Problem
When environment: is set in the workflow frontmatter, the compiler only applies it to the agent and safe_outputs jobs. The activation job does not inherit it.
The activation job runs validate_multi_secret.sh COPILOT_GITHUB_TOKEN, which checks if the engine secret is configured. When the secret is stored as an environment-level secret (not repo-level), the activation job can't access it and fails. Since every other job depends on activation, the entire workflow is blocked.
Steps to reproduce
- Create a workflow with
environment: production in the frontmatter
- Store
COPILOT_GITHUB_TOKEN as an environment secret (Settings > Environments > production)
- Do not set any repo-level secrets
- Run
gh aw compile (v0.68.3)
- Trigger the workflow
activation job fails at "Validate COPILOT_GITHUB_TOKEN secret"
Expected behavior
If environment: is set in the frontmatter, the activation job should either inherit the environment setting or skip the early token validation when an environment is configured.
Context
Enterprise customer whose IAM policy prohibits repo-level secrets. Environment-level secrets are the workaround, but incomplete propagation blocks it.
Problem
When
environment:is set in the workflow frontmatter, the compiler only applies it to theagentandsafe_outputsjobs. Theactivationjob does not inherit it.The
activationjob runsvalidate_multi_secret.sh COPILOT_GITHUB_TOKEN, which checks if the engine secret is configured. When the secret is stored as an environment-level secret (not repo-level), the activation job can't access it and fails. Since every other job depends onactivation, the entire workflow is blocked.Steps to reproduce
environment: productionin the frontmatterCOPILOT_GITHUB_TOKENas an environment secret (Settings > Environments > production)gh aw compile(v0.68.3)activationjob fails at "Validate COPILOT_GITHUB_TOKEN secret"Expected behavior
If
environment:is set in the frontmatter, theactivationjob should either inherit the environment setting or skip the early token validation when an environment is configured.Context
Enterprise customer whose IAM policy prohibits repo-level secrets. Environment-level secrets are the workaround, but incomplete propagation blocks it.