[Bug] [github team] Organization member failed to use Organization installed GitHub App in Copilot #11
Description
Describe the bug
An organization member, with a Copilot Business seat assigned by the organization owner, when typing "@" in VS Code Copilot chat could not see the GitHub Apps installed by the organization owner onto the organization.
To Reproduce
Steps to reproduce the behavior:
- setup ORG1 organization and purchase GitHub Copilot Business subscription.
- enabled the Copilot Extensions policy for the organization.
- assigned a Copilot Business seat to a member Member1
- the owner ORG1 installed "Mermaid Chart" GitHub App onto Org1
- Member1 logon GitHub Copilot in VS Code and type "@", "Mermaid Chart" did not appear.
- According to this GitHub Document, Member1 should be able to use Mermaid Chart.
Expected behavior
When Member1 logon GitHub Copilot in VS Code and type "@", "Mermaid Chart" should appear
Screenshots
NA
Desktop (please complete the following information):
- OS: Windows 11
- VS Code: 1.95.3
Smartphone (please complete the following information):
NA
Additional context
Here is a workaround:
After the Organization owner installed Mermaid Chart to the Organization, the member should first login GitHub.com and invoke Copilot Chat on the browser. Typing "@" won't list out installed Apps but you have to type "@Mermaid-Chart". Then, you can authorize the App. After authorizing the App, the member can navigate to personal account's Settings, Integrations, Applications. The "Installed GitHub Apps" is still empty but Mermaid-Chart was shown in the "Authorized GitHub Apps" tab. Then, the member can use VS Code, Copilot Chat and type "@" to list out Mermaid-Chart.
- Organization GitHub Apps should be shown in VS Code Copilot Chat after typing "@"
- Members should be able to view Organization's Installed Github Apps.
- Organization owner should be able to disable members from installing GitHub Apps thru their personal accounts if Copilot Business seat was given by the Organization. This is a serious security loophole, which will expose private repositories to unknown Copilot agents hosted elsewhere.