Skip to content

build(deps): Bump actions/setup-node from 4.4.0 to 6.0.0#1482

Open
dependabot[bot] wants to merge 1 commit into
mainfrom
dependabot/github_actions/actions/setup-node-6.0.0
Open

build(deps): Bump actions/setup-node from 4.4.0 to 6.0.0#1482
dependabot[bot] wants to merge 1 commit into
mainfrom
dependabot/github_actions/actions/setup-node-6.0.0

Conversation

@dependabot
Copy link
Copy Markdown
Contributor

@dependabot dependabot Bot commented on behalf of github Oct 14, 2025

Bumps actions/setup-node from 4.4.0 to 6.0.0.

Release notes

Sourced from actions/setup-node's releases.

v6.0.0

What's Changed

Breaking Changes

Dependency Upgrades

Full Changelog: actions/setup-node@v5...v6.0.0

v5.0.0

What's Changed

Breaking Changes

This update, introduces automatic caching when a valid packageManager field is present in your package.json. This aims to improve workflow performance and make dependency management more seamless. To disable this automatic caching, set package-manager-cache: false

steps:
- uses: actions/checkout@v5
- uses: actions/setup-node@v5
  with:
    package-manager-cache: false

Make sure your runner is on version v2.327.1 or later to ensure compatibility with this release. See Release Notes

Dependency Upgrades

New Contributors

Full Changelog: actions/setup-node@v4...v5.0.0

Commits

Dependabot compatibility score

You can trigger a rebase of this PR by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Note
Automatic rebases have been disabled on this pull request as it has been open for over 30 days.

Bumps [actions/setup-node](https://github.com/actions/setup-node) from 4.4.0 to 6.0.0.
- [Release notes](https://github.com/actions/setup-node/releases)
- [Commits](actions/setup-node@49933ea...2028fbc)

---
updated-dependencies:
- dependency-name: actions/setup-node
  dependency-version: 6.0.0
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot Bot added dependencies Pull requests that update a dependency file github_actions Pull requests that update GitHub Actions code labels Oct 14, 2025
@dependabot dependabot Bot requested review from a team as code owners October 14, 2025 20:11
@dependabot dependabot Bot requested a review from andrewb1269 October 14, 2025 20:11
@dependabot dependabot Bot added dependencies Pull requests that update a dependency file github_actions Pull requests that update GitHub Actions code labels Oct 14, 2025
@dependabot dependabot Bot requested a review from leninmehedy October 14, 2025 20:11
@swirlds-automation
Copy link
Copy Markdown
Contributor

swirlds-automation commented Oct 14, 2025

Snyk checks have passed. No issues have been found so far.

Status Scanner Critical High Medium Low Total (0)
Licenses 0 0 0 0 0 issues
Open Source Security 0 0 0 0 0 issues

💻 Catch issues earlier using the plugins for VS Code, JetBrains IDEs, Visual Studio, and Eclipse.

@github-actions
Copy link
Copy Markdown

Test Results

 21 files  ± 0  107 suites   - 2   26m 38s ⏱️ - 2m 35s
378 tests  - 20  363 ✅  - 21  6 💤  - 2  9 ❌ +3 
489 runs   - 17  474 ✅  - 18  6 💤  - 2  9 ❌ +3 

For more details on these failures, see this check.

Results for commit f26f572. ± Comparison against base commit 97c8495.

This pull request removes 38 and adds 18 tests. Note that renamed tests count towards both.
"before all" hook for "should be able to get token name" ‑ ERC721Contract Test Suite "before all" hook for "should be able to get token name"
"before all" hook for "should cancel a pending airdrop for a fungible token (FT)" ‑ HIP904Batch2 IHRC904Facade Contract Test Suite "before all" hook for "should cancel a pending airdrop for a fungible token (FT)"
should be able to change ADMIN key to ECDSA_secp256k and perform admin action with same contract ‑ TokenManagmentContract Test Suite Extended update token info and keys test suite Admin key set to contractId Positive should be able to change ADMIN key to ECDSA_secp256k and perform admin action with same contract
should be able to change FREEZE key to ECDSA_secp256k and freeze the token with the same account ‑ TokenManagmentContract Test Suite Extended update token info and keys test suite Admin key set to contractId Positive should be able to change FREEZE key to ECDSA_secp256k and freeze the token with the same account
should be able to change PAUSE key to ECDSA_secp256k and pause the token with the same account ‑ TokenManagmentContract Test Suite Extended update token info and keys test suite Admin key set to contractId Positive should be able to change PAUSE key to ECDSA_secp256k and pause the token with the same account
should be able to change WIPE key to ECDSA_secp256k and wipe the token with the same account ‑ TokenManagmentContract Test Suite Extended update token info and keys test suite Admin key set to contractId Positive should be able to change WIPE key to ECDSA_secp256k and wipe the token with the same account
should be able to update fixed HTS fee and royalty fee in NFT ‑ TokenManagmentContract Test Suite Update fees should be able to update fixed HTS fee and royalty fee in NFT
should be able to update fixed HTS fee for NFT ‑ TokenManagmentContract Test Suite Update fees should be able to update fixed HTS fee for NFT
should be able to update fixed fee for HBARs ‑ TokenManagmentContract Test Suite Update fees should be able to update fixed fee for HBARs
should be able to update fixed fee in HBARs for NFT ‑ TokenManagmentContract Test Suite Update fees should be able to update fixed fee in HBARs for NFT
…
"before all" hook in "Admin key set to contractId" ‑ TokenManagmentContract Test Suite Extended update token info and keys test suite Admin key set to contractId "before all" hook in "Admin key set to contractId"
"before each" hook for "should be able to update fixed fee in HTS token" ‑ TokenManagmentContract Test Suite Update fees "before each" hook for "should be able to update fixed fee in HTS token"
should NOT be able call tokenByIndex ‑ ERC721Contract Test Suite Unsupported operations should NOT be able call tokenByIndex
should NOT be able call tokenOfOwnerByIndex ‑ ERC721Contract Test Suite Unsupported operations should NOT be able call tokenOfOwnerByIndex
should NOT be able execute safeTransferFrom ‑ ERC721Contract Test Suite Unsupported operations should NOT be able execute safeTransferFrom
should NOT be able execute safeTransferFromWithData ‑ ERC721Contract Test Suite Unsupported operations should NOT be able execute safeTransferFromWithData
should NOT be able to execute approve ‑ ERC721Contract Test Suite Unsupported operations should NOT be able to execute approve
should NOT be able to execute delegateSetApprovalForAll and isApprovedForAll ‑ ERC721Contract Test Suite should NOT be able to execute delegateSetApprovalForAll and isApprovedForAll
should NOT be able to execute transferFrom ‑ ERC721Contract Test Suite Unsupported operations should NOT be able to execute transferFrom
should be able to delegate approve ‑ ERC721Contract Test Suite should be able to delegate approve
…

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file github_actions Pull requests that update GitHub Actions code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant