Skip to content

Bump the gradle-dependencies group in /examples/resilience-failsafe with 2 updates #4264

Bump the gradle-dependencies group in /examples/resilience-failsafe with 2 updates

Bump the gradle-dependencies group in /examples/resilience-failsafe with 2 updates #4264

Workflow file for this run

name: Qodana
permissions: read-all
on: [ push, pull_request ]
env:
DEVELOCITY_ACCESS_KEY: ${{ secrets.DEVELOCITY_ACCESS_KEY }}
JAVA_VERSION: 11
jobs:
qodana:
runs-on: ubuntu-latest
permissions:
checks: write
actions: read
contents: read
security-events: write
if: >
github.actor != 'dependabot[bot]'
&& (github.event_name != 'pull_request' || github.event.pull_request.head.repo.fork == false)
steps:
- name: Harden Runner
uses: step-security/harden-runner@17d0e2bd7d51742c71671bd19fa12bdc9d40a3d6 # v2.8.1
with:
disable-sudo: true
egress-policy: block
allowed-endpoints: >
api.adoptium.net:443
api.foojay.io:443
api.github.com:443
auth.docker.io:443
caffeine.gradle-enterprise.cloud:443
checkerframework.org:443
docs.oracle.com:443
download.jetbrains.com:443
download-cdn.jetbrains.com:443
downloads.gradle.org:443
downloads.gradle-dn.com:443
errorprone.info:443
github.com:443
guava.dev:443
jcenter.bintray.com:443
lightbend.github.io:443
objects.githubusercontent.com:443
packages.jetbrains.team:443
pkg-cdn.jetbrains.team:443
plugins.gradle.org:443
plugins.jetbrains.com:443
plugins-artifacts.gradle.org:443
prod.fus.aws.intellij.net:443
production.cloudflare.docker.com:443
registry-1.docker.io:443
repo.gradle.org:443
repo.maven.apache.org:443
repo1.maven.org:443
resources.jetbrains.com:443
services.gradle.org:443
- name: Checkout
uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
- name: Build
uses: ./.github/actions/run-gradle
with:
java: ${{ env.JAVA_VERSION }}
arguments: build -x test
- name: Qodana - Code Inspection
uses: JetBrains/qodana-action@32840fdb87f8dd110e0a6b09323c7142b667b25d # v2024.1.5
env:
QODANA_TOKEN: ${{ secrets.QODANA_TOKEN }}
with:
upload-result: true
- name: Upload SARIF file for GitHub Advanced Security Dashboard
uses: github/codeql-action/upload-sarif@23acc5c183826b7a8a97bce3cecc52db901f8251 # v3.25.10
with:
sarif_file: ${{ runner.temp }}/qodana/results/qodana.sarif.json