-
-
Notifications
You must be signed in to change notification settings - Fork 1
Updated Builds #87
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Updated Builds #87
Conversation
|
Caution Review failedThe pull request is closed. WalkthroughUpdates CI and release tooling: adds changelog config, upgrades GitVersion actions to v4.2.0 and SDK Changes
Sequence Diagram(s)sequenceDiagram
autonumber
participant Dev as Developer / PR
participant GH as GitHub Actions
participant GV as GitVersion (v4.2.0)
participant Sonar as dotnet-sonarscanner
Note over GH: CI / Release workflows (updated)
Dev->>GH: push / open PR
GH->>GV: Determine version (gitversion/[email protected])
GV-->>GH: version metadata
GH->>Sonar: begin analysis (SONAR_TOKEN from env)
Sonar-->>GH: analysis started
GH->>GH: build, test, publish, generate release notes (uses `.github/release.yml`)
Note over GV: `label-number-pattern` no longer parsed
Estimated code review effort🎯 3 (Moderate) | ⏱️ ~25 minutes
Poem
Pre-merge checks and finishing touches❌ Failed checks (1 inconclusive)
✅ Passed checks (2 passed)
📜 Recent review detailsConfiguration used: CodeRabbit UI Review profile: CHILL Plan: Pro 📒 Files selected for processing (1)
Comment |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Actionable comments posted: 2
📜 Review details
Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro
📒 Files selected for processing (4)
.github/release.yml(1 hunks).github/workflows/ci-build.yml(2 hunks).github/workflows/release-build.yml(1 hunks)GitVersion.yml(0 hunks)
💤 Files with no reviewable changes (1)
- GitVersion.yml
🔇 Additional comments (4)
.github/workflows/ci-build.yml (1)
27-27: GitVersion upgrade is applied consistently across both jobs.The upgrade from v3.1.1 to v4.2.0 with versionSpec updated to 6.4.0 is properly applied to both the build and code-quality jobs. GitVersion v4 introduced property name changes such as tag → label and tag-number-pattern → label-number-pattern, so verify that any configuration files have been updated accordingly.
Also applies to: 29-29, 33-33, 84-84, 86-86, 90-90
.github/release.yml (1)
1-22: Release notes changelog configuration is well-structured.The changelog categories are logical and the exclusion of low-value labels (question, wontfix, invalid) is appropriate. The wildcard label in the final "Other Changes" category ensures comprehensive coverage of all contributions.
.github/workflows/release-build.yml (2)
26-26: GitVersion upgrade to v4.2.0 aligns with CI workflow changes.The version specification upgrade (6.0.5 → 6.4.0) is consistent with the changes in ci-build.yml. GitVersion v4 introduced breaking changes including property name changes (tag → label, tag-number-pattern → label-number-pattern), so ensure the GitVersion.yml configuration file reflects these changes if applicable.
Also applies to: 28-28, 32-32
32-32: GitVersion v4.2.0 auto-detects configuration files by default—the removal ofuseConfigFile: trueis correct and safe.A
GitVersion.ymlconfiguration file exists in the repository root and will be automatically detected by GitVersion v4.2.0. The GitHub Actions task (v4.2.0) auto-detects the config file without requiring theuseConfigFile: trueparameter. In fact, settinguseConfigFile: truein v4.x can introduce failure modes if the config file path is misconfigured. The upgrade and parameter removal are sound design decisions by GitTools and pose no risk to version detection.Likely an incorrect or invalid review comment.
| shell: powershell | ||
| run: | | ||
| .\.sonar\scanner\dotnet-sonarscanner begin /k:"IowaComputerGurus_aspnetcore.utilities" /o:"iowacomputergurus-github" /d:sonar.login="${{ secrets.SONAR_TOKEN }}" /d:sonar.host.url="https://sonarcloud.io" /n:"AspNetCore Utilities" | ||
| .\.sonar\scanner\dotnet-sonarscanner begin /k:"IowaComputerGurus_aspnetcore.utilities" /o:"iowacomputergurus-github" /d:sonar.login="${{ env.SONAR_TOKEN }}" /n:"AspNetCore Utilities" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Sonar token handling is inconsistent between begin and end steps.
Line 98 uses env.SONAR_TOKEN for the scanner begin operation, but line 102 uses secrets.SONAR_TOKEN for the end operation. Since the environment variable is set from the GitHub secret on line 95, this inconsistency should be harmless in practice, but using the same source throughout is clearer. Standardize both steps to use env.SONAR_TOKEN for consistency.
Apply this diff to use the same token source in both steps:
- .\.sonar\scanner\dotnet-sonarscanner end /d:sonar.login="${{ secrets.SONAR_TOKEN }}"
+ .\.sonar\scanner\dotnet-sonarscanner end /d:sonar.login="${{ env.SONAR_TOKEN }}"Also applies to: 102-102
🤖 Prompt for AI Agents
.github/workflows/ci-build.yml around lines 98 and 102: the Sonar scanner steps
reference the token inconsistently (line 98 uses env.SONAR_TOKEN while line 102
uses secrets.SONAR_TOKEN); change the end step to use the same env.SONAR_TOKEN
variable as the begin step (standardize both steps to reference env.SONAR_TOKEN)
so both begin and end use the identical token source.
Co-authored-by: coderabbitai[bot] <136622811+coderabbitai[bot]@users.noreply.github.com>
|


Summary by CodeRabbit
✏️ Tip: You can customize this high-level summary in your review settings.