You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/azure-devops-extension.yml
+12-12Lines changed: 12 additions & 12 deletions
Original file line number
Diff line number
Diff line change
@@ -104,17 +104,17 @@ procedureSection:
104
104
steps:
105
105
- task: MicrosoftSecurityDevOps@1
106
106
displayName: 'Microsoft Security DevOps'
107
-
inputs:
108
-
# command: 'run' | 'pre-job' | 'post-job'. Optional. The command to run. Default: run
109
-
# config: string. Optional. A file path to an MSDO configuration file ('*.gdnconfig').
110
-
# policy: 'azuredevops' | 'microsoft' | 'none'. Optional. The name of a well-known Microsoft policy. If no configuration file or list of tools is provided, the policy may instruct MSDO which tools to run. Default: azuredevops.
111
-
# categories: string. Optional. A comma-separated list of analyzer categories to run. Values: 'code', 'artifacts', 'IaC', 'containers'. Example: 'IaC, containers'. Defaults to all.
112
-
# languages: string. Optional. A comma-separated list of languages to analyze. Example: 'javascript,typescript'. Defaults to all.
113
-
# tools: string. Optional. A comma-separated list of analyzer tools to run. Values: 'bandit', 'binskim', 'eslint', 'templateanalyzer', 'terrascan', 'trivy'.
114
-
# break: boolean. Optional. If true, will fail this build step if any error level results are found. Default: false.
115
-
# publish: boolean. Optional. If true, will publish the output SARIF results file to the chosen pipeline artifact. Default: true.
116
-
# artifactName: string. Optional. The name of the pipeline artifact to publish the SARIF result file to. Default: CodeAnalysisLogs*.
117
-
107
+
# inputs:
108
+
# command: 'run' | 'pre-job' | 'post-job'. Optional. The command to run. Default: run
109
+
# config: string. Optional. A file path to an MSDO configuration file ('*.gdnconfig').
110
+
# policy: 'azuredevops' | 'microsoft' | 'none'. Optional. The name of a well-known Microsoft policy. If no configuration file or list of tools is provided, the policy may instruct MSDO which tools to run. Default: azuredevops.
111
+
# categories: string. Optional. A comma-separated list of analyzer categories to run. Values: 'code', 'artifacts', 'IaC', 'containers'. Example: 'IaC, containers'. Defaults to all.
112
+
# languages: string. Optional. A comma-separated list of languages to analyze. Example: 'javascript,typescript'. Defaults to all.
113
+
# tools: string. Optional. A comma-separated list of analyzer tools to run. Values: 'bandit', 'binskim', 'eslint', 'templateanalyzer', 'terrascan', 'trivy'.
114
+
# break: boolean. Optional. If true, will fail this build step if any error level results are found. Default: false.
115
+
# publish: boolean. Optional. If true, will publish the output SARIF results file to the chosen pipeline artifact. Default: true.
116
+
# artifactName: string. Optional. The name of the pipeline artifact to publish the SARIF result file to. Default: CodeAnalysisLogs*.
117
+
118
118
```
119
119
120
120
> [!NOTE]
@@ -174,4 +174,4 @@ relatedContent:
174
174
175
175
176
176
# Learn more about [DevOps Security in Defender for Cloud](defender-for-devops-introduction.md).
177
-
# Learn how to [connect your Azure DevOps Organizations](quickstart-onboard-devops.md) to Defender for Cloud.
177
+
# Learn how to [connect your Azure DevOps Organizations](quickstart-onboard-devops.md) to Defender for Cloud.
0 commit comments