Skip to content

Commit eca11aa

Browse files
authored
Merge pull request #186967 from TerryLanfear/sec-220131
update
2 parents a872e2d + ef62c0d commit eca11aa

6 files changed

+18
-18
lines changed

articles/security/develop/security-code-analysis-customize.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: This article describes customizing the tasks in the Microsoft Secur
55
author: sukhans
66
manager: sukhans
77
ms.author: terrylan
8-
ms.date: 03/22/2021
8+
ms.date: 01/31/2022
99
ms.topic: article
1010
ms.service: security
1111
services: azure
@@ -18,7 +18,7 @@ ms.workload: na
1818
# Configure and customize the build tasks
1919

2020
> [!Note]
21-
> Effective March 1, 2022, the Microsoft Security Code Analysis (MSCA) extension will be retired. Existing MSCA customers will retain their access to MSCA through March 1, 2022. Please refer to the [OWASP Source Code Analysis Tools](https://owasp.org/www-community/Source_Code_Analysis_Tools) for alternative options in Azure DevOps. For customers planning to migrate to GitHub, you can check out [GitHub Advanced Security](https://docs.github.com/github/getting-started-with-github/about-github-advanced-security).
21+
> Effective July 1, 2022, the Microsoft Security Code Analysis (MSCA) extension will be retired. Existing MSCA customers will retain their access to MSCA through July 1, 2022. Please refer to the [OWASP Source Code Analysis Tools](https://owasp.org/www-community/Source_Code_Analysis_Tools) for alternative options in Azure DevOps. For customers planning to migrate to GitHub, you can check out [GitHub Advanced Security](https://docs.github.com/github/getting-started-with-github/about-github-advanced-security).
2222
2323
This article describes in detail the configuration options available in each of the build tasks. The article starts with the tasks for security code analysis tools. It ends with the post-processing tasks.
2424

articles/security/develop/security-code-analysis-faq.yml

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ metadata:
55
author: sukhans
66
manager: sukhans
77
ms.author: terrylan
8-
ms.date: 03/22/2021
8+
ms.date: 01/31/2022
99
ms.topic: article
1010
ms.service: security
1111
services: azure
@@ -17,7 +17,7 @@ metadata:
1717
title: Frequently asked questions | Azure
1818
summary: |
1919
> [!Note]
20-
> Effective March 1, 2022, the Microsoft Security Code Analysis (MSCA) extension will be retired. Existing MSCA customers will retain their access to MSCA through March 1, 2022. Please refer to the [OWASP Source Code Analysis Tools](https://owasp.org/www-community/Source_Code_Analysis_Tools) for alternative options in Azure DevOps. For customers planning to migrate to GitHub, you can check out [GitHub Advanced Security](https://docs.github.com/github/getting-started-with-github/about-github-advanced-security).
20+
> Effective July 1, 2022, the Microsoft Security Code Analysis (MSCA) extension will be retired. Existing MSCA customers will retain their access to MSCA through July 1, 2022. Refer to the [OWASP Source Code Analysis Tools](https://owasp.org/www-community/Source_Code_Analysis_Tools) for alternative options in Azure DevOps. For customers planning to migrate to GitHub, you can check out [GitHub Advanced Security](https://docs.github.com/github/getting-started-with-github/about-github-advanced-security).
2121
2222
Got questions? Check out the following FAQ for more information.
2323
@@ -42,21 +42,21 @@ sections:
4242
- question: |
4343
Can I break my build when results are found?
4444
answer: |
45-
Yes. You can introduce a build break when any tool reports an issue or problem in its log file. Just add the Post-Analysis build task, and select the checkbox for any tool for which you want to break the build.
45+
Yes. You can introduce a build break when any tool reports an issue or problem in its log file. Add the Post-Analysis build task, and select the checkbox for any tool for which you want to break the build.
4646
4747
In the UI of the Post-Analysis task, you can choose to break the build when any tool reports either errors only or both errors and warnings.
4848
4949
- question: |
5050
How do the command-line arguments in Azure DevOps differ from those arguments in the standalone desktop tools?
5151
answer: |
52-
For the most part, the Azure DevOps build tasks are direct wrappers around the command-line arguments of the security tools. You can pass as arguments to a build task anything you normally pass to a command-line tool.
52+
Usually, the Azure DevOps build tasks are direct wrappers around the command-line arguments of the security tools. You can pass as arguments to a build task anything you normally pass to a command-line tool.
5353
5454
Noticeable differences:
5555
5656
- Tools run from the source folder of the agent $(Build.SourcesDirectory) or from %BUILD_SOURCESDIRECTORY%. An example is C:\agent\_work\1\s.
5757
- Paths in the arguments can be relative to the root of the source directory previously listed. Paths can also be absolute. You get absolute paths either by using Azure DevOps Build Variables or by running an on-premises agent with known deployment locations of local resources.
5858
- Tools automatically provide an output file path or folder. If you provide an output location for a build task, that location is replaced with a path to our well-known location of logs on the build agent
59-
- Some additional command-line arguments are changed for some tools. One example is the addition or removal of options that ensure no GUI is launched.
59+
- Some other command-line arguments are changed for some tools. One example is the addition or removal of options that ensure no GUI is launched.
6060
6161
- question: |
6262
Can I run a build task like Credential Scanner across multiple repositories in an Azure DevOps Build?
@@ -215,7 +215,7 @@ sections:
215215
216216
"Error: The project was restored using Microsoft.NETCore.App version *x.x.x*, but with current settings, version *y.y.y* would be used instead. To resolve this issue, make sure the same settings are used for restore and for subsequent operations such as build or publish. Typically this issue can occur if the RuntimeIdentifier property is set during build or publish but not during restore."
217217
218-
Because Roslyn Analyzers tasks run as part of compilation, the source tree on the build machine needs to be in a buildable state.
218+
Because Roslyn Analyzers tasks run as part of compilation, the source tree on the build machine must be in a buildable state.
219219
220220
A step between your main build and Roslyn Analyzers steps might have put the source tree into a state that prevents building. This extra step is probably **dotnet.exe publish**. Try duplicating the step that does a NuGet restoration just before the Roslyn Analyzers step. This duplicated step might put the source tree back in a buildable state.
221221
@@ -227,7 +227,7 @@ sections:
227227
228228
Ensure your compiler supports Roslyn Analyzers. Running the command **csc.exe /version** should report a version value of 2.6 or later.
229229
230-
Sometimes a .csproj file can override the build machine's Visual Studio installation by referencing a package from Microsoft.Net.Compilers. If you don't intend to use a specific version of the compiler, remove references to Microsoft.Net.Compilers. Otherwise, make sure the version of the referenced package is also 2.6 or later.
230+
Sometimes a .csproj file can override the build machine's Visual Studio installation by referencing a package from Microsoft.Net.Compilers. If you don't intend to use a specific version of the compiler, remove references to Microsoft.Net.Compilers. Otherwise, make sure that the version of the referenced package is also 2.6 or later.
231231
232232
Try to get the error-log path, which is specified in the **csc.exe /errorlog** option. The option and path appear in the log for the Roslyn Analyzers build task. They might look something like **/errorlog:F:\ts-services-123\_work\456\s\Some\Project\Code\Code.csproj.sarif**
233233
@@ -237,7 +237,7 @@ sections:
237237
238238
#### MSBuild and VSBuild logs aren't found
239239
240-
The Roslyn Analyzers build task needs to query Azure DevOps for the MSBuild log from the MSBuild build task. If the analyzer task runs immediately after the MSBuild task, the log won't yet be available. Place other tasks between the MSBuild task and the Roslyn Analyzers task. Examples of other tasks include BinSkim and Anti-Malware Scanner.
240+
The Roslyn Analyzers build task must query Azure DevOps for the MSBuild log from the MSBuild build task. If the analyzer task runs immediately after the MSBuild task, the log won't yet be available. Place other tasks between the MSBuild task and the Roslyn Analyzers task. Examples of other tasks include BinSkim and Anti-Malware Scanner.
241241
242242
additionalContent: |
243243

articles/security/develop/security-code-analysis-onboard.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to onboard and install the Microsoft Security Code Analys
44
author: sukhans
55
manager: sukhans
66
ms.author: terrylan
7-
ms.date: 03/22/2021
7+
ms.date: 01/31/2022
88
ms.topic: article
99
ms.service: security
1010
services: azure
@@ -17,7 +17,7 @@ ms.workload: na
1717
# Onboarding and installing
1818

1919
> [!Note]
20-
> Effective March 1, 2022, the Microsoft Security Code Analysis (MSCA) extension will be retired. Existing MSCA customers will retain their access to MSCA through March 1, 2022. Please refer to the [OWASP Source Code Analysis Tools](https://owasp.org/www-community/Source_Code_Analysis_Tools) for alternative options in Azure DevOps. For customers planning to migrate to GitHub, you can check out [GitHub Advanced Security](https://docs.github.com/github/getting-started-with-github/about-github-advanced-security).
20+
> Effective July 1, 2022, the Microsoft Security Code Analysis (MSCA) extension will be retired. Existing MSCA customers will retain their access to MSCA through July 1, 2022. Please refer to the [OWASP Source Code Analysis Tools](https://owasp.org/www-community/Source_Code_Analysis_Tools) for alternative options in Azure DevOps. For customers planning to migrate to GitHub, you can check out [GitHub Advanced Security](https://docs.github.com/github/getting-started-with-github/about-github-advanced-security).
2121
2222
Prerequisites to getting started with Microsoft Security Code Analysis:
2323

articles/security/develop/security-code-analysis-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about the Microsoft Security Code Analysis extension. With th
44
author: sukhans
55
manager: sukhans
66
ms.author: terrylan
7-
ms.date: 03/22/2021
7+
ms.date: 01/31/2022
88
ms.topic: article
99
ms.service: security
1010
services: azure
@@ -16,7 +16,7 @@ ms.workload: na
1616
# About Microsoft Security Code Analysis
1717

1818
> [!Note]
19-
> Effective March 1, 2022, the Microsoft Security Code Analysis (MSCA) extension will be retired. Existing MSCA customers will retain their access to MSCA through March 1, 2022. Please refer to the [OWASP Source Code Analysis Tools](https://owasp.org/www-community/Source_Code_Analysis_Tools) for alternative options in Azure DevOps. For customers planning to migrate to GitHub, you can check out [GitHub Advanced Security](https://docs.github.com/github/getting-started-with-github/about-github-advanced-security).
19+
> Effective July 1, 2022, the Microsoft Security Code Analysis (MSCA) extension will be retired. Existing MSCA customers will retain their access to MSCA through July 1, 2022. Please refer to the [OWASP Source Code Analysis Tools](https://owasp.org/www-community/Source_Code_Analysis_Tools) for alternative options in Azure DevOps. For customers planning to migrate to GitHub, you can check out [GitHub Advanced Security](https://docs.github.com/github/getting-started-with-github/about-github-advanced-security).
2020
2121
With the Microsoft Security Code Analysis extension, teams can add security code analysis to their Azure DevOps continuous integration and delivery (CI/CD) pipelines. This analysis is recommended by the [Secure Development Lifecycle (SDL)](https://www.microsoft.com/securityengineering/sdl/practices) experts at Microsoft.
2222

articles/security/develop/security-code-analysis-releases.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article describes upcoming releases for the Microsoft Security
44
author: sukhans
55
manager: sukhans
66
ms.author: terrylan
7-
ms.date: 03/22/2021
7+
ms.date: 01/31/2022
88
ms.topic: article
99
ms.service: security
1010
services: azure
@@ -17,7 +17,7 @@ ms.workload: na
1717
# Microsoft Security Code Analysis releases and roadmap
1818

1919
> [!Note]
20-
> Effective March 1, 2022, the Microsoft Security Code Analysis (MSCA) extension will be retired. Existing MSCA customers will retain their access to MSCA through March 1, 2022. Please refer to the [OWASP Source Code Analysis Tools](https://owasp.org/www-community/Source_Code_Analysis_Tools) for alternative options in Azure DevOps. For customers planning to migrate to GitHub, you can check out [GitHub Advanced Security](https://docs.github.com/github/getting-started-with-github/about-github-advanced-security).
20+
> Effective July 1, 2022, the Microsoft Security Code Analysis (MSCA) extension will be retired. Existing MSCA customers will retain their access to MSCA through July 1, 2022. Please refer to the [OWASP Source Code Analysis Tools](https://owasp.org/www-community/Source_Code_Analysis_Tools) for alternative options in Azure DevOps. For customers planning to migrate to GitHub, you can check out [GitHub Advanced Security](https://docs.github.com/github/getting-started-with-github/about-github-advanced-security).
2121
2222
Microsoft Security Code Analysis team in partnership with Developer Support is proud to announce recent and upcoming enhancements to our MSCA extension.
2323

articles/security/develop/yaml-configuration.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article describes lists YAML configuration options for customi
44
author: sukhans
55
manager: sukhans
66
ms.author: terrylan
7-
ms.date: 03/22/2021
7+
ms.date: 01/31/2022
88
ms.topic: article
99
ms.service: security
1010
services: azure
@@ -16,7 +16,7 @@ ms.workload: na
1616
# YAML configuration options to customize the build tasks
1717

1818
> [!Note]
19-
> Effective March 1, 2022, the Microsoft Security Code Analysis (MSCA) extension will be retired. Existing MSCA customers will retain their access to MSCA through March 1, 2022. Please refer to the [OWASP Source Code Analysis Tools](https://owasp.org/www-community/Source_Code_Analysis_Tools) for alternative options in Azure DevOps. For customers planning to migrate to GitHub, you can check out [GitHub Advanced Security](https://docs.github.com/github/getting-started-with-github/about-github-advanced-security).
19+
> Effective July 1, 2022, the Microsoft Security Code Analysis (MSCA) extension will be retired. Existing MSCA customers will retain their access to MSCA through July 1, 2022. Please refer to the [OWASP Source Code Analysis Tools](https://owasp.org/www-community/Source_Code_Analysis_Tools) for alternative options in Azure DevOps. For customers planning to migrate to GitHub, you can check out [GitHub Advanced Security](https://docs.github.com/github/getting-started-with-github/about-github-advanced-security).
2020
2121
This article lists all YAML configuration options available in each of the build tasks. The article starts with the tasks for security code analysis tools. It ends with the post-processing tasks.
2222

0 commit comments

Comments
 (0)