Fortinet white logo
Fortinet white logo

Azure DevOps

Azure DevOps

Following is a sample code segment that can be configured in azure-pipelines.yml file.

Note: Make sure to update the parameters in the sample code according to your environment before using it.

trigger:
    - main
pool:
    vmImage: ubuntu-latest

 

steps:
    -task: Bash@3
        displayName: Install_Run_FortiDAST
        inputs:
            targetType: 'inline'
            script: |
            export EMAIL=account_email LICENSE_SERIAL=your_serial_number ASSET_TOKEN=your_asset_token SCANURL=target_asset_url SCANTYPE=1 ASSET=asset_UUID
            env | grep -E "EMAIL|LICENSE_SERIAL|ASSET_TOKEN|SCANURL|SCANTYPE|ASSET" > /tmp/env
            docker pull registry.fortidast.forticloud.com/dastdevopsproxy:latest
            docker run --rm --env-file /tmp/env --network=host registry.fortidast.forticloud.com/dastdevopsproxy:latest

Azure DevOps

Azure DevOps

Following is a sample code segment that can be configured in azure-pipelines.yml file.

Note: Make sure to update the parameters in the sample code according to your environment before using it.

trigger:
    - main
pool:
    vmImage: ubuntu-latest

 

steps:
    -task: Bash@3
        displayName: Install_Run_FortiDAST
        inputs:
            targetType: 'inline'
            script: |
            export EMAIL=account_email LICENSE_SERIAL=your_serial_number ASSET_TOKEN=your_asset_token SCANURL=target_asset_url SCANTYPE=1 ASSET=asset_UUID
            env | grep -E "EMAIL|LICENSE_SERIAL|ASSET_TOKEN|SCANURL|SCANTYPE|ASSET" > /tmp/env
            docker pull registry.fortidast.forticloud.com/dastdevopsproxy:latest
            docker run --rm --env-file /tmp/env --network=host registry.fortidast.forticloud.com/dastdevopsproxy:latest