azure-sdk-for-cpp/sdk/keyvault/ci.yml
Daniel Jurek 413b4b7665
Add coverage enforcement (#2992)
* Add coverage enforcement

* Add spelling exception for mspremier

* Use previous build coverage data, enforce 3% variance, use Skip.CoverageEnforcement feature flag

* Use version 8 of quality checks

* Remove forceCoverageImprovement, it doesn't allow 0% improvements (e.g. doc changes, etc.)

* branch -> branches

* Configure coverage thresholds per-service

* Use fixed coverage

* Review feedback

* Per-service coverage plumbing

* Flip branch and line coverage requirements for KV to accurately reflect current baseline
2021-11-03 10:56:32 -07:00

52 lines
1.4 KiB
YAML

# NOTE: Please refer to https://aka.ms/azsdk/engsys/ci-yaml before editing this file.
trigger:
branches:
include:
- main
- feature/*
- release/*
- hotfix/*
paths:
include:
- cmake-modules/
- eng/
- CMakeLists.txt
- sdk/core
- sdk/keyvault
pr:
branches:
include:
- main
- feature/*
- release/*
- hotfix/*
paths:
include:
- cmake-modules/
- eng/
- CMakeLists.txt
- sdk/core/
- sdk/keyvault
stages:
- template: ../../eng/pipelines/templates/stages/archetype-sdk-client.yml
parameters:
ServiceDirectory: keyvault
CtestRegex: "azure-security-keyvault.*-unittest"
LiveTestCtestRegex: "azure-security-keyvault.*"
LiveTestTimeoutInMinutes: 120
SubscriptionConfiguration: $(sub-config-azure-cloud-test-resources)
LineCoverageTarget: 37
BranchCoverageTarget: 15
Artifacts:
- Name: azure-security-keyvault-keys
Path: azure-security-keyvault-keys
VcpkgPortName: azure-security-keyvault-keys-cpp
- Name: azure-security-keyvault-secrets
Path: azure-security-keyvault-secrets
VcpkgPortName: azure-security-keyvault-secrets-cpp
- Name: azure-security-keyvault-certificates
Path: azure-security-keyvault-certificates
VcpkgPortName: azure-security-keyvault-certificates-cpp