diff --git a/eng/common/pipelines/templates/steps/policheck.yml b/eng/common/pipelines/templates/steps/policheck.yml index 8c112b72..76d57d47 100644 --- a/eng/common/pipelines/templates/steps/policheck.yml +++ b/eng/common/pipelines/templates/steps/policheck.yml @@ -2,17 +2,20 @@ parameters: ExclusionDataBaseFileName: '' TargetDirectory: '' PublishAnalysisLogs: false - PoliCheckBlobSAS: "$(azuresdk-policheck-blob-SAS)" ExclusionFilePath: "$(Build.SourcesDirectory)/eng/guardian-tools/policheck/PolicheckExclusions.xml" steps: - - pwsh: | - azcopy copy "https://azuresdkartifacts.blob.core.windows.net/policheck/${{ parameters.ExclusionDataBaseFileName }}.mdb?${{ parameters.PoliCheckBlobSAS }}" ` - "$(Build.BinariesDirectory)" - - # Output downloaded files - Get-ChildItem $(Build.BinariesDirectory) | Select-Object -Property Mode,Length,Name - displayName: 'Download PoliCheck Exclusion Database' + - task: AzurePowerShell@5 + displayName: 'Download Policheck Exclusion Database' + inputs: + azureSubscription: 'Azure SDK Artifacts' + ScriptType: 'InlineScript' + azurePowerShellVersion: LatestVersion + pwsh: true + Inline: | + azcopy copy "https://azuresdkartifacts.blob.core.windows.net/policheck/${{ parameters.ExclusionDataBaseFileName }}.mdb" "$(Build.BinariesDirectory)" + env: + AZCOPY_AUTO_LOGIN_TYPE: 'PSCRED' - task: securedevelopmentteam.vss-secure-development-tools.build-task-policheck.PoliCheck@2 displayName: 'Run PoliCheck' @@ -36,4 +39,4 @@ steps: - ${{ if eq(parameters.PublishAnalysisLogs, 'true') }}: - task: securedevelopmentteam.vss-secure-development-tools.build-task-publishsecurityanalysislogs.PublishSecurityAnalysisLogs@3 - displayName: 'Publish Security Analysis Logs' + displayName: 'Publish Security Analysis Logs' \ No newline at end of file