Skip to content

Commit 3e84f59

Browse files
Update azure-devops-extension.yml
1 parent d535504 commit 3e84f59

File tree

1 file changed

+12
-12
lines changed

1 file changed

+12
-12
lines changed

articles/defender-for-cloud/azure-devops-extension.yml

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -104,17 +104,17 @@ procedureSection:
104104
steps:
105105
- task: MicrosoftSecurityDevOps@1
106106
displayName: 'Microsoft Security DevOps'
107-
inputs:
108-
# command: 'run' | 'pre-job' | 'post-job'. Optional. The command to run. Default: run
109-
# config: string. Optional. A file path to an MSDO configuration file ('*.gdnconfig').
110-
# policy: 'azuredevops' | 'microsoft' | 'none'. Optional. The name of a well-known Microsoft policy. If no configuration file or list of tools is provided, the policy may instruct MSDO which tools to run. Default: azuredevops.
111-
# categories: string. Optional. A comma-separated list of analyzer categories to run. Values: 'code', 'artifacts', 'IaC', 'containers'. Example: 'IaC, containers'. Defaults to all.
112-
# languages: string. Optional. A comma-separated list of languages to analyze. Example: 'javascript,typescript'. Defaults to all.
113-
# tools: string. Optional. A comma-separated list of analyzer tools to run. Values: 'bandit', 'binskim', 'eslint', 'templateanalyzer', 'terrascan', 'trivy'.
114-
# break: boolean. Optional. If true, will fail this build step if any error level results are found. Default: false.
115-
# publish: boolean. Optional. If true, will publish the output SARIF results file to the chosen pipeline artifact. Default: true.
116-
# artifactName: string. Optional. The name of the pipeline artifact to publish the SARIF result file to. Default: CodeAnalysisLogs*.
117-
107+
# inputs:
108+
# command: 'run' | 'pre-job' | 'post-job'. Optional. The command to run. Default: run
109+
# config: string. Optional. A file path to an MSDO configuration file ('*.gdnconfig').
110+
# policy: 'azuredevops' | 'microsoft' | 'none'. Optional. The name of a well-known Microsoft policy. If no configuration file or list of tools is provided, the policy may instruct MSDO which tools to run. Default: azuredevops.
111+
# categories: string. Optional. A comma-separated list of analyzer categories to run. Values: 'code', 'artifacts', 'IaC', 'containers'. Example: 'IaC, containers'. Defaults to all.
112+
# languages: string. Optional. A comma-separated list of languages to analyze. Example: 'javascript,typescript'. Defaults to all.
113+
# tools: string. Optional. A comma-separated list of analyzer tools to run. Values: 'bandit', 'binskim', 'eslint', 'templateanalyzer', 'terrascan', 'trivy'.
114+
# break: boolean. Optional. If true, will fail this build step if any error level results are found. Default: false.
115+
# publish: boolean. Optional. If true, will publish the output SARIF results file to the chosen pipeline artifact. Default: true.
116+
# artifactName: string. Optional. The name of the pipeline artifact to publish the SARIF result file to. Default: CodeAnalysisLogs*.
117+
118118
```
119119
120120
> [!NOTE]
@@ -174,4 +174,4 @@ relatedContent:
174174

175175

176176
# Learn more about [DevOps Security in Defender for Cloud](defender-for-devops-introduction.md).
177-
# Learn how to [connect your Azure DevOps Organizations](quickstart-onboard-devops.md) to Defender for Cloud.
177+
# Learn how to [connect your Azure DevOps Organizations](quickstart-onboard-devops.md) to Defender for Cloud.

0 commit comments

Comments
 (0)