Skip to content

Add daily AllowOnly guard smoke test workflow#1729

Merged
lpcox merged 1 commit intomainfrom
smoke/allowonly-guard
Mar 10, 2026
Merged

Add daily AllowOnly guard smoke test workflow#1729
lpcox merged 1 commit intomainfrom
smoke/allowonly-guard

Conversation

@lpcox
Copy link
Collaborator

@lpcox lpcox commented Mar 10, 2026

Summary

Adds a daily agentic workflow (smoke-allowonly.md) that validates AllowOnly guard policy enforcement through the MCP Gateway.

Guard Policy

  • repos: ["github/gh-aw*"] (wildcard match)
  • min-integrity: approved (OWNER, MEMBER, COLLABORATOR only)

Test Coverage

In-Scope Access (expected: allowed)

  • list_issues, list_pull_requests, list_commits, get_file_contents, list_branches, search_code against github/gh-aw-mcpg
  • list_issues, get_file_contents against github/gh-aw

Out-of-Scope Blocking (expected: blocked)

  • All repo-scoped calls against octocat/Hello-World

Global API Blocking (expected: blocked)

  • search_repositories, search_users

Integrity Filtering (expected: filtered)

  • Validates that content from non-approved authors is filtered

Frontmatter

Uses repos and min-integrity fields directly on tools.github per the gh-aw compiler format:

tools:
  github:
    toolsets: [repos, issues, pull_requests, search]
    repos: ["github/gh-aw*"]
    min-integrity: approved

Related

Adds a daily agentic workflow that validates AllowOnly guard policy
enforcement through the MCP Gateway. Tests:

- In-scope repo access (github/gh-aw*, both gh-aw-mcpg and gh-aw)
- Out-of-scope repo blocking (octocat/Hello-World)
- Global API blocking (search_repositories, search_users)
- Integrity filtering (min-integrity: approved)

Guard policy: repos=["github/gh-aw*"], min-integrity=approved

Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
Copilot AI review requested due to automatic review settings March 10, 2026 17:08
@lpcox lpcox merged commit df1c41a into main Mar 10, 2026
5 checks passed
@lpcox lpcox deleted the smoke/allowonly-guard branch March 10, 2026 17:11
Copy link
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

This PR adds a daily agentic smoke test workflow (smoke-allowonly.md and its compiled smoke-allowonly.lock.yml) that validates the AllowOnly guard policy enforcement through the MCP Gateway. The workflow tests that repository-scoped access control (github/gh-aw* wildcard) and minimum integrity requirements (approved) are correctly enforced by the GitHub Guard.

Changes:

  • New smoke-allowonly.md agentic workflow definition with frontmatter configuring guard policies (repos: ["github/gh-aw*"], min-integrity: approved), toolsets, and a detailed 4-part test plan covering in-scope access, out-of-scope blocking, global API blocking, and integrity filtering validation.
  • New auto-generated smoke-allowonly.lock.yml compiled from the .md file using gh-aw v0.57.1, with SHA-pinned actions, full job definitions (pre_activation, activation, agent, safe_outputs, conclusion, update_cache_memory), and the MCP Gateway configuration including guard-policies for the GitHub MCP server.

Reviewed changes

Copilot reviewed 2 out of 2 changed files in this pull request and generated no comments.

File Description
.github/workflows/smoke-allowonly.md Source agentic workflow defining the AllowOnly guard smoke test plan, frontmatter config (repos, min-integrity, toolsets, permissions), and structured test output template
.github/workflows/smoke-allowonly.lock.yml Auto-generated compiled workflow (gh-aw v0.57.1) with full GitHub Actions job definitions, MCP Gateway config with guard-policies, safe outputs, threat detection, and cache memory management

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants