ci: improve SDLC pipeline readiness and AgentReady score#150
Conversation
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
Summary of ChangesHello, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed! This pull request significantly enhances the project's SDLC pipeline and overall repository maturity. By introducing automated security scanning, standardized development workflows, and optimized CI configurations, the changes ensure better code quality, faster build times, and improved maintainability for current and future contributors. Highlights
Ignored Files
Using Gemini Code AssistThe full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips. Invoking Gemini You can request assistance from Gemini at any point by creating a comment using either
Customization To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a Limitations & Feedback Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for GitHub and other Google products, sign up here. Footnotes
|
There was a problem hiding this comment.
Code Review
This pull request introduces foundational project configurations, including issue templates, dependabot settings, linting rules, pre-commit hooks, and initial Architecture Decision Records (ADRs). Feedback identifies an invalid version for the golangci-lint pre-commit hook and recommends enabling vendoring in Dependabot to maintain consistency with the project's decision to check in the vendor directory.
|
You are seeing this message because GitHub Code Scanning has recently been set up for this repository, or this pull request contains the workflow file for the Code Scanning tool. What Enabling Code Scanning Means:
For more information about GitHub Code Scanning, check out the documentation. |
76e2be3 to
01ada0b
Compare
01ada0b to
009e9a4
Compare
Add dependency security scanning (Dependabot, CodeQL, govulncheck), pre-commit hooks, conventional commit enforcement, issue templates, architecture decision records, and markdownlint config. Upgrade CI action versions, enable Go module caching, and split checks into parallel jobs for faster feedback. Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com> Signed-off-by: Miguel Duarte Barroso <mdbarroso@redhat.com>
Replace setup-go built-in cache with explicit actions/cache steps so CI caching is visible to pipeline analysis tools. Convert .golangci.json to .golangci.yml for broader linter detection compatibility. Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com> Signed-off-by: Miguel Duarte Barroso <mdbarroso@redhat.com>
009e9a4 to
be40d77
Compare
What this PR does / why we need it:
Add dependency security scanning (Dependabot, CodeQL, govulncheck), pre-commit hooks, conventional commit enforcement, issue templates, architecture decision records, and markdownlint config. Upgrade CI action versions, enable Go module caching, and split checks into parallel jobs for faster feedback.
Which issue(s) this PR fixes (optional, in
fixes #<issue number>(, fixes #<issue_number>, ...)format, will close the issue(s) when PR gets merged):Fixes #
Special notes for your reviewer:
Release note: