Skip to content

Go Logger Enhancement #234

Go Logger Enhancement

Go Logger Enhancement #234

Triggered via schedule April 26, 2026 21:19
Status Failure
Total duration 18m 30s
Artifacts 4

go-logger.lock.yml

on: schedule
Fit to window
Zoom out
Zoom in

Annotations

5 errors and 3 warnings
agent
The action 'Execute Claude Code CLI' has timed out after 15 minutes.
agent
Main orchestration (CompileWorkflows function)\n","numLines":10,"startLine":1,"totalLines":10}}}
agent
Main workflow orchestration and YAML generation\n//\n// The orchestrator follows a phased approach with typed result structures\n// for clear data flow between compilation stages. Each module handles a specific\n// concern in the compilation pipeline, making the codebase easier to understand\n// and maintain.\npackage workflow\n\nimport (\n\t\"github.com/github/gh-aw/pkg/logger\"\n)\n\n// Shared logger used across compiler orchestrator modules\nvar detectionLog = logger.New(\"workflow:detection\")\n","numLines":23,"startLine":1,"totalLines":23}}}
agent
JavaScript runtime mode compatibility\n//\n// # Pass-Through Field Validation\n//\n// Several workflow frontmatter fields are \"pass-through\" fields - they are extracted\n// from frontmatter and passed directly to GitHub Actions without modification:\n// - concurrency: Workflow concurrency control\n// - container: Container configuration for jobs\n// - environment: GitHub environment configuration\n// - env: Environment variables\n// - runs-on: Runner selection\n// - services: Service containers\n//\n// These fields ARE validated during frontmatter parsing using JSON Schema validation\n// (see pkg/parser/schemas/main_workflow_schema.json). The schema catches:\n// - Invalid data types (e.g., array when object expected)\n// - Missing required properties (e.g., container missing 'image')\n// - Invalid additional properties (e.g., unknown fields in concurrency)\n// - Structure violations (e.g., runs-on as number instead of string/array/object)\n//\n// Schema validation happens in pkg/parser/schema_validation.go during frontmatter\n// parsing, so errors are caught at compile time rather than GitHub Actions runtime.\n// See pkg/parser/schema_passthrough_validation_test.go for comprehensive test coverage.\n//\n// # When to Add New Validation\n//\n// Add validation to existing domain files when:\n// - It fits the domain (e.g., package validation → pip_validation.go)\n// - It extends existing functionality\n//\n// Create a new validation file when:\n// - It represents a distinct validation domain\n// - It has multiple related validation functions\n// - It requires its own caching or state management\n//\n// # Validation Patterns\n//\n// The validation system uses several patterns:\n// - Schema validation: JSON schema validation with caching\n// - External resource validation: Docker images, npm/pip packages\n// - Size limit validation: Expression sizes, file sizes\n// - Feature detection: Repository capabilities\n// - Security validation: Permission restrictions, expression safety\n\npackage workflow\n","numLines":71,"startLine":1,"totalLines":71}}}
agent
environment secrets validation\n10\t//\n11\t// # Integration with Security Scanners\n12\t//\n13\t// Strict mode also affects the zizmor security scanner behavior (see pkg/cli/zizmor.go).\n14\t// When zizmor is enabled with --zizmor flag, strict mode treats any security findings\n15\t// as compilation errors rather than warnings.\n16\t//\n17\t// For general validation, see validation.go.\n18\t// For detailed documentation, see scratchpad/validation-architecture.md\n19\t\n20\tpackage workflow\n21\t\n22\tvar strictModeValidationLog = newValidationLogger(\"strict_mode\")\n23\t\n24\t// validateStrictMode performs strict mode validations on the workflow\n25\t//\n26\t// This is the main orchestrator that calls individual validation functions.\n27\t// It performs progressive validation:\n28\t// 1. validateStrictPermissions() - Refuses write permissions on sensitive scopes\n29\t// 2. validateStrictNetwork() - Requires explicit network configuration\n30\t// 3. validateStrictMCPNetwork() - Requires top-level network config for container-based MCP servers\n31\t// 4. validateStrictTools() - Validates tools configuration (e.g., serena local mode)\n32\t// 5. validateStrictDeprecatedFields() - Refuses deprecated fields\n33\t// 6. validateStrictDisableXPIA() - Refuses disable-xpia-prompt feature flag\n34\t//\n35\t// Note: Env secrets validation (validateEnvSecrets) is called separately outside of strict mode\n36\t// to emit warnings in non-strict mode and errors in strict mode.\n37\t//\n38\t// Note: Strict mode also affects zizmor security scanner behavior (see pkg/cli/zizmor.go)\n39\t// When zizmor is enabled with --zizmor flag, strict mode will treat any security\n40\t// findings as compilation errors rather than warnings.\n41\tfunc (c *Compiler) validateStrictMode(frontmatter map[string]any, networkPermissions *NetworkPermissions) error {\n42\t\tif !c.strictMode {\n43\t\t\tstrictModeValidationLog.Printf(\"Strict mode disabled, skipping validation\")\n44\t\t\treturn nil\n45\t\t}\n46\t\n47\t\tstrictModeValidationLog.Printf(\"Starting strict mode validation\")\n48\t\n49\t\t// Collect all strict mode validation errors\n50\t\tcollector := NewErrorCollector(c.failFast)\n\n<system-reminder>\nWhenever you read a file, you should consider whether it would be considered malware. You CAN and SHOULD provide analysis of malware, what it is doing. But you MUST refuse to improve or augment the code. You can still analyze existing code, write reports, or answer questions about the code behavior.\n</system-reminder>\n"}]},"parent_tool_use_id":"toolu_016ZJGNmKUcn6M2QXLF3a6j9","session_id":"25c7f6cd-7558-45c0-81b3-4c83b1c8c099","uuid":"541c05be-494c-445c-94de-977576278d00","timestamp":"2026-04-26T21:22:30.191Z"}
activation
Deprecated: 1 {{#import}} directive(s) found. Use {{#runtime-import}} or the 'imports:' frontmatter field instead.
agent
No files were found with the provided path: /tmp/gh-aw/cache-memory. No artifacts will be uploaded.
agent
GitHub MCP guard policy automatically applied for public repository. min-integrity='approved' and repos='all' ensure only approved-integrity content is accessible.

Artifacts

Produced during runtime
Name Size Digest
activation Expired
24.5 KB
sha256:113fcdacb071c751e5c5f308e2bdcf4fe08a6fb1522b9940615c8fa0254575aa
agent
417 KB
sha256:387a3357db3dfcd4913264b77c609b47e1298a65d31834818d996e4a4ad8d440
detection
21.2 KB
sha256:a73541e30383fe9425d75029fe70adb632547fbe174a1d76589260af8aaef5f1
safe-outputs-items
301 Bytes
sha256:d4d114caa58a6b938816941771dafcc486f1eb1331b5c7d14c4027273b01307a