From 0569fd98cc36fd33988411b08f8a9925b4fcdd8c Mon Sep 17 00:00:00 2001 From: DrIOS <58635327+DrIOSX@users.noreply.github.com> Date: Sat, 8 Jun 2024 14:36:41 -0500 Subject: [PATCH] test: update workflow --- .github/workflows/powershell.yml | 20 +++----------------- 1 file changed, 3 insertions(+), 17 deletions(-) diff --git a/.github/workflows/powershell.yml b/.github/workflows/powershell.yml index 200e585..0b02f5e 100644 --- a/.github/workflows/powershell.yml +++ b/.github/workflows/powershell.yml @@ -36,25 +36,11 @@ jobs: with: # Check https://github.com/microsoft/action-psscriptanalyzer for more info about the options. # The below set up runs PSScriptAnalyzer to your entire repository and runs some basic security rules. - path: | - .\source\Classes - .\source\helper - .\source\Private - .\source\Public - .\source\tests + path: .\source recurse: true # Include your own basic security rules. Removing this option will run all the rules - includeRule: | - "PSAvoidGlobalAliases", - "PSAvoidUsingConvertToSecureStringWithPlainText", - "PSAvoidUsingPlainTextForPassword", - "PSAvoidUsingInvokeExpression", - "PSUseApprovedVerbs", - "PSAvoidUsingPositionalParameters", - "PSAvoidUsingEmptyCatchBlock", - "PSAvoidUsingDeprecatedManifestFields", - "PSAvoidUsingUserNameAndPasswordParams", - "PSAvoidUsingCmdletAliases" + includeRule: '"PSAvoidGlobalAliases", "PSAvoidUsingConvertToSecureStringWithPlainText", "PSAvoidUsingPlainTextForPassword", "PSAvoidUsingInvokeExpression", "PSUseApprovedVerbs", "PSAvoidUsingPositionalParameters", "PSAvoidUsingEmptyCatchBlock", "PSAvoidUsingDeprecatedManifestFields", "PSAvoidUsingUserNameAndPasswordParams", "PSAvoidUsingCmdletAliases"' + output: results.sarif # Upload the SARIF file generated in the previous step