diff --git a/README.md b/README.md index 3671c57..2190cca 100644 --- a/README.md +++ b/README.md @@ -51,7 +51,9 @@ The following sample shows how the templates can be included in your release YAM sourceScanPath: '$(Build.SourcesDirectory)' # credscan suppressionsFile: '' - # TermCheck + # TermCheck AKA PoliCheck + targetArgument: '$(Build.SourcesDirectory)' + optionsUEPATH: '' optionsRulesDBPath: '' optionsFTPath: '' # tsa-upload @@ -60,6 +62,8 @@ The following sample shows how the templates can be included in your release YAM APIScan: false # set to false when not using Windows APIs. ``` +For “TermCheck” see the [wiki](https://www.1eswiki.com/wiki/PoliCheck_Build_Task). + ## ESRP Signing Template Overview ** Requires on-boarding, see the wiki in the internal PowerShell Maintainers teams channel ** @@ -184,7 +188,7 @@ This example signs `pkg` files recursively, using minimatch. ``` ### ESRP custom signing JSON example -1. Set the build variable ESRP_TEMPLATE_CUSTOM_JSON to your desired ESRP JSON string. +1. Set the build variable `ESRP_TEMPLATE_CUSTOM_JSON` to your desired ESRP JSON string. 2. Call EsrpSign.yml@ComplianceRepo with certificateId: "" and useCustomEsrpJson: true. ```yaml @@ -299,4 +303,4 @@ This example uses a custom ESRP malware scanning (Azure DevOps) service name. **\*.dll scanningService: 'FactoryOrchestratorScanning' -``` \ No newline at end of file +``` diff --git a/assembly-module-compliance.yml b/assembly-module-compliance.yml index bbf8a07..2c957d7 100644 --- a/assembly-module-compliance.yml +++ b/assembly-module-compliance.yml @@ -11,6 +11,8 @@ parameters: # credscan suppressionsFile: '' # TermCheck + targetArgument: '$(Build.SourcesDirectory)' + optionsUEPATH: '' optionsRulesDBPath: '' optionsFTPath: '' # tsa-upload @@ -45,6 +47,8 @@ steps: - template: template-compliance/TermCheck.yml parameters: + targetArgument: ${{ parameters.targetArgument }} + optionsUEPATH: ${{ parameters.optionsUEPATH }} optionsRulesDBPath: ${{ parameters.optionsRulesDBPath }} optionsFTPath: ${{ parameters.optionsFTPath }} diff --git a/script-module-compliance.yml b/script-module-compliance.yml index c188333..0ed4154 100644 --- a/script-module-compliance.yml +++ b/script-module-compliance.yml @@ -4,6 +4,8 @@ parameters: # credscan suppressionsFile: '' # TermCheck + targetArgument: '$(Build.SourcesDirectory)' + optionsUEPATH: '' optionsRulesDBPath: '' optionsFTPath: '' # tsa-upload @@ -26,6 +28,8 @@ steps: - template: template-compliance/TermCheck.yml parameters: + targetArgument: ${{ parameters.targetArgument }} + optionsUEPATH: ${{ parameters.optionsUEPATH }} optionsRulesDBPath: ${{ parameters.optionsRulesDBPath }} optionsFTPath: ${{ parameters.optionsFTPath }} diff --git a/template-compliance/TermCheck.yml b/template-compliance/TermCheck.yml index a5c39f6..548456d 100644 --- a/template-compliance/TermCheck.yml +++ b/template-compliance/TermCheck.yml @@ -1,4 +1,6 @@ parameters: + targetArgument: '$(Build.SourcesDirectory)' + optionsUEPATH: '' optionsRulesDBPath: '' optionsFTPath: '' @@ -7,11 +9,12 @@ steps: displayName: 'Run TermCheck' inputs: targetType: F + targetArgument: ${{ parameters.targetArgument }} optionsFC: 0 - optionsXS: 0 optionsPE: '1|2|3|4' optionsHMENABLE: 0 + optionsUEPATH: ${{ parameters.optionsUEPATH }} optionsRulesDBPath: ${{ parameters.optionsRulesDBPath }} optionsFTPATH: ${{ parameters.optionsFTPath }} toolVersion: Latest - continueOnError: true \ No newline at end of file + continueOnError: true