer`,
};
}
return {
isValid: false,
error: `Line ${lineNum}: ${fieldName} must be a positive integer (got: ${value})`,
};
}
return { isValid: true, normalizedValue: parsed };
}
function validateOptionalPositiveInteger(value, fieldName, lineNum) {
if (value === undefined) {
return { isValid: true };
}
if (typeof value !== "number" && typeof value !== "string") {
if (fieldName.includes("create-pull-request-review-comment 'start_line'")) {
return {
isValid: false,
error: `Line ${lineNum}: create-pull-request-review-comment 'start_line' must be a number or string`,
};
}
if (fieldName.includes("create-code-scanning-alert 'column'")) {
return {
isValid: false,
error: `Line ${lineNum}: create-code-scanning-alert 'column' must be a number or string`,
};
}
return {
isValid: false,
error: `Line ${lineNum}: ${fieldName} must be a number or string`,
};
}
const parsed = typeof value === "string" ? parseInt(value, 10) : value;
if (isNaN(parsed) || parsed <= 0 || !Number.isInteger(parsed)) {
if (fieldName.includes("create-pull-request-review-comment 'start_line'")) {
return {
isValid: false,
error: `Line ${lineNum}: create-pull-request-review-comment 'start_line' must be a positive integer`,
};
}
if (fieldName.includes("create-code-scanning-alert 'column'")) {
return {
isValid: false,
error: `Line ${lineNum}: create-code-scanning-alert 'column' must be a valid positive integer (got: ${value})`,
};
}
return {
isValid: false,
error: `Line ${lineNum}: ${fieldName} must be a positive integer (got: ${value})`,
};
}
return { isValid: true, normalizedValue: parsed };
}
function validateIssueOrPRNumber(value, fieldName, lineNum) {
if (value === undefined) {
return { isValid: true };
}
if (typeof value !== "number" && typeof value !== "string") {
return {
isValid: false,
error: `Line ${lineNum}: ${fieldName} must be a number or string`,
};
}
return { isValid: true };
}
function parseJsonWithRepair(jsonStr) {
try {
return JSON.parse(jsonStr);
} catch (originalError) {
try {
const repairedJson = repairJson(jsonStr);
return JSON.parse(repairedJson);
} catch (repairError) {
core.info(`invalid input json: ${jsonStr}`);
const originalMsg = originalError instanceof Error ? originalError.message : String(originalError);
const repairMsg = repairError instanceof Error ? repairError.message : String(repairError);
throw new Error(`JSON parsing failed. Original: ${originalMsg}. After attempted repair: ${repairMsg}`);
}
}
}
const outputFile = process.env.GITHUB_AW_SAFE_OUTPUTS;
const safeOutputsConfig = process.env.GITHUB_AW_SAFE_OUTPUTS_CONFIG;
if (!outputFile) {
core.info("GITHUB_AW_SAFE_OUTPUTS not set, no output to collect");
core.setOutput("output", "");
return;
}
if (!fs.existsSync(outputFile)) {
core.info(`Output file does not exist: ${outputFile}`);
core.setOutput("output", "");
return;
}
const outputContent = fs.readFileSync(outputFile, "utf8");
if (outputContent.trim() === "") {
core.info("Output file is empty");
core.setOutput("output", "");
return;
}
core.info(`Raw output content length: ${outputContent.length}`);
let expectedOutputTypes = {};
if (safeOutputsConfig) {
try {
expectedOutputTypes = JSON.parse(safeOutputsConfig);
core.info(`Expected output types: ${JSON.stringify(Object.keys(expectedOutputTypes))}`);
} catch (error) {
const errorMsg = error instanceof Error ? error.message : String(error);
core.info(`Warning: Could not parse safe-outputs config: ${errorMsg}`);
}
}
const lines = outputContent.trim().split("\n");
const parsedItems = [];
const errors = [];
for (let i = 0; i < lines.length; i++) {
const line = lines[i].trim();
if (line === "") continue;
try {
const item = parseJsonWithRepair(line);
if (item === undefined) {
errors.push(`Line ${i + 1}: Invalid JSON - JSON parsing failed`);
continue;
}
if (!item.type) {
errors.push(`Line ${i + 1}: Missing required 'type' field`);
continue;
}
const itemType = item.type;
if (!expectedOutputTypes[itemType]) {
errors.push(`Line ${i + 1}: Unexpected output type '${itemType}'. Expected one of: ${Object.keys(expectedOutputTypes).join(", ")}`);
continue;
}
const typeCount = parsedItems.filter(existing => existing.type === itemType).length;
const maxAllowed = getMaxAllowedForType(itemType, expectedOutputTypes);
if (typeCount >= maxAllowed) {
errors.push(`Line ${i + 1}: Too many items of type '${itemType}'. Maximum allowed: ${maxAllowed}.`);
continue;
}
core.info(`Line ${i + 1}: type '${itemType}'`);
switch (itemType) {
case "create-issue":
if (!item.title || typeof item.title !== "string") {
errors.push(`Line ${i + 1}: create_issue requires a 'title' string field`);
continue;
}
if (!item.body || typeof item.body !== "string") {
errors.push(`Line ${i + 1}: create_issue requires a 'body' string field`);
continue;
}
item.title = sanitizeContent(item.title);
item.body = sanitizeContent(item.body);
if (item.labels && Array.isArray(item.labels)) {
item.labels = item.labels.map( label => (typeof label === "string" ? sanitizeContent(label) : label));
}
break;
case "add-comment":
if (!item.body || typeof item.body !== "string") {
errors.push(`Line ${i + 1}: add_comment requires a 'body' string field`);
continue;
}
const issueNumValidation = validateIssueOrPRNumber(item.issue_number, "add_comment 'issue_number'", i + 1);
if (!issueNumValidation.isValid) {
errors.push(issueNumValidation.error);
continue;
}
item.body = sanitizeContent(item.body);
break;
case "create-pull-request":
if (!item.title || typeof item.title !== "string") {
errors.push(`Line ${i + 1}: create_pull_request requires a 'title' string field`);
continue;
}
if (!item.body || typeof item.body !== "string") {
errors.push(`Line ${i + 1}: create_pull_request requires a 'body' string field`);
continue;
}
if (!item.branch || typeof item.branch !== "string") {
errors.push(`Line ${i + 1}: create_pull_request requires a 'branch' string field`);
continue;
}
item.title = sanitizeContent(item.title);
item.body = sanitizeContent(item.body);
item.branch = sanitizeContent(item.branch);
if (item.labels && Array.isArray(item.labels)) {
item.labels = item.labels.map( label => (typeof label === "string" ? sanitizeContent(label) : label));
}
break;
case "add-labels":
if (!item.labels || !Array.isArray(item.labels)) {
errors.push(`Line ${i + 1}: add_labels requires a 'labels' array field`);
continue;
}
if (item.labels.some( label => typeof label !== "string")) {
errors.push(`Line ${i + 1}: add_labels labels array must contain only strings`);
continue;
}
const labelsIssueNumValidation = validateIssueOrPRNumber(item.issue_number, "add-labels 'issue_number'", i + 1);
if (!labelsIssueNumValidation.isValid) {
errors.push(labelsIssueNumValidation.error);
continue;
}
item.labels = item.labels.map( label => sanitizeContent(label));
break;
case "update-issue":
const hasValidField = item.status !== undefined || item.title !== undefined || item.body !== undefined;
if (!hasValidField) {
errors.push(`Line ${i + 1}: update_issue requires at least one of: 'status', 'title', or 'body' fields`);
continue;
}
if (item.status !== undefined) {
if (typeof item.status !== "string" || (item.status !== "open" && item.status !== "closed")) {
errors.push(`Line ${i + 1}: update_issue 'status' must be 'open' or 'closed'`);
continue;
}
}
if (item.title !== undefined) {
if (typeof item.title !== "string") {
errors.push(`Line ${i + 1}: update-issue 'title' must be a string`);
continue;
}
item.title = sanitizeContent(item.title);
}
if (item.body !== undefined) {
if (typeof item.body !== "string") {
errors.push(`Line ${i + 1}: update-issue 'body' must be a string`);
continue;
}
item.body = sanitizeContent(item.body);
}
const updateIssueNumValidation = validateIssueOrPRNumber(item.issue_number, "update-issue 'issue_number'", i + 1);
if (!updateIssueNumValidation.isValid) {
errors.push(updateIssueNumValidation.error);
continue;
}
break;
case "push-to-pull-request-branch":
if (!item.branch || typeof item.branch !== "string") {
errors.push(`Line ${i + 1}: push_to_pull_request_branch requires a 'branch' string field`);
continue;
}
if (!item.message || typeof item.message !== "string") {
errors.push(`Line ${i + 1}: push_to_pull_request_branch requires a 'message' string field`);
continue;
}
item.branch = sanitizeContent(item.branch);
item.message = sanitizeContent(item.message);
const pushPRNumValidation = validateIssueOrPRNumber(
item.pull_request_number,
"push-to-pull-request-branch 'pull_request_number'",
i + 1
);
if (!pushPRNumValidation.isValid) {
errors.push(pushPRNumValidation.error);
continue;
}
break;
case "create-pull-request-review-comment":
if (!item.path || typeof item.path !== "string") {
errors.push(`Line ${i + 1}: create-pull-request-review-comment requires a 'path' string field`);
continue;
}
const lineValidation = validatePositiveInteger(item.line, "create-pull-request-review-comment 'line'", i + 1);
if (!lineValidation.isValid) {
errors.push(lineValidation.error);
continue;
}
const lineNumber = lineValidation.normalizedValue;
if (!item.body || typeof item.body !== "string") {
errors.push(`Line ${i + 1}: create-pull-request-review-comment requires a 'body' string field`);
continue;
}
item.body = sanitizeContent(item.body);
const startLineValidation = validateOptionalPositiveInteger(
item.start_line,
"create-pull-request-review-comment 'start_line'",
i + 1
);
if (!startLineValidation.isValid) {
errors.push(startLineValidation.error);
continue;
}
if (
startLineValidation.normalizedValue !== undefined &&
lineNumber !== undefined &&
startLineValidation.normalizedValue > lineNumber
) {
errors.push(`Line ${i + 1}: create-pull-request-review-comment 'start_line' must be less than or equal to 'line'`);
continue;
}
if (item.side !== undefined) {
if (typeof item.side !== "string" || (item.side !== "LEFT" && item.side !== "RIGHT")) {
errors.push(`Line ${i + 1}: create-pull-request-review-comment 'side' must be 'LEFT' or 'RIGHT'`);
continue;
}
}
break;
case "create-discussion":
if (!item.title || typeof item.title !== "string") {
errors.push(`Line ${i + 1}: create_discussion requires a 'title' string field`);
continue;
}
if (!item.body || typeof item.body !== "string") {
errors.push(`Line ${i + 1}: create_discussion requires a 'body' string field`);
continue;
}
if (item.category !== undefined) {
if (typeof item.category !== "string") {
errors.push(`Line ${i + 1}: create_discussion 'category' must be a string`);
continue;
}
item.category = sanitizeContent(item.category);
}
item.title = sanitizeContent(item.title);
item.body = sanitizeContent(item.body);
break;
case "missing-tool":
if (!item.tool || typeof item.tool !== "string") {
errors.push(`Line ${i + 1}: missing_tool requires a 'tool' string field`);
continue;
}
if (!item.reason || typeof item.reason !== "string") {
errors.push(`Line ${i + 1}: missing_tool requires a 'reason' string field`);
continue;
}
item.tool = sanitizeContent(item.tool);
item.reason = sanitizeContent(item.reason);
if (item.alternatives !== undefined) {
if (typeof item.alternatives !== "string") {
errors.push(`Line ${i + 1}: missing-tool 'alternatives' must be a string`);
continue;
}
item.alternatives = sanitizeContent(item.alternatives);
}
break;
case "upload-asset":
if (!item.path || typeof item.path !== "string") {
errors.push(`Line ${i + 1}: upload_asset requires a 'path' string field`);
continue;
}
break;
case "create-code-scanning-alert":
if (!item.file || typeof item.file !== "string") {
errors.push(`Line ${i + 1}: create-code-scanning-alert requires a 'file' field (string)`);
continue;
}
const alertLineValidation = validatePositiveInteger(item.line, "create-code-scanning-alert 'line'", i + 1);
if (!alertLineValidation.isValid) {
errors.push(alertLineValidation.error);
continue;
}
if (!item.severity || typeof item.severity !== "string") {
errors.push(`Line ${i + 1}: create-code-scanning-alert requires a 'severity' field (string)`);
continue;
}
if (!item.message || typeof item.message !== "string") {
errors.push(`Line ${i + 1}: create-code-scanning-alert requires a 'message' field (string)`);
continue;
}
const allowedSeverities = ["error", "warning", "info", "note"];
if (!allowedSeverities.includes(item.severity.toLowerCase())) {
errors.push(
`Line ${i + 1}: create-code-scanning-alert 'severity' must be one of: ${allowedSeverities.join(", ")}, got ${item.severity.toLowerCase()}`
);
continue;
}
const columnValidation = validateOptionalPositiveInteger(item.column, "create-code-scanning-alert 'column'", i + 1);
if (!columnValidation.isValid) {
errors.push(columnValidation.error);
continue;
}
if (item.ruleIdSuffix !== undefined) {
if (typeof item.ruleIdSuffix !== "string") {
errors.push(`Line ${i + 1}: create-code-scanning-alert 'ruleIdSuffix' must be a string`);
continue;
}
if (!/^[a-zA-Z0-9_-]+$/.test(item.ruleIdSuffix.trim())) {
errors.push(
`Line ${i + 1}: create-code-scanning-alert 'ruleIdSuffix' must contain only alphanumeric characters, hyphens, and underscores`
);
continue;
}
}
item.severity = item.severity.toLowerCase();
item.file = sanitizeContent(item.file);
item.severity = sanitizeContent(item.severity);
item.message = sanitizeContent(item.message);
if (item.ruleIdSuffix) {
item.ruleIdSuffix = sanitizeContent(item.ruleIdSuffix);
}
break;
default:
const jobOutputType = expectedOutputTypes[itemType];
if (!jobOutputType) {
errors.push(`Line ${i + 1}: Unknown output type '${itemType}'`);
continue;
}
break;
}
core.info(`Line ${i + 1}: Valid ${itemType} item`);
parsedItems.push(item);
} catch (error) {
const errorMsg = error instanceof Error ? error.message : String(error);
errors.push(`Line ${i + 1}: Invalid JSON - ${errorMsg}`);
}
}
if (errors.length > 0) {
core.warning("Validation errors found:");
errors.forEach(error => core.warning(` - ${error}`));
if (parsedItems.length === 0) {
core.setFailed(errors.map(e => ` - ${e}`).join("\n"));
return;
}
}
core.info(`Successfully parsed ${parsedItems.length} valid output items`);
const validatedOutput = {
items: parsedItems,
errors: errors,
};
const agentOutputFile = "/tmp/agent_output.json";
const validatedOutputJson = JSON.stringify(validatedOutput);
try {
fs.mkdirSync("/tmp", { recursive: true });
fs.writeFileSync(agentOutputFile, validatedOutputJson, "utf8");
core.info(`Stored validated output to: ${agentOutputFile}`);
core.exportVariable("GITHUB_AW_AGENT_OUTPUT", agentOutputFile);
} catch (error) {
const errorMsg = error instanceof Error ? error.message : String(error);
core.error(`Failed to write agent output file: ${errorMsg}`);
}
core.setOutput("output", JSON.stringify(validatedOutput));
core.setOutput("raw_output", outputContent);
try {
await core.summary
.addRaw("## Processed Output\n\n")
.addRaw("```json\n")
.addRaw(JSON.stringify(validatedOutput))
.addRaw("\n```\n")
.write();
core.info("Successfully wrote processed output to step summary");
} catch (error) {
const errorMsg = error instanceof Error ? error.message : String(error);
core.warning(`Failed to write to step summary: ${errorMsg}`);
}
}
await main();
- name: Upload sanitized agent output
if: always() && env.GITHUB_AW_AGENT_OUTPUT
uses: actions/upload-artifact@v4
with:
name: agent_output.json
path: ${{ env.GITHUB_AW_AGENT_OUTPUT }}
if-no-files-found: warn
- name: Upload MCP logs
if: always()
uses: actions/upload-artifact@v4
with:
name: mcp-logs
path: /tmp/mcp-logs/
if-no-files-found: ignore
- name: Parse agent logs for step summary
if: always()
uses: actions/github-script@v8
env:
GITHUB_AW_AGENT_OUTPUT: /tmp/dev.log
with:
script: |
function main() {
const fs = require("fs");
try {
const logFile = process.env.GITHUB_AW_AGENT_OUTPUT;
if (!logFile) {
core.info("No agent log file specified");
return;
}
if (!fs.existsSync(logFile)) {
core.info(`Log file not found: ${logFile}`);
return;
}
const logContent = fs.readFileSync(logFile, "utf8");
const result = parseClaudeLog(logContent);
core.summary.addRaw(result.markdown).write();
if (result.mcpFailures && result.mcpFailures.length > 0) {
const failedServers = result.mcpFailures.join(", ");
core.setFailed(`MCP server(s) failed to launch: ${failedServers}`);
}
} catch (error) {
const errorMessage = error instanceof Error ? error.message : String(error);
core.setFailed(errorMessage);
}
}
function parseClaudeLog(logContent) {
try {
let logEntries;
try {
logEntries = JSON.parse(logContent);
if (!Array.isArray(logEntries)) {
throw new Error("Not a JSON array");
}
} catch (jsonArrayError) {
logEntries = [];
const lines = logContent.split("\n");
for (const line of lines) {
const trimmedLine = line.trim();
if (trimmedLine === "") {
continue;
}
if (trimmedLine.startsWith("[{")) {
try {
const arrayEntries = JSON.parse(trimmedLine);
if (Array.isArray(arrayEntries)) {
logEntries.push(...arrayEntries);
continue;
}
} catch (arrayParseError) {
continue;
}
}
if (!trimmedLine.startsWith("{")) {
continue;
}
try {
const jsonEntry = JSON.parse(trimmedLine);
logEntries.push(jsonEntry);
} catch (jsonLineError) {
continue;
}
}
}
if (!Array.isArray(logEntries) || logEntries.length === 0) {
return {
markdown: "## Agent Log Summary\n\nLog format not recognized as Claude JSON array or JSONL.\n",
mcpFailures: [],
};
}
let markdown = "";
const mcpFailures = [];
const initEntry = logEntries.find(entry => entry.type === "system" && entry.subtype === "init");
if (initEntry) {
markdown += "## 🚀 Initialization\n\n";
const initResult = formatInitializationSummary(initEntry);
markdown += initResult.markdown;
mcpFailures.push(...initResult.mcpFailures);
markdown += "\n";
}
markdown += "## 🤖 Commands and Tools\n\n";
const toolUsePairs = new Map();
const commandSummary = [];
for (const entry of logEntries) {
if (entry.type === "user" && entry.message?.content) {
for (const content of entry.message.content) {
if (content.type === "tool_result" && content.tool_use_id) {
toolUsePairs.set(content.tool_use_id, content);
}
}
}
}
for (const entry of logEntries) {
if (entry.type === "assistant" && entry.message?.content) {
for (const content of entry.message.content) {
if (content.type === "tool_use") {
const toolName = content.name;
const input = content.input || {};
if (["Read", "Write", "Edit", "MultiEdit", "LS", "Grep", "Glob", "TodoWrite"].includes(toolName)) {
continue;
}
const toolResult = toolUsePairs.get(content.id);
let statusIcon = "❓";
if (toolResult) {
statusIcon = toolResult.is_error === true ? "❌" : "✅";
}
if (toolName === "Bash") {
const formattedCommand = formatBashCommand(input.command || "");
commandSummary.push(`* ${statusIcon} \`${formattedCommand}\``);
} else if (toolName.startsWith("mcp__")) {
const mcpName = formatMcpName(toolName);
commandSummary.push(`* ${statusIcon} \`${mcpName}(...)\``);
} else {
commandSummary.push(`* ${statusIcon} ${toolName}`);
}
}
}
}
}
if (commandSummary.length > 0) {
for (const cmd of commandSummary) {
markdown += `${cmd}\n`;
}
} else {
markdown += "No commands or tools used.\n";
}
markdown += "\n## 📊 Information\n\n";
const lastEntry = logEntries[logEntries.length - 1];
if (lastEntry && (lastEntry.num_turns || lastEntry.duration_ms || lastEntry.total_cost_usd || lastEntry.usage)) {
if (lastEntry.num_turns) {
markdown += `**Turns:** ${lastEntry.num_turns}\n\n`;
}
if (lastEntry.duration_ms) {
const durationSec = Math.round(lastEntry.duration_ms / 1000);
const minutes = Math.floor(durationSec / 60);
const seconds = durationSec % 60;
markdown += `**Duration:** ${minutes}m ${seconds}s\n\n`;
}
if (lastEntry.total_cost_usd) {
markdown += `**Total Cost:** $${lastEntry.total_cost_usd.toFixed(4)}\n\n`;
}
if (lastEntry.usage) {
const usage = lastEntry.usage;
if (usage.input_tokens || usage.output_tokens) {
markdown += `**Token Usage:**\n`;
if (usage.input_tokens) markdown += `- Input: ${usage.input_tokens.toLocaleString()}\n`;
if (usage.cache_creation_input_tokens) markdown += `- Cache Creation: ${usage.cache_creation_input_tokens.toLocaleString()}\n`;
if (usage.cache_read_input_tokens) markdown += `- Cache Read: ${usage.cache_read_input_tokens.toLocaleString()}\n`;
if (usage.output_tokens) markdown += `- Output: ${usage.output_tokens.toLocaleString()}\n`;
markdown += "\n";
}
}
if (lastEntry.permission_denials && lastEntry.permission_denials.length > 0) {
markdown += `**Permission Denials:** ${lastEntry.permission_denials.length}\n\n`;
}
}
markdown += "\n## 🤖 Reasoning\n\n";
for (const entry of logEntries) {
if (entry.type === "assistant" && entry.message?.content) {
for (const content of entry.message.content) {
if (content.type === "text" && content.text) {
const text = content.text.trim();
if (text && text.length > 0) {
markdown += text + "\n\n";
}
} else if (content.type === "tool_use") {
const toolResult = toolUsePairs.get(content.id);
const toolMarkdown = formatToolUse(content, toolResult);
if (toolMarkdown) {
markdown += toolMarkdown;
}
}
}
}
}
return { markdown, mcpFailures };
} catch (error) {
const errorMessage = error instanceof Error ? error.message : String(error);
return {
markdown: `## Agent Log Summary\n\nError parsing Claude log (tried both JSON array and JSONL formats): ${errorMessage}\n`,
mcpFailures: [],
};
}
}
function formatInitializationSummary(initEntry) {
let markdown = "";
const mcpFailures = [];
if (initEntry.model) {
markdown += `**Model:** ${initEntry.model}\n\n`;
}
if (initEntry.session_id) {
markdown += `**Session ID:** ${initEntry.session_id}\n\n`;
}
if (initEntry.cwd) {
const cleanCwd = initEntry.cwd.replace(/^\/home\/runner\/work\/[^\/]+\/[^\/]+/, ".");
markdown += `**Working Directory:** ${cleanCwd}\n\n`;
}
if (initEntry.mcp_servers && Array.isArray(initEntry.mcp_servers)) {
markdown += "**MCP Servers:**\n";
for (const server of initEntry.mcp_servers) {
const statusIcon = server.status === "connected" ? "✅" : server.status === "failed" ? "❌" : "❓";
markdown += `- ${statusIcon} ${server.name} (${server.status})\n`;
if (server.status === "failed") {
mcpFailures.push(server.name);
}
}
markdown += "\n";
}
if (initEntry.tools && Array.isArray(initEntry.tools)) {
markdown += "**Available Tools:**\n";
const categories = {
Core: [],
"File Operations": [],
"Git/GitHub": [],
MCP: [],
Other: [],
};
for (const tool of initEntry.tools) {
if (["Task", "Bash", "BashOutput", "KillBash", "ExitPlanMode"].includes(tool)) {
categories["Core"].push(tool);
} else if (["Read", "Edit", "MultiEdit", "Write", "LS", "Grep", "Glob", "NotebookEdit"].includes(tool)) {
categories["File Operations"].push(tool);
} else if (tool.startsWith("mcp__github__")) {
categories["Git/GitHub"].push(formatMcpName(tool));
} else if (tool.startsWith("mcp__") || ["ListMcpResourcesTool", "ReadMcpResourceTool"].includes(tool)) {
categories["MCP"].push(tool.startsWith("mcp__") ? formatMcpName(tool) : tool);
} else {
categories["Other"].push(tool);
}
}
for (const [category, tools] of Object.entries(categories)) {
if (tools.length > 0) {
markdown += `- **${category}:** ${tools.length} tools\n`;
if (tools.length <= 5) {
markdown += ` - ${tools.join(", ")}\n`;
} else {
markdown += ` - ${tools.slice(0, 3).join(", ")}, and ${tools.length - 3} more\n`;
}
}
}
markdown += "\n";
}
if (initEntry.slash_commands && Array.isArray(initEntry.slash_commands)) {
const commandCount = initEntry.slash_commands.length;
markdown += `**Slash Commands:** ${commandCount} available\n`;
if (commandCount <= 10) {
markdown += `- ${initEntry.slash_commands.join(", ")}\n`;
} else {
markdown += `- ${initEntry.slash_commands.slice(0, 5).join(", ")}, and ${commandCount - 5} more\n`;
}
markdown += "\n";
}
return { markdown, mcpFailures };
}
function formatToolUse(toolUse, toolResult) {
const toolName = toolUse.name;
const input = toolUse.input || {};
if (toolName === "TodoWrite") {
return "";
}
function getStatusIcon() {
if (toolResult) {
return toolResult.is_error === true ? "❌" : "✅";
}
return "❓";
}
let markdown = "";
const statusIcon = getStatusIcon();
switch (toolName) {
case "Bash":
const command = input.command || "";
const description = input.description || "";
const formattedCommand = formatBashCommand(command);
if (description) {
markdown += `${description}:\n\n`;
}
markdown += `${statusIcon} \`${formattedCommand}\`\n\n`;
break;
case "Read":
const filePath = input.file_path || input.path || "";
const relativePath = filePath.replace(/^\/[^\/]*\/[^\/]*\/[^\/]*\/[^\/]*\//, "");
markdown += `${statusIcon} Read \`${relativePath}\`\n\n`;
break;
case "Write":
case "Edit":
case "MultiEdit":
const writeFilePath = input.file_path || input.path || "";
const writeRelativePath = writeFilePath.replace(/^\/[^\/]*\/[^\/]*\/[^\/]*\/[^\/]*\//, "");
markdown += `${statusIcon} Write \`${writeRelativePath}\`\n\n`;
break;
case "Grep":
case "Glob":
const query = input.query || input.pattern || "";
markdown += `${statusIcon} Search for \`${truncateString(query, 80)}\`\n\n`;
break;
case "LS":
const lsPath = input.path || "";
const lsRelativePath = lsPath.replace(/^\/[^\/]*\/[^\/]*\/[^\/]*\/[^\/]*\//, "");
markdown += `${statusIcon} LS: ${lsRelativePath || lsPath}\n\n`;
break;
default:
if (toolName.startsWith("mcp__")) {
const mcpName = formatMcpName(toolName);
const params = formatMcpParameters(input);
markdown += `${statusIcon} ${mcpName}(${params})\n\n`;
} else {
const keys = Object.keys(input);
if (keys.length > 0) {
const mainParam = keys.find(k => ["query", "command", "path", "file_path", "content"].includes(k)) || keys[0];
const value = String(input[mainParam] || "");
if (value) {
markdown += `${statusIcon} ${toolName}: ${truncateString(value, 100)}\n\n`;
} else {
markdown += `${statusIcon} ${toolName}\n\n`;
}
} else {
markdown += `${statusIcon} ${toolName}\n\n`;
}
}
}
return markdown;
}
function formatMcpName(toolName) {
if (toolName.startsWith("mcp__")) {
const parts = toolName.split("__");
if (parts.length >= 3) {
const provider = parts[1];
const method = parts.slice(2).join("_");
return `${provider}::${method}`;
}
}
return toolName;
}
function formatMcpParameters(input) {
const keys = Object.keys(input);
if (keys.length === 0) return "";
const paramStrs = [];
for (const key of keys.slice(0, 4)) {
const value = String(input[key] || "");
paramStrs.push(`${key}: ${truncateString(value, 40)}`);
}
if (keys.length > 4) {
paramStrs.push("...");
}
return paramStrs.join(", ");
}
function formatBashCommand(command) {
if (!command) return "";
let formatted = command
.replace(/\n/g, " ")
.replace(/\r/g, " ")
.replace(/\t/g, " ")
.replace(/\s+/g, " ")
.trim();
formatted = formatted.replace(/`/g, "\\`");
const maxLength = 80;
if (formatted.length > maxLength) {
formatted = formatted.substring(0, maxLength) + "...";
}
return formatted;
}
function truncateString(str, maxLength) {
if (!str) return "";
if (str.length <= maxLength) return str;
return str.substring(0, maxLength) + "...";
}
if (typeof module !== "undefined" && module.exports) {
module.exports = {
parseClaudeLog,
formatToolUse,
formatInitializationSummary,
formatBashCommand,
truncateString,
};
}
main();
- name: Upload agent logs
if: always()
uses: actions/upload-artifact@v4
with:
name: dev.log
path: /tmp/dev.log
if-no-files-found: warn
print:
needs: agent
runs-on: ubuntu-latest
steps:
- name: Download agent output artifact
continue-on-error: true
uses: actions/download-artifact@v5
with:
name: agent_output.json
path: /tmp/safe-jobs/
- name: Setup Safe Job Environment Variables
run: |
echo "Setting up environment for safe job"
echo "GITHUB_AW_AGENT_OUTPUT=/tmp/safe-jobs/agent_output.json" >> $GITHUB_ENV
- name: See artifacts
run: cd /tmp/safe-jobs && ls -lR
- name: print message
run: |-
if [ -f "$GITHUB_AW_AGENT_OUTPUT" ]; then
MESSAGE=$(cat "$GITHUB_AW_AGENT_OUTPUT" | jq -r '.items[] | select(.type == "print") | .message')
echo "print: $MESSAGE"
echo "### Print Step Summary" >> "$GITHUB_STEP_SUMMARY"
echo "$MESSAGE" >> "$GITHUB_STEP_SUMMARY"
else
echo "No agent output found, using default: Hello from safe-job!"
fi