-
Notifications
You must be signed in to change notification settings - Fork 109
Fix resolution comment length bug when migrating Secret Scanning alerts #1349
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
Co-authored-by: dylan-smith <1508559+dylan-smith@users.noreply.github.com>
Co-authored-by: dylan-smith <1508559+dylan-smith@users.noreply.github.com>
@dylan-smith I suggest we implement the other option. If |
…riginal comment Co-authored-by: dylan-smith <1508559+dylan-smith@users.noreply.github.com>
The build gave this error: Make sure you run |
Co-authored-by: dylan-smith <1508559+dylan-smith@users.noreply.github.com>
... Fixed the IDE0057 warning by running |
Problem
When migrating secret scanning alerts with
gh gei migrate-secret-alerts
, if the new comment format[@resolverName] originalComment
exceeds 270 characters, the GitHub API call fails with an error about comment length limits.This was introduced in PR #1337 which added the resolver name prefix to resolution comments, but didn't account for the 270 character limit.
Solution
Added length validation before using the prefixed comment format:
[@resolverName] originalComment
is < 270 characters: use the prefixed format (preserves existing behavior)[@resolverName] originalComment
is >= 270 characters: truncate the original comment to make it fitThis ensures migration completes successfully while preserving the most important content when length limits are exceeded.
Changes
Update_With_Long_Comment_Uses_Original_Comment_Only
- verifies fallback behaviorUpdate_With_Short_Comment_Uses_Prefixed_Comment
- ensures existing behavior preservedExample
All existing tests pass. The fix is minimal and preserves all existing functionality while gracefully handling the edge case.
Fixes #1348.
Warning
Firewall rules blocked me from connecting to one or more addresses
I tried to connect to the following addresses, but was blocked by firewall rules:
http://www.microsoft.com:80/pkiops/crl/Microsoft%20Identity%20Verification%20Root%20Certificate%20Authority%202020.crl
dotnet build src/OctoshiftCLI.sln
(http block)http://www.microsoft.com:80/pkiops/crl/Microsoft%20Public%20RSA%20Timestamping%20CA%202020.crl
dotnet build src/OctoshiftCLI.sln
(http block)If you need me to access, download, or install something from one of these locations, you can either:
💡 You can make Copilot smarter by setting up custom instructions, customizing its development environment and configuring Model Context Protocol (MCP) servers. Learn more Copilot coding agent tips in the docs.