-
Notifications
You must be signed in to change notification settings - Fork 1.2k
Capture build scans on ge.apache.org to benefit from deep build insights #5411
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Codecov Report
@@ Coverage Diff @@
## master #5411 +/- ##
==========================================
- Coverage 76.83% 76.52% -0.31%
==========================================
Files 241 241
Lines 14630 14630
Branches 616 616
==========================================
- Hits 11241 11196 -45
- Misses 3389 3434 +45
... and 9 files with indirect coverage changes 📣 We’re building smart automated test selection to slash your CI/CD build times. Learn more |
Hi, is anything needed to get this reviewed and merged? |
@clayburn Thank you for the contribution. |
This change allows GitHub Actions builds to submit build scans to ge.apache.org by authenticating those builds. The access key has been stored as an organizational secret by the ASF Infrastructure team in the Apache GitHub organization. The access key is not available to workflows triggered from forks. This builds on the changes in apache#5411
This change allows GitHub Actions builds to submit build scans to ge.apache.org by authenticating those builds. The access key has been stored as an organizational secret by the ASF Infrastructure team in the Apache GitHub organization. The access key is not available to workflows triggered from forks. This builds on the changes in #5411
…hts (apache#5411) (cherry picked from commit 37605b4)
This change allows GitHub Actions builds to submit build scans to ge.apache.org by authenticating those builds. The access key has been stored as an organizational secret by the ASF Infrastructure team in the Apache GitHub organization. The access key is not available to workflows triggered from forks. This builds on the changes in apache#5411 (cherry picked from commit be3f6d6)
Capture build scans on ge.apache.org to benefit from deep build insights
Description
This PR publishes a build scan for every CI build on Jenkins and GitHub Actions and for every local build from an authenticated Apache committer. The build will not fail if publishing fails.
The build scans of the Apache OpenWhisk project are published to the Gradle Enterprise instance at ge.apache.org, hosted by the Apache Software Foundation and run in partnership between the ASF and Gradle. This Gradle Enterprise instance has all features and extensions enabled and is freely available for use by the Apache OpenWhisk project and all other Apache projects.
Currently, the Apache OpenWhisk build is configured to publish build scans to the publicly available scans.gradle.com. This pull request enhances that functionality by instead publishing build scans to ge.apache.org. On this Gradle Enterprise instance, Apache OpenWhisk will have access not only to all of the published build scans but other aggregate data features such as:
If interested in exploring a fully populated Gradle Enterprise instance, please explore the Maven builds already connected to ge.apache.org, the Spring project’s instance, or any number of other OSS projects for which we sponsor instances of Gradle Enterprise.
Please let me know if there are any questions about the value of Gradle Enterprise or the changes in this pull request and I’d be happy to address them.
Related issue and scope
My changes affect the following components
Types of changes
Checklist: