Skip to content
| Marketplace
Sign in
Azure DevOps>Azure Pipelines>Finite State Binary Scan
Finite State Binary Scan

Finite State Binary Scan

Finite State

|
20 installs
| (0) | Free
The Finite State binary-scan Azure extension allows you to easily integrate the Finite State Platform into your CI/CD pipelines.
Get it free

Finite State binary-scan Extension for Azure DevOps

Finite state logo finitestate.io

Description

The Finite State binary-scan Extension allows you to easily integrate the Finite State Platform into your Azure Devops Pipeline.

Following the steps below will:

  • Upload the file to the Finite State platform
  • Create a new version of the configured asset
  • Conduct a Quick Scan binary analysis on the uploaded file
  • Associate the results to the asset version

By default, the asset version will be assigned the existing values for Business Unit and Created By User. If you need to change these, you can provide the IDs for them.

Inputs

parameter description required type default
finiteStateClientId Finite State API client ID true string
finiteStateSecret Finite State API secret true string
finiteStateOrganizationContext The Organization-Context should have been provided to you by your Finite State representative and looks like xxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx true string
assetId Asset ID for the asset that the new asset version will belong to true string
version The name of the asset version that will be created true string
filePath Local path of the file to be uploaded true string
quickScan Boolean that uploads the file for quick scan when true. Defaults to true (Quick Scan). For details about the contents of the Quick Scan vs. the Full Scan, please see the API documentation. false boolean true
automaticComment Defaults to false. If it is true, it will generate a comment in the PR with the link to the Asset version URL in the Finite State Platform. false boolean false
businessUnitId (optional) ID of the business unit that the asset version will belong to. If not provided, the asset version will adopt the existing business unit of the asset. false string
createdByUserId (optional) ID of the user to be recorded as the 'Created By User' on the asset version. If not provided, the version will adopt the existing value of the asset. false string
productId (optional) ID of the product that the asset version will belong to. If not provided, the existing product for the asset will be used, if applicable. false string
artifactDescription (optional) Description of the artifact. If not provided, the default is "Firmware Binary". false string

Set Up Workflow

To start using this Extension, you must install it using Azure DevOps Markeplace.

After it is installed, you can use it in your pipeline by finding the task in the right Tasks panel:

Task install

You can customize the input parameters, as you see in the next image:

Task configuration

Although you can write some values directly in the input fields, we recommend storing some sensitive values as secrets, rather than hardcoding them directly in the pipeline yml file. At minimum, the following values should be stored as secrets:

  • Finite State Client ID,
  • Finite State Secret ID and
  • Finite State Context organization

Secret values definition

Generate a Comment on a PR with the Link to the Uploaded Binary File

If you want the extension to automatically generate a PR comment with the link to the results on the Finite State Platform, make sure to give permissions to the azure pipeline token System.AccessToken. Then, grant the necessary permissions to the associated Azure Token by going to Project Settings > Repositories > Security tab as you can see in the follow image:

Give token permissions

This allows the action to post the comment in the PR when the automaticComment is checked (true). After this step, you will get a comment in the PR with a link that points to the binary uploaded in the Finite State Platform:

Azure PR automatic comment

Build Policy

You will need to configure a build policy over your main branch in order to auto start a build process. This way, when you make a modification to a branch that has a PR associated with it, the pipeline will be executed automatically and generate a comment using the task configured.

To set up a policy, you need to go to Repositories > Branches. Then click on the three point in your main branch and select Branch policies in the dropdown menu:

Azure Branch policies

In the popup, save the settings as follow:

Azure build policy

After that, you will see a configuration option similar to this:

Azure main policy enabled

Going forward, each commit to a branch associated with a PR that is requested to be merge to the main branch will trigger the pipeline execution automatically and execute the Finite State task:

Azure auto trigger on PR

The extension will show some information/details about the result of the execution:

Azure auto trigger on PR

Action Debugging

All details pertaining to the execution of the extension will be recorded. You can review this information in the workflow execution logs, which is a helpful starting point if you encounter any errors during the extension's run.

If you have any errors, we recommend to enabling the System diagnostics whe you run the pipeline:

System diagnostics enabled

Example of the output when system diagnostics is enabled:

System diagnostics results

  • Contact us
  • Jobs
  • Privacy
  • Manage cookies
  • Terms of use
  • Trademarks
© 2025 Microsoft