Fortinet black logo
22.2.0

Azure DevOps

Azure DevOps

Paste the following code segment in the azure-pipelines.yml file for a SAST scan.

trigger:
— main
pool:
vmImage: ubuntu-latest

steps:
–task: Bash@3
displayName: Install_Run_SAST
inputs:
targetType: 'inline'
script: |
docker pull registry.fortidevsec.forticloud.com/fdevsec_sast:latest
docker run --rm --mount type=bind,source="$PWD",target=/scan registry.fortidevsec.forticloud.com/fdevsec_sast:latest

Paste the following code segment in the azure-pipelines.yml file for a DAST scan.

trigger:
— main
pool:
vmImage: ubuntu-latest

steps:
– task: Bash@3
displayName: Install_Run_DAST
inputs:
targetType: 'inline'
script: |
docker pull registry.fortidevsec.forticloud.com/fdevsec_dast:latest
docker run --rm --mount type=bind,source="$PWD",target=/scan registry.fortidevsec.forticloud.com/fdevsec_dast:latest

Azure DevOps

Paste the following code segment in the azure-pipelines.yml file for a SAST scan.

trigger:
— main
pool:
vmImage: ubuntu-latest

steps:
–task: Bash@3
displayName: Install_Run_SAST
inputs:
targetType: 'inline'
script: |
docker pull registry.fortidevsec.forticloud.com/fdevsec_sast:latest
docker run --rm --mount type=bind,source="$PWD",target=/scan registry.fortidevsec.forticloud.com/fdevsec_sast:latest

Paste the following code segment in the azure-pipelines.yml file for a DAST scan.

trigger:
— main
pool:
vmImage: ubuntu-latest

steps:
– task: Bash@3
displayName: Install_Run_DAST
inputs:
targetType: 'inline'
script: |
docker pull registry.fortidevsec.forticloud.com/fdevsec_dast:latest
docker run --rm --mount type=bind,source="$PWD",target=/scan registry.fortidevsec.forticloud.com/fdevsec_dast:latest