en-AU/about_PSRule_Options.help.txt
TOPIC
about_psrule_options SHORT DESCRIPTION Describes additional options that can be used during rule execution. LONG DESCRIPTION PSRule lets you use options when calling cmdlets such as `Invoke-PSRule` and `Test-PSRuleTarget` to change how rules are processed. This topic describes what options are available, when to and how to use them. The following workspace options are available for use: - Baseline.Group - Binding.Field - Binding.IgnoreCase - Binding.NameSeparator - Binding.PreferTargetInfo - Binding.TargetName - Binding.TargetType - Binding.UseQualifiedName - Convention.Include - Execution.AliasReference - Execution.Break - Execution.DuplicateResourceId - Execution.HashAlgorithm - Execution.LanguageMode - Execution.InvariantCulture - Execution.InitialSessionState - Execution.RestrictScriptSource - Execution.RuleInconclusive - Execution.SuppressionGroupExpired - Execution.UnprocessedObject - Format - Include.Module - Include.Path - Input.FileObjects - Input.Format - Input.IgnoreGitPath - Input.IgnoreObjectSource - Input.IgnoreRepositoryCommon - Input.IgnoreUnchangedPath - Input.ObjectPath - Input.PathIgnore - Input.TargetType - Logging.LimitDebug - Logging.LimitVerbose - Logging.RuleFail - Logging.RulePass - Output.As - Output.Banner - Output.Culture - Output.Encoding - Output.Footer - Output.Format - Output.JobSummaryPath - Output.JsonIndent - Output.Outcome - Output.Path - Output.SarifProblemsOnly - Output.Style - Repository.BaseRef - Repository.Url - Requires - Suppression Additionally the following baseline options can be included: - Configuration - Override.Level - Rule.Baseline - Rule.Include - Rule.IncludeLocal - Rule.Exclude - Rule.Tag See about_PSRule_Baseline for more information on baseline options. Options can be used with the following PSRule cmdlets: - Export-PSRuleBaseline - Get-PSRule - Get-PSRuleBaseline - Get-PSRuleHelp - Invoke-PSRule - Test-PSRuleTarget Each of these cmdlets support: - Using the `-Option` parameter with an object created with the `New-PSRuleOption` cmdlet. See cmdlet help for syntax and examples. - Using the `-Option` parameter with a hashtable object. - Using the `-Option` parameter with a YAML file path. When using a hashtable object `@{}`, one or more options can be specified as keys using a dotted notation. For example: $option = @{ 'Output.Format' = 'Yaml' }; Invoke-PSRule -Path . -Option $option; Invoke-PSRule -Path . -Option @{ 'Output.Format' = 'Yaml' }; The above example shows how the `Output.Format` option as a hashtable key can be used. Continue reading for a full list of options and how each can be used. Alternatively, options can be stored in a YAML formatted file and loaded from disk. Storing options as YAML allows different configurations to be loaded in a repeatable way instead of having to create an options object each time. Options are stored as YAML properties using a lower camel case naming convention, for example: output: format: Yaml The `Set-PSRuleOption` cmdlet can be used to set options stored in YAML or the YAML file can be manually edited. Set-PSRuleOption -OutputFormat Yaml; By default, PSRule will automatically look for a default YAML options file in the current working directory. Alternatively, you can specify a specific file path. For example: Invoke-PSRule -Option '.\myconfig.yml'; New-PSRuleOption -Path '.\myconfig.yaml'; PSRule uses any of the following file names (in order) as the default YAML options file. If more than one of these files exist, the following order will be used to find the first match. - `ps-rule.yaml` - `ps-rule.yml` - `psrule.yaml` - `psrule.yml` We recommend only using lowercase characters as shown above. This is because not all operating systems treat case in the same way. Most options can be set using environment variables. When configuring environment variables we recommend that all capital letters are used. This is because environment variables are case-sensitive on some operating systems. PSRule environment variables use a consistent naming pattern of `PSRULE_<PARENT>_<NAME>`. Where `<PARENT>` is the parent class and `<NAME>` is the specific option. For example: - `Execution.InconclusiveWarning` is configured by `PSRULE_EXECUTION_INCONCLUSIVEWARNING`. - `Input.TargetType` is configured by `PSRULE_INPUT_TARGETTYPE`. - `Output.Format` is configured by `PSRULE_OUTPUT_FORMAT`. When setting environment variables: - Enum values are set by string. For example `PSRULE_OUTPUT_FORMAT` could be set to `Yaml`. Enum values are case-insensitive. - Boolean values are set by `true`, `false`, `1`, or `0`. For example `PSRULE_EXECUTION_INCONCLUSIVEWARNING` could be set to `false`. Boolean values are case-insensitive. - String array values can specify multiple items by using a semi-colon separator. For example `PSRULE_INPUT_TARGETTYPE` could be set to `virtualMachine;virtualNetwork`. BASELINE.GROUP You can use a baseline group to provide a friendly name to an existing baseline. When you run PSRule you can opt to use the baseline group name as an alternative name for the baseline. To indicate a baseline group, prefix the group name with `@` where you would use the name of a baseline. Baseline groups can be specified using: # PowerShell: Using the BaselineGroup parameter $option = New-PSRuleOption -BaselineGroup @{ latest = 'YourBaseline' }; # PowerShell: Using the Baseline.Group hashtable key $option = New-PSRuleOption -Option @{ 'Baseline.Group' = @{ latest = 'YourBaseline' } }; # PowerShell: Using the BaselineGroup parameter to set YAML Set-PSRuleOption -BaselineGroup @{ latest = 'YourBaseline' }; # YAML: Using the baseline/group property baseline: group: latest: YourBaseline # Bash: Using environment variable export PSRULE_BASELINE_GROUP='latest=YourBaseline' # GitHub Actions: Using environment variable env: PSRULE_BASELINE_GROUP: 'latest=YourBaseline' # Azure Pipelines: Using environment variable variables: - name: PSRULE_BASELINE_GROUP value: 'latest=YourBaseline' BINDING.FIELD When an object is passed from the pipeline, PSRule automatically extracts fields from object properties. PSRule provides standard fields such as `TargetName` and `TargetType`. In addition to standard fields, custom fields can be bound. Custom fields are available to rules and included in output. PSRule uses the following logic to determine which property should be used for binding: - By default PSRule will not extract any custom fields. - If custom fields are configured, PSRule will attempt to bind the field. - If none of the configured property names exist, the field will be skipped. - If more then one property name is configured, the order they are specified in the configuration determines precedence. - i.e. The first configured property name will take precedence over the second property name. - By default the property name will be matched ignoring case sensitivity. To use a case sensitive match, configure the Binding.IgnoreCase option. Custom field bindings can be specified using: # PowerShell: Using the BindingField parameter $option = New-PSRuleOption -BindingField @{ id = 'ResourceId', 'AlternativeId' }; # PowerShell: Using the Binding.Field hashtable key $option = New-PSRuleOption -Option @{ 'Binding.Field' = @{ id = 'ResourceId', 'AlternativeId' } }; # PowerShell: Using the BindingField parameter to set YAML Set-PSRuleOption -BindingField @{ id = 'ResourceId', 'AlternativeId' }; # YAML: Using the binding/field property binding: field: id: - ResourceId - AlternativeId BINDING.IGNORECASE When evaluating an object, PSRule extracts a few key properties from the object to help filter rules and display output results. The process of extract these key properties is called binding . The properties that PSRule uses for binding can be customized by providing a order list of alternative properties to use. See `Binding.TargetName` for these options. - By default, custom property binding finds the first matching property by name regardless of case. i.e. `Binding.IgnoreCase` is `true`. - To make custom bindings case sensitive, set the `Binding.IgnoreCase` option to `false`. - Changing this option will affect custom property bindings for both TargetName and TargetType . - Setting this option has no affect on binding defaults or custom scripts. This option can be specified using: # PowerShell: Using the BindingIgnoreCase parameter $option = New-PSRuleOption -BindingIgnoreCase $False; # PowerShell: Using the Binding.IgnoreCase hashtable key $option = New-PSRuleOption -Option @{ 'Binding.IgnoreCase' = $False }; # PowerShell: Using the BindingIgnoreCase parameter to set YAML Set-PSRuleOption -BindingIgnoreCase $False; # YAML: Using the binding/ignoreCase property binding: ignoreCase: false # Bash: Using environment variable export PSRULE_BINDING_IGNORECASE=false # GitHub Actions: Using environment variable env: PSRULE_BINDING_IGNORECASE: false # Azure Pipelines: Using environment variable variables: - name: PSRULE_BINDING_IGNORECASE value: false BINDING.NAMESEPARATOR When an object is passed from the pipeline, PSRule assigns the object a TargetName . TargetName is used in output results to identify one object from another. In cases where different types of objects share the same TargetName , this may become confusing. Using a qualified name, prefixes the TargetName with TargetType . i.e. TargetType/TargetName To use a qualified name, see the `Binding.UseQualifiedName` option. By default, PSRule uses `/` to separate TargetType from TargetName . This option configures the separator that PSRule uses between the two components. This option can be specified using: # PowerShell: Using the BindingNameSeparator parameter $option = New-PSRuleOption -BindingNameSeparator '::'; # PowerShell: Using the Binding.NameSeparator hashtable key $option = New-PSRuleOption -Option @{ 'Binding.NameSeparator' = '::' }; # PowerShell: Using the BindingNameSeparator parameter to set YAML Set-PSRuleOption -BindingNameSeparator '::'; # YAML: Using the binding/nameSeparator property binding: nameSeparator: '::' # Bash: Using environment variable export PSRULE_BINDING_NAMESEPARATOR='::' # GitHub Actions: Using environment variable env: PSRULE_BINDING_NAMESEPARATOR: '::' # Azure Pipelines: Using environment variable variables: - name: PSRULE_BINDING_NAMESEPARATOR value: '::' BINDING.PREFERTARGETINFO Some built-in objects within PSRule perform automatic binding of TargetName and TargetType. These built-in objects provide their own target info. When binding has been configured these values override automatic binding by default. This can occur when the built-in object uses one of the fields specified by the custom configuration. The common occurrences of this are on fields such as `Name` and `FullName` which are widely used. To prefer automatic binding when specified set this option to `$True`. This option can be specified using: # PowerShell: Using the BindingPreferTargetInfo parameter $option = New-PSRuleOption -BindingPreferTargetInfo $True; # PowerShell: Using the Binding.PreferTargetInfo hashtable key $option = New-PSRuleOption -Option @{ 'Binding.PreferTargetInfo' = $True }; # PowerShell: Using the BindingPreferTargetInfo parameter to set YAML Set-PSRuleOption -BindingPreferTargetInfo $True; # YAML: Using the binding/preferTargetInfo property binding: preferTargetInfo: true # Bash: Using environment variable export PSRULE_BINDING_PREFERTARGETINFO=false # GitHub Actions: Using environment variable env: PSRULE_BINDING_PREFERTARGETINFO: false # Azure Pipelines: Using environment variable variables: - name: PSRULE_BINDING_PREFERTARGETINFO value: false BINDING.TARGETNAME When an object is passed from the pipeline, PSRule assigns the object a TargetName . TargetName is used in output results to identify one object from another. Many objects could be passed down the pipeline at the same time, so using a TargetName that is meaningful is important. TargetName is also used for advanced features such as rule suppression. The value that PSRule uses for TargetName is configurable. PSRule uses the following logic to determine what TargetName should be used: - By default PSRule will: - Use `TargetName` or `Name` properties on the object. These property names are case insensitive. - If both `TargetName` and `Name` properties exist, `TargetName` will take precedence over `Name`. - If neither `TargetName` or `Name` properties exist, a hash of the object will be used as TargetName . - The hash algorithm used can be set by the `Execution.HashAlgorithm` option. - If custom TargetName binding properties are configured, the property names specified will override the defaults. - If none of the configured property names exist, PSRule will revert back to `TargetName` then `Name`. - If more then one property name is configured, the order they are specified in the configuration determines precedence. - i.e. The first configured property name will take precedence over the second property name. - By default the property name will be matched ignoring case sensitivity. To use a case sensitive match, configure the Binding.IgnoreCase option. - If a custom TargetName binding function is specified, the function will be evaluated first before any other option. - If the function returns `$Null` then custom properties, `TargetName` and `Name` properties will be used. - The custom binding function is executed outside the PSRule engine, so PSRule keywords and variables will not be available. - Custom binding functions are blocked in constrained language mode is used. See language mode for more information. Custom property names to use for binding can be specified using: # PowerShell: Using the TargetName parameter $option = New-PSRuleOption -TargetName 'ResourceName', 'AlternateName'; # PowerShell: Using the Binding.TargetName hashtable key $option = New-PSRuleOption -Option @{ 'Binding.TargetName' = 'ResourceName', 'AlternateName' }; # PowerShell: Using the TargetName parameter to set YAML Set-PSRuleOption -TargetName 'ResourceName', 'AlternateName'; # YAML: Using the binding/targetName property binding: targetName: - ResourceName - AlternateName # Bash: Using environment variable export PSRULE_BINDING_TARGETNAME='ResourceName;AlternateName' # GitHub Actions: Using environment variable env: PSRULE_BINDING_TARGETNAME: 'ResourceName;AlternateName' # Azure Pipelines: Using environment variable variables: - name: PSRULE_BINDING_TARGETNAME value: 'ResourceName;AlternateName' To specify a custom binding function use: # Create a custom function that returns a TargetName string $bindFn = { param ($TargetObject) $otherName = $TargetObject.PSObject.Properties['OtherName']; if ($Null -eq $otherName) { return $Null } return $otherName.Value; } # Specify the binding function script block code to execute $option = New-PSRuleOption -BindTargetName $bindFn; BINDING.TARGETTYPE When an object is passed from the pipeline, PSRule assigns the object a TargetType . TargetType is used to filter rules based on object type and appears in output results. The value that PSRule uses for TargetType is configurable. PSRule uses the following logic to determine what TargetType should be used: - By default PSRule will: - Use the default type presented by PowerShell from `TypeNames`. i.e. `.PSObject.TypeNames[0]` - If custom TargetType binding properties are configured, the property names specified will override the defaults. - If none of the configured property names exist, PSRule will revert back to the type presented by PowerShell. - If more then one property name is configured, the order they are specified in the configuration determines precedence. - i.e. The first configured property name will take precedence over the second property name. - By default the property name will be matched ignoring case sensitivity. To use a case sensitive match, configure the `Binding.IgnoreCase` option. - If a custom TargetType binding function is specified, the function will be evaluated first before any other option. - If the function returns `$Null` then custom properties, or the type presented by PowerShell will be used in order instead. - The custom binding function is executed outside the PSRule engine, so PSRule keywords and variables will not be available. - Custom binding functions are blocked in constrained language mode is used. See language mode for more information. Custom property names to use for binding can be specified using: # PowerShell: Using the TargetType parameter $option = New-PSRuleOption -TargetType 'ResourceType', 'kind'; # PowerShell: Using the Binding.TargetType hashtable key $option = New-PSRuleOption -Option @{ 'Binding.TargetType' = 'ResourceType', 'kind' }; # PowerShell: Using the TargetType parameter to set YAML Set-PSRuleOption -TargetType 'ResourceType', 'kind'; # YAML: Using the binding/targetType property binding: targetType: - ResourceType - kind # Bash: Using environment variable export PSRULE_BINDING_TARGETTYPE='ResourceType;kind' # GitHub Actions: Using environment variable env: PSRULE_BINDING_TARGETTYPE: 'ResourceType;kind' # Azure Pipelines: Using environment variable variables: - name: PSRULE_BINDING_TARGETTYPE value: 'ResourceType;kind' To specify a custom binding function use: # Create a custom function that returns a TargetType string $bindFn = { param ($TargetObject) $otherType = $TargetObject.PSObject.Properties['OtherType']; if ($otherType -eq $Null) { return $Null } return $otherType.Value; } # Specify the binding function script block code to execute $option = New-PSRuleOption -BindTargetType $bindFn; BINDING.USEQUALIFIEDNAME When an object is passed from the pipeline, PSRule assigns the object a TargetName . TargetName is used in output results to identify one object from another. In cases where different types of objects share the same TargetName , this may become confusing. Using a qualified name, prefixes the TargetName with TargetType . i.e. TargetType/TargetName This option determines if PSRule uses qualified or unqualified names (default). By default, PSRule uses `/` to separate TargetType from TargetName . Set `Binding.NameSeparator` to change. This option can be specified using: # PowerShell: Using the BindingUseQualifiedName parameter $option = New-PSRuleOption -BindingUseQualifiedName $True; # PowerShell: Using the Binding.UseQualifiedName hashtable key $option = New-PSRuleOption -Option @{ 'Binding.UseQualifiedName' = $True }; # PowerShell: Using the BindingUseQualifiedName parameter to set YAML Set-PSRuleOption -BindingUseQualifiedName $True; # YAML: Using the binding/useQualifiedName property binding: useQualifiedName: true # Bash: Using environment variable export PSRULE_BINDING_USEQUALIFIEDNAME=false # GitHub Actions: Using environment variable env: PSRULE_BINDING_USEQUALIFIEDNAME: false # Azure Pipelines: Using environment variable variables: - name: PSRULE_BINDING_USEQUALIFIEDNAME value: false CONFIGURATION Configures a set of baseline configuration values that can be used in rule definitions. Configuration values can be overridden at different scopes. This option can be specified using: # PowerShell: Using the Configuration option with a hashtable $option = New-PSRuleOption -Configuration @{ LOCAL_APPSERVICEMININSTANCECOUNT = 2 }; # YAML: Using the configuration property configuration: LOCAL_APPSERVICEMININSTANCECOUNT: 2 Configuration values can be specified using environment variables. To specify a configuration value, prefix the configuration value with `PSRULE_CONFIGURATION_`. # Bash: Using environment variable export PSRULE_CONFIGURATION_LOCAL_APPSERVICEMININSTANCECOUNT=2 # GitHub Actions: Using environment variable env: PSRULE_CONFIGURATION_LOCAL_APPSERVICEMININSTANCECOUNT: '2' # Azure Pipelines: Using environment variable variables: - name: PSRULE_CONFIGURATION_LOCAL_APPSERVICEMININSTANCECOUNT value: '2' CONVENTION.INCLUDE Specifies conventions to execute when the pipeline run. Conventions are included by name and must be defined within files included in `-Path` or `-Module`. This option can be specified using: # PowerShell: Using the Convention parameter $option = New-PSRuleOption -Convention 'Convention1', 'Convention2'; # PowerShell: Using the Convention.Include hashtable key $option = New-PSRuleOption -Option @{ 'Convention.Include' = $True }; # PowerShell: Using the Convention parameter to set YAML Set-PSRuleOption -Convention 'Convention1', 'Convention2'; # YAML: Using the convention/include property convention: include: - 'Convention1' - 'Convention2' # Bash: Using environment variable export PSRULE_CONVENTION_INCLUDE='Convention1;Convention2' # GitHub Actions: Using environment variable env: PSRULE_CONVENTION_INCLUDE: 'Convention1;Convention2' # Azure Pipelines: Using environment variable variables: - name: PSRULE_CONVENTION_INCLUDE value: 'Convention1;Convention2' EXECUTION.ALIASREFERENCE :octicons-milestone-24: v2.9.0 Determines how to handle when an alias to a resource is used. By default, a warning is generated, however this behavior can be modified by this option. The following preferences are available: - `None` (0) - No preference. Inherits the default of `Warn`. - `Ignore` (1) - Continue to execute silently. - `Warn` (2) - Continue to execute but log a warning. This is the default. - `Error` (3) - Abort and throw an error. - `Debug` (4) - Continue to execute but log a debug message. This option can be specified using: # PowerShell: Using the ExecutionAliasReference parameter $option = New-PSRuleOption -ExecutionAliasReference 'Error'; # PowerShell: Using the Execution.AliasReference hashtable key $option = New-PSRuleOption -Option @{ 'Execution.AliasReference' = 'Error' }; # PowerShell: Using the ExecutionAliasReference parameter to set YAML Set-PSRuleOption -ExecutionAliasReference 'Error'; # YAML: Using the execution/aliasReference property execution: aliasReference: Error # Bash: Using environment variable export PSRULE_EXECUTION_ALIASREFERENCE=Error # GitHub Actions: Using environment variable env: PSRULE_EXECUTION_ALIASREFERENCE: Error # Azure Pipelines: Using environment variable variables: - name: PSRULE_EXECUTION_ALIASREFERENCE value: Error EXECUTION.BREAK :octicons-milestone-24: v3.0.0 Determines the minimum rule severity level that breaks the pipeline. By default, the pipeline will break if a rule of error severity level fails. For this to take effect the rule must execute successfully and return a failure. This does not affect the pipeline if other errors or exceptions occurs. The following preferences are available: - `None` (0) - No preference. Inherits the default of `Error`. - `Never` = (1) - Never break the pipeline if a rule fails regardless of level. The pipeline will still break if other errors occur. - `OnError` = (2) - Break the pipeline if a rule of error severity level fails. This is the default. - `OnWarning` = (3) - Break the pipeline if a rule of warning or error severity level fails. - `OnInformation` = (4) - Break the pipeline if a rule of information, warning, or error severity level fails. This option can be specified using: # PowerShell: Using the Break parameter $option = New-PSRuleOption -ExecutionBreak 'Never'; # PowerShell: Using the Execution.Break hashtable key $option = New-PSRuleOption -Option @{ 'Execution.Break' = 'Never' }; # PowerShell: Using the ExecutionBreak parameter to set YAML Set-PSRuleOption -ExecutionBreak 'Never'; # YAML: Using the execution/break property execution: break: Never # Bash: Using environment variable export PSRULE_EXECUTION_BREAK=Never # GitHub Actions: Using environment variable env: PSRULE_EXECUTION_BREAK: Never # Azure Pipelines: Using environment variable variables: - name: PSRULE_EXECUTION_BREAK value: Never EXECUTION.DUPLICATERESOURCEID :octicons-milestone-24: v2.4.0 Determines how to handle duplicate resources identifiers during execution. A duplicate resource identifier may exist if two resources are defined with the same name, ref, or alias. By default, an error is thrown, however this behavior can be modified by this option. If this option is configured to `Warn` or `Ignore` only the first resource will be used, however PSRule will continue to execute. The following preferences are available: - `None` (0) - No preference. Inherits the default of `Error`. - `Ignore` (1) - Continue to execute silently. - `Warn` (2) - Continue to execute but log a warning. - `Error` (3) - Abort and throw an error. This is the default. - `Debug` (4) - Continue to execute but log a debug message. This option can be specified using: # PowerShell: Using the DuplicateResourceId parameter $option = New-PSRuleOption -DuplicateResourceId 'Warn'; # PowerShell: Using the Execution.DuplicateResourceId hashtable key $option = New-PSRuleOption -Option @{ 'Execution.DuplicateResourceId' = 'Warn' }; # PowerShell: Using the DuplicateResourceId parameter to set YAML Set-PSRuleOption -DuplicateResourceId 'Warn'; # YAML: Using the execution/duplicateResourceId property execution: duplicateResourceId: Warn # Bash: Using environment variable export PSRULE_EXECUTION_DUPLICATERESOURCEID=Warn # GitHub Actions: Using environment variable env: PSRULE_EXECUTION_DUPLICATERESOURCEID: Warn # Azure Pipelines: Using environment variable variables: - name: PSRULE_EXECUTION_DUPLICATERESOURCEID value: Warn EXECUTION.HASHALGORITHM :octicons-milestone-24: v3.0.0 Specifies the hashing algorithm used by the PSRule runtime. This hash algorithm is used when generating a resource identifier for an object that does not have a bound name. By default, the SHA512 algorithm is used. The following algorithms are available for use in PSRule: - `SHA512` - `SHA384` - `SHA256` This option can be specified using: # PowerShell: Using the Execution.HashAlgorithm hashtable key $option = New-PSRuleOption -Option @{ 'Execution.HashAlgorithm' = 'SHA256' }; # YAML: Using the execution/hashAlgorithm property execution: hashAlgorithm: SHA256 # Bash: Using environment variable export PSRULE_EXECUTION_HASHALGORITHM=SHA256 # GitHub Actions: Using environment variable env: PSRULE_EXECUTION_HASHALGORITHM: SHA256 # Azure Pipelines: Using environment variable variables: - name: PSRULE_EXECUTION_HASHALGORITHM value: SHA256 EXECUTION.LANGUAGEMODE Unless PowerShell has been constrained, full language features of PowerShell are available to use within rule definitions. In locked down environments, a reduced set of language features may be desired. When PSRule is executed in an environment configured for Device Guard, only constrained language features are available. The following language modes are available for use in PSRule: - `FullLanguage` - Executes with all language features. This is the default. - `ConstrainedLanguage` - Executes in constrained language mode that restricts the types and methods that can be used. This option can be specified using: # PowerShell: Using the Execution.LanguageMode hashtable key $option = New-PSRuleOption -Option @{ 'Execution.LanguageMode' = 'ConstrainedLanguage' }; # YAML: Using the execution/languageMode property execution: languageMode: ConstrainedLanguage # Bash: Using environment variable export PSRULE_EXECUTION_LANGUAGEMODE=ConstrainedLanguage # GitHub Actions: Using environment variable env: PSRULE_EXECUTION_LANGUAGEMODE: ConstrainedLanguage # Azure Pipelines: Using environment variable variables: - name: PSRULE_EXECUTION_LANGUAGEMODE value: ConstrainedLanguage EXECUTION.INVARIANTCULTURE :octicons-milestone-24: v2.9.0 Determines how to report when an invariant culture is used. By default, a warning is generated, however this behavior can be modified by this option. The following preferences are available: - `None` (0) - No preference. Inherits the default of `Warn`. - `Ignore` (1) - Continue to execute silently. - `Warn` (2) - Continue to execute but log a warning. This is the default. - `Error` (3) - Abort and throw an error. - `Debug` (4) - Continue to execute but log a debug message. This option can be specified using: # PowerShell: Using the ExecutionInvariantCulture parameter $option = New-PSRuleOption -ExecutionInvariantCulture 'Error'; # PowerShell: Using the Execution.InvariantCulture hashtable key $option = New-PSRuleOption -Option @{ 'Execution.InvariantCulture' = 'Error' }; # PowerShell: Using the ExecutionInvariantCulture parameter to set YAML Set-PSRuleOption -ExecutionInvariantCulture 'Error'; # YAML: Using the execution/invariantCulture property execution: invariantCulture: Error # Bash: Using environment variable export PSRULE_EXECUTION_INVARIANTCULTURE=Error # GitHub Actions: Using environment variable env: PSRULE_EXECUTION_INVARIANTCULTURE: Error # Azure Pipelines: Using environment variable variables: - name: PSRULE_EXECUTION_INVARIANTCULTURE value: Error EXECUTION.INITIALSESSIONSTATE :octicons-milestone-24: v2.5.0 Determines how the initial session state for executing PowerShell code is created. The following preferences are available: - `BuiltIn` (0) - Create the initial session state with all built-in cmdlets loaded. This is the default. - `Minimal` (1) - Create the initial session state with only a minimum set of cmdlets loaded. This option can be specified using: # PowerShell: Using the InitialSessionState parameter $option = New-PSRuleOption -InitialSessionState 'Minimal'; # PowerShell: Using the Execution.InitialSessionState hashtable key $option = New-PSRuleOption -Option @{ 'Execution.InitialSessionState' = 'Minimal' }; # PowerShell: Using the InitialSessionState parameter to set YAML Set-PSRuleOption -InitialSessionState 'Minimal'; # YAML: Using the execution/initialSessionState property execution: initialSessionState: Minimal # Bash: Using environment variable export PSRULE_EXECUTION_INITIALSESSIONSTATE=Minimal # GitHub Actions: Using environment variable env: PSRULE_EXECUTION_INITIALSESSIONSTATE: Minimal # Azure Pipelines: Using environment variable variables: - name: PSRULE_EXECUTION_INITIALSESSIONSTATE value: Minimal EXECUTION.RESTRICTSCRIPTSOURCE :octicons-milestone-24: v3.0.0 Configures where to allow PowerShell language features (such as rules and conventions) to run from. In locked down environments, running PowerShell scripts from the workspace may not be allowed. Only run scripts from a trusted source. This option does not affect YAML or JSON based rules and resources. The following script source restrictions are available: - `Unrestricted` - PowerShell language features are allowed from workspace and modules. This is the default. - `ModuleOnly` - PowerShell language features are allowed from loaded modules, but script files within the workspace are ignored. - `DisablePowerShell` - No PowerShell language features are used during PSRule run. When this mode is used, rules and conventions written in PowerShell will not execute. Modules that use PowerShell rules and conventions may not work as expected. This option can be specified using: # PowerShell: Using the RestrictScriptSource parameter $option = New-PSRuleOption -RestrictScriptSource 'ModuleOnly'; # PowerShell: Using the Execution.RestrictScriptSource hashtable key $option = New-PSRuleOption -Option @{ 'Execution.RestrictScriptSource' = 'ModuleOnly' }; # PowerShell: Using the RestrictScriptSource parameter to set YAML Set-PSRuleOption -RestrictScriptSource 'ModuleOnly'; # YAML: Using the execution/restrictScriptSource property execution: restrictScriptSource: ModuleOnly # Bash: Using environment variable export PSRULE_EXECUTION_RESTRICTSCRIPTSOURCE=ModuleOnly # GitHub Actions: Using environment variable env: PSRULE_EXECUTION_RESTRICTSCRIPTSOURCE: ModuleOnly # Azure Pipelines: Using environment variable variables: - name: PSRULE_EXECUTION_RESTRICTSCRIPTSOURCE value: ModuleOnly EXECUTION.RULEINCONCLUSIVE :octicons-milestone-24: v2.9.0 Determines how to handle rules that generate inconclusive results. By default, a warning is generated, however this behavior can be modified by this option. The following preferences are available: - `None` (0) - No preference. Inherits the default of `Warn`. - `Ignore` (1) - Continue to execute silently. - `Warn` (2) - Continue to execute but log a warning. This is the default. - `Error` (3) - Abort and throw an error. - `Debug` (4) - Continue to execute but log a debug message. This option can be specified using: # PowerShell: Using the ExecutionRuleInconclusive parameter $option = New-PSRuleOption -ExecutionRuleInconclusive 'Error'; # PowerShell: Using the Execution.RuleInconclusive hashtable key $option = New-PSRuleOption -Option @{ 'Execution.RuleInconclusive' = 'Error' }; # PowerShell: Using the ExecutionRuleInconclusive parameter to set YAML Set-PSRuleOption -ExecutionRuleInconclusive 'Error'; # YAML: Using the execution/ruleInconclusive property execution: ruleInconclusive: Error # Bash: Using environment variable export PSRULE_EXECUTION_RULEINCONCLUSIVE=Error # GitHub Actions: Using environment variable env: PSRULE_EXECUTION_RULEINCONCLUSIVE: Error # Azure Pipelines: Using environment variable variables: - name: PSRULE_EXECUTION_RULEINCONCLUSIVE value: Error EXECUTION.SUPPRESSIONGROUPEXPIRED :octicons-milestone-24: v2.6.0 Determines how to handle expired suppression groups. Regardless of the value, an expired suppression group will be ignored. By default, a warning is generated, however this behavior can be modified by this option. The following preferences are available: - `None` (0) - No preference. Inherits the default of `Warn`. - `Ignore` (1) - Continue to execute silently. - `Warn` (2) - Continue to execute but log a warning. This is the default. - `Error` (3) - Abort and throw an error. - `Debug` (4) - Continue to execute but log a debug message. This option can be specified using: # PowerShell: Using the SuppressionGroupExpired parameter $option = New-PSRuleOption -SuppressionGroupExpired 'Error'; # PowerShell: Using the Execution.SuppressionGroupExpired hashtable key $option = New-PSRuleOption -Option @{ 'Execution.SuppressionGroupExpired' = 'Error' }; # PowerShell: Using the SuppressionGroupExpired parameter to set YAML Set-PSRuleOption -SuppressionGroupExpired 'Error'; # YAML: Using the execution/suppressionGroupExpired property execution: suppressionGroupExpired: Error # Bash: Using environment variable export PSRULE_EXECUTION_SUPPRESSIONGROUPEXPIRED=Error # GitHub Actions: Using environment variable env: PSRULE_EXECUTION_SUPPRESSIONGROUPEXPIRED: Error # Azure Pipelines: Using environment variable variables: - name: PSRULE_EXECUTION_SUPPRESSIONGROUPEXPIRED value: Error EXECUTION.RULEEXCLUDED :octicons-milestone-24: v2.8.0 Determines how to handle excluded rules. Regardless of the value, excluded rules are ignored. By default, a rule is excluded silently, however this behavior can be modified by this option. The following preferences are available: - `None` (0) - No preference. Inherits the default of `Ignore`. - `Ignore` (1) - Continue to execute silently. This is the default. - `Warn` (2) - Continue to execute but log a warning. - `Error` (3) - Abort and throw an error. - `Debug` (4) - Continue to execute but log a debug message. This option can be specified using: # PowerShell: Using the ExecutionRuleExcluded parameter $option = New-PSRuleOption -ExecutionRuleExcluded 'Warn'; # PowerShell: Using the Execution.RuleExcluded hashtable key $option = New-PSRuleOption -Option @{ 'Execution.RuleExcluded' = 'Warn' }; # PowerShell: Using the ExecutionRuleExcluded parameter to set YAML Set-PSRuleOption -ExecutionRuleExcluded 'Warn'; # YAML: Using the execution/ruleExcluded property execution: ruleExcluded: Warn # Bash: Using environment variable export PSRULE_EXECUTION_RULEEXCLUDED=Warn # GitHub Actions: Using environment variable env: PSRULE_EXECUTION_RULEEXCLUDED: Warn # Azure Pipelines: Using environment variable variables: - name: PSRULE_EXECUTION_RULEEXCLUDED value: Warn EXECUTION.RULESUPPRESSED :octicons-milestone-24: v2.8.0 Determines how to handle suppressed rules. Regardless of the value, a suppressed rule is ignored. By default, a warning is generated, however this behavior can be modified by this option. The following preferences are available: - `None` (0) - No preference. Inherits the default of `Warn`. - `Ignore` (1) - Continue to execute silently. - `Warn` (2) - Continue to execute but log a warning. This is the default. - `Error` (3) - Abort and throw an error. - `Debug` (4) - Continue to execute but log a debug message. # PowerShell: Using the ExecutionRuleSuppressed parameter $option = New-PSRuleOption -ExecutionRuleSuppressed 'Error'; # PowerShell: Using the Execution.RuleSuppressed hashtable key $option = New-PSRuleOption -Option @{ 'Execution.RuleSuppressed' = 'Error' }; # PowerShell: Using the ExecutionRuleSuppressed parameter to set YAML Set-PSRuleOption -ExecutionRuleSuppressed 'Error'; # YAML: Using the execution/ruleSuppressed property execution: ruleSuppressed: Error # Bash: Using environment variable export PSRULE_EXECUTION_RULESUPPRESSED=Error # GitHub Actions: Using environment variable env: PSRULE_EXECUTION_RULESUPPRESSED: Error # Azure Pipelines: Using environment variable variables: - name: PSRULE_EXECUTION_RULESUPPRESSED value: Error EXECUTION.UNPROCESSEDOBJECT :octicons-milestone-24: v2.9.0 Determines how to report objects that are not processed by any rule. By default, a warning is generated, however this behavior can be modified by this option. The following preferences are available: - `None` (0) - No preference. Inherits the default of `Warn`. - `Ignore` (1) - Continue to execute silently. - `Warn` (2) - Continue to execute but log a warning. This is the default. - `Error` (3) - Abort and throw an error. - `Debug` (4) - Continue to execute but log a debug message. This option can be specified using: # PowerShell: Using the ExecutionUnprocessedObject parameter $option = New-PSRuleOption -ExecutionUnprocessedObject 'Ignore'; # PowerShell: Using the Execution.UnprocessedObject hashtable key $option = New-PSRuleOption -Option @{ 'Execution.UnprocessedObject' = 'Ignore' }; # PowerShell: Using the ExecutionUnprocessedObject parameter to set YAML Set-PSRuleOption -ExecutionUnprocessedObject 'Ignore'; # YAML: Using the execution/unprocessedObject property execution: unprocessedObject: Ignore # Bash: Using environment variable export PSRULE_EXECUTION_UNPROCESSEDOBJECT=Ignore # GitHub Actions: Using environment variable env: PSRULE_EXECUTION_UNPROCESSEDOBJECT: Ignore # Azure Pipelines: Using environment variable variables: - name: PSRULE_EXECUTION_UNPROCESSEDOBJECT value: Ignore FORMAT :octicons-milestone-24: v3.0.0 Configures each format by setting mapped types. The following built-in types can be configured: - `yaml` - `json` - `markdown` - `powershell_data` The following is the default configuration for each format: format: yaml: types: - .yaml - .yml json: types: - .json - .jsonc - .sarif markdown: types: - .md - .markdown powershell_data: types: - .psd1 The configuration for each built-in or custom format a hashtable key by using the name: $option = New-PSRuleOption -Option @{ 'Format.<FORMAT>.Type' = value }; For example: $option = New-PSRuleOption -Option @{ 'Format.Yaml.Type' = @('.yaml', '.yml') }; The configuration for each built-in or custom format can be set by environment variable by using the name: PSRULE_FORMAT_<FORMAT>_TYPE='<value>' For example: export PSRULE_FORMAT_YAML_TYPES='.yaml;.yml' INCLUDE.MODULE Automatically include rules and resources from the specified module. To automatically import and include a module specify the module by name. The module must already be installed on the system. When `$PSModuleAutoLoadingPreference` is set to a value other then `All` the module must be imported. This option is equivalent to using the `-Module` parameter on PSRule cmdlets, with the following addition: - Modules specified with `Include.Module` are combined with `-Module`. Both sets of modules will be imported and used using execution. This option can be specified using: # PowerShell: Using the IncludeModule parameter $option = New-PSRuleOption -IncludeModule 'TestModule1', 'TestModule2'; # PowerShell: Using the Include.Module hashtable key $option = New-PSRuleOption -Option @{ 'Include.Module' = 'TestModule1', 'TestModule2' }; # PowerShell: Using the IncludeModule parameter to set YAML Set-PSRuleOption -IncludeModule 'TestModule1', 'TestModule2'; # YAML: Using the include/module property include: module: - TestModule1 # Bash: Using environment variable export PSRULE_INCLUDE_MODULE=TestModule1;TestModule2 # GitHub Actions: Using environment variable env: PSRULE_INCLUDE_MODULE: TestModule1;TestModule2 # Azure Pipelines: Using environment variable variables: - name: PSRULE_INCLUDE_MODULE value: TestModule1;TestModule2 INCLUDE.PATH Automatically include rules and resources from the specified path. By default, `.ps-rule/` is included. This option is equivalent to using the `-Path` parameter on PSRule cmdlets, with the following additions: - Paths specified with `Include.Path` are combined with `-Path`. Both sets of paths will be imported and used using execution. - The `Include.Path` option defaults to `.ps-rule/`. To override this default, specify one or more alternative paths or an empty array. This option can be specified using: # PowerShell: Using the IncludePath parameter $option = New-PSRuleOption -IncludePath '.ps-rule/', 'custom-rules/'; # PowerShell: Using the Include.Path hashtable key $option = New-PSRuleOption -Option @{ 'Include.Path' = '.ps-rule/', 'custom-rules/' }; # PowerShell: Using the IncludePath parameter to set YAML Set-PSRuleOption -IncludePath '.ps-rule/', 'custom-rules/'; # YAML: Using the include/path property include: path: - custom-rules/ # Bash: Using environment variable export PSRULE_INCLUDE_PATH=.ps-rule/;custom-rules/ # GitHub Actions: Using environment variable env: PSRULE_INCLUDE_PATH: .ps-rule/;custom-rules/ # Azure Pipelines: Using environment variable variables: - name: PSRULE_INCLUDE_PATH value: .ps-rule/;custom-rules/ INPUT.FILEOBJECTS :octicons-milestone-24: v3.0.0 Determines if file objects are processed by rules. This option is for backwards compatibility with PSRule v2.x in cases where file objects are used as input. By default, file are not processed by rules. Set to `$True` to enable processing of file objects by rules. This option can be specified using: # PowerShell: Using the InputFileObjects parameter $option = New-PSRuleOption -InputFileObjects $True; # PowerShell: Using the Input.FileObjects hashtable key $option = New-PSRuleOption -Option @{ 'Input.FileObjects' = $True }; # PowerShell: Using the InputFileObjects parameter to set YAML Set-PSRuleOption -InputFileObjects $True; # YAML: Using the input/fileObjects property input: fileObjects: true # Bash: Using environment variable export PSRULE_INPUT_FILEOBJECTS=true # GitHub Actions: Using environment variable env: PSRULE_INPUT_FILEOBJECTS: true # Azure Pipelines: Using environment variable variables: - name: PSRULE_INPUT_FILEOBJECTS value: true INPUT.FORMAT Configures the input format for when a string is passed in as a target object. This option determines if the target object is deserialized into an alternative form. Use this option with `Assert-PSRule`, `Invoke-PSRule` or `Test-PSRuleTarget`. Set this option to either `Yaml`, `Json`, `Markdown`, `PowerShellData` to deserialize as a specific format. The `-Format` parameter will override any value set in configuration. When the `-InputObject` parameter or pipeline input is used, strings are treated as plain text by default. `FileInfo` objects for supported file formats will be deserialized based on file extension. When the `-InputPath` parameter is used, supported file formats will be deserialized based on file extension. The `-InputPath` parameter can be used with a file path or URL. The following formats are available: - `None` - Treat strings as plain text and do not deserialize files. This is the default. - `Yaml` - Deserialize as one or more YAML objects. - `Json` - Deserialize as one or more JSON objects. - `Markdown` - Deserialize as a markdown object. - `PowerShellData` - Deserialize as a PowerShell data object. The `Markdown` format does not parse the whole markdown document. Specifically this format deserializes YAML front matter from the top of the document if any exists. Files within `.git` sub-directories are ignored. Path specs specified in `.gitignore` directly in the current working path are ignored. A `RepositoryInfo` object is generated if the current working path if a `.git` sub-directory is present. Additionally, PSRule performs automatic type binding for file objects, using the extension as the type. When files have no extension the whole file name is used. Detect uses the following file extensions: - Yaml - `.yaml` or `.yml` - Json - `.json` or `.jsonc` - Markdown - `.md` or `.markdown` - PowerShellData - `.psd1` This option can be specified using: # PowerShell: Using the Format parameter $option = New-PSRuleOption -Format Yaml; # PowerShell: Using the Input.Format hashtable key $option = New-PSRuleOption -Option @{ 'Input.Format' = 'Yaml' }; # PowerShell: Using the Format parameter to set YAML Set-PSRuleOption -Format Yaml; # YAML: Using the input/format property input: format: Yaml # Bash: Using environment variable export PSRULE_INPUT_FORMAT=Yaml # GitHub Actions: Using environment variable env: PSRULE_INPUT_FORMAT: Yaml # Azure Pipelines: Using environment variable variables: - name: PSRULE_INPUT_FORMAT value: Yaml INPUT.IGNOREGITPATH When reading files from an input path, files within the `.git` sub-directory are ignored by default. Files stored within the `.git` sub-directory are system repository files used by git. To read files stored within the `.git` path, set this option to `$False`. This option can be specified using: # PowerShell: Using the InputIgnoreGitPath parameter $option = New-PSRuleOption -InputIgnoreGitPath $False; # PowerShell: Using the Input.IgnoreGitPath hashtable key $option = New-PSRuleOption -Option @{ 'Input.IgnoreGitPath' = $False }; # PowerShell: Using the InputIgnoreGitPath parameter to set YAML Set-PSRuleOption -InputIgnoreGitPath $False; # YAML: Using the input/ignoreGitPath property input: ignoreGitPath: false # Bash: Using environment variable export PSRULE_INPUT_IGNOREGITPATH=false # GitHub Actions: Using environment variable env: PSRULE_INPUT_IGNOREGITPATH: false # Azure Pipelines: Using environment variable variables: - name: PSRULE_INPUT_IGNOREGITPATH value: false INPUT.IGNOREOBJECTSOURCE By default, objects read from file using `inputPath` will be skipped if the file path has been ignored. When set to true, additionally objects with a source path that has been ignored will be skipped. This will include `FileInfo` objects, and objects with a source set using the `_PSRule.source` property. File paths to ignore are set by `Input.PathIgnore`, `Input.IgnoreGitPath`, and `Input.IgnoreRepositoryCommon`. This option can be specified using: # PowerShell: Using the InputIgnoreObjectSource parameter $option = New-PSRuleOption -InputIgnoreObjectSource $True; # PowerShell: Using the Input.IgnoreObjectSource hashtable key $option = New-PSRuleOption -Option @{ 'Input.IgnoreObjectSource' = $True }; # PowerShell: Using the InputIgnoreObjectSource parameter to set YAML Set-PSRuleOption -InputIgnoreObjectSource $True; # YAML: Using the input/ignoreObjectSource property input: ignoreObjectSource: true # Bash: Using environment variable export PSRULE_INPUT_IGNOREOBJECTSOURCE=true # GitHub Actions: Using environment variable env: PSRULE_INPUT_IGNOREOBJECTSOURCE: true # Azure Pipelines: Using environment variable variables: - name: PSRULE_INPUT_IGNOREOBJECTSOURCE value: true INPUT.IGNOREREPOSITORYCOMMON When reading files from an input path, files are discovered recursively. A number of files are commonly found within a private and open-source repositories. In many cases these files are of no interest for analysis and should be ignored by rules. PSRule will ignore the following files by default: - `README.md` - `.DS_Store` - `.gitignore` - `.gitattributes` - `.gitmodules` - `LICENSE` - `LICENSE.txt` - `CODE_OF_CONDUCT.md` - `CONTRIBUTING.md` - `SECURITY.md` - `SUPPORT.md` - `.vscode/*.json` - `.vscode/*.code-snippets` - `.github/ */ .md` - `.github/CODEOWNERS` - `.pipelines/ */ .yml` - `.pipelines/ */ .yaml` - `.azure-pipelines/ */ .yml` - `.azure-pipelines/ */ .yaml` - `.azuredevops/*.md` To include these files, set this option to `$False`. This option can be specified using: # PowerShell: Using the InputIgnoreRepositoryCommon parameter $option = New-PSRuleOption -InputIgnoreRepositoryCommon $False; # PowerShell: Using the Input.IgnoreRepositoryCommon hashtable key $option = New-PSRuleOption -Option @{ 'Input.IgnoreRepositoryCommon' = $False }; # PowerShell: Using the InputIgnoreRepositoryCommon parameter to set YAML Set-PSRuleOption -InputIgnoreRepositoryCommon $False; # YAML: Using the input/ignoreRepositoryCommon property input: ignoreRepositoryCommon: false # Bash: Using environment variable export PSRULE_INPUT_IGNOREREPOSITORYCOMMON=false # GitHub Actions: Using environment variable env: PSRULE_INPUT_IGNOREREPOSITORYCOMMON: false # Azure Pipelines: Using environment variable variables: - name: PSRULE_INPUT_IGNOREREPOSITORYCOMMON value: false INPUT.IGNOREUNCHANGEDPATH :octicons-milestone-24: v2.5.0 By default, PSRule will process all files within an input path. For large repositories, this can result in a large number of files being processed. Additionally, for a pull request you may only be interested in files that have changed. When set to `true`, files that have not changed will be ignored. This option can be specified using: # PowerShell: Using the InputIgnoreUnchangedPath parameter $option = New-PSRuleOption -InputIgnoreUnchangedPath $True; # PowerShell: Using the Input.IgnoreUnchangedPath hashtable key $option = New-PSRuleOption -Option @{ 'Input.IgnoreUnchangedPath' = $True }; # PowerShell: Using the InputIgnoreUnchangedPath parameter to set YAML Set-PSRuleOption -InputIgnoreUnchangedPath $True; # YAML: Using the input/ignoreUnchangedPath property input: ignoreUnchangedPath: true # Bash: Using environment variable export PSRULE_INPUT_IGNOREUNCHANGEDPATH=true # GitHub Actions: Using environment variable env: PSRULE_INPUT_IGNOREUNCHANGEDPATH: true # Azure Pipelines: Using environment variable variables: - name: PSRULE_INPUT_IGNOREUNCHANGEDPATH value: true INPUT.OBJECTPATH The object path to a property to use instead of the pipeline object. By default, PSRule processes objects passed from the pipeline against selected rules. When this option is set, instead of evaluating the pipeline object, PSRule looks for a property of the pipeline object specified by `ObjectPath` and uses that instead. If the property specified by `ObjectPath` is a collection/ array, then each item is evaluated separately. If the property specified by `ObjectPath` does not exist, PSRule skips the object. When using `Invoke-PSRule`, `Test-PSRuleTarget`, and `Assert-PSRule` the `-ObjectPath` parameter will override any value set in configuration. This option can be specified using: # PowerShell: Using the ObjectPath parameter $option = New-PSRuleOption -ObjectPath 'items'; # PowerShell: Using the Input.ObjectPath hashtable key $option = New-PSRuleOption -Option @{ 'Input.ObjectPath' = 'items' }; # PowerShell: Using the ObjectPath parameter to set YAML Set-PSRuleOption -ObjectPath 'items'; # YAML: Using the input/objectPath property input: objectPath: items # Bash: Using environment variable export PSRULE_INPUT_OBJECTPATH=items # GitHub Actions: Using environment variable env: PSRULE_INPUT_OBJECTPATH: items # Azure Pipelines: Using environment variable variables: - name: PSRULE_INPUT_OBJECTPATH value: items INPUT.PATHIGNORE Ignores input files that match the path spec when using `-InputPath`. If specified, files that match the path spec will not be processed. By default, all files are processed. For example, ignoring file extensions: input: pathIgnore: # Exclude files with these extensions - '*.md' - '*.png' # Exclude specific configuration files - 'bicepconfig.json' For example, ignoring all files with exceptions: input: pathIgnore: # Exclude all files - '*' # Only process deploy.bicep files - '!**/deploy.bicep' This option can be specified using: # PowerShell: Using the InputPathIgnore parameter $option = New-PSRuleOption -InputPathIgnore '*.Designer.cs'; # PowerShell: Using the Input.PathIgnore hashtable key $option = New-PSRuleOption -Option @{ 'Input.PathIgnore' = '*.Designer.cs' }; # PowerShell: Using the InputPathIgnore parameter to set YAML Set-PSRuleOption -InputPathIgnore '*.Designer.cs'; # YAML: Using the input/pathIgnore property input: pathIgnore: - '*.Designer.cs' # Bash: Using environment variable export PSRULE_INPUT_PATHIGNORE=*.Designer.cs # GitHub Actions: Using environment variable env: PSRULE_INPUT_PATHIGNORE: '*.Designer.cs' # Azure Pipelines: Using environment variable variables: - name: PSRULE_INPUT_PATHIGNORE value: '*.Designer.cs' INPUT.TARGETTYPE Filters input objects by TargetType. If specified, only objects with the specified TargetType are processed. Objects that do not match TargetType are ignored. If multiple values are specified, only one TargetType must match. This option is not case-sensitive. By default, all objects are processed. To change the field TargetType is bound to set the `Binding.TargetType` option. When using `Invoke-PSRule`, `Test-PSRuleTarget`, and `Assert-PSRule` the `-TargetType` parameter will override any value set in configuration. This option can be specified using: # PowerShell: Using the InputTargetType parameter $option = New-PSRuleOption -InputTargetType 'virtualMachine', 'virtualNetwork'; # PowerShell: Using the Input.TargetType hashtable key $option = New-PSRuleOption -Option @{ 'Input.TargetType' = 'virtualMachine', 'virtualNetwork' }; # PowerShell: Using the InputTargetType parameter to set YAML Set-PSRuleOption -InputTargetType 'virtualMachine', 'virtualNetwork'; # YAML: Using the input/targetType property input: targetType: - virtualMachine # Bash: Using environment variable export PSRULE_INPUT_TARGETTYPE=virtualMachine;virtualNetwork # GitHub Actions: Using environment variable env: PSRULE_INPUT_TARGETTYPE: virtualMachine;virtualNetwork # Azure Pipelines: Using environment variable variables: - name: PSRULE_INPUT_TARGETTYPE value: virtualMachine;virtualNetwork LOGGING.LIMITDEBUG Limits debug messages to a list of named debug scopes. When using the `-Debug` switch or preference variable, by default PSRule cmdlets log all debug output. When using debug output for debugging a specific rule, it may be helpful to limit debug message to a specific rule. To identify a rule to include in debug output use the rule name. The following built-in scopes exist in addition to rule names: - `[Discovery.Source]` - Discovery messages for `.Rule.ps1` files and rule modules. - `[Discovery.Rule]` - Discovery messages for individual rules within `.Rule.ps1` files. This option can be specified using: # PowerShell: Using the LoggingLimitDebug parameter $option = New-PSRuleOption -LoggingLimitDebug Rule1, Rule2; # PowerShell: Using the Logging.LimitDebug hashtable key $option = New-PSRuleOption -Option @{ 'Logging.LimitDebug' = Rule1, Rule2 }; # PowerShell: Using the LoggingLimitDebug parameter to set YAML Set-PSRuleOption -LoggingLimitDebug Rule1, Rule2; # YAML: Using the logging/limitDebug property logging: limitDebug: - Rule1 - Rule2 LOGGING.LIMITVERBOSE Limits verbose messages to a list of named verbose scopes. When using the `-Verbose` switch or preference variable, by default PSRule cmdlets log all verbose output. When using verbose output for troubleshooting a specific rule, it may be helpful to limit verbose messages to a specific rule. To identify a rule to include in verbose output use the rule name. The following built-in scopes exist in addition to rule names: - `[Discovery.Source]` - Discovery messages for `.Rule.ps1` files and rule modules. - `[Discovery.Rule]` - Discovery messages for individual rules within `.Rule.ps1` files. This option can be specified using: # PowerShell: Using the LoggingLimitVerbose parameter $option = New-PSRuleOption -LoggingLimitVerbose Rule1, Rule2; # PowerShell: Using the Logging.LimitVerbose hashtable key $option = New-PSRuleOption -Option @{ 'Logging.LimitVerbose' = Rule1, Rule2 }; # PowerShell: Using the LoggingLimitVerbose parameter to set YAML Set-PSRuleOption -LoggingLimitVerbose Rule1, Rule2; # YAML: Using the logging/limitVerbose property logging: limitVerbose: - Rule1 - Rule2 LOGGING.RULEFAIL When an object fails a rule condition the results are written to output as a structured object marked with the outcome of Fail . If the rule executed successfully regardless of outcome no other informational messages are shown by default. In some circumstances such as a continuous integration (CI) pipeline, it may be preferable to see informational messages or abort the CI process if one or more Fail outcomes are returned. By settings this option, error, warning or information messages will be generated for each rule fail outcome in addition to structured output. By default, outcomes are not logged to an informational stream (i.e. None). The following streams available: - None - Error - Warning - Information This option can be specified using: # PowerShell: Using the LoggingRuleFail parameter $option = New-PSRuleOption -LoggingRuleFail Error; # PowerShell: Using the Logging.RuleFail hashtable key $option = New-PSRuleOption -Option @{ 'Logging.RuleFail' = 'Error' }; # PowerShell: Using the LoggingRuleFail parameter to set YAML Set-PSRuleOption -LoggingRuleFail Error; # YAML: Using the logging/ruleFail property logging: ruleFail: Error LOGGING.RULEPASS When an object passes a rule condition the results are written to output as a structured object marked with the outcome of Pass . If the rule executed successfully regardless of outcome no other informational messages are shown by default. In some circumstances such as a continuous integration (CI) pipeline, it may be preferable to see informational messages. By settings this option, error, warning or information messages will be generated for each rule pass outcome in addition to structured output. By default, outcomes are not logged to an informational stream (i.e. None). The following streams available: - None - Error - Warning - Information This option can be specified using: # PowerShell: Using the LoggingRulePass parameter $option = New-PSRuleOption -LoggingRulePass Information; # PowerShell: Using the Logging.RulePass hashtable key $option = New-PSRuleOption -Option @{ 'Logging.RulePass' = 'Information' }; # PowerShell: Using the LoggingRulePass parameter to set YAML Set-PSRuleOption -LoggingRulePass Information; # YAML: Using the logging/rulePass property logging: rulePass: Information OUTPUT.AS Configures the type of results to produce. This option only applies to `Invoke-PSRule` and `Assert-PSRule`. `Invoke-PSRule` and `Assert-PSRule` also include a `-As` parameter to set this option at runtime. If specified, the `-As` parameter take precedence, over this option. The following options are available: - Detail - Return a record per rule per object. - Summary - Return summary results. This option can be specified using: # PowerShell: Using the OutputAs parameter $option = New-PSRuleOption -OutputAs Summary; # PowerShell: Using the Output.As hashtable key $option = New-PSRuleOption -Option @{ 'Output.As' = 'Summary' }; # PowerShell: Using the OutputAs parameter to set YAML Set-PSRuleOption -OutputAs Summary; # YAML: Using the output/as property output: as: Summary # Bash: Using environment variable export PSRULE_OUTPUT_AS=Summary title="GitHub Actions" # GitHub Actions: Using environment variable env: PSRULE_OUTPUT_AS: Summary title="Azure Pipelines" # Azure Pipelines: Using environment variable variables: - name: PSRULE_OUTPUT_AS value: Summary title="Visual Studio Code settings.json" { "PSRule.output.as": "Summary" } OUTPUT.BANNER The information displayed for PSRule banner. This option is only applicable when using `Assert-PSRule` cmdlet. The following information can be shown or hidden by configuring this option. - `Title` (1) - Shows the PSRule title ASCII text. - `Source` (2) - Shows rules module versions used in this run. - `SupportLinks` (4) - Shows supporting links for PSRule and rules modules. - `RepositoryInfo` (8) - Show information about the repository where PSRule is being run from. Additionally the following rollup options exist: - `Default` - Shows `Title`, `Source`, `SupportLinks`, `RepositoryInfo`. This is the default option. - `Minimal` - Shows `Source`. This option can be configured using one of the named values described above. Alternatively, this value can be configured by specifying a bit mask as an integer. For example `6` would show `Source`, and `SupportLinks`. This option can be specified using: # PowerShell: Using the OutputBanner parameter $option = New-PSRuleOption -OutputBanner Minimal; # PowerShell: Using the Output.Banner hashtable key $option = New-PSRuleOption -Option @{ 'Output.Banner' = 'Minimal' }; # PowerShell: Using the OutputBanner parameter to set YAML Set-PSRuleOption -OutputBanner Minimal; # YAML: Using the output/banner property output: banner: Minimal # Bash: Using environment variable export PSRULE_OUTPUT_BANNER=Minimal # GitHub Actions: Using environment variable env: PSRULE_OUTPUT_BANNER: Minimal # Azure Pipelines: Using environment variable variables: - name: PSRULE_OUTPUT_BANNER value: Minimal OUTPUT.CULTURE Specified the name of one or more cultures to use for generating output. When multiple cultures are specified, the first matching culture will be used. If a culture is not specified, PSRule will use the current PowerShell culture. PSRule cmdlets also include a `-Culture` parameter to set this option at runtime. If specified, the `-Culture` parameter take precedence, over this option. To get a list of cultures use the `Get-Culture -ListAvailable` cmdlet. This option can be specified using: # PowerShell: Using the OutputCulture parameter $option = New-PSRuleOption -OutputCulture 'en-AU'; # PowerShell: Using the Output.Culture hashtable key $option = New-PSRuleOption -Option @{ 'Output.Culture' = 'en-AU' }; # PowerShell: Using the OutputCulture parameter to set YAML Set-PSRuleOption -OutputCulture 'en-AU', 'en-US'; # YAML: Using the output/culture property output: culture: [ 'en-AU', 'en-US' ] # Bash: Using environment variable export PSRULE_OUTPUT_CULTURE=en-AU;en-US # GitHub Actions: Using environment variable env: PSRULE_OUTPUT_CULTURE: en-AU;en-US # Azure Pipelines: Using environment variable variables: - name: PSRULE_OUTPUT_CULTURE value: en-AU;en-US OUTPUT.ENCODING Configures the encoding used when output is written to file. This option has no affect when `Output.Path` is not set. The following encoding options are available: - Default - UTF-8 - UTF-7 - Unicode - UTF-32 - ASCII This option can be specified using: # PowerShell: Using the OutputEncoding parameter $option = New-PSRuleOption -OutputEncoding UTF8; # PowerShell: Using the Output.Format hashtable key $option = New-PSRuleOption -Option @{ 'Output.Encoding' = 'UTF8' }; # PowerShell: Using the OutputEncoding parameter to set YAML Set-PSRuleOption -OutputEncoding UTF8; # YAML: Using the output/encoding property output: encoding: UTF8 # Bash: Using environment variable export PSRULE_OUTPUT_ENCODING=UTF8 # GitHub Actions: Using environment variable env: PSRULE_OUTPUT_ENCODING: UTF8 # Azure Pipelines: Using environment variable variables: - name: PSRULE_OUTPUT_ENCODING value: UTF8 OUTPUT.FOOTER The information displayed for PSRule footer. This option is only applicable when using `Assert-PSRule` cmdlet. The following information can be shown or hidden by configuring this option. - `RuleCount` (1) - Shows a summary of rules processed. - `RunInfo` (2) - Shows information about the run. - `OutputFile` (4) - Shows information about the output file if an output path is set. Additionally the following rollup options exist: - `Default` - Shows `RuleCount`, `RunInfo`, and `OutputFile`. This is the default option. This option can be configured using one of the named values described above. Alternatively, this value can be configured by specifying a bit mask as an integer. For example `3` would show `RunInfo`, and `RuleCount`. This option can be specified using: # PowerShell: Using the OutputFooter parameter $option = New-PSRuleOption -OutputFooter RuleCount; # PowerShell: Using the Output.Footer hashtable key $option = New-PSRuleOption -Option @{ 'Output.Footer' = 'RuleCount' }; # PowerShell: Using the OutputFooter parameter to set YAML Set-PSRuleOption -OutputFooter RuleCount; # YAML: Using the output/footer property output: footer: RuleCount # Bash: Using environment variable export PSRULE_OUTPUT_FOOTER=RuleCount # GitHub Actions: Using environment variable env: PSRULE_OUTPUT_FOOTER: RuleCount # Azure Pipelines: Using environment variable variables: - name: PSRULE_OUTPUT_FOOTER value: RuleCount OUTPUT.FORMAT Configures the format that results will be presented in. This option applies to `Invoke-PSRule`, `Assert-PSRule`, `Get-PSRule` and `Get-PSRuleBaseline`. This options is ignored by other cmdlets. The following format options are available: - None - Output is presented as an object using PowerShell defaults. This is the default. - Yaml - Output is serialized as YAML. - Json - Output is serialized as JSON. - Markdown - Output is serialized as Markdown. - NUnit3 - Output is serialized as NUnit3 (XML). - Csv - Output is serialized as a comma-separated values (CSV). - The following columns are included for `Detail` output: RuleName, TargetName, TargetType, Outcome, OutcomeReason, Synopsis, Recommendation - The following columns are included for `Summary` output: RuleName, Pass, Fail, Outcome, Synopsis, Recommendation - Wide - Output is presented using the wide table format, which includes reason and wraps columns. - Sarif - Output is serialized as SARIF. The Wide format is ignored by `Assert-PSRule`. `Get-PSRule` only accepts `None`, `Wide`, `Yaml` and `Json`. Usage of other formats are treated as `None`. The `Get-PSRuleBaseline` cmdlet only accepts `None` or `Yaml`. The `Export-PSRuleBaseline` cmdlet only accepts `Yaml`. This option can be specified using: # PowerShell: Using the OutputFormat parameter $option = New-PSRuleOption -OutputFormat Yaml; # PowerShell: Using the Output.Format hashtable key $option = New-PSRuleOption -Option @{ 'Output.Format' = 'Yaml' }; # PowerShell: Using the OutputFormat parameter to set YAML Set-PSRuleOption -OutputFormat Yaml; # YAML: Using the output/format property output: format: Yaml # Bash: Using environment variable export PSRULE_OUTPUT_FORMAT=Yaml # GitHub Actions: Using environment variable env: PSRULE_OUTPUT_FORMAT: Yaml # Azure Pipelines: Using environment variable variables: - name: PSRULE_OUTPUT_FORMAT value: Yaml OUTPUT.OUTCOME Filters output to include results with the specified outcome. The following outcome options are available: - `None` (0) - Results for rules that did not get processed are returned. This include rules that have been suppressed or were not run against a target object. - `Fail` (1) - Results for rules that failed are returned. - `Pass` (2) - Results for rules that passed are returned. - `Error` (4) - Results for rules that raised an error are returned. Additionally the following rollup options exist: - `Processed` - Results for rules with the `Fail`, `Pass`, or `Error` outcome. This is the default option. - `Problem` - Results for rules with the `Fail`, or `Error` outcome. - `All` - All results for rules are returned. This option can be specified using: # PowerShell: Using the OutputOutcome parameter $option = New-PSRuleOption -OutputOutcome Fail; # PowerShell: Using the Output.Outcome hashtable key $option = New-PSRuleOption -Option @{ 'Output.Outcome' = 'Fail' }; # PowerShell: Using the OutputOutcome parameter to set YAML Set-PSRuleOption -OutputOutcome Fail; # YAML: Using the output/outcome property output: outcome: 'Fail' # Bash: Using environment variable export PSRULE_OUTPUT_OUTCOME=Fail # GitHub Actions: Using environment variable env: PSRULE_OUTPUT_OUTCOME: Fail # Azure Pipelines: Using environment variable variables: - name: PSRULE_OUTPUT_OUTCOME value: Fail OUTPUT.PATH Specifies the output file path to write results. Directories along the file path will automatically be created if they do not exist. This option only applies to `Invoke-PSRule`. `Invoke-PSRule` also includes a parameter `-OutputPath` to set this option at runtime. If specified, the `-OutputPath` parameter take precedence, over this option. Syntax: output: path: string Default: output: path: null This option can be specified using: # PowerShell: Using the OutputPath parameter $option = New-PSRuleOption -OutputPath 'out/results.yaml'; # PowerShell: Using the Output.Path hashtable key $option = New-PSRuleOption -Option @{ 'Output.Path' = 'out/results.yaml' }; # PowerShell: Using the OutputPath parameter to set YAML Set-PSRuleOption -OutputPath 'out/results.yaml'; # YAML: Using the output/path property output: path: 'out/results.yaml' # Bash: Using environment variable export PSRULE_OUTPUT_PATH=out/results.yaml # GitHub Actions: Using environment variable env: PSRULE_OUTPUT_PATH: out/results.yaml # Azure Pipelines: Using environment variable variables: - name: PSRULE_OUTPUT_PATH value: out/results.yaml OUTPUT.SARIFPROBLEMSONLY Determines if SARIF output only includes rules with fail or error outcomes. By default, only rules with fail or error outcomes are included for compatibility with external tools. To include rules with pass outcomes, set this option to `false`. This option only applies when the output format is `Sarif`. Syntax: output: sarifProblemsOnly: boolean Default: output: sarifProblemsOnly: true This option can be specified using: # PowerShell: Using the OutputSarifProblemsOnly parameter $option = New-PSRuleOption -OutputSarifProblemsOnly $False; # PowerShell: Using the Output.SarifProblemsOnly hashtable key $option = New-PSRuleOption -Option @{ 'Output.SarifProblemsOnly' = $False }; # PowerShell: Using the OutputSarifProblemsOnly parameter to set YAML Set-PSRuleOption -OutputSarifProblemsOnly $False; # YAML: Using the output/sarifProblemsOnly property output: sarifProblemsOnly: false # Bash: Using environment variable export PSRULE_OUTPUT_SARIFPROBLEMSONLY=false # GitHub Actions: Using environment variable env: PSRULE_OUTPUT_SARIFPROBLEMSONLY: false # Azure Pipelines: Using environment variable variables: - name: PSRULE_OUTPUT_SARIFPROBLEMSONLY value: false OUTPUT.STYLE Configures the style that results will be presented in. This option only applies to output generated from `Assert-PSRule`. `Assert-PSRule` also include a parameter `-Style` to set this option at runtime. If specified, the `-Style` parameter takes precedence, over this option. The following styles are available: - `Client` - Output is written to the host directly in green/ red to indicate outcome. - `Plain` - Output is written as an unformatted string. This option can be redirected to a file. - `AzurePipelines` - Output is written for integration Azure Pipelines. - `GitHubActions` - Output is written for integration GitHub Actions. - `VisualStudioCode` - Output is written for integration with Visual Studio Code. - `Detect` - Output style will be detected by checking the environment variables. This is the default. Detect uses the following logic: 1. If the `TF_BUILD` environment variable is set to `true`, `AzurePipelines` will be used. 2. If the `GITHUB_ACTIONS` environment variable is set to `true`, `GitHubActions` will be used. 3. If the `TERM_PROGRAM` environment variable is set to `vscode`, `VisualStudioCode` will be used. 4. Use `Client`. Syntax: output: style: string Default: output: style: Detect This option can be specified using: # PowerShell: Using the OutputStyle parameter $option = New-PSRuleOption -OutputStyle AzurePipelines; # PowerShell: Using the Output.Style hashtable key $option = New-PSRuleOption -Option @{ 'Output.Style' = 'AzurePipelines' }; # PowerShell: Using the OutputStyle parameter to set YAML Set-PSRuleOption -OutputFormat AzurePipelines; # YAML: Using the output/style property output: style: AzurePipelines # Bash: Using environment variable export PSRULE_OUTPUT_STYLE=AzurePipelines # GitHub Actions: Using environment variable env: PSRULE_OUTPUT_STYLE: AzurePipelines # Azure Pipelines: Using environment variable variables: - name: PSRULE_OUTPUT_STYLE value: AzurePipelines OUTPUT.JOBSUMMARYPATH :octicons-milestone-24: v2.6.0 Configures the file path a job summary will be written to when using `Assert-PSRule`. A job summary is a markdown file that summarizes the results of a job. When not specified, a job summary will not be generated. Syntax: output: jobSummaryPath: string Default: output: jobSummaryPath: null This option can be specified using: # PowerShell: Using the OutputJobSummaryPath parameter $option = New-PSRuleOption -OutputJobSummaryPath 'reports/summary.md'; # PowerShell: Using the Output.JobSummaryPath hashtable key $option = New-PSRuleOption -Option @{ 'Output.JobSummaryPath' = 'reports/summary.md' }; # PowerShell: Using the OutputJobSummaryPath parameter to set YAML Set-PSRuleOption -OutputJobSummaryPath 'reports/summary.md'; # YAML: Using the output/jobSummaryPath property output: jobSummaryPath: 'reports/summary.md' # Bash: Using environment variable export PSRULE_OUTPUT_JOBSUMMARYPATH='reports/summary.md' # PowerShell: Using environment variable $env:PSRULE_OUTPUT_JOBSUMMARYPATH = 'reports/summary.md'; # GitHub Actions: Using environment variable env: PSRULE_OUTPUT_JOBSUMMARYPATH: reports/summary.md # Azure Pipelines: Using environment variable variables: - name: PSRULE_OUTPUT_JOBSUMMARYPATH value: reports/summary.md OUTPUT.JSONINDENT Configures the number of spaces to indent JSON properties and elements. The default number of spaces is 0. This option applies to output generated from `-OutputFormat Json` for `Get-PSRule` and `Invoke-PSRule`. This option also applies to output generated from `-OutputPath` for `Assert-PSRule`. The range of indentation accepts a minimum of 0 (machine first) spaces and a maximum of 4 spaces. This option can be specified using: # PowerShell: Using the OutputJsonIndent parameter $option = New-PSRuleOption -OutputJsonIndent 2; # PowerShell: Using the Output.JsonIndent hashtable key $option = New-PSRuleOption -Option @{ 'Output.JsonIndent' = 2 }; # PowerShell: Using the OutputJsonIndent parameter to set YAML Set-PSRuleOption -OutputJsonIndent 2; # YAML: Using the output/jsonIndent property output: jsonIndent: 2 # Bash: Using environment variable export PSRULE_OUTPUT_JSONINDENT=2 # PowerShell: Using environment variable $env:PSRULE_OUTPUT_JSONINDENT = 2; # GitHub Actions: Using environment variable env: PSRULE_OUTPUT_JSONINDENT: 2 # Azure Pipelines: Using environment variable variables: - name: PSRULE_OUTPUT_JSONINDENT value: 2 OVERRIDE.LEVEL This option is used to override the severity level of one or more rules. When specified, the severity level of the rule will be set to the value specified. Use this option to change the severity level of a rule to be different then originally defined by the author. The following severity levels are available: - `Error` - A serious problem that must be addressed before going forward. - `Warning` - A problem that should be addressed. - `Information` - A minor problem or an opportunity to improve the code. This option can be specified using: # PowerShell: Using the OverrideLevel parameter $option = New-PSRuleOption -OverrideLevel @{ 'rule1' = 'Information' }; # PowerShell: Using the OVerride.Level hashtable key $option = New-PSRuleOption -Option @{ 'Override.Level.rule1' = 'Information' }; # PowerShell: Using the OverrideLevel parameter to set YAML Set-PSRuleOption -OverrideLevel @{ 'rule1' = 'Information' }; # YAML: Using the override/level property override: level: rule1: Information # Bash: Using environment variable export PSRULE_OVERRIDE_LEVEL_RULE1='Information' # PowerShell: Using environment variable $env:PSRULE_OVERRIDE_LEVEL_RULE1 = 'Information'; REPOSITORY.BASEREF This option is used for specify the base branch for pull requests. When evaluating changes files only PSRule uses this option for comparison with the current branch. By default, the base ref is detected from environment variables set by the build system. This option can be specified using: # PowerShell: Using the RepositoryBaseRef parameter $option = New-PSRuleOption -RepositoryBaseRef 'main'; # PowerShell: Using the Repository.BaseRef hashtable key $option = New-PSRuleOption -Option @{ 'Repository.BaseRef' = 'main' }; # PowerShell: Using the RepositoryBaseRef parameter to set YAML Set-PSRuleOption -RepositoryBaseRef 'main'; # YAML: Using the repository/baseRef property repository: baseRef: main # Bash: Using environment variable export PSRULE_REPOSITORY_BASEREF='main' # PowerShell: Using environment variable $env:PSRULE_REPOSITORY_BASEREF = 'main'; REPOSITORY.URL This option can be configured to set the repository URL reported in output. By default, the repository URL is detected from environment variables set by the build system. - In GitHub Actions, the repository URL is detected from the `GITHUB_REPOSITORY` environment variable. - In Azure Pipelines, the repository URL is detected from the `BUILD_REPOSITORY_URI` environment variable. This option can be specified using: # PowerShell: Using the RepositoryUrl parameter $option = New-PSRuleOption -RepositoryUrl 'https://github.com/microsoft/PSRule'; # PowerShell: Using the Repository.Url hashtable key $option = New-PSRuleOption -Option @{ 'Repository.Url' = 'https://github.com/microsoft/PSRule' }; # PowerShell: Using the RepositoryUrl parameter to set YAML Set-PSRuleOption -RepositoryUrl 'https://github.com/microsoft/PSRule'; # YAML: Using the repository/url property repository: url: 'https://github.com/microsoft/PSRule' # Bash: Using environment variable export PSRULE_REPOSITORY_URL='https://github.com/microsoft/PSRule' # PowerShell: Using environment variable $env:PSRULE_REPOSITORY_URL = 'https://github.com/microsoft/PSRule'; REQUIRES Specifies module version constraints for running PSRule. When set PSRule will error if a module version is used that does not satisfy the requirements. The format for version constraints are the same as the `Version` assertion method. See [about_PSRule_Assert] for more information. Module version constraints a not enforced prior to PSRule v0.19.0. The version constraint for a rule module is enforced when the module is included with `-Module`. A version constraint does not require a rule module to be included. Use the `Include.Module` option to automatically include a rule module. This option can be specified using: # PowerShell: Using the Requires.module hashtable key $option = New-PSRuleOption -Option @{ 'Requires.PSRule' = '>=1.0.0' }; # YAML: Using the requires property requires: PSRule: '>=1.0.0' # Require v1.0.0 or greater. PSRule.Rules.Azure: '>=1.0.0' # Require v1.0.0 or greater. PSRule.Rules.CAF: '@pre >=0.1.0' # Require stable or pre-releases v0.1.0 or greater. This option can be configured using environment variables. To specify a module version constraint, prefix the module name with `PSRULE_REQUIRES_`. When the module name includes a dot (`.`) use an underscore (`_`) instead. # Bash: Using environment variable export PSRULE_REQUIRES_PSRULE='>=1.0.0' export PSRULE_REQUIRES_PSRULE_RULES_AZURE='>=1.0.0' export PSRULE_REQUIRES_PSRULE_RULES_CAF='@pre >=0.1.0' # GitHub Actions: Using environment variable env: PSRULE_REQUIRES_PSRULE: '>=1.0.0' PSRULE_REQUIRES_PSRULE_RULES_AZURE: '>=1.0.0' PSRULE_REQUIRES_PSRULE_RULES_CAF: '@pre >=0.1.0' # Azure Pipelines: Using environment variable variables: - name: PSRULE_REQUIRES_PSRULE value: '>=1.0.0' - name: PSRULE_REQUIRES_PSRULE_RULES_AZURE value: '>=1.0.0' - name: PSRULE_REQUIRES_PSRULE_RULES_CAF value: '@pre >=0.1.0' RULE.BASELINE The name of a default baseline to use for the module. Currently this option can only be set within a module configuration resource. For example: ```yaml SYNOPSIS: EXAMPLE MODULE CONFIGURATION FOR ENTERPRISE.RULES MODULE. apiVersion: github.com/microsoft/PSRule/v1 kind: ModuleConfig metadata: name: Enterprise.Rules spec: rule: baseline: Enterprise.Baseline1 ### Rule.Include The name of specific rules to evaluate. If this option is not specified all rules in search paths will be evaluated. This option can be overridden at runtime by using the `-Name` cmdlet parameter. This option can be specified using: powershell POWERSHELL: USING THE RULE.INCLUDE HASHTABLE KEY $option = New-PSRuleOption -Option @{ 'Rule.Include' = 'Rule1','Rule2' }; yaml YAML: USING THE RULE/INCLUDE PROPERTY rule: include: - Rule1 - Rule2 bash BASH: USING ENVIRONMENT VARIABLE export PSRULE_RULE_INCLUDE='Rule1;Rule2' yaml GITHUB ACTIONS: USING ENVIRONMENT VARIABLE env: PSRULE_RULE_INCLUDE: 'Rule1;Rule2' yaml AZURE PIPELINES: USING ENVIRONMENT VARIABLE variables: - name: PSRULE_RULE_INCLUDE value: 'Rule1;Rule2' ### Rule.IncludeLocal Automatically include all local rules in the search path unless they have been explicitly excluded. This option will include local rules even when they do not match `Rule.Include` or `Rule.Tag` filters. By default, local rules will be filtered with `Rule.Include` and `Rule.Tag` filters. This option is useful when you want to include local rules not included in a baseline. This option can be specified using: powershell POWERSHELL: USING THE RULEINCLUDELOCAL PARAMETER $option = New-PSRuleOption -RuleIncludeLocal $True; powershell POWERSHELL: USING THE RULE.INCLUDELOCAL HASHTABLE KEY $option = New-PSRuleOption -Option @{ 'Rule.IncludeLocal' = $True }; powershell POWERSHELL: USING THE RULEINCLUDELOCAL PARAMETER TO SET YAML Set-PSRuleOption -RuleIncludeLocal $True; yaml YAML: USING THE RULE/INCLUDELOCAL PROPERTY rule: includeLocal: true bash BASH: USING ENVIRONMENT VARIABLE export PSRULE_RULE_INCLUDELOCAL=true yaml GITHUB ACTIONS: USING ENVIRONMENT VARIABLE env: PSRULE_RULE_INCLUDELOCAL: true yaml AZURE PIPELINES: USING ENVIRONMENT VARIABLE variables: - name: PSRULE_RULE_INCLUDELOCAL value: true ### Rule.Exclude The name of specific rules to exclude from being evaluated. This will exclude rules specified by `Rule.Include` or discovered from a search path. This option can be specified using: powershell POWERSHELL: USING THE RULE.EXCLUDE HASHTABLE KEY $option = New-PSRuleOption -Option @{ 'Rule.Exclude' = 'Rule3','Rule4' }; yaml YAML: USING THE RULE/EXCLUDE PROPERTY rule: exclude: - Rule3 - Rule4 bash BASH: USING ENVIRONMENT VARIABLE export PSRULE_RULE_EXCLUDE='Rule3;Rule4' yaml GITHUB ACTIONS: USING ENVIRONMENT VARIABLE env: PSRULE_RULE_EXCLUDE: 'Rule3;Rule4' yaml AZURE PIPELINES: USING ENVIRONMENT VARIABLE variables: - name: PSRULE_RULE_EXCLUDE value: 'Rule3;Rule4' ### Rule.Tag A set of required key value pairs (tags) that rules must have applied to them to be included. Multiple values can be specified for the same tag. When multiple values are used, only one must match. This option can be overridden at runtime by using the `-Tag` cmdlet parameter. This option can be specified using: powershell POWERSHELL: USING THE RULE.TAG HASHTABLE KEY $option = New-PSRuleOption -Option @{ 'Rule.Tag' = @{ severity = 'Critical','Warning' } }; yaml YAML: USING THE RULE/TAG PROPERTY rule: tag: severity: Critical yaml YAML: USING THE RULE/TAG PROPERTY, WITH MULTIPLE VALUES rule: tag: severity: - Critical - Warning In the example above, rules must have a tag of `severity` set to either `Critical` or `Warning` to be included. ### Suppression In certain circumstances it may be necessary to exclude or suppress rules from processing objects that are in a known failed state. PSRule allows objects to be suppressed for a rule by TargetName. Objects that are suppressed are not processed by the rule at all but will continue to be processed by other rules. Rule suppression complements pre-filtering and pre-conditions. This option can be specified using: powershell POWERSHELL: USING THE SUPPRESSTARGETNAME OPTION WITH A HASHTABLE $option = New-PSRuleOption -SuppressTargetName @{ 'storageAccounts.UseHttps' = 'TestObject1', 'TestObject3' }; yaml YAML: USING THE SUPPRESSION PROPERTY suppression: storageAccounts.UseHttps: targetName: - TestObject1 - TestObject3 In both of the above examples, `TestObject1` and `TestObject3` have been suppressed from being processed by a rule named `storageAccounts.UseHttps`. When **to** use rule suppression: - A temporary exclusion for an object that is in a known failed state. When **not** to use rule suppression: - An object should never be processed by any rule. Pre-filter the pipeline instead. - The rule is not applicable because the object is the wrong type. Use pre-conditions on the rule instead. An example of pre-filtering: powershell DEFINE OBJECTS TO VALIDATE $items = @(); $items += [PSCustomObject]@{ Name = 'Fridge'; Type = 'Equipment'; Category = 'White goods'; }; $items += [PSCustomObject]@{ Name = 'Apple'; Type = 'Food'; Category = 'Produce'; }; $items += [PSCustomObject]@{ Name = 'Carrot'; Type = 'Food'; Category = 'Produce'; }; EXAMPLE OF PRE-FILTERING, ONLY FOOD ITEMS ARE SENT TO INVOKE-PSRULE $items | Where-Object { $_.Type -eq 'Food' } | Invoke-PSRule; An example of pre-conditions: powershell A RULE WITH A PRE-CONDITION TO ONLY PROCESS PRODUCE Rule 'isFruit' -If { $TargetObject.Category -eq 'Produce' } { # Condition to determine if the object is fruit $TargetObject.Name -in 'Apple', 'Orange', 'Pear' } ## EXAMPLES ### Example ps-rule.yaml yaml # PSRULE EXAMPLE CONFIGURATION # CONFIGURES THE REPOSITORY repository: url: https://github.com/microsoft/PSRule baseRef: main CONFIGURE REQUIRED MODULE VERSIONS requires: PSRule.Rules.Azure: '>=1.1.0' CONFIGURE CONVENTION OPTIONS convention: include: - 'Convention1' CONFIGURE EXECUTION OPTIONS execution: hashAlgorithm: SHA256 duplicateResourceId: Warn languageMode: ConstrainedLanguage suppressionGroupExpired: Error restrictScriptSource: ModuleOnly CONFIGURE INCLUDE OPTIONS include: module: - 'PSRule.Rules.Azure' path: [ ] CONFIGURES INPUT OPTIONS input: format: Yaml ignoreGitPath: false ignoreObjectSource: true ignoreRepositoryCommon: false ignoreUnchangedPath: true objectPath: items pathIgnore: - '*.Designer.cs' targetType: - Microsoft.Compute/virtualMachines - Microsoft.Network/virtualNetworks CONFIGURES OUTCOME LOGGING OPTIONS logging: limitDebug: - Rule1 - Rule2 limitVerbose: - Rule1 - Rule2 ruleFail: Error rulePass: Information output: as: Summary banner: Minimal culture: - en-US encoding: UTF8 footer: RuleCount format: Json jobSummaryPath: reports/summary.md outcome: Fail sarifProblemsOnly: false style: GitHubActions OVERRIDES THE SEVERITY LEVEL FOR RULES override: level: Rule1: Error Rule2: Warning CONFIGURE RULE SUPPRESSION suppression: storageAccounts.UseHttps: targetName: - TestObject1 - TestObject3 CONFIGURE BASELINE OPTIONS binding: field: id: - ResourceId - AlternativeId ignoreCase: false nameSeparator: '::' preferTargetInfo: true targetName: - ResourceName - AlternateName targetType: - ResourceType - kind useQualifiedName: true configuration: appServiceMinInstanceCount: 2 rule: include: - rule1 - rule2 includeLocal: true exclude: - rule3 - rule4 tag: severity: - Critical - Warning ### Default ps-rule.yaml yaml # PSRULE DEFAULTS # NOTE: ONLY PROPERTIES THAT DIFFER FROM THE DEFAULT VALUES NEED TO BE SPECIFIED. CONFIGURE REQUIRED MODULE VERSIONS requires: { } CONFIGURE CONVENTION OPTIONS convention: include: [ ] CONFIGURE EXECUTION OPTIONS execution: hashAlgorithm: SHA512 aliasReference: Warn duplicateResourceId: Error invariantCulture: Warn languageMode: FullLanguage initialSessionState: BuiltIn restrictScriptSource: Unrestricted ruleInconclusive: Warn ruleSuppressed: Warn suppressionGroupExpired: Warn unprocessedObject: Warn CONFIGURE FORMATS format: yaml: types: - .yaml - .yml json: types: - .json - .jsonc - .sarif markdown: types: - .md - .markdown powershell_data: types: - .psd1 CONFIGURE INCLUDE OPTIONS include: module: [ ] path: - '.ps-rule/' CONFIGURES INPUT OPTIONS input: format: Detect ignoreGitPath: true ignoreObjectSource: false ignoreRepositoryCommon: true ignoreUnchangedPath: false objectPath: null pathIgnore: [ ] targetType: [ ] CONFIGURES OUTCOME LOGGING OPTIONS logging: limitDebug: [ ] limitVerbose: [ ] ruleFail: None rulePass: None output: as: Detail banner: Default culture: [ ] encoding: Default footer: Default format: None jobSummaryPath: null outcome: Processed sarifProblemsOnly: true style: Detect override: level: { } CONFIGURE RULE SUPPRESSION suppression: { } CONFIGURE BASELINE OPTIONS binding: field: { } ignoreCase: true nameSeparator: '/' preferTargetInfo: false targetName: - TargetName - Name targetType: - PSObject.TypeNames[0] useQualifiedName: false configuration: { } rule: include: [ ] includeLocal: false exclude: [ ] tag: { } ``` NOTE An online version of this document is available at <https://microsoft.github.io/PSRule/v2/concepts/PSRule/en-US/about_PSRule_Options/>. SEE ALSO - Invoke-PSRule - New-PSRuleOption - Set-PSRuleOption KEYWORDS - Options - PSRule - TargetInfo - Binding [about_PSRule_Assert]: about_PSRule_Assert.md |