-
Notifications
You must be signed in to change notification settings - Fork 965
/
azure-pipelines.yml
146 lines (123 loc) · 4.39 KB
/
azure-pipelines.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
trigger:
- main
- rel/*
pr:
- main
- rel/*
variables:
BuildConfiguration: Release
DOTNET_SKIP_FIRST_TIME_EXPERIENCE: true
disable.coverage.autogenerate: 'true'
stages:
- stage: Build
variables:
- group: 'Report Generator License Key'
jobs:
- job: Build
pool:
vmImage: windows-latest
steps:
- task: UseDotNet@2
displayName: 'Use .NET Core SDK 8.x'
inputs:
version: 8.x
- task: DotNetCoreCLI@2
inputs:
command: custom
custom: tool
arguments: install --tool-path . nbgv
displayName: Install NBGV tool
- script: nbgv cloud
displayName: Set Version
- task: DotNetCoreCLI@2
inputs:
command: restore
projects: .\src\Humanizer.sln
arguments: -c $(BuildConfiguration)
displayName: Restore
- task: VSBuild@1
inputs:
solution: .\src\Humanizer.sln
configuration: $(BuildConfiguration)
- task: NuGetToolInstaller@1
- pwsh: |
mkdir $(Build.ArtifactStagingDirectory)\Packages
$version = .\nbgv get-version -f json | ConvertFrom-Json
$nuspecs = gci .\NuSpecs\*.nuspec
foreach ($item in $nuspecs) {
nuget pack $($item.FullName) `
-outputdirectory $(Build.ArtifactStagingDirectory)\Packages `
-basepath $(System.DefaultWorkingDirectory)\src\ `
-NoPackageAnalysis `
-Properties "version=$($version.NuGetPackageVersion);RepositoryType=git;RepositoryCommit=$($version.GitCommitId);RepositoryUrl=https://github.com/Humanizr/Humanizer"
}
displayName: Create packages
- task: DotNetCoreCLI@2
inputs:
command: test
projects: .\src\Humanizer.Tests\Humanizer.Tests.csproj
arguments: -c $(BuildConfiguration) --no-build --collect:"XPlat code coverage" -s $(System.DefaultWorkingDirectory)/src/CodeCoverage.runsettings -- RunConfiguration.DisableAppDomain=true
displayName: Run Tests
# Generate code coverage report
# https://danielpalme.github.io/ReportGenerator/
- task: reportgenerator@5
displayName: Generate Code Coverage Report
inputs:
reports: '$(Agent.TempDirectory)/**/coverage.cobertura.xml'
targetdir: $(Build.ArtifactStagingDirectory)/coverageReports/
reporttypes: HtmlInline_AzurePipelines;Cobertura;Badges
license: '$(ReportGeneratorLicenseKey)'
# Publish Code Coverage results
- task: PublishCodeCoverageResults@1
displayName: 'Publish Code Coverage Results'
inputs:
codeCoverageTool: cobertura
summaryFileLocation: $(Build.ArtifactStagingDirectory)/coverageReports/Cobertura.xml
reportDirectory: $(Build.ArtifactStagingDirectory)/coverageReports/
- publish: $(Build.ArtifactStagingDirectory)\Packages
displayName: Publish build packages
artifact: BuildPackages
- stage: CodeSign
dependsOn: Build
condition: and(succeeded('Build'), not(eq(variables['build.reason'], 'PullRequest')))
jobs:
- job: CodeSign
displayName: Code Signing
pool:
vmImage: windows-latest
variables:
- group: SignCLI Creds
steps:
# Retreive unsigned artifacts
- download: current
artifact: BuildPackages
displayName: Download build artifacts
- task: UseDotNet@2
displayName: 'Use .NET SDK 8.x'
inputs:
version: 8.x
# Install the code signing tool
- task: DotNetCoreCLI@2
inputs:
command: custom
custom: tool
arguments: install --tool-path . --prerelease sign
displayName: Install SignTool tool
# Run the signing command
- pwsh: |
.\sign code azure-key-vault `
"**/*.nupkg" `
--base-directory "$(Pipeline.Workspace)\BuildPackages" `
--publisher-name "Humanizer" `
--description "Humanizer" `
--description-url "https://github.com/Humanizr/Humanizer" `
--azure-key-vault-tenant-id "$(SignTenantId)" `
--azure-key-vault-client-id "$(SignClientId)" `
--azure-key-vault-client-secret '$(SignClientSecret)' `
--azure-key-vault-certificate "$(SignKeyVaultCertificate)" `
--azure-key-vault-url "$(SignKeyVaultUrl)"
displayName: Sign packages
# Publish the signed packages
- publish: $(Pipeline.Workspace)/BuildPackages
displayName: Publish Signed Packages
artifact: SignedPackages