You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/security/develop/security-code-analysis-customize.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ description: This article describes customizing the tasks in the Microsoft Secur
5
5
author: sukhans
6
6
manager: sukhans
7
7
ms.author: terrylan
8
-
ms.date: 03/22/2021
8
+
ms.date: 01/31/2022
9
9
ms.topic: article
10
10
ms.service: security
11
11
services: azure
@@ -18,7 +18,7 @@ ms.workload: na
18
18
# Configure and customize the build tasks
19
19
20
20
> [!Note]
21
-
> Effective March 1, 2022, the Microsoft Security Code Analysis (MSCA) extension will be retired. Existing MSCA customers will retain their access to MSCA through March 1, 2022. Please refer to the [OWASP Source Code Analysis Tools](https://owasp.org/www-community/Source_Code_Analysis_Tools) for alternative options in Azure DevOps. For customers planning to migrate to GitHub, you can check out [GitHub Advanced Security](https://docs.github.com/github/getting-started-with-github/about-github-advanced-security).
21
+
> Effective July 1, 2022, the Microsoft Security Code Analysis (MSCA) extension will be retired. Existing MSCA customers will retain their access to MSCA through July 1, 2022. Please refer to the [OWASP Source Code Analysis Tools](https://owasp.org/www-community/Source_Code_Analysis_Tools) for alternative options in Azure DevOps. For customers planning to migrate to GitHub, you can check out [GitHub Advanced Security](https://docs.github.com/github/getting-started-with-github/about-github-advanced-security).
22
22
23
23
This article describes in detail the configuration options available in each of the build tasks. The article starts with the tasks for security code analysis tools. It ends with the post-processing tasks.
Copy file name to clipboardExpand all lines: articles/security/develop/security-code-analysis-faq.yml
+8-8Lines changed: 8 additions & 8 deletions
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ metadata:
5
5
author: sukhans
6
6
manager: sukhans
7
7
ms.author: terrylan
8
-
ms.date: 03/22/2021
8
+
ms.date: 01/31/2022
9
9
ms.topic: article
10
10
ms.service: security
11
11
services: azure
@@ -17,7 +17,7 @@ metadata:
17
17
title: Frequently asked questions | Azure
18
18
summary: |
19
19
> [!Note]
20
-
> Effective March 1, 2022, the Microsoft Security Code Analysis (MSCA) extension will be retired. Existing MSCA customers will retain their access to MSCA through March 1, 2022. Please refer to the [OWASP Source Code Analysis Tools](https://owasp.org/www-community/Source_Code_Analysis_Tools) for alternative options in Azure DevOps. For customers planning to migrate to GitHub, you can check out [GitHub Advanced Security](https://docs.github.com/github/getting-started-with-github/about-github-advanced-security).
20
+
> Effective July 1, 2022, the Microsoft Security Code Analysis (MSCA) extension will be retired. Existing MSCA customers will retain their access to MSCA through July 1, 2022. Refer to the [OWASP Source Code Analysis Tools](https://owasp.org/www-community/Source_Code_Analysis_Tools) for alternative options in Azure DevOps. For customers planning to migrate to GitHub, you can check out [GitHub Advanced Security](https://docs.github.com/github/getting-started-with-github/about-github-advanced-security).
21
21
22
22
Got questions? Check out the following FAQ for more information.
23
23
@@ -42,21 +42,21 @@ sections:
42
42
- question: |
43
43
Can I break my build when results are found?
44
44
answer: |
45
-
Yes. You can introduce a build break when any tool reports an issue or problem in its log file. Just add the Post-Analysis build task, and select the checkbox for any tool for which you want to break the build.
45
+
Yes. You can introduce a build break when any tool reports an issue or problem in its log file. Add the Post-Analysis build task, and select the checkbox for any tool for which you want to break the build.
46
46
47
47
In the UI of the Post-Analysis task, you can choose to break the build when any tool reports either errors only or both errors and warnings.
48
48
49
49
- question: |
50
50
How do the command-line arguments in Azure DevOps differ from those arguments in the standalone desktop tools?
51
51
answer: |
52
-
For the most part, the Azure DevOps build tasks are direct wrappers around the command-line arguments of the security tools. You can pass as arguments to a build task anything you normally pass to a command-line tool.
52
+
Usually, the Azure DevOps build tasks are direct wrappers around the command-line arguments of the security tools. You can pass as arguments to a build task anything you normally pass to a command-line tool.
53
53
54
54
Noticeable differences:
55
55
56
56
- Tools run from the source folder of the agent $(Build.SourcesDirectory) or from %BUILD_SOURCESDIRECTORY%. An example is C:\agent\_work\1\s.
57
57
- Paths in the arguments can be relative to the root of the source directory previously listed. Paths can also be absolute. You get absolute paths either by using Azure DevOps Build Variables or by running an on-premises agent with known deployment locations of local resources.
58
58
- Tools automatically provide an output file path or folder. If you provide an output location for a build task, that location is replaced with a path to our well-known location of logs on the build agent
59
-
- Some additional command-line arguments are changed for some tools. One example is the addition or removal of options that ensure no GUI is launched.
59
+
- Some other command-line arguments are changed for some tools. One example is the addition or removal of options that ensure no GUI is launched.
60
60
61
61
- question: |
62
62
Can I run a build task like Credential Scanner across multiple repositories in an Azure DevOps Build?
@@ -215,7 +215,7 @@ sections:
215
215
216
216
"Error: The project was restored using Microsoft.NETCore.App version *x.x.x*, but with current settings, version *y.y.y* would be used instead. To resolve this issue, make sure the same settings are used for restore and for subsequent operations such as build or publish. Typically this issue can occur if the RuntimeIdentifier property is set during build or publish but not during restore."
217
217
218
-
Because Roslyn Analyzers tasks run as part of compilation, the source tree on the build machine needs to be in a buildable state.
218
+
Because Roslyn Analyzers tasks run as part of compilation, the source tree on the build machine must be in a buildable state.
219
219
220
220
A step between your main build and Roslyn Analyzers steps might have put the source tree into a state that prevents building. This extra step is probably **dotnet.exe publish**. Try duplicating the step that does a NuGet restoration just before the Roslyn Analyzers step. This duplicated step might put the source tree back in a buildable state.
221
221
@@ -227,7 +227,7 @@ sections:
227
227
228
228
Ensure your compiler supports Roslyn Analyzers. Running the command **csc.exe /version** should report a version value of 2.6 or later.
229
229
230
-
Sometimes a .csproj file can override the build machine's Visual Studio installation by referencing a package from Microsoft.Net.Compilers. If you don't intend to use a specific version of the compiler, remove references to Microsoft.Net.Compilers. Otherwise, make sure the version of the referenced package is also 2.6 or later.
230
+
Sometimes a .csproj file can override the build machine's Visual Studio installation by referencing a package from Microsoft.Net.Compilers. If you don't intend to use a specific version of the compiler, remove references to Microsoft.Net.Compilers. Otherwise, make sure that the version of the referenced package is also 2.6 or later.
231
231
232
232
Try to get the error-log path, which is specified in the **csc.exe /errorlog** option. The option and path appear in the log for the Roslyn Analyzers build task. They might look something like **/errorlog:F:\ts-services-123\_work\456\s\Some\Project\Code\Code.csproj.sarif**
233
233
@@ -237,7 +237,7 @@ sections:
237
237
238
238
#### MSBuild and VSBuild logs aren't found
239
239
240
-
The Roslyn Analyzers build task needs to query Azure DevOps for the MSBuild log from the MSBuild build task. If the analyzer task runs immediately after the MSBuild task, the log won't yet be available. Place other tasks between the MSBuild task and the Roslyn Analyzers task. Examples of other tasks include BinSkim and Anti-Malware Scanner.
240
+
The Roslyn Analyzers build task must query Azure DevOps for the MSBuild log from the MSBuild build task. If the analyzer task runs immediately after the MSBuild task, the log won't yet be available. Place other tasks between the MSBuild task and the Roslyn Analyzers task. Examples of other tasks include BinSkim and Anti-Malware Scanner.
Copy file name to clipboardExpand all lines: articles/security/develop/security-code-analysis-onboard.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn how to onboard and install the Microsoft Security Code Analys
4
4
author: sukhans
5
5
manager: sukhans
6
6
ms.author: terrylan
7
-
ms.date: 03/22/2021
7
+
ms.date: 01/31/2022
8
8
ms.topic: article
9
9
ms.service: security
10
10
services: azure
@@ -17,7 +17,7 @@ ms.workload: na
17
17
# Onboarding and installing
18
18
19
19
> [!Note]
20
-
> Effective March 1, 2022, the Microsoft Security Code Analysis (MSCA) extension will be retired. Existing MSCA customers will retain their access to MSCA through March 1, 2022. Please refer to the [OWASP Source Code Analysis Tools](https://owasp.org/www-community/Source_Code_Analysis_Tools) for alternative options in Azure DevOps. For customers planning to migrate to GitHub, you can check out [GitHub Advanced Security](https://docs.github.com/github/getting-started-with-github/about-github-advanced-security).
20
+
> Effective July 1, 2022, the Microsoft Security Code Analysis (MSCA) extension will be retired. Existing MSCA customers will retain their access to MSCA through July 1, 2022. Please refer to the [OWASP Source Code Analysis Tools](https://owasp.org/www-community/Source_Code_Analysis_Tools) for alternative options in Azure DevOps. For customers planning to migrate to GitHub, you can check out [GitHub Advanced Security](https://docs.github.com/github/getting-started-with-github/about-github-advanced-security).
21
21
22
22
Prerequisites to getting started with Microsoft Security Code Analysis:
Copy file name to clipboardExpand all lines: articles/security/develop/security-code-analysis-overview.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn about the Microsoft Security Code Analysis extension. With th
4
4
author: sukhans
5
5
manager: sukhans
6
6
ms.author: terrylan
7
-
ms.date: 03/22/2021
7
+
ms.date: 01/31/2022
8
8
ms.topic: article
9
9
ms.service: security
10
10
services: azure
@@ -16,7 +16,7 @@ ms.workload: na
16
16
# About Microsoft Security Code Analysis
17
17
18
18
> [!Note]
19
-
> Effective March 1, 2022, the Microsoft Security Code Analysis (MSCA) extension will be retired. Existing MSCA customers will retain their access to MSCA through March 1, 2022. Please refer to the [OWASP Source Code Analysis Tools](https://owasp.org/www-community/Source_Code_Analysis_Tools) for alternative options in Azure DevOps. For customers planning to migrate to GitHub, you can check out [GitHub Advanced Security](https://docs.github.com/github/getting-started-with-github/about-github-advanced-security).
19
+
> Effective July 1, 2022, the Microsoft Security Code Analysis (MSCA) extension will be retired. Existing MSCA customers will retain their access to MSCA through July 1, 2022. Please refer to the [OWASP Source Code Analysis Tools](https://owasp.org/www-community/Source_Code_Analysis_Tools) for alternative options in Azure DevOps. For customers planning to migrate to GitHub, you can check out [GitHub Advanced Security](https://docs.github.com/github/getting-started-with-github/about-github-advanced-security).
20
20
21
21
With the Microsoft Security Code Analysis extension, teams can add security code analysis to their Azure DevOps continuous integration and delivery (CI/CD) pipelines. This analysis is recommended by the [Secure Development Lifecycle (SDL)](https://www.microsoft.com/securityengineering/sdl/practices) experts at Microsoft.
Copy file name to clipboardExpand all lines: articles/security/develop/security-code-analysis-releases.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: This article describes upcoming releases for the Microsoft Security
4
4
author: sukhans
5
5
manager: sukhans
6
6
ms.author: terrylan
7
-
ms.date: 03/22/2021
7
+
ms.date: 01/31/2022
8
8
ms.topic: article
9
9
ms.service: security
10
10
services: azure
@@ -17,7 +17,7 @@ ms.workload: na
17
17
# Microsoft Security Code Analysis releases and roadmap
18
18
19
19
> [!Note]
20
-
> Effective March 1, 2022, the Microsoft Security Code Analysis (MSCA) extension will be retired. Existing MSCA customers will retain their access to MSCA through March 1, 2022. Please refer to the [OWASP Source Code Analysis Tools](https://owasp.org/www-community/Source_Code_Analysis_Tools) for alternative options in Azure DevOps. For customers planning to migrate to GitHub, you can check out [GitHub Advanced Security](https://docs.github.com/github/getting-started-with-github/about-github-advanced-security).
20
+
> Effective July 1, 2022, the Microsoft Security Code Analysis (MSCA) extension will be retired. Existing MSCA customers will retain their access to MSCA through July 1, 2022. Please refer to the [OWASP Source Code Analysis Tools](https://owasp.org/www-community/Source_Code_Analysis_Tools) for alternative options in Azure DevOps. For customers planning to migrate to GitHub, you can check out [GitHub Advanced Security](https://docs.github.com/github/getting-started-with-github/about-github-advanced-security).
21
21
22
22
Microsoft Security Code Analysis team in partnership with Developer Support is proud to announce recent and upcoming enhancements to our MSCA extension.
Copy file name to clipboardExpand all lines: articles/security/develop/yaml-configuration.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: This article describes lists YAML configuration options for customi
4
4
author: sukhans
5
5
manager: sukhans
6
6
ms.author: terrylan
7
-
ms.date: 03/22/2021
7
+
ms.date: 01/31/2022
8
8
ms.topic: article
9
9
ms.service: security
10
10
services: azure
@@ -16,7 +16,7 @@ ms.workload: na
16
16
# YAML configuration options to customize the build tasks
17
17
18
18
> [!Note]
19
-
> Effective March 1, 2022, the Microsoft Security Code Analysis (MSCA) extension will be retired. Existing MSCA customers will retain their access to MSCA through March 1, 2022. Please refer to the [OWASP Source Code Analysis Tools](https://owasp.org/www-community/Source_Code_Analysis_Tools) for alternative options in Azure DevOps. For customers planning to migrate to GitHub, you can check out [GitHub Advanced Security](https://docs.github.com/github/getting-started-with-github/about-github-advanced-security).
19
+
> Effective July 1, 2022, the Microsoft Security Code Analysis (MSCA) extension will be retired. Existing MSCA customers will retain their access to MSCA through July 1, 2022. Please refer to the [OWASP Source Code Analysis Tools](https://owasp.org/www-community/Source_Code_Analysis_Tools) for alternative options in Azure DevOps. For customers planning to migrate to GitHub, you can check out [GitHub Advanced Security](https://docs.github.com/github/getting-started-with-github/about-github-advanced-security).
20
20
21
21
This article lists all YAML configuration options available in each of the build tasks. The article starts with the tasks for security code analysis tools. It ends with the post-processing tasks.
0 commit comments