intellij-openshift-connector
intellij-openshift-connector copied to clipboard
build(deps): bump gradle/actions from 3.5.0 to 4.0.0
Bumps gradle/actions from 3.5.0 to 4.0.0.
Release notes
Sourced from gradle/actions's releases.
v4.0.0
Final release of
v4.0.0of thesetup-gradle,dependency-submissionandwrapper-validationactions provided undergradle/actions. This release is available under thev4tag.Major changes from the
v3releaseThe
argumentsparameter has been removedUsing the action to execute Gradle via the
argumentsparameter was deprecated inv3and this parameter has been removed. See here for more details.Cache cleanup enabled by default
After a number of fixes and improvements, this release enables cache-cleanup by default for all Jobs using the
setup-gradleanddependency-submissionactions.Improvements and bugfixes related cache cleanup:
- By default, cache cleanup is not run if any Gradle build fails (#71)
- Cache cleanup is not run after configuration-cache reuse (#19)
This feature should help to minimize the size of entries written to the GitHub Actions cache, speeding up builds and reducing cache usage.
Wrapper validation enabled by default
In
v3, thesetup-gradleaction was enhanced to support Gradle wrapper validation, removing the need to use a separate workflow file with thegradle/actions/wrapper-validationaction.With this release, wrapper validation has been significantly improved, and is now enabled by default (#12):
- The
allow-snapshot-wrappersmakes it possible to validate snapshot wrapper jars usingsetup-gradle.- Checksums for nightly and snapshot Gradle versions are now validated (#281).
- Valid wrapper checksums are cached in Gradle User Home, reducing the need to retrieve checksum values remotely (#172).
- Reduce network calls in
wrapper-validationfor new Gradle versions: By only fetching wrapper checksums for Gradle versions that were not known when this action was released, this release reduces the likelihood that a network failure could cause failure in wrapper validation (#171)- Improved error message when
wrapper-validationfinds no wrapper jars (#284)Wrapper validation is important for supply-chain integrity. Enabling this feature by default will increase the coverage of wrapper validation on projects using GitHub Actions.
New input parameters for Dependency Graph generation
Some dependency-graph inputs that could previously only be configured via environment variables now have dedicated action inputs:
dependency-graph-report-dir: sets the location where dependency-graph reports will be generateddependency-graph-exclude-projectsanddependency-graph-include-projects: select which Gradle projects will contribute to the generated dependency graph.dependency-graph-exclude-configurationsanddependency-graph-include-configurations: select which Gradle configurations will contribute to the generated dependency graph.Other improvements
- In Job summary, the action now provides an explanation when cache is set to
read-onlyordisabled(#255)- When
setup-gradlerequests a specific Gradle version, the action will no longer download and install that version if it is already available on thePATHof the runner (#270)- To attempt to speed up builds, the
setup-gradleanddependency-submissionactions now attempt to use theD:drive for Gradle User Home if it is available (#290)Deprecations and breaking changes
... (truncated)
Commits
af1da67Prevent concurrent jobs in integ-test-fullf8ba43cBetter names for suite workflowsbcd07e6Refactor integ-tests into suitesd74ee73Refactor integ-testsfb2e693[bot] Update dist directory0719002Improve error messages for min-wrapper-count (#321)ac3aebdImprove error messages for min-wrapper-countd473db0Add tests for wrapper-validation with insufficient wrappers833b05f[bot] Update dist directory06905c7Enable wrapper-validation by default in setup-gradle (#318)- Additional commits viewable in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot mergewill merge this PR after your CI passes on it@dependabot squash and mergewill squash and merge this PR after your CI passes on it@dependabot cancel mergewill cancel a previously requested merge and block automerging@dependabot reopenwill reopen this PR if it is closed@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
[APPROVALNOTIFIER] This PR is NOT APPROVED
This pull-request has been approved by: Once this PR has been reviewed and has the lgtm label, please assign adietish for approval. For more information see the Kubernetes Code Review Process.
The full list of commands accepted by this bot can be found here.
Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment
Hi @dependabot[bot]. Thanks for your PR.
I'm waiting for a redhat-developer member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.
Once the patch is verified, the new status will be reflected by the ok-to-test label.
I understand the commands that are listed here.
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.
Quality Gate passed
Issues
0 New issues
0 Accepted issues
Measures
0 Security Hotspots
0.0% Coverage on New Code
0.0% Duplication on New Code
Superseded by #904.