Skip to content

Go Logger Enhancement #230

Go Logger Enhancement

Go Logger Enhancement #230

Triggered via schedule April 22, 2026 21:25
Status Success
Total duration 17m 2s
Artifacts 4

go-logger.lock.yml

on: schedule
Fit to window
Zoom out
Zoom in

Annotations

7 errors and 3 warnings
agent
$GITHUB_STEP_SUMMARY upload aborted, supports content up to a size of 1024k, got 10326k. For more information see: https://docs.github.com/actions/using-workflows/workflow-commands-for-github-actions#adding-a-markdown-summary
agent
ansiLog (\"stringutil:ansi\") with entry-point logging\n\nCo-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>\nEOF\n)\""},"caller":{"type":"direct"}}],"stop_reason":null,"stop_sequence":null,"stop_details":null,"usage":{"input_tokens":1,"cache_creation_input_tokens":365,"cache_read_input_tokens":56319,"cache_creation":{"ephemeral_5m_input_tokens":365,"ephemeral_1h_input_tokens":0},"output_tokens":45,"service_tier":"standard","inference_geo":"global"},"context_management":null},"parent_tool_use_id":null,"session_id":"f466a12f-48c7-466d-8ba7-5b3f239130a8","uuid":"9e627fce-0632-49a3-9407-119592d6d89c"}
agent
`pkg/workflow/mcp_playwright_config.go` (60 lines) - Uses shared `log` → Add dedicated `playwrightConfigLog`\"\n \n The file currently contains:\n ```go\n package workflow\n \n import (\n \"strings\"\n )\n ```\n And uses `log.Printf` / `log.Print` for 3 calls. The fix is to:\n 1. Add `\"github.com/github/gh-aw/pkg/logger\"` to imports\n 2. Add `var playwrightConfigLog = logger.New(\"workflow:mcp_playwright\")`\n 3. Replace all `log.` calls with `playwrightConfigLog.`\n \n Then proceed to `prompts.go`, `stringutil/ansi.go`, and `compiler_safe_outputs_builder.go`.\n\nIf you need specific details from before compaction (like exact code snippets, error messages, or content you generated), read the full transcript at: /home/runner/.claude/projects/-home-runner-work-gh-aw-gh-aw/f466a12f-48c7-466d-8ba7-5b3f239130a8.jsonl\nContinue the conversation from where it left off without asking the user any further questions. Resume directly — do not acknowledge the summary, do not recap what was happening, do not preface with \"I'll continue\" or similar. Pick up the last task as if the break never happened."}]},"parent_tool_use_id":null,"session_id":"f466a12f-48c7-466d-8ba7-5b3f239130a8","uuid":"4dda62f0-2115-46c1-a56e-6381c780b2f3","timestamp":"2026-04-22T21:35:34.382Z","isSynthetic":true}
agent
JavaScript runtime mode compatibility\n//\n// # Pass-Through Field Validation\n//\n// Several workflow frontmatter fields are \"pass-through\" fields - they are extracted\n// from frontmatter and passed directly to GitHub Actions without modification:\n// - concurrency: Workflow concurrency control\n// - container: Container configuration for jobs\n// - environment: GitHub environment configuration\n// - env: Environment variables\n// - runs-on: Runner selection\n// - services: Service containers\n//\n// These fields ARE validated during frontmatter parsing using JSON Schema validation\n// (see pkg/parser/schemas/main_workflow_schema.json). The schema catches:\n// - Invalid data types (e.g., array when object expected)\n// - Missing required properties (e.g., container missing 'image')\n// - Invalid additional properties (e.g., unknown fields in concurrency)\n// - Structure violations (e.g., runs-on as number instead of string/array/object)\n//\n// Schema validation happens in pkg/parser/schema_validation.go during frontmatter\n// parsing, so errors are caught at compile time rather than GitHub Actions runtime.\n// See pkg/parser/schema_passthrough_validation_test.go for comprehensive test coverage.\n//\n// # When to Add New Validation\n//\n// Add validation to existing domain files when:\n// - It fits the domain (e.g., package validation → pip_validation.go)\n// - It extends existing functionality\n//\n// Create a new validation file when:\n// - It represents a distinct validation domain\n// - It has multiple related validation functions\n// - It requires its own caching or state management\n//\n// # Validation Patterns\n//\n// The validation system uses several patterns:\n// - Schema validation: JSON schema validation with caching\n// - External resource validation: Docker images, npm/pip packages\n// - Size limit validation: Expression sizes, file sizes\n// - Feature detection: Repository capabilities\n// - Security validation: Permission restrictions, expression safety\n\npackage workflow\n","numLines":71,"startLine":1,"totalLines":71}}}
agent
Main workflow orchestration and YAML generation\n//\n// The orchestrator follows a phased approach with typed result structures\n// for clear data flow between compilation stages. Each module handles a specific\n// concern in the compilation pipeline, making the codebase easier to understand\n// and maintain.\npackage workflow\n\nimport (\n\t\"github.com/github/gh-aw/pkg/logger\"\n)\n\n// Shared logger used across compiler orchestrator modules\nvar detectionLog = logger.New(\"workflow:detection\")\n","numLines":23,"startLine":1,"totalLines":23}}}
agent
Topological ordering\npackage parser\n\nimport \"github.com/github/gh-aw/pkg/logger\"\n\nvar importLog = logger.New(\"parser:import_processor\")\n\n// ImportsResult holds the result of processing imports from frontmatter\ntype ImportsResult struct {\n\tMergedTools string // Merged tools configuration from all imports\n\tMergedMCPServers string // Merged mcp-servers configuration from all imports\n\tMergedEngines []string // Merged engine configurations from all imports\n\tMergedSafeOutputs []string // Merged safe-outputs configurations from all imports\n\tMergedMCPScripts []string // Merged mcp-scripts configurations from all imports\n\tMergedMarkdown string // Only contains imports WITH inputs (for compile-time substitution)\n\tImportPaths []string // List of import file paths for runtime-import macro generation (replaces MergedMarkdown)\n\tMergedSteps string // Merged steps configuration from all imports (excluding copilot-setup-steps)\n\tCopilotSetupSteps string // Steps from copilot-setup-steps.yml (inserted at start)\n\tMergedPreSteps string // Merged pre-steps configuration from all imports (prepended in order)\n\tMergedPreAgentSteps string // Merged pre-agent-steps configuration from all imports (prepended in order)\n\tMergedRuntimes string // Merged runtimes configuration from all imports\n\tMergedRunInstallScripts bool // true if any imported workflow sets run-install-scripts: true (global or node-level)\n\tMergedServices string // Merged services configuration from all imports\n\tMergedNetwork string // Merged network configuration from all imports\n\tMergedPermissions string // Merged permissions configuration from all imports\n\tMergedSecretMasking string // Merged secret-masking steps from all imports\n\tMergedBots []string // Merged bots list from all imports (union of bot names)\n\tMergedSkipRoles []string // Merged skip-roles list from all imports (union of role names)\n\tMergedSkipBots []string // Merged skip-bots list from all imports (union of usernames)\n\tMergedActivationGitHubToken string // GitHub token from on.github-token in first imported workflow that defines it\n\tMergedActivationGitHubApp string // JSON-encoded on.github-app from first imported workflow that defines it\n\tMergedTopLevelGitHubApp string // JSON-encoded top-level github-app from first imported workflow that defines it\n\tMergedCheckout string // JSON-encoded checkout configurations from imported workflows (one JSON value per line)\n\tMergedPostSteps string // Merged post-steps configuration from all imports (appended in order)\n\tMergedLabels []string // Merged labels from all imports (union of label names)\n\tMergedCaches []string // Merged cache configurations from all imports (appended in order)\n\tMergedJobs string // Merged jobs from imported YAML workflows (JSON format)\n\tMergedEnv string // Merged env configuration from all imports (JSON format)\n\tMergedEnvSources map[string]string // env var name → source import path (for conflict detection and lock file header listing)\n\tMergedFeatures []map[string]any // Merged features configuration from all imports (parsed YAML structures)\n\tMergedObservability string // Observability config (JSON) from first import that defines it (first-wins)\n\tImportedFiles []string // List of imported file paths (for manifest)\n\tAgentFile string // Path to custom a
update_cache_memory
Unable to download artifact(s): Artifact not found for name: cache-memory Please ensure that your artifact is not expired and the artifact was uploaded using a compatible version of toolkit/upload-artifact. For more information, visit the GitHub Artifacts FAQ: https://github.com/actions/toolkit/blob/main/packages/artifact/docs/faq.md
agent
No files were found with the provided path: /tmp/gh-aw/cache-memory. No artifacts will be uploaded.
agent
GitHub MCP guard policy automatically applied for public repository. min-integrity='approved' and repos='all' ensure only approved-integrity content is accessible.
safe_outputs
Agent requested draft: true, but configuration enforces draft: false. Configuration takes precedence for security. To change this, update safe-outputs.create-pull-request.draft in the workflow file.

Artifacts

Produced during runtime
Name Size Digest
activation Expired
23.6 KB
sha256:e3208ff7fe814ce084b8c9155b804bad685df3e5e19afd43d683237b37ac9422
agent
8.11 MB
sha256:c15c113393b920a5aa35eca1196bb1140c79317406b2fb1af88ec2cf1dde5377
detection
25.1 KB
sha256:7981c724712b9ca8a8af3636789022189c21238395716147b21539ada4e3ca54
safe-outputs-items
387 Bytes
sha256:a1780e8b7d5ff95f6c59957fb87bdc6879e6b533a301da3805ff7160b4a2beaf