Skip to content

Commit b77e16a

Browse files
authored
v1.7.1 - readme and small fixes (#53)
* Add node16 support * DevOps Release v1.7.0 * Release v1.7.0 * Fix build directory. * Onboard to github packages * v1.7.0-beta.6 - decompress nuget server responses * v1.7.0 - sign commit * v1.7.1 - remove dependency requirement from readmes * v1.7.1 - fix groupName advanced * v1.7.1 - update wording * Fix 'templateanalyzer'
1 parent 7b34ca0 commit b77e16a

9 files changed

Lines changed: 32 additions & 51 deletions

File tree

CHANGELOG.md

Lines changed: 0 additions & 12 deletions
This file was deleted.

README.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,6 @@ Add the `MicrosoftSecurityDevOps` build task to your pipeline's yaml:
1717
```yaml
1818
steps:
1919
- task: MicrosoftSecurityDevOps@1
20-
displayName: 'Run Microsoft Security DevOps'
2120
```
2221
2322
# Tools
Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
{
2+
"publisherName": "debug",
3+
"publisher": "ms-secdevops-test",
4+
"version": "1.7.1.0",
5+
"mapping": {
6+
"MicrosoftSecurityDevOps": "505fbc36-f364-4b95-b1c4-7a3fd78a6559"
7+
},
8+
"extensionId": "microsoft-security-devops-azdevops-debug",
9+
"count": 0
10+
}

src/MicrosoftSecurityDevOps/v1/task.json

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@
1212
"version": {
1313
"Major": 1,
1414
"Minor": 7,
15-
"Patch": 0
15+
"Patch": 1
1616
},
1717
"preview": true,
1818
"minimumAgentVersion": "1.83.0",
@@ -50,23 +50,23 @@
5050
"type": "string",
5151
"required": false,
5252
"helpMarkDown": "A comma separated list of analyzer categories to run. Values: `secrets`, `code`, `artifacts`, `IaC`, `containers`. Example: `IaC,secrets`. Defaults to all.",
53-
"group": "advanced"
53+
"groupName": "advanced"
5454
},
5555
{
5656
"name": "languages",
5757
"label": "Languages",
5858
"type": "string",
5959
"required": false,
6060
"helpMarkDown": "A comma separated list of languages to analyze. Example: `javascript,typescript`. Defaults to all.",
61-
"group": "advanced"
61+
"groupName": "advanced"
6262
},
6363
{
6464
"name": "tools",
6565
"label": "Tools",
6666
"type": "string",
6767
"required": false,
68-
"helpMarkDown": "A comma separated list of analyzer tools to run. Values: `bandit`, `binskim`, `eslint`, `template-analyzer`, `terrascan`, `trivy`.",
69-
"group": "advanced"
68+
"helpMarkDown": "A comma separated list of analyzer tools to run. Values: `bandit`, `binskim`, `eslint`, `templateanalyzer`, `terrascan`, `trivy`.",
69+
"groupName": "advanced"
7070
},
7171
{
7272
"name": "break",
@@ -75,7 +75,7 @@
7575
"required": false,
7676
"helpMarkDown": "If checked, will fail this build step if any error level results are found.",
7777
"defaultValue": "false",
78-
"group": "advanced"
78+
"groupName": "advanced"
7979
},
8080
{
8181
"name": "publish",
@@ -84,16 +84,16 @@
8484
"required": false,
8585
"helpMarkDown": "If checked, will publish the output SARIF results file to the chosen pipeline artifact. Default: true",
8686
"defaultValue": "true",
87-
"group": "advanced"
87+
"groupName": "advanced"
8888
},
8989
{
9090
"name": "artifactName",
9191
"label": "Artifact Name",
9292
"type": "string",
9393
"required": false,
94-
"helpMarkDown": "The name of the pipeline artifact to publish the SARIF result file to. Default: CodeAnalysisLogs</br>If left as \"CodeAnalysisLogs\", it integrates with the [SARIF Scans Tab](https://marketplace.visualstudio.com/items?itemName=sariftools.scans) viewing experience.",
94+
"helpMarkDown": "The name of the pipeline artifact to publish the SARIF result file to. Default: CodeAnalysisLogs</br>\"CodeAnalysisLogs\" is required for integration with [Defender for DevOps](https://aka.ms/defender-for-devops).</br>If left as \"CodeAnalysisLogs\", it integrates with the [SARIF Scans Tab](https://marketplace.visualstudio.com/items?itemName=sariftools.scans) viewing experience.",
9595
"defaultValue": "CodeAnalysisLogs",
96-
"group": "advanced"
96+
"groupName": "advanced"
9797
}
9898
],
9999
"instanceNameFormat": "Run Microsoft Defender for DevOps",

src/extension-manifest-debug.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
"manifestVersion": 1,
33
"id": "microsoft-security-devops-azdevops",
44
"name": "Microsoft Security DevOps (Debug)",
5-
"version": "1.7.0.0",
5+
"version": "1.7.1.0",
66
"publisher": "ms-securitydevops",
77
"description": "Build tasks for performing security analysis.",
88
"public": false,

src/extension-manifest.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
"manifestVersion": 1,
33
"id": "microsoft-security-devops-azdevops",
44
"name": "Microsoft Security DevOps",
5-
"version": "1.7.0",
5+
"version": "1.7.1",
66
"publisher": "ms-securitydevops",
77
"description": "Build tasks for performing security analysis.",
88
"public": true,

src/extension-readme.md

Lines changed: 0 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -10,29 +10,13 @@ An extension for Azure DevOps that contributes a build task to run the [Microsof
1010
* Normalized processing of results into the SARIF format
1111
* Build breaks and more
1212

13-
## Dependencies
14-
15-
* The `MicrosoftSecurityDevOps` build task depends on [.NET 6](https://dotnet.microsoft.com/en-us/download/dotnet/6.0).
16-
* The CredScan analyzer depends on [.NET 3.1](https://dotnet.microsoft.com/en-us/download/dotnet/3.1).
17-
18-
Microsoft-hosted build agents ship with an included list of software. To see if your agent image comes with these pre-installed, [see here](https://learn.microsoft.com/en-us/azure/devops/pipelines/agents/hosted?view=azure-devops&tabs=yaml#software).
19-
20-
To install these dependencies at runtime, run the following tasks before the `MicrosoftSecurityDevOps` task.
21-
```yaml
22-
- task: UseDotNet@2
23-
displayName: 'Use dotnet 6.0'
24-
inputs:
25-
version: 6.0.x
26-
```
27-
2813
## Basic
2914

3015
Add the `MicrosoftSecurityDevOps` build task to your pipeline's yaml:
3116

3217
```yaml
3318
steps:
3419
- task: MicrosoftSecurityDevOps@1
35-
displayName: 'Run Microsoft Security DevOps'
3620
```
3721
3822
The `publish` input option is defaulted to true. If true, this will publish a [SARIF formatted](https://aka.ms/sarif) results file as a build artifact to `CodeAnalysisLogs/msdo.sarif`.

src/package-lock.json

Lines changed: 9 additions & 9 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

src/package.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
{
22
"name": "microsoft-security-devops-azdevops",
3-
"version": "1.7.0",
3+
"version": "1.7.1",
44
"description": "Microsoft Security DevOps for Azure DevOps.",
55
"author": "Microsoft Corporation",
66
"license": "MIT",
77
"repository": "https://github.com/microsoft/microsoft-security-devops-azdevops",
88
"dependencies": {
9-
"@microsoft/security-devops-azdevops-task-lib": "1.7.0-beta.7",
9+
"@microsoft/security-devops-azdevops-task-lib": "1.7.0",
1010
"azure-pipelines-task-lib": "4.3.1",
1111
"azure-pipelines-tool-lib": "2.0.4"
1212
},

0 commit comments

Comments
 (0)