|
| 1 | +parameters: |
| 2 | + configuration: "" |
| 3 | + framework: "" |
| 4 | + |
| 5 | +steps: |
| 6 | + |
| 7 | +- task: securedevelopmentteam.vss-secure-development-tools.build-task-antimalware.AntiMalware@3 |
| 8 | + displayName: 'Run Defender Scan' |
| 9 | + |
| 10 | +- task: securedevelopmentteam.vss-secure-development-tools.build-task-credscan.CredScan@2 |
| 11 | + displayName: 'Run CredScan' |
| 12 | + inputs: |
| 13 | + debugMode: false |
| 14 | + continueOnError: true |
| 15 | + |
| 16 | +- task: securedevelopmentteam.vss-secure-development-tools.build-task-binskim.BinSkim@3 |
| 17 | + displayName: 'Run BinSkim ' |
| 18 | + inputs: |
| 19 | + InputType: Basic |
| 20 | + AnalyzeTarget: '$(Build.SourcesDirectory)\bin\${{ parameters.configuration }}\PSReadLine\*.dll' |
| 21 | + AnalyzeSymPath: 'SRV*' |
| 22 | + AnalyzeVerbose: true |
| 23 | + AnalyzeHashes: true |
| 24 | + AnalyzeStatistics: true |
| 25 | + continueOnError: true |
| 26 | + |
| 27 | +- task: securedevelopmentteam.vss-secure-development-tools.build-task-policheck.PoliCheck@1 |
| 28 | + displayName: 'Run PoliCheck' |
| 29 | + inputs: |
| 30 | + targetType: F |
| 31 | + optionsFC: 0 |
| 32 | + optionsXS: 0 |
| 33 | + optionsPE: '1|2|3|4' |
| 34 | + optionsHMENABLE: 0 |
| 35 | +# optionsRulesDBPath: '$(Build.SourcesDirectory)\tools\terms\PowerShell-Terms-Rules.mdb' |
| 36 | +# optionsFTPATH: '$(Build.SourcesDirectory)\tools\terms\FileTypeSet.xml' |
| 37 | + toolVersion: 5.8.2.1 |
| 38 | + continueOnError: true |
| 39 | + |
| 40 | +- task: securedevelopmentteam.vss-secure-development-tools.build-task-apiscan.APIScan@1 |
| 41 | + displayName: 'Run APIScan' |
| 42 | + inputs: |
| 43 | + softwareFolder: '$(Build.SourcesDirectory)' |
| 44 | + softwareName: PSReadLine |
| 45 | + softwareVersionNum: '$(ModuleVersion)' |
| 46 | + isLargeApp: false |
| 47 | + preserveTempFiles: true |
| 48 | + continueOnError: true |
| 49 | + |
| 50 | +- task: securedevelopmentteam.vss-secure-development-tools.build-task-publishsecurityanalysislogs.PublishSecurityAnalysisLogs@2 |
| 51 | + displayName: 'Publish Security Analysis Logs to Build Artifacts' |
| 52 | + continueOnError: true |
| 53 | + |
| 54 | +- task: securedevelopmentteam.vss-secure-development-tools.build-task-uploadtotsa.TSAUpload@1 |
| 55 | + displayName: 'TSA upload to Codebase: PSReadLine_201912 Stamp: Azure' |
| 56 | + inputs: |
| 57 | + tsaStamp: Azure |
| 58 | + codeBaseName: PSReadLine_201912 |
| 59 | + tsaVersion: TsaV2 |
| 60 | + uploadFortifySCA: false |
| 61 | + uploadFxCop: false |
| 62 | + uploadModernCop: false |
| 63 | + uploadPREfast: false |
| 64 | + uploadRoslyn: false |
| 65 | + uploadTSLint: false |
| 66 | + uploadAPIScan: true |
| 67 | + |
| 68 | +- task: securedevelopmentteam.vss-secure-development-tools.build-task-report.SdtReport@1 |
| 69 | + displayName: 'Create Security Analysis Report' |
| 70 | + inputs: |
| 71 | + TsvFile: false |
| 72 | + APIScan: true |
| 73 | + BinSkim: true |
| 74 | + CredScan: true |
| 75 | + PoliCheck: true |
| 76 | + PoliCheckBreakOn: Severity2Above |
| 77 | + |
| 78 | +- task: ms.vss-governance-buildtask.governance-build-task-component-detection.ComponentGovernanceComponentDetection@0 |
| 79 | + displayName: 'Component Detection' |
| 80 | + inputs: |
| 81 | + sourceScanPath: '$(Build.SourcesDirectory)' |
| 82 | + snapshotForceEnabled: true |
0 commit comments