Skip to content

Daily Perf Improver #14

Daily Perf Improver

Daily Perf Improver #14

Manually triggered October 28, 2025 13:34
Status Success
Total duration 12m 12s
Artifacts 8

daily-perf-improver.lock.yml

on: workflow_dispatch
activation
3s
activation
detection
34s
detection
create_discussion
0s
create_discussion
create_pull_request
17s
create_pull_request
missing_tool
0s
missing_tool
add_comment
6s
add_comment
Fit to window
Zoom out
Zoom in

Annotations

3 errors and 3 warnings
agent
Errors detected in agent logs - continuing workflow step (not failing for now)
agent
Line 5: Request to GitHub API at https://api.enterprise.githubcopilot.com/agents/swe/custom-agents/githubnext/gh-aw?exclude_invalid_config=true failed with status 404 (request ID: A413:1D8C22:24A856A:2B73685:6900C6D6), body: Not Found (Pattern: Copilot CLI timestamped ERROR messages, Raw log: 2025-10-28T13:36:23.978Z [ERROR] Request to GitHub API at https://api.enterprise.githubcopilot.com/agents/swe/custom-age...)
agent
Line 3389: Unexpected token 'i', "failed to li"... is not valid JSON (Pattern: Generic ERROR messages, Raw log: 2025-10-28T13:37:01.050Z [DEBUG] Unable to parse tool invocation as JSON. Treating it as a string for filtering: SyntaxE...)
agent
Line 9: could not load remote agents for githubnext/gh-aw: server returned 404: (Pattern: Copilot CLI timestamped WARNING messages, Raw log: 2025-10-28T13:36:23.979Z [WARNING] could not load remote agents for githubnext/gh-aw: server returned 404:)
agent
Line 7: Failed to load custom agents for githubnext/gh-aw: Not Found (Pattern: Copilot CLI timestamped WARNING messages, Raw log: 2025-10-28T13:36:23.979Z [WARNING] Failed to load custom agents for githubnext/gh-aw: Not Found)
agent
Line 3945: Could not verify %s@%s - git ls-remote failed: %v\\\", pin.Repo, pin.Version, err)\\n\\t\\t\\t\\tt.Logf(\\\"This may be expected for actions that don't follow standard tagging or private repos\\\")\\n\\t\\t\\t\\treturn // Skip verification but don't fail the test\\n\\t\\t\\t}\\n\\n\\t\\t\\toutputStr := strings.TrimSpace(string(output))\\n\\t\\t\\tif outputStr == \\\"\\\" {\\n\\t\\t\\t\\tt.Logf(\\\"Warning: No tag found for %s@%s\\\", pin.Repo, pin.Version)\\n\\t\\t\\t\\treturn // Skip verification but don't fail the test\\n\\t\\t\\t}\\n\\n\\t\\t\\t// Extract SHA from git ls-remote output (format: \\\"SHA\\\\trefs/tags/version\\\")\\n\\t\\t\\tparts := strings.Fields(outputStr)\\n\\t\\t\\tif len(parts) < 1 {\\n\\t\\t\\t\\tt.Errorf(\\\"Unexpected git ls-remote output format for %s@%s: %s\\\", pin.Repo, pin.Version, outputStr)\\n\\t\\t\\t\\treturn\\n\\t\\t\\t}\\n\\n\\t\\t\\tactualSHA := parts[0]\\n\\n\\t\\t\\t// Verify the SHA matches\\n\\t\\t\\tif actualSHA != pin.SHA {\\n\\t\\t\\t\\tt.Errorf(\\\"SHA mismatch for %s@%s:\\\\n Expected: %s\\\\n Got: %s\\\",\\n\\t\\t\\t\\t\\tpin.Repo, pin.Version, pin.SHA, actualSHA)\\n\\t\\t\\t\\tt.Logf(\\\"To fix, update the SHA in action_pins.go to: %s\\\", actualSHA)\\n\\t\\t\\t}\\n\\t\\t})\\n\\t}\\n}\", \"new_str\": \"// TestActionPinSHAsMatchVersionTags verifies that the SHAs in actionPins actually correspond to their version tags\\n// by querying the GitHub repositories using git ls-remote\\nfunc TestActionPinSHAsMatchVersionTags(t *testing.T) {\\n\\tif testing.Short() {\\n\\t\\tt.Skip(\\\"Skipping network-dependent test in short mode\\\")\\n\\t}\\n\\n\\t// Test all action pins in parallel for faster execution\\n\\tfor key, pin := range actionPins {\\n\\t\\tkey := key // Capture for parallel execution\\n\\t\\tpin := pin // Capture for parallel execution\\n\\t\\tt.Run(key, func(t *testing.T) {\\n\\t\\t\\tt.Parallel() // Run subtests in parallel\\n\\t\\t\\t\\n\\t\\t\\t// Extract the repository URL from the repo field\\n\\t\\t\\t// For actions like \\\"actions/checkout\\\", the URL is https://github.com/actions/checkout.git\\n\\t\\t\\t// For actions like \\\"github/codeql-action/upload-sarif\\\", we need the base repo\\n\\t\\t\\trepoURL := getGitHubRepoURL(pin.Repo)\\n\\n\\t\\t\\t// Use git ls-remote to get the SHA for the version tag\\n\\t\\t\\tcmd := exec.Command(\\\"git\\\", \\\"ls-remote\\\", repoURL, \\\"refs/tags/\\\"+pin.Version)\\n\\t\\t\\toutput, err := cmd.Output()\\n\\t\\t\\tif err != nil {\\n\\t\\t\\t\\tt.Logf(\\\"Warning: Could not verify %s@%s - git ls-remote failed: %v\\\", pin.Repo, pin.Version, err)\\n\\t\\t\\t\\tt.Logf(\\\"This may be expected for actions that don't follow standard tagging or private repos\\\")\\n\\t\\t\\t\\treturn // Skip verification but don't fail the test\\n\\t\\t\\t}\\n\\n\\t\\t\\toutputStr := strings.TrimSpace(string(output))\\n\\t\\t\\tif outputStr == \\\"\\\" {\\n\\t\\t\\t\\tt.Logf(\\\"Warning: No tag found for %s@%s\\\", pin.Repo, pin.Version)\\n\\t\\t\\t\\treturn // Skip verification but don't fail the test\\n\\t\\t\\t}\\n\\n\\t\\t\\t// Extract SHA from git ls-remote output (format: \\\"SHA\\\\trefs/tags/version\\\")\\n\\t\\t\\tparts := strings.Fields(outputStr)\\n\\t\\t\\tif len(parts) < 1 {\\n\\t\\t\\t\\tt.Errorf(\\\"Unexpected git ls-remote output format for %s@%s: %s\\\", pin.Repo, pin.Version, outputStr)\\n\\t\\t\\t\\treturn\\n\\t\\t\\t}\\n\\n\\t\\t\\tactualSHA := parts[0]\\n\\n\\t\\t\\t// Verify the SHA matches\\n\\t\\t\\tif actualSHA != pin.SHA {\\n\\t\\t\\t\\tt.Errorf(\\\"SHA mismatch for %s@%s:\\\\n Expected: %s\\\\n Got: %s\\\",\\n\\t\\t\\t\\t\\tpin.Repo, pin.Version, pin.SHA, actualSHA)\\n\\t\\t\\t\\tt.Logf(\\\"To fix, update the SHA in action_pins.go to: %s\\\", actualSHA)\\n\\t\\t\\t}\\n\\t\\t})\\n\\t}\\n}\"}" (Pattern: Generic WARNING messages, Raw log: "arguments": "{\"path\": \"/home/runner/work/gh-aw/gh-aw/pkg/workflow/action_pins_test.go\", \"old_str\": \"// TestActio...)

Artifacts

Produced during runtime
Name Size Digest
agent-stdio.log Expired
6.5 KB
sha256:bcd9b19b67bb748015e4a2fa54da6448802daf6f7da7d905c84b25ff865436b8
agent_output.json Expired
2.44 KB
sha256:f8bc3688ccae183e34b7d22388afa6e234e5806f7f7d3c94e4bfa9489a126be4
agent_outputs Expired
45.9 KB
sha256:52904715e4b00c1ab5dc5f8f8924c4d3be85b231660dd7c7003f394127d30a20
aw.patch Expired
1.76 KB
sha256:3d854e02ab5e5ff51a9f8f2687f3e5c42164d119a2b488a3006bd8d61fb8d95e
aw_info.json Expired
491 Bytes
sha256:398f52cab6c30ba3a476a96cf35cba9b79a57a541ff61ebfe63cc589839746fd
prompt.txt Expired
4.68 KB
sha256:877686761cffef7877cc18c5cf2fc7995702545a7aad54990e63b4e18d69148b
safe_output.jsonl Expired
2.42 KB
sha256:58a80de912c4accf7739bf342cb58b086eae9c6a427f12c035562fc228f6537d
threat-detection.log Expired
468 Bytes
sha256:e2bc678b2924c93f7bd42f02564f500aa85ffe43e64bace84c5ac7e031710e17