From 5701167794183a1943e7a74aa53d829c468d0762 Mon Sep 17 00:00:00 2001 From: June Blender Date: Wed, 11 Nov 2015 21:50:40 -0700 Subject: [PATCH] First draft of cmdlet help file --- ...ows.PowerShell.ScriptAnalyzer.dll-Help.xml | 675 ++++++++++++++++++ 1 file changed, 675 insertions(+) create mode 100644 Engine/Microsoft.Windows.PowerShell.ScriptAnalyzer.dll-Help.xml diff --git a/Engine/Microsoft.Windows.PowerShell.ScriptAnalyzer.dll-Help.xml b/Engine/Microsoft.Windows.PowerShell.ScriptAnalyzer.dll-Help.xml new file mode 100644 index 000000000..5c176a9f2 --- /dev/null +++ b/Engine/Microsoft.Windows.PowerShell.ScriptAnalyzer.dll-Help.xml @@ -0,0 +1,675 @@ + + + + + + + + + Get-ScriptAnalyzerRule + + Gets the script analyzer rules on the local computer. + + + + + Get + ScriptAnalyzerRule + + + + Gets the script analyzer rules on the local computer. You can select rules by Name, Severity, Source, or SourceType, or even particular words in the rule description. + +Use this cmdlet to create collections of rules to include and exclude when running the Invoke-ScriptAnalyzer cmdlet. +To get information about the rules, see the value of the Description property of each rule. + +The PSScriptAnalyzer module tests the Windows PowerShell code in a script, module, or DSC resource to determine whether, and to what extent, it fulfils best practice standards. For more information about PSScriptAnalyzer, type: Get-Help about_PSScriptAnalyzer. + +PSScriptAnalyzer is an open-source project. To contribute or file an issue, see GitHub.com\PowerShell\PSScriptAnalyzer. + + + + + Get-ScriptAnalyzerRule + + CustomizedRulePath + + Gets the Script Analyzer rules in the specified path. By default, PSScriptAnalyzer gets the rules specified in the Microsoft.Windows.PowerShell.ScriptAnalyzer.BuiltinRules.dll file in the module. + +You can create customized rules by using a custom .NET assembly or a Windows PowerShell module, such as the Community Analyzer Rules in +https://github.com/PowerShell/PSScriptAnalyzer/blob/development/Tests/Engine/CommunityAnalyzerRules/CommunityAnalyzerRules.psm1. + + String[] + The rules in Microsoft.Windows.PowerShell.ScriptAnalyzer.BuiltinRules.dll. + + + Name + + Gets only rules with the specified name or name pattern. By default, Get-ScriptAnalyzerRule gets all rules in the current rule path. Wildcards are supported. + + String[] + All rules + + + Severity + + Gets only rules with the specified severity values. Valid values are Information, Warning, and Error. By default, Get-ScriptAnalyzerRule gets all rules in the current rule path. + + String[] + All rules + + + + + + + CustomizedRulePath + + Gets the Script Analyzer rules in the specified path. By default, PSScriptAnalyzer gets the rules specified in the Microsoft.Windows.PowerShell.ScriptAnalyzer.BuiltinRules.dll file in the module. + +You can create customized rules by using a custom .NET assembly or a Windows PowerShell module, such as the Community Analyzer Rules in +https://github.com/PowerShell/PSScriptAnalyzer/blob/development/Tests/Engine/CommunityAnalyzerRules/CommunityAnalyzerRules.psm1. + + String[] + + String[] + + + The rules in Microsoft.Windows.PowerShell.ScriptAnalyzer.BuiltinRules.dll. + + + Name + + Gets only rules with the specified name or name pattern. By default, Get-ScriptAnalyzerRule gets all rules in the current rule path. Wildcards are supported. + + String[] + + String[] + + + All rules + + + Severity + + Gets only rules with the specified severity values. Valid values are Information, Warning, and Error. By default, Get-ScriptAnalyzerRule gets all rules in the current rule path. + + String[] + + String[] + + + All rules + + + + + + + You cannot pipe input to this cmdlet. + + + None + + + + + + + + + + The RuleInfo object is a custom object created especially for Script Analyzer. It is not documented in MSDN. + + + Microsoft.Windows.PowerShell.ScriptAnalyzer.Generic.RuleInfo + + + + + + + + -------------------------- EXAMPLE 1 -------------------------- + + PS C:\> + + Get-ScriptAnalyzerRule + + This command gets all script analyzer rules on the local computer. + + + + -------------------------- EXAMPLE 2 -------------------------- + + PS C:\> + + Get-ScriptAnalyzerRule -Severity Error + + This command gets only rules with the Error severity. + + + + -------------------------- EXAMPLE 3 -------------------------- + + PS C:\> + + $DSCError = Get-ScriptAnalyzerRule -Severity Error | Where SourceName -eq PSDSC + +PS C:\>$Path = "$home\Documents\WindowsPowerShell\Modules\MyDSCModule\*" + +PS C:\> Invoke-ScriptAnalyzerRule -Path $Path -IncludeRule $DSCError -Recurse + + + This example runs only the DSC rules with the Error severity on the files in the MyDSCModule module. + +Using the IncludeRule parameter of Invoke-ScriptAnalyzerRule is much more efficient than using its Severity parameter, which is applied only after using all rules to analyze all module files. + + + + -------------------------- EXAMPLE 4 -------------------------- + + PS C:\> + + $TestParameters = Get-ScriptAnalyzerRule -Severity Error, Warning -Name *Parameter* + + This command gets rules with "Parameter" in the name that generate an Error or Warning. Use this set of rules to test the parameters of your script or module. + + + + + + Online version: + http://go.microsoft.com/fwlink/?LinkId=525913 + + + + Invoke-ScriptAnalyzer + + + about_PSScriptAnalyzer + + + PSScriptAnalyzer on GitHub + https://github.com/PowerShell/PSScriptAnalyzer + + + + + + + Invoke-ScriptAnalyzer + + Evaluates a script or module based on selected best practice rules + + + + + Invoke + ScriptAnalyzer + + + + Invoke-ScriptAnalyzer evaluates a script or module based on a collection of best practice rules and returns objects that represent rule violations. In each evaluation, you can run all rules or use the IncludeRule and ExcludeRule parameters to run only selected rules. Invoke-ScriptAnalyzer includes special rules to analyze DSC resources. + +Invoke-ScriptAnalyzer evaluates only .ps1 and .psm1 files. If you specify a path with multiple file types, the .ps1 and .psm1 files are tested; all other file types are ignored. + +Invoke-ScriptAnalzyer comes with a set of built-in rules, but you can also use customized rules that you write in Windows PowerShell scripts, or compile in assemblies by using C#. Just as with the built-in rules, you can add the ExcludeRule and IncludeRule parameters to your Invoke-ScriptAnalyzer command to exclude or include custom rules. + +To analyze your script or module, begin by using the Get-ScriptAnalyzerRule cmdlet to examine and select the rules you want to include and/or exclude from the evaluation. + +You can also include a rule in the analysis, but suppress the output of that rule for selected functions or scripts. This feature should be used only when absolutely necessary. To get rules that were suppressed, run Invoke-ScriptAnalyzer with the SuppressedOnly parameter. For instructions on suppressing a rule, see the description of the SuppressedOnly parameter. + +The PSScriptAnalyzer module tests the Windows PowerShell code in a script, module, or DSC resource to determine whether, and to what extent, it fulfils best practice standards. For more information about PSScriptAnalyzer, type: Get-Help about_PSScriptAnalyzer. + +PSScriptAnalyzer is an open-source project. To contribute or file an issue, see GitHub.com\PowerShell\PSScriptAnalyzer. + + + + + Invoke-ScriptAnalyzer + + Path + + Specifies the path to the scripts or module to be analyzed. Wildcard characters are supported. + +Enter the path to a script (.ps1) or module file (.psm1) or to a directory that contains scripts or modules. If the directory contains other types of files, they are ignored. + +To analyze files that are not in the root directory of the specified path, use a wildcard character (C:\Modules\MyModule\*) or the Recurse parameter. + + String + + + + + CustomizedRulePath + + Adds the custom rules defined in the specified paths to the analysis. Enter one or more paths to Windows PowerShell modules or .NET assemblies that define rules. + +By default, Invoke-ScriptAnalyzer uses only rules defined in the Microsoft.Windows.PowerShell.ScriptAnalyzer.BuiltinRules.dll file in the PSScriptAnalyzer module. + +If Invoke-ScriptAnalyzer cannot find rules in the CustomizedRulePath, it runs the standard rules without notice. + + String[] + The rules in Microsoft.Windows.PowerShell.ScriptAnalyzer.BuiltinRules.dll. + + + ExcludeRule + + Omits the specified rules from the Script Analyzer test. Wildcard characters are supported. + +Enter a comma-separated list of rule names, a variable that contains rule names, or a command that gets rule names. You can also specify a list of excluded rules in a Script Analyzer profile file. You can exclude standard rules and rules in a custom rule path. + +When you exclude a rule, the rule does not run on any of the files in the path. To exclude a rule on a particular line, parameter, function, script, or class, adjust the Path parameter or suppress the rule. For information about suppressing a rule, see the examples. + +If a rule is specified in both the ExcludeRule and IncludeRule collections, the rule is excluded. + + String[] + All rules are included. + + + IncludeRule + + Runs only the specified rules in the Script Analyzer test. By default, PSScriptAnalyzer runs all rules. + +Enter a comma-separated list of rule names, a variable that contains rule names, or a command that gets rule names. Wildcard characters are supported. You can also specify rule names in a Script Analyzer profile file. + +When you use the CustomizedRulePath parameter, you can use this parameter to include standard rules and rules in the custom rule paths. + +If a rule is specified in both the ExcludeRule and IncludeRule collections, the rule is excluded. + +Also, Severity takes precedence over IncludeRule. For example, if Severity is Error, you cannot use IncludeRule to include a Warning rule. + + String[] + All rules are included. + + + Severity + + After running Script Analyzer with all rules, this parameter selects rule violations with the specified severity. + +Valid values are: Error, Warning, and Information. You can specify one ore more severity values. + +Because this parameter filters the rules only after running with all rules, it is not an efficient filter. To filter rules efficiently, use Get-ScriptAnalyzer rule to get the rules you want to run or exclude and then use the ExcludeRule or IncludeRule parameters. + +Also, Severity takes precedence over IncludeRule. For example, if Severity is Error, you cannot use IncludeRule to include a Warning rule. + + String[] + All rule violations + + + Recurse + + Runs Script Analyzer on the files in the Path directory and all subdirectories recursively. + +Recurse applies only to the Path parameter value; not to the CustomizedRulePath parameter. + + SwitchParameter + False + + + SuppressedOnly + + Returns rules that are suppressed, instead of analyzing the files in the path. + +When you used SuppressedOnly, Invoke-ScriptAnalyzer returns a SuppressedRecord object (Microsoft.Windows.PowerShell.ScriptAnalyzer.Generic.SuppressedRecord). + +To suppress a rule, use the SuppressMessageAttribute. For help, see the examples. + + SwitchParameter + False + + + Profile + + Runs Invoke-ScriptAnalyzer with the parameters and values specified in a Script Analyzer profile file. Enter the path to the profile file. + +If the path, the file, or its content is invalid, it is ignored. The parameters and values in the profile take precedence over the same parameter and values specified at the command line. + +A Script Analyzer profile file is a text file that contains a hash table with one or more of the following keys: +-- Severity +-- IncludeRules +-- ExcludeRules + +The keys and values in the profile are interpreted as if they were standard parameters and parameter values. + +To specify a single value, enclose the value in quotation marks. For example: + + @{ Severity = 'Error'} + +To specify multiple values, enclose the values in an array. For example: + + @{ Severity = 'Error', 'Warning'} + + String + Uses the parameters and values specified at the command line. + + + + + + + Path + + Specifies the path to the scripts or module to be analyzed. Wildcard characters are supported. + +Enter the path to a script (.ps1) or module file (.psm1) or to a directory that contains scripts or modules. If the directory contains other types of files, they are ignored. + +To analyze files that are not in the root directory of the specified path, use a wildcard character (C:\Modules\MyModule\*) or the Recurse parameter. + + String + + String + + + + + + + CustomizedRulePath + + Adds the custom rules defined in the specified paths to the analysis. Enter one or more paths to Windows PowerShell modules or .NET assemblies that define rules. + +By default, Invoke-ScriptAnalyzer uses only rules defined in the Microsoft.Windows.PowerShell.ScriptAnalyzer.BuiltinRules.dll file in the PSScriptAnalyzer module. + +If Invoke-ScriptAnalyzer cannot find rules in the CustomizedRulePath, it runs the standard rules without notice. + + String[] + + String[] + + + The rules in Microsoft.Windows.PowerShell.ScriptAnalyzer.BuiltinRules.dll. + + + ExcludeRule + + Omits the specified rules from the Script Analyzer test. Wildcard characters are supported. + +Enter a comma-separated list of rule names, a variable that contains rule names, or a command that gets rule names. You can also specify a list of excluded rules in a Script Analyzer profile file. You can exclude standard rules and rules in a custom rule path. + +When you exclude a rule, the rule does not run on any of the files in the path. To exclude a rule on a particular line, parameter, function, script, or class, adjust the Path parameter or suppress the rule. For information about suppressing a rule, see the examples. + +If a rule is specified in both the ExcludeRule and IncludeRule collections, the rule is excluded. + + String[] + + String[] + + + All rules are included. + + + IncludeRule + + Runs only the specified rules in the Script Analyzer test. By default, PSScriptAnalyzer runs all rules. + +Enter a comma-separated list of rule names, a variable that contains rule names, or a command that gets rule names. Wildcard characters are supported. You can also specify rule names in a Script Analyzer profile file. + +When you use the CustomizedRulePath parameter, you can use this parameter to include standard rules and rules in the custom rule paths. + +If a rule is specified in both the ExcludeRule and IncludeRule collections, the rule is excluded. + +Also, Severity takes precedence over IncludeRule. For example, if Severity is Error, you cannot use IncludeRule to include a Warning rule. + + String[] + + String[] + + + All rules are included. + + + Severity + + After running Script Analyzer with all rules, this parameter selects rule violations with the specified severity. + +Valid values are: Error, Warning, and Information. You can specify one ore more severity values. + +Because this parameter filters the rules only after running with all rules, it is not an efficient filter. To filter rules efficiently, use Get-ScriptAnalyzer rule to get the rules you want to run or exclude and then use the ExcludeRule or IncludeRule parameters. + +Also, Severity takes precedence over IncludeRule. For example, if Severity is Error, you cannot use IncludeRule to include a Warning rule. + + String[] + + String[] + + + All rule violations + + + Recurse + + Runs Script Analyzer on the files in the Path directory and all subdirectories recursively. + +Recurse applies only to the Path parameter value; not to the CustomizedRulePath parameter. + + SwitchParameter + + SwitchParameter + + + False + + + SuppressedOnly + + Returns rules that are suppressed, instead of analyzing the files in the path. + +When you used SuppressedOnly, Invoke-ScriptAnalyzer returns a SuppressedRecord object (Microsoft.Windows.PowerShell.ScriptAnalyzer.Generic.SuppressedRecord). + +To suppress a rule, use the SuppressMessageAttribute. For help, see the examples. + + SwitchParameter + + SwitchParameter + + + False + + + Profile + + Runs Invoke-ScriptAnalyzer with the parameters and values specified in a Script Analyzer profile file. Enter the path to the profile file. + +If the path, the file, or its content is invalid, it is ignored. The parameters and values in the profile take precedence over the same parameter and values specified at the command line. + +A Script Analyzer profile file is a text file that contains a hash table with one or more of the following keys: +-- Severity +-- IncludeRules +-- ExcludeRules + +The keys and values in the profile are interpreted as if they were standard parameters and parameter values. + +To specify a single value, enclose the value in quotation marks. For example: + + @{ Severity = 'Error'} + +To specify multiple values, enclose the values in an array. For example: + + @{ Severity = 'Error', 'Warning'} + + String + + String + + + Uses the parameters and values specified at the command line. + + + + + + + You cannot pipe input to this cmdlet. + + + None + + + + + + + + + + + By default, Invoke-ScriptAnalyzer returns one DiagnosticRecord object to report a rule violation. If you use the SuppressedOnly parameter, Invoke-ScriptAnalyzer instead returns a SuppressedRecord object. + + + Microsoft.Windows.PowerShell.ScriptAnalyzer.Generic.DiagnosticRecord, Microsoft.Windows.PowerShell.ScriptAnalyzer.Generic.SuppressedRecord + + + + + + + + -------------------------- EXAMPLE 1 -------------------------- + + PS C:\> + + Invoke-ScriptAnalyzer -Path $pshome\Modules\PSDiagnostics\PSDiagnostics.psm1 + + This command runs all Script Analyzer rules on the .psm1 file of the PSDiagnostics module. + + + + -------------------------- EXAMPLE 2 -------------------------- + + PS C:\> + + Invoke-ScriptAnalyzer -Path C:\Scripts -Recurse + + This command runs all Script Analyzer rules on all .ps1 and .psm1 files in the C:\Scripts directory and its subdirectories. + + + + -------------------------- EXAMPLE 3 -------------------------- + + PS C:\> + + Invoke-ScriptAnalyzer -Path C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PSDiagnostics\PSDiagnostics.psm1 -IncludeRule PSAvoidUsingPositionalParameters + + This command runs only the PSAvoidUsingPositionalParameters rule. You might use a command like this to find all instances of a particular rule violation while working to eliminate it. + + + + -------------------------- EXAMPLE 4 -------------------------- + + PS C:\> + + Invoke-ScriptAnalyzer -Path C:\ps-test\MyModule -Recurse -ExcludeRule PSAvoidUsingCmdletAliases, PSAvoidUsingInternalURLs + + + This command runs Script Analyzer on the .ps1 and .psm1 files in the MyModules directory (and its subdirectories) with all rules except for PSAvoidUsingCmdletAliases and PSAvoidUsingInternalURLs. + + + + -------------------------- EXAMPLE 5 -------------------------- + + PS C:\> + + Invoke-ScriptAnalyzer -Path D:\test_scripts\Test-Script.ps1 -CustomizedRulePath C:\CommunityAnalyzerRules + + This command runs Script Analyzer with the standard rules and rules in the C:\CommunityAnalyzerRules path. + + + + -------------------------- EXAMPLE 6 -------------------------- + + PS C:\> + + $DSCError = Get-ScriptAnalyzerRule -Severity Error | Where SourceName -eq PSDSC + +PS C:\>$Path = "$home\Documents\WindowsPowerShell\Modules\MyDSCModule" + +PS C:\> Invoke-ScriptAnalyzerRule -Path $Path -IncludeRule $DSCError -Recurse + + This example runs only the rules that are Error severity and have the PSDSC source name. + + + + -------------------------- EXAMPLE 7 -------------------------- + + PS C:\> + + function Get-Widgets +{ + [CmdletBinding()] + [System.Diagnostics.CodeAnalysis.SuppressMessageAttribute("PSUseSingularNouns")] + [System.Diagnostics.CodeAnalysis.SuppressMessageAttribute("PSAvoidUsingCmdletAliases", Justification="Resolution in progress.")] + Param() + + dir $pshome + ... +} + +PS C:\> Invoke-ScriptAnalyzer -Path .\Get-Widgets.ps1 + +RuleName Severity FileName Line Message +-------- -------- -------- ---- ------- +PSProvideCommentHelp Information ManageProf 14 The cmdlet 'Get-Widget' does not have a help comment. + iles.psm1 + +PS C:\> Invoke-ScriptAnalyzer -Path .\Get-Widgets.ps1 -SuppressedOnly + +Rule Name Severity File Name Line Justification +--------- -------- --------- ---- ------------- +PSAvoidUsingCmdletAliases Warning ManageProf 21 Resolution in progress. + iles.psm1 +PSUseSingularNouns Warning ManageProf 14 + iles.psm1 + + This example shows how to suppress the reporting of rule violations in a function and how to discover rule violations that are suppressed. + +The example uses the SuppressMessageAttribute attribute to suppress the PSUseSingularNouns and PSAvoidUsingCmdletAliases rules for the Get-Widgets function in the Get-Widgets.ps1 script. You can use this attribute to suppress a rule for a module, script, class, function, parameter, or line. + +The first command runs Script Analyzer on the script that contains the Get-Widgets function. The output reports a rule violation, but neither of the suppressed rules is listed, even though they are violated. + +The second command uses the SuppressedOnly parameter to discover the rules that are supressed in the Get-Widgets.ps1 file. The output reports the suppressed rules. + + + + -------------------------- EXAMPLE 8 -------------------------- + + PS C:\> + + # In .\ScriptAnalyzerProfile.txt +@{ + Severity = @('Error', 'Warning') + IncludeRules = 'PSAvoid*' + ExcludeRules = '*WriteHost' +} + +PS C:\> Invoke-ScriptAnalyzer -Path $pshome\Modules\BitLocker -Profile .\ScriptAnalyzerProfile.txt + + In this example, we create a Script Analyzer profile and save it in the ScriptAnalyzerProfile.txt file in the local directory. + +Next, we run Invoke-ScriptAnalyzer on the BitLocker module files. The value of the Profile parameter is the path to the Script Analyzer profile. + +If you include a conflicting parameter in the Invoke-ScriptAnalyzer command, such as '-Severity Error', Invoke-ScriptAnalyzer uses the profile value and ignores the parameter. + + + + + + + Online version: + http://go.microsoft.com/fwlink/?LinkId=525914 + + + Get-ScriptAnalyzerRule + + + about_PSScriptAnalyzer + + + PSScriptAnalyzer on GitHub + https://github.com/PowerShell/PSScriptAnalyzer + + + + + \ No newline at end of file