Skip to content

Go Logger Enhancement #242

Go Logger Enhancement

Go Logger Enhancement #242

Triggered via schedule May 5, 2026 04:15
Status Success
Total duration 16m 53s
Artifacts 4

go-logger.lock.yml

on: schedule
Fit to window
Zoom out
Zoom in

Annotations

5 errors and 2 warnings
agent
log path validation outcomes and MustBeWithin travers...
agent
log engine/dir/ext on sub-agent restore step\n\nCo-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>\nEOF\n)\"","description":"Commit the logging changes"},"caller":{"type":"direct"}}],"stop_reason":null,"stop_sequence":null,"stop_details":null,"usage":{"input_tokens":1,"cache_creation_input_tokens":147,"cache_read_input_tokens":33632,"cache_creation":{"ephemeral_5m_input_tokens":147,"ephemeral_1h_input_tokens":0},"output_tokens":51,"service_tier":"standard","inference_geo":"global"},"context_management":null},"parent_tool_use_id":null,"session_id":"e9c8d75d-5198-4ab3-8039-fbe0bdc1c77a","uuid":"dd3f8f87-8eb4-4dbc-bd54-39a4a360cf2a"}
agent
Main workflow orchestration and YAML generation\n//\n// The orchestrator follows a phased approach with typed result structures\n// for clear data flow between compilation stages. Each module handles a specific\n// concern in the compilation pipeline, making the codebase easier to understand\n// and maintain.\npackage workflow\n\nimport (\n\t\"github.com/github/gh-aw/pkg/logger\"\n)\n\n// Shared logger used across compiler orchestrator modules\nvar detectionLog = logger.New(\"workflow:detection\")\n","numLines":23,"startLine":1,"totalLines":23}}}
agent
JavaScript runtime mode compatibility\n//\n// # Pass-Through Field Validation\n//\n// Several workflow frontmatter fields are \"pass-through\" fields - they are extracted\n// from frontmatter and passed directly to GitHub Actions without modification:\n// - concurrency: Workflow concurrency control\n// - container: Container configuration for jobs\n// - environment: GitHub environment configuration\n// - env: Environment variables\n// - runs-on: Runner selection\n// - services: Service containers\n//\n// These fields ARE validated during frontmatter parsing using JSON Schema validation\n// (see pkg/parser/schemas/main_workflow_schema.json). The schema catches:\n// - Invalid data types (e.g., array when object expected)\n// - Missing required properties (e.g., container missing 'image')\n// - Invalid additional properties (e.g., unknown fields in concurrency)\n// - Structure violations (e.g., runs-on as number instead of string/array/object)\n//\n// Schema validation happens in pkg/parser/schema_validation.go during frontmatter\n// parsing, so errors are caught at compile time rather than GitHub Actions runtime.\n// See pkg/parser/schema_passthrough_validation_test.go for comprehensive test coverage.\n//\n// # When to Add New Validation\n//\n// Add validation to existing domain files when:\n// - It fits the domain (e.g., package validation → pip_validation.go)\n// - It extends existing functionality\n//\n// Create a new validation file when:\n// - It represents a distinct validation domain\n// - It has multiple related validation functions\n// - It requires its own caching or state management\n//\n// # Validation Patterns\n//\n// The validation system uses several patterns:\n// - Schema validation: JSON schema validation with caching\n// - External resource validation: Docker images, npm/pip packages\n// - Size limit validation: Expression sizes, file sizes\n// - Feature detection: Repository capabilities\n// - Security validation: Permission restrictions, expression safety\n\npackage workflow\n","numLines":71,"startLine":1,"totalLines":71}}}
update_cache_memory
Unable to download artifact(s): Artifact not found for name: cache-memory Please ensure that your artifact is not expired and the artifact was uploaded using a compatible version of toolkit/upload-artifact. For more information, visit the GitHub Artifacts FAQ: https://github.com/actions/toolkit/blob/main/packages/artifact/docs/faq.md
agent
No files were found with the provided path: /tmp/gh-aw/cache-memory. No artifacts will be uploaded.
agent
GitHub MCP guard policy automatically applied for public repository. min-integrity='approved' and repos='all' ensure only approved-integrity content is accessible.

Artifacts

Produced during runtime
Name Size Digest
activation Expired
4.52 MB
sha256:dc39212b32801d02cfe3733d6603ce357fb5afe14ee6eb8a109b2cded31bc993
agent
359 KB
sha256:da0b014ea66db5b29c5c3b230a2000460a4c30aefa5a31e9bed259851c7a9dd6
detection
26.1 KB
sha256:7cb056dacc8b6a3abcabbc648ff7403bae89350cfa4b1043cfd1d92f9eb822e6
safe-outputs-items
387 Bytes
sha256:8bb93fb83b8ee4a55f6c99930cbe1719f0f1806957abd3aa6c8e3b5b1279af46