From f7b87ebc78f93311cf68df90b79fa02cf726dfd2 Mon Sep 17 00:00:00 2001 From: DrIOS <58635327+DrIOSX@users.noreply.github.com> Date: Sat, 8 Jun 2024 14:25:00 -0500 Subject: [PATCH] test: update workflow --- .github/workflows/powershell.yml | 19 +++++++++++++++++-- 1 file changed, 17 insertions(+), 2 deletions(-) diff --git a/.github/workflows/powershell.yml b/.github/workflows/powershell.yml index 94c9bc1..200e585 100644 --- a/.github/workflows/powershell.yml +++ b/.github/workflows/powershell.yml @@ -36,10 +36,25 @@ jobs: with: # Check https://github.com/microsoft/action-psscriptanalyzer for more info about the options. # The below set up runs PSScriptAnalyzer to your entire repository and runs some basic security rules. - path: .\ + path: | + .\source\Classes + .\source\helper + .\source\Private + .\source\Public + .\source\tests recurse: true # Include your own basic security rules. Removing this option will run all the rules - includeRule: '"PSAvoidGlobalAliases", "PSAvoidUsingConvertToSecureStringWithPlainText"' + includeRule: | + "PSAvoidGlobalAliases", + "PSAvoidUsingConvertToSecureStringWithPlainText", + "PSAvoidUsingPlainTextForPassword", + "PSAvoidUsingInvokeExpression", + "PSUseApprovedVerbs", + "PSAvoidUsingPositionalParameters", + "PSAvoidUsingEmptyCatchBlock", + "PSAvoidUsingDeprecatedManifestFields", + "PSAvoidUsingUserNameAndPasswordParams", + "PSAvoidUsingCmdletAliases" output: results.sarif # Upload the SARIF file generated in the previous step