diff --git a/.github/workflows/powershell.yml b/.github/workflows/powershell.yml index 200e585..0b02f5e 100644 --- a/.github/workflows/powershell.yml +++ b/.github/workflows/powershell.yml @@ -36,25 +36,11 @@ jobs: with: # Check https://github.com/microsoft/action-psscriptanalyzer for more info about the options. # The below set up runs PSScriptAnalyzer to your entire repository and runs some basic security rules. - path: | - .\source\Classes - .\source\helper - .\source\Private - .\source\Public - .\source\tests + path: .\source recurse: true # Include your own basic security rules. Removing this option will run all the rules - includeRule: | - "PSAvoidGlobalAliases", - "PSAvoidUsingConvertToSecureStringWithPlainText", - "PSAvoidUsingPlainTextForPassword", - "PSAvoidUsingInvokeExpression", - "PSUseApprovedVerbs", - "PSAvoidUsingPositionalParameters", - "PSAvoidUsingEmptyCatchBlock", - "PSAvoidUsingDeprecatedManifestFields", - "PSAvoidUsingUserNameAndPasswordParams", - "PSAvoidUsingCmdletAliases" + includeRule: '"PSAvoidGlobalAliases", "PSAvoidUsingConvertToSecureStringWithPlainText", "PSAvoidUsingPlainTextForPassword", "PSAvoidUsingInvokeExpression", "PSUseApprovedVerbs", "PSAvoidUsingPositionalParameters", "PSAvoidUsingEmptyCatchBlock", "PSAvoidUsingDeprecatedManifestFields", "PSAvoidUsingUserNameAndPasswordParams", "PSAvoidUsingCmdletAliases"' + output: results.sarif # Upload the SARIF file generated in the previous step