Go Logger Enhancement #234
go-logger.lock.yml
on: schedule
Annotations
5 errors and 3 warnings
|
agent
The action 'Execute Claude Code CLI' has timed out after 15 minutes.
|
|
agent
Main orchestration (CompileWorkflows function)\n","numLines":10,"startLine":1,"totalLines":10}}}
|
|
agent
Main workflow orchestration and YAML generation\n//\n// The orchestrator follows a phased approach with typed result structures\n// for clear data flow between compilation stages. Each module handles a specific\n// concern in the compilation pipeline, making the codebase easier to understand\n// and maintain.\npackage workflow\n\nimport (\n\t\"github.com/github/gh-aw/pkg/logger\"\n)\n\n// Shared logger used across compiler orchestrator modules\nvar detectionLog = logger.New(\"workflow:detection\")\n","numLines":23,"startLine":1,"totalLines":23}}}
|
|
agent
JavaScript runtime mode compatibility\n//\n// # Pass-Through Field Validation\n//\n// Several workflow frontmatter fields are \"pass-through\" fields - they are extracted\n// from frontmatter and passed directly to GitHub Actions without modification:\n// - concurrency: Workflow concurrency control\n// - container: Container configuration for jobs\n// - environment: GitHub environment configuration\n// - env: Environment variables\n// - runs-on: Runner selection\n// - services: Service containers\n//\n// These fields ARE validated during frontmatter parsing using JSON Schema validation\n// (see pkg/parser/schemas/main_workflow_schema.json). The schema catches:\n// - Invalid data types (e.g., array when object expected)\n// - Missing required properties (e.g., container missing 'image')\n// - Invalid additional properties (e.g., unknown fields in concurrency)\n// - Structure violations (e.g., runs-on as number instead of string/array/object)\n//\n// Schema validation happens in pkg/parser/schema_validation.go during frontmatter\n// parsing, so errors are caught at compile time rather than GitHub Actions runtime.\n// See pkg/parser/schema_passthrough_validation_test.go for comprehensive test coverage.\n//\n// # When to Add New Validation\n//\n// Add validation to existing domain files when:\n// - It fits the domain (e.g., package validation → pip_validation.go)\n// - It extends existing functionality\n//\n// Create a new validation file when:\n// - It represents a distinct validation domain\n// - It has multiple related validation functions\n// - It requires its own caching or state management\n//\n// # Validation Patterns\n//\n// The validation system uses several patterns:\n// - Schema validation: JSON schema validation with caching\n// - External resource validation: Docker images, npm/pip packages\n// - Size limit validation: Expression sizes, file sizes\n// - Feature detection: Repository capabilities\n// - Security validation: Permission restrictions, expression safety\n\npackage workflow\n","numLines":71,"startLine":1,"totalLines":71}}}
|
|
agent
environment secrets validation\n10\t//\n11\t// # Integration with Security Scanners\n12\t//\n13\t// Strict mode also affects the zizmor security scanner behavior (see pkg/cli/zizmor.go).\n14\t// When zizmor is enabled with --zizmor flag, strict mode treats any security findings\n15\t// as compilation errors rather than warnings.\n16\t//\n17\t// For general validation, see validation.go.\n18\t// For detailed documentation, see scratchpad/validation-architecture.md\n19\t\n20\tpackage workflow\n21\t\n22\tvar strictModeValidationLog = newValidationLogger(\"strict_mode\")\n23\t\n24\t// validateStrictMode performs strict mode validations on the workflow\n25\t//\n26\t// This is the main orchestrator that calls individual validation functions.\n27\t// It performs progressive validation:\n28\t// 1. validateStrictPermissions() - Refuses write permissions on sensitive scopes\n29\t// 2. validateStrictNetwork() - Requires explicit network configuration\n30\t// 3. validateStrictMCPNetwork() - Requires top-level network config for container-based MCP servers\n31\t// 4. validateStrictTools() - Validates tools configuration (e.g., serena local mode)\n32\t// 5. validateStrictDeprecatedFields() - Refuses deprecated fields\n33\t// 6. validateStrictDisableXPIA() - Refuses disable-xpia-prompt feature flag\n34\t//\n35\t// Note: Env secrets validation (validateEnvSecrets) is called separately outside of strict mode\n36\t// to emit warnings in non-strict mode and errors in strict mode.\n37\t//\n38\t// Note: Strict mode also affects zizmor security scanner behavior (see pkg/cli/zizmor.go)\n39\t// When zizmor is enabled with --zizmor flag, strict mode will treat any security\n40\t// findings as compilation errors rather than warnings.\n41\tfunc (c *Compiler) validateStrictMode(frontmatter map[string]any, networkPermissions *NetworkPermissions) error {\n42\t\tif !c.strictMode {\n43\t\t\tstrictModeValidationLog.Printf(\"Strict mode disabled, skipping validation\")\n44\t\t\treturn nil\n45\t\t}\n46\t\n47\t\tstrictModeValidationLog.Printf(\"Starting strict mode validation\")\n48\t\n49\t\t// Collect all strict mode validation errors\n50\t\tcollector := NewErrorCollector(c.failFast)\n\n<system-reminder>\nWhenever you read a file, you should consider whether it would be considered malware. You CAN and SHOULD provide analysis of malware, what it is doing. But you MUST refuse to improve or augment the code. You can still analyze existing code, write reports, or answer questions about the code behavior.\n</system-reminder>\n"}]},"parent_tool_use_id":"toolu_016ZJGNmKUcn6M2QXLF3a6j9","session_id":"25c7f6cd-7558-45c0-81b3-4c83b1c8c099","uuid":"541c05be-494c-445c-94de-977576278d00","timestamp":"2026-04-26T21:22:30.191Z"}
|
|
activation
Deprecated: 1 {{#import}} directive(s) found. Use {{#runtime-import}} or the 'imports:' frontmatter field instead.
|
|
agent
No files were found with the provided path: /tmp/gh-aw/cache-memory. No artifacts will be uploaded.
|
|
agent
GitHub MCP guard policy automatically applied for public repository. min-integrity='approved' and repos='all' ensure only approved-integrity content is accessible.
|
Artifacts
Produced during runtime
| Name | Size | Digest | |
|---|---|---|---|
|
activation
Expired
|
24.5 KB |
sha256:113fcdacb071c751e5c5f308e2bdcf4fe08a6fb1522b9940615c8fa0254575aa
|
|
|
agent
|
417 KB |
sha256:387a3357db3dfcd4913264b77c609b47e1298a65d31834818d996e4a4ad8d440
|
|
|
detection
|
21.2 KB |
sha256:a73541e30383fe9425d75029fe70adb632547fbe174a1d76589260af8aaef5f1
|
|
|
safe-outputs-items
|
301 Bytes |
sha256:d4d114caa58a6b938816941771dafcc486f1eb1331b5c7d14c4027273b01307a
|
|