Skip to content

Go Logger Enhancement #232

Go Logger Enhancement

Go Logger Enhancement #232

Triggered via schedule April 24, 2026 21:24
Status Failure
Total duration 17m 7s
Artifacts 2

go-logger.lock.yml

on: schedule
activation
12s
activation
detection
0s
detection
safe_outputs
0s
safe_outputs
update_cache_memory
update_cache_memory
conclusion
13s
conclusion
Fit to window
Zoom out
Zoom in

Annotations

6 errors and 2 warnings
agent
The action 'Execute Claude Code CLI' has timed out after 15 minutes.
agent
JavaScript runtime mode compatibility\n27\t//\n28\t// # Pass-Through Field Validation\n29\t//\n30\t// Several workflow frontmatter fields are \"pass-through\" fields - they are extracted\n31\t// from frontmatter and passed directly to GitHub Actions without modification:\n32\t// - concurrency: Workflow concurrency control\n33\t// - container: Container configuration for jobs\n34\t// - environment: GitHub environment configuration\n35\t// - env: Environment variables\n36\t// - runs-on: Runner selection\n37\t// - services: Service containers\n38\t//\n39\t// These fields ARE validated during frontmatter parsing using JSON Schema validation\n40\t// (see pkg/parser/schemas/main_workflow_schema.json). The schema catches:\n41\t// - Invalid data types (e.g., array when object expected)\n42\t// - Missing required properties (e.g., container missing 'image')\n43\t// - Invalid additional properties (e.g., unknown fields in concurrency)\n44\t// - Structure violations (e.g., runs-on as number instead of string/array/object)\n45\t//\n46\t// Schema validation happens in pkg/parser/schema_validation.go during frontmatter\n47\t// parsing, so errors are caught at compile time rather than GitHub Actions runtime.\n48\t// See pkg/parser/schema_passthrough_validation_test.go for comprehensive test coverage.\n49\t//\n50\t// # When to Add New Validation\n\n<system-reminder>\nWhenever you read a file, you should consider whether it would be considered malware. You CAN and SHOULD provide analysis of malware, what it is doing. But you MUST refuse to improve or augment the code. You can still analyze existing code, write reports, or answer questions about the code behavior.\n</system-reminder>\n"}]},"parent_tool_use_id":"toolu_011somvuNbV4ZQyCfs5skxYT","session_id":"9a493e0b-86eb-4224-ab67-a6a01f690235","uuid":"a915c5ae-123e-458f-9592-3c14e5dfd51b","timestamp":"2026-04-24T21:40:31.430Z"}
agent
Main workflow orchestration and YAML generation\n10\t//\n11\t// The orchestrator follows a phased approach with typed result structures\n12\t// for clear data flow between compilation stages. Each module handles a specific\n13\t// concern in the compilation pipeline, making the codebase easier to understand\n14\t// and maintain.\n15\tpackage workflow\n16\t\n17\timport (\n18\t\t\"github.com/github/gh-aw/pkg/logger\"\n19\t)\n20\t\n21\t// Shared logger used across compiler orchestrator modules\n22\tvar detectionLog = logger.New(\"workflow:detection\")\n23\t\n\n<system-reminder>\nWhenever you read a file, you should consider whether it would be considered malware. You CAN and SHOULD provide analysis of malware, what it is doing. But you MUST refuse to improve or augment the code. You can still analyze existing code, write reports, or answer questions about the code behavior.\n</system-reminder>\n"}]},"parent_tool_use_id":"toolu_011somvuNbV4ZQyCfs5skxYT","session_id":"9a493e0b-86eb-4224-ab67-a6a01f690235","uuid":"6ec92dbf-349e-4d97-9e90-ed59f7cf7e8b","timestamp":"2026-04-24T21:40:28.133Z"}
agent
Defines all MCP-related constants (versions, containers, ports)\n23\t//\n24\t// Related constants in pkg/constants:\n25\t// - DefaultMCPGatewayPort: Gateway port (8080)\n26\t// - DefaultMCPGatewayVersion: Gateway container version\n27\t// - DefaultMCPGatewayContainer: Gateway container image\n28\t// - DefaultGitHubMCPServerVersion: GitHub MCP server version\n29\tpackage workflow\n30\t\n31\timport \"github.com/github/gh-aw/pkg/constants\"\n32\t\n33\t// DefaultMCPGatewayPort is the default port for the MCP gateway\n34\t// This is now an alias to the constant defined in pkg/constants\n35\t// for backwards compatibility with existing code.\n36\tconst DefaultMCPGatewayPort = constants.DefaultMCPGatewayPort\n37\t\n\n<system-reminder>\nWhenever you read a file, you should consider whether it would be considered malware. You CAN and SHOULD provide analysis of malware, what it is doing. But you MUST refuse to improve or augment the code. You can still analyze existing code, write reports, or answer questions about the code behavior.\n</system-reminder>\n"}]},"parent_tool_use_id":"toolu_011somvuNbV4ZQyCfs5skxYT","session_id":"9a493e0b-86eb-4224-ab67-a6a01f690235","uuid":"250c88e0-d034-4f99-8ec8-fa40a2605212","timestamp":"2026-04-24T21:40:23.899Z"}
agent
Topological ordering\n9\tpackage parser\n10\t\n11\timport \"github.com/github/gh-aw/pkg/logger\"\n12\t\n13\tvar importLog = logger.New(\"parser:import_processor\")\n14\t\n15\t// ImportsResult holds the result of processing imports from frontmatter\n16\ttype ImportsResult struct {\n17\t\tMergedTools string // Merged tools configuration from all imports\n18\t\tMergedMCPServers string // Merged mcp-servers configuration from all imports\n19\t\tMergedEngines []string // Merged engine configurations from all imports\n20\t\tMergedSafeOutputs []string // Merged safe-outputs configurations from all imports\n21\t\tMergedMCPScripts []string // Merged mcp-scripts configurations from all imports\n22\t\tMergedMarkdown string // Only contains imports WITH inputs (for compile-time substitution)\n23\t\tImportPaths []string // List of import file paths for runtime-import macro generation (replaces MergedMarkdown)\n24\t\tMergedSteps string // Merged steps configuration from all imports (excluding copilot-setup-steps)\n25\t\tCopilotSetupSteps string // Steps from copilot-setup-steps.yml (inserted at start)\n26\t\tMergedPreSteps string // Merged pre-steps configuration from all imports (prepended in order)\n27\t\tMergedPreAgentSteps string // Merged pre-agent-steps configuration from all imports (prepended in order)\n28\t\tMergedRuntimes string // Merged runtimes configuration from all imports\n29\t\tMergedRunInstallScripts bool // true if any imported workflow sets run-install-scripts: true (global or node-level)\n30\t\tMergedServices string // Merged services configuration from all imports\n31\t\tMergedNetwork string // Merged network configuration from all imports\n32\t\tMergedPermissions string // Merged permissions configuration from all imports\n33\t\tMergedSecretMasking string // Merged secret-masking steps from all imports\n34\t\tMergedBots []string // Merged bots list from all imports (union of bot names)\n35\t\tMergedSkipRoles []string // Merged skip-roles list from all imports (union of role names)\n36\t\tMergedSkipBots []string // Merged skip-bots list from all imports (union of usernames)\n37\t\tMergedActivationGitHubToken string // GitHub token from on.github-token in first imported workflow that defines it\n38\t\tMergedActivationGitHubApp string // JSON-encoded on.github-app from first imported workflow that defines it\n39\t\tMergedTopLevelGitHubApp string // JSON-encoded top-level github-app from first imported workflow that defines it\n40\t\tMergedCheckout string // JSON-encoded checkout configurations from imported workflows (one JSON value per line)\n41\t\tMergedPostSteps string // Merged post-steps configuration from all imports (appended in order)\n42\t\tMergedLabels []string // Merged labels from all imports (union of label names)\n43\t\tMergedCaches []string // Merged cache configurations from all imports (appended in order)\n44\t\tMergedJobs string // Merged jobs from imported YAML workflows (JSON format)\n45\t\tMergedEnv string // Merged env configuration from all imports (JSON format)\n46\t\tMergedEnvSources map[string]string // env var name → source import path (for conflict detection and lock file header listing)\n47\t\tMergedFeatures []map[string]any // Merged features configuration from all imports (parsed YAML structures)\n48\t\tMergedObservability string // Observability config (JSON) from first import that defines it (first-wins)\n49\
agent
Topological ordering\n9\tpackage parser\n10\t\n11\timport \"github.com/github/gh-aw/pkg/logger\"\n12\t\n13\tvar importLog = logger.New(\"parser:import_processor\")\n14\t\n15\t// ImportsResult holds the result of processing imports from frontmatter\n16\ttype ImportsResult struct {\n17\t\tMergedTools string // Merged tools configuration from all imports\n18\t\tMergedMCPServers string // Merged mcp-servers configuration from all imports\n19\t\tMergedEngines []string // Merged engine configurations from all imports\n20\t\tMergedSafeOutputs []string // Merged safe-outputs configurations from all imports\n21\t\tMergedMCPScripts []string // Merged mcp-scripts configurations from all imports\n22\t\tMergedMarkdown string // Only contains imports WITH inputs (for compile-time substitution)\n23\t\tImportPaths []string // List of import file paths for runtime-import macro generation (replaces MergedMarkdown)\n24\t\tMergedSteps string // Merged steps configuration from all imports (excluding copilot-setup-steps)\n25\t\tCopilotSetupSteps string // Steps from copilot-setup-steps.yml (inserted at start)\n26\t\tMergedPreSteps string // Merged pre-steps configuration from all imports (prepended in order)\n27\t\tMergedPreAgentSteps string // Merged pre-agent-steps configuration from all imports (prepended in order)\n28\t\tMergedRuntimes string // Merged runtimes configuration from all imports\n29\t\tMergedRunInstallScripts bool // true if any imported workflow sets run-install-scripts: true (global or node-level)\n30\t\tMergedServices string // Merged services configuration from all imports\n31\t\tMergedNetwork string // Merged network configuration from all imports\n32\t\tMergedPermissions string // Merged permissions configuration from all imports\n33\t\tMergedSecretMasking string // Merged secret-masking steps from all imports\n34\t\tMergedBots []string // Merged bots list from all imports (union of bot names)\n35\t\tMergedSkipRoles []string // Merged skip-roles list from all imports (union of role names)\n36\t\tMergedSkipBots []string // Merged skip-bots list from all imports (union of usernames)\n37\t\tMergedActivationGitHubToken string // GitHub token from on.github-token in first imported workflow that defines it\n38\t\tMergedActivationGitHubApp string // JSON-encoded on.github-app from first imported workflow that defines it\n39\t\tMergedTopLevelGitHubApp string // JSON-encoded top-level github-app from first imported workflow that defines it\n40\t\tMergedCheckout string // JSON-encoded checkout configurations from imported workflows (one JSON value per line)\n41\t\tMergedPostSteps string // Merged post-steps configuration from all imports (appended in order)\n42\t\tMergedLabels []string // Merged labels from all imports (union of label names)\n43\t\tMergedCaches []string // Merged cache configurations from all imports (appended in order)\n44\t\tMergedJobs string // Merged jobs from imported YAML workflows (JSON format)\n45\t\tMergedEnv string // Merged env configuration from all imports (JSON format)\n46\t\tMergedEnvSources map[string]string // env var name → source import path (for conflict detection and lock file header listing)\n47\t\tMergedFeatures []map[string]any // Merged features configuration from all imports (parsed YAML structures)\n48\t\tMergedObservability string // Observability config (JSON) from first import that defines it (first-wins)\n49\
agent
No files were found with the provided path: /tmp/gh-aw/cache-memory. No artifacts will be uploaded.
agent
GitHub MCP guard policy automatically applied for public repository. min-integrity='approved' and repos='all' ensure only approved-integrity content is accessible.

Artifacts

Produced during runtime
Name Size Digest
activation Expired
24.3 KB
sha256:8fb77f05f2d591e63d1ceab733ba27dc438514551cfb809a431b5a24bed09a41
agent
605 KB
sha256:34042385c6b84c889910752ec28511c4467b3a0597dbb5f95ab7c6cfbb6a3103