Conversation
jamesadevine
commented
Mar 7, 2026
- also align ado-aw release model
Replace the legacy DownloadPipelineArtifact@2 task (pipeline 2450, project 4x4)
for the AWF binary with a curl-based download from GitHub Releases at
github.com/github/gh-aw-firewall. Add a pinned AWF_VERSION constant in
common.rs with a {{ firewall_version }} template marker.
Also migrate the ado-aw compiler checksum verification from per-binary .sha256
files to checksums.txt with --ignore-missing, matching the gh-aw-firewall
publishing convention. Both standalone and 1ES templates are updated.
Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
Verify the standalone template no longer references ADO pipeline 2450 or DownloadPipelineArtifact, and instead downloads AWF from GitHub Releases with firewall_version marker and checksums.txt verification. Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
Update release.yml to publish checksums.txt instead of per-binary .sha256
files. Add {{ firewall_version }} marker documentation to AGENTS.md and
update the Network Isolation section to reflect GitHub Releases for AWF.
Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
🔍 Rust PR ReviewSummary: Looks good overall — clean migration from internal ADO artifacts to GitHub Releases. One security concern worth addressing, one testing gap. Findings🔒 Security Concerns
|
Add grep confirmation after sha256sum to ensure at least one file was verified, preventing silent success on naming mismatches. Add compiled output test asserting AWF GitHub Releases URL appears in final YAML. Add clarifying comment for no-op firewall_version in 1ES compiler. Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
🔍 Rust PR ReviewSummary: Looks good — clean migration from internal ADO artifact to public GitHub Releases for AWF. One subtle security observation worth considering. Findings
|