Skip to content

Options#

Describes additional options that can be used during rule execution.

Description#

PSRule lets you use options when calling cmdlets such as Invoke-PSRule and Test-PSRuleTarget to change how rules are processed. This topic describes what options are available, when to and how to use them.

The following workspace options are available for use:

Additionally the following baseline options can be included:

See about_PSRule_Baseline for more information on baseline options.

Options can be used with the following PSRule cmdlets:

  • Export-PSRuleBaseline
  • Get-PSRule
  • Get-PSRuleBaseline
  • Get-PSRuleHelp
  • Invoke-PSRule
  • Test-PSRuleTarget

Each of these cmdlets support:

  • Using the -Option parameter with an object created with the New-PSRuleOption cmdlet. See cmdlet help for syntax and examples.
  • Using the -Option parameter with a hashtable object.
  • Using the -Option parameter with a YAML file path.

When using a hashtable object @{}, one or more options can be specified as keys using a dotted notation.

For example:

$option = @{ 'Output.Format' = 'Yaml' };
Invoke-PSRule -Path . -Option $option;
Invoke-PSRule -Path . -Option @{ 'Output.Format' = 'Yaml' };

The above example shows how the Output.Format option as a hashtable key can be used. Continue reading for a full list of options and how each can be used.

Alternatively, options can be stored in a YAML formatted file and loaded from disk. Storing options as YAML allows different configurations to be loaded in a repeatable way instead of having to create an options object each time.

Options are stored as YAML properties using a lower camel case naming convention, for example:

output:
  format: Yaml

The Set-PSRuleOption cmdlet can be used to set options stored in YAML or the YAML file can be manually edited.

Set-PSRuleOption -OutputFormat Yaml;

By default, PSRule will automatically look for a default YAML options file in the current working directory. Alternatively, you can specify a specific file path.

For example:

Invoke-PSRule -Option '.\myconfig.yml';
New-PSRuleOption -Path '.\myconfig.yaml';

PSRule uses any of the following file names (in order) as the default YAML options file. If more than one of these files exist, the following order will be used to find the first match.

  • ps-rule.yaml
  • ps-rule.yml
  • psrule.yaml
  • psrule.yml

We recommend only using lowercase characters as shown above. This is because not all operating systems treat case in the same way.

Most options can be set using environment variables. When configuring environment variables we recommend that all capital letters are used. This is because environment variables are case-sensitive on some operating systems.

PSRule environment variables use a consistent naming pattern of PSRULE_<PARENT>_<NAME>. Where <PARENT> is the parent class and <NAME> is the specific option. For example:

  • Execution.InconclusiveWarning is configured by PSRULE_EXECUTION_INCONCLUSIVEWARNING.
  • Input.TargetType is configured by PSRULE_INPUT_TARGETTYPE.
  • Output.Format is configured by PSRULE_OUTPUT_FORMAT.

When setting environment variables:

  • Enum values are set by string. For example PSRULE_OUTPUT_FORMAT could be set to Yaml. Enum values are case-insensitive.
  • Boolean values are set by true, false, 1, or 0. For example PSRULE_EXECUTION_INCONCLUSIVEWARNING could be set to false. Boolean values are case-insensitive.
  • String array values can specify multiple items by using a semi-colon separator. For example PSRULE_INPUT_TARGETTYPE could be set to virtualMachine;virtualNetwork.

Baseline.Group#

You can use a baseline group to provide a friendly name to an existing baseline. When you run PSRule you can opt to use the baseline group name as an alternative name for the baseline. To indicate a baseline group, prefix the group name with @ where you would use the name of a baseline.

Baseline groups can be specified using:

# PowerShell: Using the BaselineGroup parameter
$option = New-PSRuleOption -BaselineGroup @{ latest = 'YourBaseline' };
# PowerShell: Using the Baseline.Group hashtable key
$option = New-PSRuleOption -Option @{ 'Baseline.Group' = @{ latest = 'YourBaseline' } };
# PowerShell: Using the BaselineGroup parameter to set YAML
Set-PSRuleOption -BaselineGroup @{ latest = 'YourBaseline' };
# YAML: Using the baseline/group property
baseline:
  group:
    latest: YourBaseline
# Bash: Using environment variable
export PSRULE_BASELINE_GROUP='latest=YourBaseline'
# GitHub Actions: Using environment variable
env:
  PSRULE_BASELINE_GROUP: 'latest=YourBaseline'
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_BASELINE_GROUP
  value: 'latest=YourBaseline'

Binding.Field#

When an object is passed from the pipeline, PSRule automatically extracts fields from object properties. PSRule provides standard fields such as TargetName and TargetType. In addition to standard fields, custom fields can be bound. Custom fields are available to rules and included in output.

PSRule uses the following logic to determine which property should be used for binding:

  • By default PSRule will not extract any custom fields.
  • If custom fields are configured, PSRule will attempt to bind the field.
    • If none of the configured property names exist, the field will be skipped.
    • If more then one property name is configured, the order they are specified in the configuration determines precedence.
      • i.e. The first configured property name will take precedence over the second property name.
    • By default the property name will be matched ignoring case sensitivity. To use a case sensitive match, configure the Binding.IgnoreCase option.

Custom field bindings can be specified using:

# PowerShell: Using the BindingField parameter
$option = New-PSRuleOption -BindingField @{ id = 'ResourceId', 'AlternativeId' };
# PowerShell: Using the Binding.Field hashtable key
$option = New-PSRuleOption -Option @{ 'Binding.Field' = @{ id = 'ResourceId', 'AlternativeId' } };
# PowerShell: Using the BindingField parameter to set YAML
Set-PSRuleOption -BindingField @{ id = 'ResourceId', 'AlternativeId' };
# YAML: Using the binding/field property
binding:
  field:
    id:
    - ResourceId
    - AlternativeId

Binding.IgnoreCase#

When evaluating an object, PSRule extracts a few key properties from the object to help filter rules and display output results. The process of extract these key properties is called binding. The properties that PSRule uses for binding can be customized by providing a order list of alternative properties to use. See Binding.TargetName and Binding.TargetType for these options.

  • By default, custom property binding finds the first matching property by name regardless of case. i.e. Binding.IgnoreCase is true.
  • To make custom bindings case sensitive, set the Binding.IgnoreCase option to false.
    • Changing this option will affect custom property bindings for both TargetName and TargetType.
    • Setting this option has no affect on binding defaults or custom scripts.

This option can be specified using:

# PowerShell: Using the BindingIgnoreCase parameter
$option = New-PSRuleOption -BindingIgnoreCase $False;
# PowerShell: Using the Binding.IgnoreCase hashtable key
$option = New-PSRuleOption -Option @{ 'Binding.IgnoreCase' = $False };
# PowerShell: Using the BindingIgnoreCase parameter to set YAML
Set-PSRuleOption -BindingIgnoreCase $False;
# YAML: Using the binding/ignoreCase property
binding:
  ignoreCase: false
# Bash: Using environment variable
export PSRULE_BINDING_IGNORECASE=false
# GitHub Actions: Using environment variable
env:
  PSRULE_BINDING_IGNORECASE: false
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_BINDING_IGNORECASE
  value: false

Binding.NameSeparator#

When an object is passed from the pipeline, PSRule assigns the object a TargetName. TargetName is used in output results to identify one object from another.

In cases where different types of objects share the same TargetName, this may become confusing. Using a qualified name, prefixes the TargetName with TargetType. i.e. TargetType/TargetName

To use a qualified name, see the Binding.UseQualifiedName option.

By default, PSRule uses / to separate TargetType from TargetName. This option configures the separator that PSRule uses between the two components.

This option can be specified using:

# PowerShell: Using the BindingNameSeparator parameter
$option = New-PSRuleOption -BindingNameSeparator '::';
# PowerShell: Using the Binding.NameSeparator hashtable key
$option = New-PSRuleOption -Option @{ 'Binding.NameSeparator' = '::' };
# PowerShell: Using the BindingNameSeparator parameter to set YAML
Set-PSRuleOption -BindingNameSeparator '::';
# YAML: Using the binding/nameSeparator property
binding:
  nameSeparator: '::'
# Bash: Using environment variable
export PSRULE_BINDING_NAMESEPARATOR='::'
# GitHub Actions: Using environment variable
env:
  PSRULE_BINDING_NAMESEPARATOR: '::'
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_BINDING_NAMESEPARATOR
  value: '::'

Binding.PreferTargetInfo#

Some built-in objects within PSRule perform automatic binding of TargetName and TargetType. These built-in objects provide their own target info.

When binding has been configured these values override automatic binding by default. This can occur when the built-in object uses one of the fields specified by the custom configuration. The common occurrences of this are on fields such as Name and FullName which are widely used. To prefer automatic binding when specified set this option to $True.

This option can be specified using:

# PowerShell: Using the BindingPreferTargetInfo parameter
$option = New-PSRuleOption -BindingPreferTargetInfo $True;
# PowerShell: Using the Binding.PreferTargetInfo hashtable key
$option = New-PSRuleOption -Option @{ 'Binding.PreferTargetInfo' = $True };
# PowerShell: Using the BindingPreferTargetInfo parameter to set YAML
Set-PSRuleOption -BindingPreferTargetInfo $True;
# YAML: Using the binding/preferTargetInfo property
binding:
  preferTargetInfo: true
# Bash: Using environment variable
export PSRULE_BINDING_PREFERTARGETINFO=false
# GitHub Actions: Using environment variable
env:
  PSRULE_BINDING_PREFERTARGETINFO: false
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_BINDING_PREFERTARGETINFO
  value: false

Binding.TargetName#

When an object is passed from the pipeline, PSRule assigns the object a TargetName. TargetName is used in output results to identify one object from another. Many objects could be passed down the pipeline at the same time, so using a TargetName that is meaningful is important. TargetName is also used for advanced features such as rule suppression.

The value that PSRule uses for TargetName is configurable. PSRule uses the following logic to determine what TargetName should be used:

  • By default PSRule will:
    • Use TargetName or Name properties on the object. These property names are case insensitive.
    • If both TargetName and Name properties exist, TargetName will take precedence over Name.
    • If neither TargetName or Name properties exist, a SHA1 hash of the object will be used as TargetName.
  • If custom TargetName binding properties are configured, the property names specified will override the defaults.
    • If none of the configured property names exist, PSRule will revert back to TargetName then Name.
    • If more then one property name is configured, the order they are specified in the configuration determines precedence.
      • i.e. The first configured property name will take precedence over the second property name.
    • By default the property name will be matched ignoring case sensitivity. To use a case sensitive match, configure the Binding.IgnoreCase option.
  • If a custom TargetName binding function is specified, the function will be evaluated first before any other option.
    • If the function returns $Null then custom properties, TargetName and Name properties will be used.
    • The custom binding function is executed outside the PSRule engine, so PSRule keywords and variables will not be available.
    • Custom binding functions are blocked in constrained language mode is used. See language mode for more information.

Custom property names to use for binding can be specified using:

# PowerShell: Using the TargetName parameter
$option = New-PSRuleOption -TargetName 'ResourceName', 'AlternateName';
# PowerShell: Using the Binding.TargetName hashtable key
$option = New-PSRuleOption -Option @{ 'Binding.TargetName' = 'ResourceName', 'AlternateName' };
# PowerShell: Using the TargetName parameter to set YAML
Set-PSRuleOption -TargetName 'ResourceName', 'AlternateName';
# YAML: Using the binding/targetName property
binding:
  targetName:
  - ResourceName
  - AlternateName
# Bash: Using environment variable
export PSRULE_BINDING_TARGETNAME='ResourceName;AlternateName'
# GitHub Actions: Using environment variable
env:
  PSRULE_BINDING_TARGETNAME: 'ResourceName;AlternateName'
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_BINDING_TARGETNAME
  value: 'ResourceName;AlternateName'

To specify a custom binding function use:

# Create a custom function that returns a TargetName string
$bindFn = {
    param ($TargetObject)

    $otherName = $TargetObject.PSObject.Properties['OtherName'];
    if ($Null -eq $otherName) { return $Null }
    return $otherName.Value;
}

# Specify the binding function script block code to execute
$option = New-PSRuleOption -BindTargetName $bindFn;

Binding.TargetType#

When an object is passed from the pipeline, PSRule assigns the object a TargetType. TargetType is used to filter rules based on object type and appears in output results.

The value that PSRule uses for TargetType is configurable. PSRule uses the following logic to determine what TargetType should be used:

  • By default PSRule will:
    • Use the default type presented by PowerShell from TypeNames. i.e. .PSObject.TypeNames[0]
  • If custom TargetType binding properties are configured, the property names specified will override the defaults.
    • If none of the configured property names exist, PSRule will revert back to the type presented by PowerShell.
    • If more then one property name is configured, the order they are specified in the configuration determines precedence.
      • i.e. The first configured property name will take precedence over the second property name.
    • By default the property name will be matched ignoring case sensitivity. To use a case sensitive match, configure the Binding.IgnoreCase option.
  • If a custom TargetType binding function is specified, the function will be evaluated first before any other option.
    • If the function returns $Null then custom properties, or the type presented by PowerShell will be used in order instead.
    • The custom binding function is executed outside the PSRule engine, so PSRule keywords and variables will not be available.
    • Custom binding functions are blocked in constrained language mode is used. See language mode for more information.

Custom property names to use for binding can be specified using:

# PowerShell: Using the TargetType parameter
$option = New-PSRuleOption -TargetType 'ResourceType', 'kind';
# PowerShell: Using the Binding.TargetType hashtable key
$option = New-PSRuleOption -Option @{ 'Binding.TargetType' = 'ResourceType', 'kind' };
# PowerShell: Using the TargetType parameter to set YAML
Set-PSRuleOption -TargetType 'ResourceType', 'kind';
# YAML: Using the binding/targetType property
binding:
  targetType:
  - ResourceType
  - kind
# Bash: Using environment variable
export PSRULE_BINDING_TARGETTYPE='ResourceType;kind'
# GitHub Actions: Using environment variable
env:
  PSRULE_BINDING_TARGETTYPE: 'ResourceType;kind'
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_BINDING_TARGETTYPE
  value: 'ResourceType;kind'

To specify a custom binding function use:

# Create a custom function that returns a TargetType string
$bindFn = {
    param ($TargetObject)

    $otherType = $TargetObject.PSObject.Properties['OtherType'];

    if ($otherType -eq $Null) {
        return $Null
    }

    return $otherType.Value;
}

# Specify the binding function script block code to execute
$option = New-PSRuleOption -BindTargetType $bindFn;

Binding.UseQualifiedName#

When an object is passed from the pipeline, PSRule assigns the object a TargetName. TargetName is used in output results to identify one object from another.

In cases where different types of objects share the same TargetName, this may become confusing. Using a qualified name, prefixes the TargetName with TargetType. i.e. TargetType/TargetName

This option determines if PSRule uses qualified or unqualified names (default).

By default, PSRule uses / to separate TargetType from TargetName. Set Binding.NameSeparator to change.

This option can be specified using:

# PowerShell: Using the BindingUseQualifiedName parameter
$option = New-PSRuleOption -BindingUseQualifiedName $True;
# PowerShell: Using the Binding.UseQualifiedName hashtable key
$option = New-PSRuleOption -Option @{ 'Binding.UseQualifiedName' = $True };
# PowerShell: Using the BindingUseQualifiedName parameter to set YAML
Set-PSRuleOption -BindingUseQualifiedName $True;
# YAML: Using the binding/useQualifiedName property
binding:
  useQualifiedName: true
# Bash: Using environment variable
export PSRULE_BINDING_USEQUALIFIEDNAME=false
# GitHub Actions: Using environment variable
env:
  PSRULE_BINDING_USEQUALIFIEDNAME: false
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_BINDING_USEQUALIFIEDNAME
  value: false

Configuration#

Configures a set of baseline configuration values that can be used in rule definitions. Configuration values can be overridden at different scopes.

This option can be specified using:

# PowerShell: Using the Configuration option with a hashtable
$option = New-PSRuleOption -Configuration @{ LOCAL_APPSERVICEMININSTANCECOUNT = 2 };
# YAML: Using the configuration property
configuration:
  LOCAL_APPSERVICEMININSTANCECOUNT: 2

Configuration values can be specified using environment variables. To specify a configuration value, prefix the configuration value with PSRULE_CONFIGURATION_.

# Bash: Using environment variable
export PSRULE_CONFIGURATION_LOCAL_APPSERVICEMININSTANCECOUNT=2
# GitHub Actions: Using environment variable
env:
  PSRULE_CONFIGURATION_LOCAL_APPSERVICEMININSTANCECOUNT: '2'
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_CONFIGURATION_LOCAL_APPSERVICEMININSTANCECOUNT
  value: '2'

Convention.Include#

Specifies conventions to execute when the pipeline run. Conventions are included by name and must be defined within files included in -Path or -Module.

This option can be specified using:

# PowerShell: Using the Convention parameter
$option = New-PSRuleOption -Convention 'Convention1', 'Convention2';
# PowerShell: Using the Convention.Include hashtable key
$option = New-PSRuleOption -Option @{ 'Convention.Include' = $True };
# PowerShell: Using the Convention parameter to set YAML
Set-PSRuleOption -Convention 'Convention1', 'Convention2';
# YAML: Using the convention/include property
convention:
  include:
  - 'Convention1'
  - 'Convention2'
# Bash: Using environment variable
export PSRULE_CONVENTION_INCLUDE='Convention1;Convention2'
# GitHub Actions: Using environment variable
env:
  PSRULE_CONVENTION_INCLUDE: 'Convention1;Convention2'
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_CONVENTION_INCLUDE
  value: 'Convention1;Convention2'

Execution.AliasReference#

Determines how to handle when an alias to a resource is used. By defaut, a warning is generated, however this behaviour can be modified by this option.

This option replaces AliasReferenceWarning. You do not need to configure both options. If AliasReferenceWarning is configured, it will override AliasReference with Warn or Ignore until removal in PSRule v3.

The following preferences are available:

  • None (0) - No preference. Inherits the default of Warn.
  • Ignore (1) - Continue to execute silently.
  • Warn (2) - Continue to execute but log a warning. This is the default.
  • Error (3) - Abort and throw an error.
  • Debug (4) - Continue to execute but log a debug message.
# PowerShell: Using the ExecutionAliasReference parameter
$option = New-PSRuleOption -ExecutionAliasReference 'Error';
# PowerShell: Using the Execution.AliasReference hashtable key
$option = New-PSRuleOption -Option @{ 'Execution.AliasReference' = 'Error' };
# PowerShell: Using the ExecutionAliasReference parameter to set YAML
Set-PSRuleOption -ExecutionAliasReference 'Error';
# YAML: Using the execution/aliasReference property
execution:
  aliasReference: Error
# Bash: Using environment variable
export PSRULE_EXECUTION_ALIASREFERENCE=Error
# GitHub Actions: Using environment variable
env:
  PSRULE_EXECUTION_ALIASREFERENCE: Error
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_EXECUTION_ALIASREFERENCE
  value: Error

Execution.AliasReferenceWarning#

This option has been deprecated and will be removed from v3 in favor of aliasReference. Use aliasReference instead.

Rules may define one or more aliases. These aliases are alternative names to identify the rule. An alias may be used to reference the rule anywhere a rule name is used. The primary purpose of an alias is to provide a non-breaking method to change the rule name. Alises can be removed at a later revision once the rule is no longer referenced by the alias.

A warning is logged by default to help identify when an alias is used. We recommend taking action to update your usage of the alis to use the rule name or ref instead.

Alternatively, the alias reference warning can be disabled by using:

# PowerShell: Using the AliasReferenceWarning parameter
$option = New-PSRuleOption -AliasReferenceWarning $False;
# PowerShell: Using the Execution.AliasReferenceWarning hashtable key
$option = New-PSRuleOption -Option @{ 'Execution.AliasReferenceWarning' = $False };
# PowerShell: Using the AliasReferenceWarning parameter to set YAML
Set-PSRuleOption -AliasReferenceWarning $False;
# YAML: Using the execution/aliasReferenceWarning property
execution:
  aliasReferenceWarning: false
# Bash: Using environment variable
export PSRULE_EXECUTION_ALIASREFERENCEWARNING=false
# GitHub Actions: Using environment variable
env:
  PSRULE_EXECUTION_ALIASREFERENCEWARNING: false
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_EXECUTION_ALIASREFERENCEWARNING
  value: false

Execution.DuplicateResourceId#

Determines how to handle duplicate resources identifiers during execution. A duplicate resource identifier may exist if two resources are defined with the same name, ref, or alias. By defaut, an error is thrown, however this behaviour can be modified by this option.

If this option is configured to Warn or Ignore only the first resource will be used, however PSRule will continue to execute.

The following preferences are available:

  • None (0) - No preference. Inherits the default of Error.
  • Ignore (1) - Continue to execute silently.
  • Warn (2) - Continue to execute but log a warning.
  • Error (3) - Abort and throw an error. This is the default.
  • Debug (4) - Continue to execute but log a debug message.
# PowerShell: Using the DuplicateResourceId parameter
$option = New-PSRuleOption -DuplicateResourceId 'Warn';
# PowerShell: Using the Execution.DuplicateResourceId hashtable key
$option = New-PSRuleOption -Option @{ 'Execution.DuplicateResourceId' = 'Warn' };
# PowerShell: Using the DuplicateResourceId parameter to set YAML
Set-PSRuleOption -DuplicateResourceId 'Warn';
# YAML: Using the execution/duplicateResourceId property
execution:
  duplicateResourceId: Warn
# Bash: Using environment variable
export PSRULE_EXECUTION_DUPLICATERESOURCEID=Warn
# GitHub Actions: Using environment variable
env:
  PSRULE_EXECUTION_DUPLICATERESOURCEID: Warn
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_EXECUTION_DUPLICATERESOURCEID
  value: Warn

Execution.LanguageMode#

Unless PowerShell has been constrained, full language features of PowerShell are available to use within rule definitions. In locked down environments, a reduced set of language features may be desired.

When PSRule is executed in an environment configured for Device Guard, only constrained language features are available.

The following language modes are available for use in PSRule:

  • FullLanguage
  • ConstrainedLanguage

This option can be specified using:

# PowerShell: Using the Execution.LanguageMode hashtable key
$option = New-PSRuleOption -Option @{ 'Execution.LanguageMode' = 'ConstrainedLanguage' };
# YAML: Using the execution/languageMode property
execution:
  languageMode: ConstrainedLanguage
# Bash: Using environment variable
export PSRULE_EXECUTION_LANGUAGEMODE=ConstrainedLanguage
# GitHub Actions: Using environment variable
env:
  PSRULE_EXECUTION_LANGUAGEMODE: ConstrainedLanguage
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_EXECUTION_LANGUAGEMODE
  value: ConstrainedLanguage

Execution.InconclusiveWarning#

This option has been deprecated and will be removed from v3 in favor of ruleInconclusive. Use ruleInconclusive instead.

When defining rules, it is possible not return a valid $True or $False result within the definition script block.

Rule authors should not intentionally avoid returning a result, however a possible cause for not returning a result may be a rule logic error.

If a rule should not be evaluated, use pre-conditions to avoid processing the rule for objects where the rule is not applicable.

In cases where the rule does not return a result it is marked as inconclusive.

Inconclusive results will:

  • Generate a warning by default.
  • Fail the object. Outcome will be reported as Fail with an OutcomeReason of Inconclusive.

The inconclusive warning can be disabled by using:

# PowerShell: Using the InconclusiveWarning parameter
$option = New-PSRuleOption -InconclusiveWarning $False;
# PowerShell: Using the Execution.InconclusiveWarning hashtable key
$option = New-PSRuleOption -Option @{ 'Execution.InconclusiveWarning' = $False };
# PowerShell: Using the InconclusiveWarning parameter to set YAML
Set-PSRuleOption -InconclusiveWarning $False;
# YAML: Using the execution/inconclusiveWarning property
execution:
  inconclusiveWarning: false
# Bash: Using environment variable
export PSRULE_EXECUTION_INCONCLUSIVEWARNING=false
# GitHub Actions: Using environment variable
env:
  PSRULE_EXECUTION_INCONCLUSIVEWARNING: false
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_EXECUTION_INCONCLUSIVEWARNING
  value: false

Execution.InvariantCulture#

Determines how to report when an invariant culture is used. By defaut, a warning is generated, however this behaviour can be modified by this option.

This option replaces InvariantCultureWarning. You do not need to configure both options. If InvariantCultureWarning is configured, it will override InvariantCulture with Warn or Ignore until removal in PSRule v3.

The following preferences are available:

  • None (0) - No preference. Inherits the default of Warn.
  • Ignore (1) - Continue to execute silently.
  • Warn (2) - Continue to execute but log a warning. This is the default.
  • Error (3) - Abort and throw an error.
  • Debug (4) - Continue to execute but log a debug message.
# PowerShell: Using the ExecutionInvariantCulture parameter
$option = New-PSRuleOption -ExecutionInvariantCulture 'Error';
# PowerShell: Using the Execution.InvariantCulture hashtable key
$option = New-PSRuleOption -Option @{ 'Execution.InvariantCulture' = 'Error' };
# PowerShell: Using the ExecutionInvariantCulture parameter to set YAML
Set-PSRuleOption -ExecutionInvariantCulture 'Error';
# YAML: Using the execution/invariantCulture property
execution:
  invariantCulture: Error
# Bash: Using environment variable
export PSRULE_EXECUTION_INVARIANTCULTURE=Error
# GitHub Actions: Using environment variable
env:
  PSRULE_EXECUTION_INVARIANTCULTURE: Error
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_EXECUTION_INVARIANTCULTURE
  value: Error

Execution.InvariantCultureWarning#

This option has been deprecated and will be removed from v3 in favor of invariantCulture. Use invariantCulture instead.

When evaluating rules inside a CI host, if invariant culture is used, a warning is shown by default. You can suppress this warning if you set the culture with -Culture or the Output.Culture option.

This warning can also be suppressed by using:

# PowerShell: Using the InvariantCultureWarning parameter
$option = New-PSRuleOption -InvariantCultureWarning $False;
# PowerShell: Using the Execution.InvariantCultureWarning hashtable key
$option = New-PSRuleOption -Option @{ 'Execution.InvariantCultureWarning' = $False };
# PowerShell: Using the InvariantCultureWarning parameter to set YAML
Set-PSRuleOption -InvariantCultureWarning $False;
# YAML: Using the execution/invariantCultureWarning property
execution:
  invariantCultureWarning: false
# Bash: Using environment variable
export PSRULE_EXECUTION_INVARIANTCULTUREWARNING=false
# GitHub Actions: Using environment variable
env:
  PSRULE_EXECUTION_INVARIANTCULTUREWARNING: false
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_EXECUTION_INVARIANTCULTUREWARNING
  value: false

Execution.InitialSessionState#

Determines how the initial session state for executing PowerShell code is created.

The following preferences are available:

  • BuiltIn (0) - Create the initial session state with all built-in cmdlets loaded. This is the default.
  • Minimal (1) - Create the initial session state with only a minimum set of cmdlets loaded.
# PowerShell: Using the InitialSessionState parameter
$option = New-PSRuleOption -InitialSessionState 'Minimal';
# PowerShell: Using the Execution.InitialSessionState hashtable key
$option = New-PSRuleOption -Option @{ 'Execution.InitialSessionState' = 'Minimal' };
# PowerShell: Using the InitialSessionState parameter to set YAML
Set-PSRuleOption -InitialSessionState 'Minimal';
# YAML: Using the execution/initialSessionState property
execution:
  initialSessionState: Minimal
# Bash: Using environment variable
export PSRULE_EXECUTION_INITIALSESSIONSTATE=Minimal
# GitHub Actions: Using environment variable
env:
  PSRULE_EXECUTION_INITIALSESSIONSTATE: Minimal
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_EXECUTION_INITIALSESSIONSTATE
  value: Minimal

Execution.NotProcessedWarning#

This option has been deprecated and will be removed from v3 in favor of unprocessedObject. Use unprocessedObject instead.

When evaluating rules, it is possible to incorrectly select a path with rules that use pre-conditions that do not accept the pipeline object. In this case the object has not been processed by any rule.

Not processed objects will:

  • Generate a warning by default.
  • Pass the object. Outcome will be reported as None.

The not processed warning can be disabled by using:

# PowerShell: Using the NotProcessedWarning parameter
$option = New-PSRuleOption -NotProcessedWarning $False;
# PowerShell: Using the Execution.NotProcessedWarning hashtable key
$option = New-PSRuleOption -Option @{ 'Execution.NotProcessedWarning' = $False };
# PowerShell: Using the NotProcessedWarning parameter to set YAML
Set-PSRuleOption -NotProcessedWarning $False;
# YAML: Using the execution/notProcessedWarning property
execution:
  notProcessedWarning: false
# Bash: Using environment variable
export PSRULE_EXECUTION_NOTPROCESSEDWARNING=false
# GitHub Actions: Using environment variable
env:
  PSRULE_EXECUTION_NOTPROCESSEDWARNING: false
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_EXECUTION_NOTPROCESSEDWARNING
  value: false

Execution.RuleInconclusive#

Determines how to handle rules that generate inconclusive results. By defaut, a warning is generated, however this behaviour can be modified by this option.

This option replaces InconclusiveWarning. You do not need to configure both options. If InconclusiveWarning is configured, it will override RuleInconclusive with Warn or Ignore until removal in PSRule v3.

The following preferences are available:

  • None (0) - No preference. Inherits the default of Warn.
  • Ignore (1) - Continue to execute silently.
  • Warn (2) - Continue to execute but log a warning. This is the default.
  • Error (3) - Abort and throw an error.
  • Debug (4) - Continue to execute but log a debug message.
# PowerShell: Using the ExecutionRuleInconclusive parameter
$option = New-PSRuleOption -ExecutionRuleInconclusive 'Error';
# PowerShell: Using the Execution.RuleInconclusive hashtable key
$option = New-PSRuleOption -Option @{ 'Execution.RuleInconclusive' = 'Error' };
# PowerShell: Using the ExecutionRuleInconclusive parameter to set YAML
Set-PSRuleOption -ExecutionRuleInconclusive 'Error';
# YAML: Using the execution/ruleInconclusive property
execution:
  ruleInconclusive: Error
# Bash: Using environment variable
export PSRULE_EXECUTION_RULEINCONCLUSIVE=Error
# GitHub Actions: Using environment variable
env:
  PSRULE_EXECUTION_RULEINCONCLUSIVE: Error
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_EXECUTION_RULEINCONCLUSIVE
  value: Error

Execution.SuppressedRuleWarning#

This option has been deprecated and will be removed from v3 in favor of ruleSuppressed. Use ruleSuppressed instead.

When evaluating rules, it is possible to output suppressed rules as warnings.

Suppressed rules will:

  • Output a warning by default.
  • Show which rules were suppressed when Output.As is set to Detail.
  • Show how many rules were suppressed when Output.As is set to Summary.

The suppressed rule can be disabled by using:

# PowerShell: Using the SuppressedRuleWarning parameter
$option = New-PSRuleOption -SuppressedRuleWarning $False;
# PowerShell: Using the Execution.SuppressedRuleWarning hashtable key
$option = New-PSRuleOption -Option @{ 'Execution.SuppressedRuleWarning' = $False };
# PowerShell: Using the SuppressedRuleWarning parameter to set YAML
Set-PSRuleOption -SuppressedRuleWarning $False;
# YAML: Using the execution/suppressedRuleWarning property
execution:
  suppressedRuleWarning: false
# Bash: Using environment variable
export PSRULE_EXECUTION_SUPPRESSEDRULEWARNING=false
# GitHub Actions: Using environment variable
env:
  PSRULE_EXECUTION_SUPPRESSEDRULEWARNING: false
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_EXECUTION_SUPPRESSEDRULEWARNING
  value: false

Execution.SuppressionGroupExpired#

Determines how to handle expired suppression groups. Regardless of the value, an expired suppression group will be ignored. By defaut, a warning is generated, however this behaviour can be modified by this option.

The following preferences are available:

  • None (0) - No preference. Inherits the default of Warn.
  • Ignore (1) - Continue to execute silently.
  • Warn (2) - Continue to execute but log a warning. This is the default.
  • Error (3) - Abort and throw an error.
  • Debug (4) - Continue to execute but log a debug message.
# PowerShell: Using the SuppressionGroupExpired parameter
$option = New-PSRuleOption -SuppressionGroupExpired 'Error';
# PowerShell: Using the Execution.SuppressionGroupExpired hashtable key
$option = New-PSRuleOption -Option @{ 'Execution.SuppressionGroupExpired' = 'Error' };
# PowerShell: Using the SuppressionGroupExpired parameter to set YAML
Set-PSRuleOption -SuppressionGroupExpired 'Error';
# YAML: Using the execution/suppressionGroupExpired property
execution:
  suppressionGroupExpired: Error
# Bash: Using environment variable
export PSRULE_EXECUTION_SUPPRESSIONGROUPEXPIRED=Error
# GitHub Actions: Using environment variable
env:
  PSRULE_EXECUTION_SUPPRESSIONGROUPEXPIRED: Error
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_EXECUTION_SUPPRESSIONGROUPEXPIRED
  value: Error

Execution.RuleExcluded#

Determines how to handle excluded rules. Regardless of the value, excluded rules are ignored. By defaut, a rule is excluded silently, however this behaviour can be modified by this option.

The following preferences are available:

  • None (0) - No preference. Inherits the default of Ignore.
  • Ignore (1) - Continue to execute silently. This is the default.
  • Warn (2) - Continue to execute but log a warning.
  • Error (3) - Abort and throw an error.
  • Debug (4) - Continue to execute but log a debug message.
# PowerShell: Using the ExecutionRuleExcluded parameter
$option = New-PSRuleOption -ExecutionRuleExcluded 'Warn';
# PowerShell: Using the Execution.RuleExcluded hashtable key
$option = New-PSRuleOption -Option @{ 'Execution.RuleExcluded' = 'Warn' };
# PowerShell: Using the ExecutionRuleExcluded parameter to set YAML
Set-PSRuleOption -ExecutionRuleExcluded 'Warn';
# YAML: Using the execution/ruleExcluded property
execution:
  ruleExcluded: Warn
# Bash: Using environment variable
export PSRULE_EXECUTION_RULEEXCLUDED=Warn
# GitHub Actions: Using environment variable
env:
  PSRULE_EXECUTION_RULEEXCLUDED: Warn
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_EXECUTION_RULEEXCLUDED
  value: Warn

Execution.RuleSuppressed#

Determines how to handle suppressed rules. Regardless of the value, a suppressed rule is ignored. By defaut, a warning is generated, however this behaviour can be modified by this option.

This option replaces suppressedRuleWarning. You do not need to configure both options. If suppressedRuleWarning is configured, it will override ruleSuppressed with Warn or Ignore until removal in PSRule v3.

The following preferences are available:

  • None (0) - No preference. Inherits the default of Warn.
  • Ignore (1) - Continue to execute silently.
  • Warn (2) - Continue to execute but log a warning. This is the default.
  • Error (3) - Abort and throw an error.
  • Debug (4) - Continue to execute but log a debug message.
# PowerShell: Using the ExecutionRuleSuppressed parameter
$option = New-PSRuleOption -ExecutionRuleSuppressed 'Error';
# PowerShell: Using the Execution.RuleSuppressed hashtable key
$option = New-PSRuleOption -Option @{ 'Execution.RuleSuppressed' = 'Error' };
# PowerShell: Using the ExecutionRuleSuppressed parameter to set YAML
Set-PSRuleOption -ExecutionRuleSuppressed 'Error';
# YAML: Using the execution/ruleSuppressed property
execution:
  ruleSuppressed: Error
# Bash: Using environment variable
export PSRULE_EXECUTION_RULESUPPRESSED=Error
# GitHub Actions: Using environment variable
env:
  PSRULE_EXECUTION_RULESUPPRESSED: Error
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_EXECUTION_RULESUPPRESSED
  value: Error

Execution.UnprocessedObject#

Determines how to report objects that are not processed by any rule. By defaut, a warning is generated, however this behaviour can be modified by this option.

This option replaces NotProcessedWarning. You do not need to configure both options. If NotProcessedWarning is configured, it will override UnprocessedObject with Warn or Ignore until removal in PSRule v3.

The following preferences are available:

  • None (0) - No preference. Inherits the default of Warn.
  • Ignore (1) - Continue to execute silently.
  • Warn (2) - Continue to execute but log a warning. This is the default.
  • Error (3) - Abort and throw an error.
  • Debug (4) - Continue to execute but log a debug message.
# PowerShell: Using the ExecutionUnprocessedObject parameter
$option = New-PSRuleOption -ExecutionUnprocessedObject 'Error';
# PowerShell: Using the Execution.UnprocessedObject hashtable key
$option = New-PSRuleOption -Option @{ 'Execution.UnprocessedObject' = 'Error' };
# PowerShell: Using the ExecutionUnprocessedObject parameter to set YAML
Set-PSRuleOption -ExecutionUnprocessedObject 'Error';
# YAML: Using the execution/unprocessedObject property
execution:
  unprocessedObject: Error
# Bash: Using environment variable
export PSRULE_EXECUTION_UNPROCESSEDOBJECT=Error
# GitHub Actions: Using environment variable
env:
  PSRULE_EXECUTION_UNPROCESSEDOBJECT: Error
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_EXECUTION_UNPROCESSEDOBJECT
  value: Error

Include.Module#

Automatically include rules and resources from the specified module. To automatically import and include a module specify the module by name. The module must already be installed on the system.

When $PSModuleAutoLoadingPreference is set to a value other then All the module must be imported.

This option is equivalent to using the -Module parameter on PSRule cmdlets, with the following addition:

  • Modules specified with Include.Module are combined with -Module. Both sets of modules will be imported and used using execution.

This option can be specified using:

# PowerShell: Using the IncludeModule parameter
$option = New-PSRuleOption -IncludeModule 'TestModule1', 'TestModule2';
# PowerShell: Using the Include.Module hashtable key
$option = New-PSRuleOption -Option @{ 'Include.Module' = 'TestModule1', 'TestModule2' };
# PowerShell: Using the IncludeModule parameter to set YAML
Set-PSRuleOption -IncludeModule 'TestModule1', 'TestModule2';
# YAML: Using the include/module property
include:
  module:
  - TestModule1
# Bash: Using environment variable
export PSRULE_INCLUDE_MODULE=TestModule1;TestModule2
# GitHub Actions: Using environment variable
env:
  PSRULE_INCLUDE_MODULE: TestModule1;TestModule2
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_INCLUDE_MODULE
  value: TestModule1;TestModule2

Include.Path#

Automatically include rules and resources from the specified path. By default, .ps-rule/ is included.

This option is equivalent to using the -Path parameter on PSRule cmdlets, with the following additions:

  • Paths specified with Include.Path are combined with -Path. Both sets of paths will be imported and used using execution.
  • The Include.Path option defaults to .ps-rule/. To override this default, specify one or more alternative paths or an empty array.

This option can be specified using:

# PowerShell: Using the IncludePath parameter
$option = New-PSRuleOption -IncludePath '.ps-rule/', 'custom-rules/';
# PowerShell: Using the Include.Path hashtable key
$option = New-PSRuleOption -Option @{ 'Include.Path' = '.ps-rule/', 'custom-rules/' };
# PowerShell: Using the IncludePath parameter to set YAML
Set-PSRuleOption -IncludePath '.ps-rule/', 'custom-rules/';
# YAML: Using the include/path property
include:
  path:
  - custom-rules/
# Bash: Using environment variable
export PSRULE_INCLUDE_PATH=.ps-rule/;custom-rules/
# GitHub Actions: Using environment variable
env:
  PSRULE_INCLUDE_PATH: .ps-rule/;custom-rules/
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_INCLUDE_PATH
  value: .ps-rule/;custom-rules/

Input.Format#

Configures the input format for when a string is passed in as a target object. This option determines if the target object is deserialized into an alternative form.

Use this option with Assert-PSRule, Invoke-PSRule or Test-PSRuleTarget. Set this option to either Yaml, Json, Markdown, PowerShellData to deserialize as a specific format. The -Format parameter will override any value set in configuration.

When the -InputObject parameter or pipeline input is used, strings are treated as plain text by default. FileInfo objects for supported file formats will be deserialized based on file extension.

When the -InputPath parameter is used, supported file formats will be deserialized based on file extension. The -InputPath parameter can be used with a file path or URL.

The following formats are available:

  • None - Treat strings as plain text and do not deserialize files.
  • Yaml - Deserialize as one or more YAML objects.
  • Json - Deserialize as one or more JSON objects.
  • Markdown - Deserialize as a markdown object.
  • PowerShellData - Deserialize as a PowerShell data object.
  • File - Files are not deserialized.
  • Detect - Detect format based on file extension. This is the default.

If the Detect format is used, the file extension will be used to automatically detect the format. When the file extension can not be determined Detect is the same as None.

The Markdown format does not parse the whole markdown document. Specifically this format deserializes YAML front matter from the top of the document if any exists.

The File format does not deserialize file contents. Each file is returned as an object. Files within .git sub-directories are ignored. Path specs specified in .gitignore directly in the current working path are ignored. A RepositoryInfo object is generated if the current working path if a .git sub-directory is present. Additionally, PSRule performs automatic type binding for file objects, using the extension as the type. When files have no extension the whole file name is used.

Detect uses the following file extensions:

  • Yaml - .yaml or .yml
  • Json - .json or .jsonc
  • Markdown - .md or .markdown
  • PowerShellData - .psd1

This option can be specified using:

# PowerShell: Using the Format parameter
$option = New-PSRuleOption -Format Yaml;
# PowerShell: Using the Input.Format hashtable key
$option = New-PSRuleOption -Option @{ 'Input.Format' = 'Yaml' };
# PowerShell: Using the Format parameter to set YAML
Set-PSRuleOption -Format Yaml;
# YAML: Using the input/format property
input:
  format: Yaml
# Bash: Using environment variable
export PSRULE_INPUT_FORMAT=Yaml
# GitHub Actions: Using environment variable
env:
  PSRULE_INPUT_FORMAT: Yaml
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_INPUT_FORMAT
  value: Yaml

Input.IgnoreGitPath#

When reading files from an input path, files within the .git sub-directory are ignored by default. Files stored within the .git sub-directory are system repository files used by git. To read files stored within the .git path, set this option to $False.

This option can be specified using:

# PowerShell: Using the InputIgnoreGitPath parameter
$option = New-PSRuleOption -InputIgnoreGitPath $False;
# PowerShell: Using the Input.IgnoreGitPath hashtable key
$option = New-PSRuleOption -Option @{ 'Input.IgnoreGitPath' = $False };
# PowerShell: Using the InputIgnoreGitPath parameter to set YAML
Set-PSRuleOption -InputIgnoreGitPath $False;
# YAML: Using the input/ignoreGitPath property
input:
  ignoreGitPath: false
# Bash: Using environment variable
export PSRULE_INPUT_IGNOREGITPATH=false
# GitHub Actions: Using environment variable
env:
  PSRULE_INPUT_IGNOREGITPATH: false
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_INPUT_IGNOREGITPATH
  value: false

Input.IgnoreObjectSource#

By default, objects read from file using inputPath will be skipped if the file path has been ignored. When set to true, additionally objects with a source path that has been ignored will be skipped. This will include FileInfo objects, and objects with a source set using the _PSRule.source property.

File paths to ignore are set by Input.PathIgnore, Input.IgnoreGitPath, and Input.IgnoreRepositoryCommon.

This option can be specified using:

# PowerShell: Using the InputIgnoreObjectSource parameter
$option = New-PSRuleOption -InputIgnoreObjectSource $True;
# PowerShell: Using the Input.IgnoreObjectSource hashtable key
$option = New-PSRuleOption -Option @{ 'Input.IgnoreObjectSource' = $True };
# PowerShell: Using the InputIgnoreObjectSource parameter to set YAML
Set-PSRuleOption -InputIgnoreObjectSource $True;
# YAML: Using the input/ignoreObjectSource property
input:
  ignoreObjectSource: true
# Bash: Using environment variable
export PSRULE_INPUT_IGNOREOBJECTSOURCE=true
# GitHub Actions: Using environment variable
env:
  PSRULE_INPUT_IGNOREOBJECTSOURCE: true
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_INPUT_IGNOREOBJECTSOURCE
  value: true

Input.IgnoreRepositoryCommon#

When reading files from an input path, files are discovered recursively. A number of files are commonly found within a private and open-source repositories. In many cases these files are of no interest for analysis and should be ignored by rules. PSRule will ignore the following files by default:

  • README.md
  • .DS_Store
  • .gitignore
  • .gitattributes
  • .gitmodules
  • LICENSE
  • LICENSE.txt
  • CODE_OF_CONDUCT.md
  • CONTRIBUTING.md
  • SECURITY.md
  • SUPPORT.md
  • .vscode/*.json
  • .vscode/*.code-snippets
  • .github/**/*.md
  • .github/CODEOWNERS
  • .pipelines/**/*.yml
  • .pipelines/**/*.yaml
  • .azure-pipelines/**/*.yml
  • .azure-pipelines/**/*.yaml
  • .azuredevops/*.md

To include these files, set this option to $False. This option can be specified using:

# PowerShell: Using the InputIgnoreRepositoryCommon parameter
$option = New-PSRuleOption -InputIgnoreRepositoryCommon $False;
# PowerShell: Using the Input.IgnoreRepositoryCommon hashtable key
$option = New-PSRuleOption -Option @{ 'Input.IgnoreRepositoryCommon' = $False };
# PowerShell: Using the InputIgnoreRepositoryCommon parameter to set YAML
Set-PSRuleOption -InputIgnoreRepositoryCommon $False;
# YAML: Using the input/ignoreRepositoryCommon property
input:
  ignoreRepositoryCommon: false
# Bash: Using environment variable
export PSRULE_INPUT_IGNOREREPOSITORYCOMMON=false
# GitHub Actions: Using environment variable
env:
  PSRULE_INPUT_IGNOREREPOSITORYCOMMON: false
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_INPUT_IGNOREREPOSITORYCOMMON
  value: false

Input.IgnoreUnchangedPath#

By default, PSRule will process all files within an input path. For large repositories, this can result in a large number of files being processed. Additionally, for a pull request you may only be interested in files that have changed.

When set to true, files that have not changed will be ignored. This option can be specified using:

# PowerShell: Using the InputIgnoreUnchangedPath parameter
$option = New-PSRuleOption -InputIgnoreUnchangedPath $True;
# PowerShell: Using the Input.IgnoreUnchangedPath hashtable key
$option = New-PSRuleOption -Option @{ 'Input.IgnoreUnchangedPath' = $True };
# PowerShell: Using the InputIgnoreUnchangedPath parameter to set YAML
Set-PSRuleOption -InputIgnoreUnchangedPath $True;
# YAML: Using the input/ignoreUnchangedPath property
input:
  ignoreUnchangedPath: true
# Bash: Using environment variable
export PSRULE_INPUT_IGNOREUNCHANGEDPATH=true
# GitHub Actions: Using environment variable
env:
  PSRULE_INPUT_IGNOREUNCHANGEDPATH: true
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_INPUT_IGNOREUNCHANGEDPATH
  value: true

Input.ObjectPath#

The object path to a property to use instead of the pipeline object.

By default, PSRule processes objects passed from the pipeline against selected rules. When this option is set, instead of evaluating the pipeline object, PSRule looks for a property of the pipeline object specified by ObjectPath and uses that instead. If the property specified by ObjectPath is a collection/ array, then each item is evaluated separately.

If the property specified by ObjectPath does not exist, PSRule skips the object.

When using Invoke-PSRule, Test-PSRuleTarget and Assert-PSRule the -ObjectPath parameter will override any value set in configuration.

This option can be specified using:

# PowerShell: Using the ObjectPath parameter
$option = New-PSRuleOption -ObjectPath 'items';
# PowerShell: Using the Input.ObjectPath hashtable key
$option = New-PSRuleOption -Option @{ 'Input.ObjectPath' = 'items' };
# PowerShell: Using the ObjectPath parameter to set YAML
Set-PSRuleOption -ObjectPath 'items';
# YAML: Using the input/objectPath property
input:
  objectPath: items
# Bash: Using environment variable
export PSRULE_INPUT_OBJECTPATH=items
# GitHub Actions: Using environment variable
env:
  PSRULE_INPUT_OBJECTPATH: items
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_INPUT_OBJECTPATH
  value: items

Input.PathIgnore#

Ignores input files that match the path spec when using -InputPath. If specified, files that match the path spec will not be processed. By default, all files are processed.

For example, ignoring file extensions:

input:
  pathIgnore:
  # Exclude files with these extensions
  - '*.md'
  - '*.png'
  # Exclude specific configuration files
  - 'bicepconfig.json'

For example, ignoring all files with exceptions:

input:
  pathIgnore:
  # Exclude all files
  - '*'
  # Only process deploy.bicep files
  - '!**/deploy.bicep'

This option can be specified using:

# PowerShell: Using the InputPathIgnore parameter
$option = New-PSRuleOption -InputPathIgnore '*.Designer.cs';
# PowerShell: Using the Input.PathIgnore hashtable key
$option = New-PSRuleOption -Option @{ 'Input.PathIgnore' = '*.Designer.cs' };
# PowerShell: Using the InputPathIgnore parameter to set YAML
Set-PSRuleOption -InputPathIgnore '*.Designer.cs';
# YAML: Using the input/pathIgnore property
input:
  pathIgnore:
  - '*.Designer.cs'
# Bash: Using environment variable
export PSRULE_INPUT_PATHIGNORE=*.Designer.cs
# GitHub Actions: Using environment variable
env:
  PSRULE_INPUT_PATHIGNORE: '*.Designer.cs'
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_INPUT_PATHIGNORE
  value: '*.Designer.cs'

Input.TargetType#

Filters input objects by TargetType.

If specified, only objects with the specified TargetType are processed. Objects that do not match TargetType are ignored. If multiple values are specified, only one TargetType must match. This option is not case-sensitive.

By default, all objects are processed.

To change the field TargetType is bound to set the Binding.TargetType option.

When using Invoke-PSRule, Test-PSRuleTarget and Assert-PSRule the -TargetType parameter will override any value set in configuration.

This option can be specified using:

# PowerShell: Using the InputTargetType parameter
$option = New-PSRuleOption -InputTargetType 'virtualMachine', 'virtualNetwork';
# PowerShell: Using the Input.TargetType hashtable key
$option = New-PSRuleOption -Option @{ 'Input.TargetType' = 'virtualMachine', 'virtualNetwork' };
# PowerShell: Using the InputTargetType parameter to set YAML
Set-PSRuleOption -InputTargetType 'virtualMachine', 'virtualNetwork';
# YAML: Using the input/targetType property
input:
  targetType:
  - virtualMachine
# Bash: Using environment variable
export PSRULE_INPUT_TARGETTYPE=virtualMachine;virtualNetwork
# GitHub Actions: Using environment variable
env:
  PSRULE_INPUT_TARGETTYPE: virtualMachine;virtualNetwork
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_INPUT_TARGETTYPE
  value: virtualMachine;virtualNetwork

Logging.LimitDebug#

Limits debug messages to a list of named debug scopes.

When using the -Debug switch or preference variable, by default PSRule cmdlets log all debug output. When using debug output for debugging a specific rule, it may be helpful to limit debug message to a specific rule.

To identify a rule to include in debug output use the rule name.

The following built-in scopes exist in addition to rule names:

  • [Discovery.Source] - Discovery messages for .Rule.ps1 files and rule modules.
  • [Discovery.Rule] - Discovery messages for individual rules within .Rule.ps1 files.

This option can be specified using:

# PowerShell: Using the LoggingLimitDebug parameter
$option = New-PSRuleOption -LoggingLimitDebug Rule1, Rule2;
# PowerShell: Using the Logging.LimitDebug hashtable key
$option = New-PSRuleOption -Option @{ 'Logging.LimitDebug' = Rule1, Rule2 };
# PowerShell: Using the LoggingLimitDebug parameter to set YAML
Set-PSRuleOption -LoggingLimitDebug Rule1, Rule2;
# YAML: Using the logging/limitDebug property
logging:
  limitDebug:
  - Rule1
  - Rule2

Logging.LimitVerbose#

Limits verbose messages to a list of named verbose scopes.

When using the -Verbose switch or preference variable, by default PSRule cmdlets log all verbose output. When using verbose output for troubleshooting a specific rule, it may be helpful to limit verbose messages to a specific rule.

To identify a rule to include in verbose output use the rule name.

The following built-in scopes exist in addition to rule names:

  • [Discovery.Source] - Discovery messages for .Rule.ps1 files and rule modules.
  • [Discovery.Rule] - Discovery messages for individual rules within .Rule.ps1 files.

This option can be specified using:

# PowerShell: Using the LoggingLimitVerbose parameter
$option = New-PSRuleOption -LoggingLimitVerbose Rule1, Rule2;
# PowerShell: Using the Logging.LimitVerbose hashtable key
$option = New-PSRuleOption -Option @{ 'Logging.LimitVerbose' = Rule1, Rule2 };
# PowerShell: Using the LoggingLimitVerbose parameter to set YAML
Set-PSRuleOption -LoggingLimitVerbose Rule1, Rule2;
# YAML: Using the logging/limitVerbose property
logging:
  limitVerbose:
  - Rule1
  - Rule2

Logging.RuleFail#

When an object fails a rule condition the results are written to output as a structured object marked with the outcome of Fail. If the rule executed successfully regardless of outcome no other informational messages are shown by default.

In some circumstances such as a continuous integration (CI) pipeline, it may be preferable to see informational messages or abort the CI process if one or more Fail outcomes are returned.

By settings this option, error, warning or information messages will be generated for each rule fail outcome in addition to structured output. By default, outcomes are not logged to an informational stream (i.e. None).

The following streams available:

  • None
  • Error
  • Warning
  • Information

This option can be specified using:

# PowerShell: Using the LoggingRuleFail parameter
$option = New-PSRuleOption -LoggingRuleFail Error;
# PowerShell: Using the Logging.RuleFail hashtable key
$option = New-PSRuleOption -Option @{ 'Logging.RuleFail' = 'Error' };
# PowerShell: Using the LoggingRuleFail parameter to set YAML
Set-PSRuleOption -LoggingRuleFail Error;
# YAML: Using the logging/ruleFail property
logging:
  ruleFail: Error

Logging.RulePass#

When an object passes a rule condition the results are written to output as a structured object marked with the outcome of Pass. If the rule executed successfully regardless of outcome no other informational messages are shown by default.

In some circumstances such as a continuous integration (CI) pipeline, it may be preferable to see informational messages.

By settings this option, error, warning or information messages will be generated for each rule pass outcome in addition to structured output. By default, outcomes are not logged to an informational stream (i.e. None).

The following streams available:

  • None
  • Error
  • Warning
  • Information

This option can be specified using:

# PowerShell: Using the LoggingRulePass parameter
$option = New-PSRuleOption -LoggingRulePass Information;
# PowerShell: Using the Logging.RulePass hashtable key
$option = New-PSRuleOption -Option @{ 'Logging.RulePass' = 'Information' };
# PowerShell: Using the LoggingRulePass parameter to set YAML
Set-PSRuleOption -LoggingRulePass Information;
# YAML: Using the logging/rulePass property
logging:
  rulePass: Information

Output.As#

Configures the type of results to produce.

This option only applies to Invoke-PSRule and Assert-PSRule. Invoke-PSRule and Assert-PSRule also include a -As parameter to set this option at runtime. If specified, the -As parameter take precedence, over this option.

The following options are available:

  • Detail - Return a record per rule per object.
  • Summary - Return summary results.

This option can be specified using:

# PowerShell: Using the OutputAs parameter
$option = New-PSRuleOption -OutputAs Summary;
# PowerShell: Using the Output.As hashtable key
$option = New-PSRuleOption -Option @{ 'Output.As' = 'Summary' };
# PowerShell: Using the OutputAs parameter to set YAML
Set-PSRuleOption -OutputAs Summary;
# YAML: Using the output/as property
output:
  as: Summary
# Bash: Using environment variable
export PSRULE_OUTPUT_AS=Summary
# GitHub Actions: Using environment variable
env:
  PSRULE_OUTPUT_AS: Summary
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_OUTPUT_AS
  value: Summary

Output.Banner#

The information displayed for PSRule banner. This option is only applicable when using Assert-PSRule cmdlet.

The following information can be shown or hidden by configuring this option.

  • Title (1) - Shows the PSRule title ASCII text.
  • Source (2) - Shows rules module versions used in this run.
  • SupportLinks (4) - Shows supporting links for PSRule and rules modules.
  • RepositoryInfo (8) - Show information about the repository where PSRule is being run from.

Additionally the following rollup options exist:

  • Default - Shows Title, Source, SupportLinks, RepositoryInfo. This is the default option.
  • Minimal - Shows Source.

This option can be configured using one of the named values described above. Alternatively, this value can be configured by specifying a bit mask as an integer. For example 6 would show Source, and SupportLinks.

This option can be specified using:

# PowerShell: Using the OutputBanner parameter
$option = New-PSRuleOption -OutputBanner Minimal;
# PowerShell: Using the Output.Banner hashtable key
$option = New-PSRuleOption -Option @{ 'Output.Banner' = 'Minimal' };
# PowerShell: Using the OutputBanner parameter to set YAML
Set-PSRuleOption -OutputBanner Minimal;
# YAML: Using the output/banner property
output:
  banner: Minimal
# Bash: Using environment variable
export PSRULE_OUTPUT_BANNER=Minimal
# GitHub Actions: Using environment variable
env:
  PSRULE_OUTPUT_BANNER: Minimal
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_OUTPUT_BANNER
  value: Minimal

Output.Culture#

Specified the name of one or more cultures to use for generating output. When multiple cultures are specified, the first matching culture will be used. If a culture is not specified, PSRule will use the current PowerShell culture.

PSRule cmdlets also include a -Culture parameter to set this option at runtime. If specified, the -Culture parameter take precedence, over this option.

To get a list of cultures use the Get-Culture -ListAvailable cmdlet.

This option can be specified using:

# PowerShell: Using the OutputCulture parameter
$option = New-PSRuleOption -OutputCulture 'en-AU';
# PowerShell: Using the Output.Culture hashtable key
$option = New-PSRuleOption -Option @{ 'Output.Culture' = 'en-AU' };
# PowerShell: Using the OutputCulture parameter to set YAML
Set-PSRuleOption -OutputCulture 'en-AU', 'en-US';
# YAML: Using the output/culture property
output:
  culture: [ 'en-AU', 'en-US' ]
# Bash: Using environment variable
export PSRULE_OUTPUT_CULTURE=en-AU;en-US
# GitHub Actions: Using environment variable
env:
  PSRULE_OUTPUT_CULTURE: en-AU;en-US
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_OUTPUT_CULTURE
  value: en-AU;en-US

Output.Encoding#

Configures the encoding used when output is written to file. This option has no affect when Output.Path is not set.

The following encoding options are available:

  • Default
  • UTF-8
  • UTF-7
  • Unicode
  • UTF-32
  • ASCII

This option can be specified using:

# PowerShell: Using the OutputEncoding parameter
$option = New-PSRuleOption -OutputEncoding UTF8;
# PowerShell: Using the Output.Format hashtable key
$option = New-PSRuleOption -Option @{ 'Output.Encoding' = 'UTF8' };
# PowerShell: Using the OutputEncoding parameter to set YAML
Set-PSRuleOption -OutputEncoding UTF8;
# YAML: Using the output/encoding property
output:
  encoding: UTF8
# Bash: Using environment variable
export PSRULE_OUTPUT_ENCODING=UTF8
# GitHub Actions: Using environment variable
env:
  PSRULE_OUTPUT_ENCODING: UTF8
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_OUTPUT_ENCODING
  value: UTF8

Output.Footer#

The information displayed for PSRule footer. This option is only applicable when using Assert-PSRule cmdlet.

The following information can be shown or hidden by configuring this option.

  • RuleCount (1) - Shows a summary of rules processed.
  • RunInfo (2) - Shows information about the run.
  • OutputFile (4) - Shows information about the output file if an output path is set.

Additionally the following rollup options exist:

  • Default - Shows RuleCount, RunInfo, and OutputFile. This is the default option.

This option can be configured using one of the named values described above. Alternatively, this value can be configured by specifying a bit mask as an integer. For example 3 would show RunInfo, and RuleCount.

This option can be specified using:

# PowerShell: Using the OutputFooter parameter
$option = New-PSRuleOption -OutputFooter RuleCount;
# PowerShell: Using the Output.Footer hashtable key
$option = New-PSRuleOption -Option @{ 'Output.Footer' = 'RuleCount' };
# PowerShell: Using the OutputFooter parameter to set YAML
Set-PSRuleOption -OutputFooter RuleCount;
# YAML: Using the output/footer property
output:
  footer: RuleCount
# Bash: Using environment variable
export PSRULE_OUTPUT_FOOTER=RuleCount
# GitHub Actions: Using environment variable
env:
  PSRULE_OUTPUT_FOOTER: RuleCount
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_OUTPUT_FOOTER
  value: RuleCount

Output.Format#

Configures the format that results will be presented in. This option applies to Invoke-PSRule, Assert-PSRule, Get-PSRule and Get-PSRuleBaseline. This options is ignored by other cmdlets.

The following format options are available:

  • None - Output is presented as an object using PowerShell defaults. This is the default.
  • Yaml - Output is serialized as YAML.
  • Json - Output is serialized as JSON.
  • Markdown - Output is serialized as Markdown.
  • NUnit3 - Output is serialized as NUnit3 (XML).
  • Csv - Output is serialized as a comma-separated values (CSV).
    • The following columns are included for Detail output: RuleName, TargetName, TargetType, Outcome, OutcomeReason, Synopsis, Recommendation
    • The following columns are included for Summary output: RuleName, Pass, Fail, Outcome, Synopsis, Recommendation
  • Wide - Output is presented using the wide table format, which includes reason and wraps columns.
  • Sarif - Output is serialized as SARIF.

The Wide format is ignored by Assert-PSRule. Get-PSRule only accepts None, Wide, Yaml and Json. Usage of other formats are treated as None.

The Get-PSRuleBaseline cmdlet only accepts None or Yaml. The Export-PSRuleBaseline cmdlet only accepts Yaml.

This option can be specified using:

# PowerShell: Using the OutputFormat parameter
$option = New-PSRuleOption -OutputFormat Yaml;
# PowerShell: Using the Output.Format hashtable key
$option = New-PSRuleOption -Option @{ 'Output.Format' = 'Yaml' };
# PowerShell: Using the OutputFormat parameter to set YAML
Set-PSRuleOption -OutputFormat Yaml;
# YAML: Using the output/format property
output:
  format: Yaml
# Bash: Using environment variable
export PSRULE_OUTPUT_FORMAT=Yaml
# GitHub Actions: Using environment variable
env:
  PSRULE_OUTPUT_FORMAT: Yaml
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_OUTPUT_FORMAT
  value: Yaml

Output.Outcome#

Filters output to include results with the specified outcome. The following outcome options are available:

  • None (0) - Results for rules that did not get processed are returned. This include rules that have been suppressed or were not run against a target object.
  • Fail (1) - Results for rules that failed are returned.
  • Pass (2) - Results for rules that passed are returned.
  • Error (4) - Results for rules that raised an error are returned.

Additionally the following rollup options exist:

  • Processed - Results for rules with the Fail, Pass, or Error outcome. This is the default option.
  • Problem - Results for rules with the Fail, or Error outcome.
  • All - All results for rules are returned.

This option can be specified using:

# PowerShell: Using the OutputOutcome parameter
$option = New-PSRuleOption -OutputOutcome Fail;
# PowerShell: Using the Output.Outcome hashtable key
$option = New-PSRuleOption -Option @{ 'Output.Outcome' = 'Fail' };
# PowerShell: Using the OutputOutcome parameter to set YAML
Set-PSRuleOption -OutputOutcome Fail;
# YAML: Using the output/outcome property
output:
  outcome: 'Fail'
# Bash: Using environment variable
export PSRULE_OUTPUT_OUTCOME=Fail
# GitHub Actions: Using environment variable
env:
  PSRULE_OUTPUT_OUTCOME: Fail
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_OUTPUT_OUTCOME
  value: Fail

Output.Path#

Specifies the output file path to write results. Directories along the file path will automatically be created if they do not exist.

This option only applies to Invoke-PSRule. Invoke-PSRule also includes a parameter -OutputPath to set this option at runtime. If specified, the -OutputPath parameter take precedence, over this option.

Syntax:

output:
  path: string

Default:

output:
  path: null

This option can be specified using:

# PowerShell: Using the OutputPath parameter
$option = New-PSRuleOption -OutputPath 'out/results.yaml';
# PowerShell: Using the Output.Path hashtable key
$option = New-PSRuleOption -Option @{ 'Output.Path' = 'out/results.yaml' };
# PowerShell: Using the OutputPath parameter to set YAML
Set-PSRuleOption -OutputPath 'out/results.yaml';
# YAML: Using the output/path property
output:
  path: 'out/results.yaml'
# Bash: Using environment variable
export PSRULE_OUTPUT_PATH=out/results.yaml
# GitHub Actions: Using environment variable
env:
  PSRULE_OUTPUT_PATH: out/results.yaml
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_OUTPUT_PATH
  value: out/results.yaml

Output.SarifProblemsOnly#

Determines if SARIF output only includes rules with fail or error outcomes. By default, only rules with fail or error outcomes are included for compatibility with external tools. To include rules with pass outcomes, set this option to false. This option only applies when the output format is Sarif.

Syntax:

output:
  sarifProblemsOnly: boolean

Default:

output:
  sarifProblemsOnly: true

This option can be specified using:

# PowerShell: Using the OutputSarifProblemsOnly parameter
$option = New-PSRuleOption -OutputSarifProblemsOnly $False;
# PowerShell: Using the Output.SarifProblemsOnly hashtable key
$option = New-PSRuleOption -Option @{ 'Output.SarifProblemsOnly' = $False };
# PowerShell: Using the OutputSarifProblemsOnly parameter to set YAML
Set-PSRuleOption -OutputSarifProblemsOnly $False;
# YAML: Using the output/sarifProblemsOnly property
output:
  sarifProblemsOnly: false
# Bash: Using environment variable
export PSRULE_OUTPUT_SARIFPROBLEMSONLY=false
# GitHub Actions: Using environment variable
env:
  PSRULE_OUTPUT_SARIFPROBLEMSONLY: false
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_OUTPUT_SARIFPROBLEMSONLY
  value: false

Output.Style#

Configures the style that results will be presented in.

This option only applies to output generated from Assert-PSRule. Assert-PSRule also include a parameter -Style to set this option at runtime. If specified, the -Style parameter takes precedence, over this option.

The following styles are available:

  • Client - Output is written to the host directly in green/ red to indicate outcome.
  • Plain - Output is written as an unformatted string. This option can be redirected to a file.
  • AzurePipelines - Output is written for integration Azure Pipelines.
  • GitHubActions - Output is written for integration GitHub Actions.
  • VisualStudioCode - Output is written for integration with Visual Studio Code.
  • Detect - Output style will be detected by checking the environment variables. This is the default.

Detect uses the following logic:

  1. If the TF_BUILD environment variable is set to true, AzurePipelines will be used.
  2. If the GITHUB_ACTIONS environment variable is set to true, GitHubActions will be used.
  3. If the TERM_PROGRAM environment variable is set to vscode, VisualStudioCode will be used.
  4. Use Client.

Syntax:

output:
  style: string

Default:

output:
  style: Detect

This option can be specified using:

# PowerShell: Using the OutputStyle parameter
$option = New-PSRuleOption -OutputStyle AzurePipelines;
# PowerShell: Using the Output.Style hashtable key
$option = New-PSRuleOption -Option @{ 'Output.Style' = 'AzurePipelines' };
# PowerShell: Using the OutputStyle parameter to set YAML
Set-PSRuleOption -OutputFormat AzurePipelines;
# YAML: Using the output/style property
output:
  style: AzurePipelines
# Bash: Using environment variable
export PSRULE_OUTPUT_STYLE=AzurePipelines
# GitHub Actions: Using environment variable
env:
  PSRULE_OUTPUT_STYLE: AzurePipelines
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_OUTPUT_STYLE
  value: AzurePipelines

Output.JobSummaryPath#

Configures the file path a job summary will be written to when using Assert-PSRule. A job summary is a markdown file that summarizes the results of a job. When not specified, a job summary will not be generated.

Syntax:

output:
  jobSummaryPath: string

Default:

output:
  jobSummaryPath: null

This option can be specified using:

# PowerShell: Using the OutputJobSummaryPath parameter
$option = New-PSRuleOption -OutputJobSummaryPath 'reports/summary.md';
# PowerShell: Using the Output.JobSummaryPath hashtable key
$option = New-PSRuleOption -Option @{ 'Output.JobSummaryPath' = 'reports/summary.md' };
# PowerShell: Using the OutputJobSummaryPath parameter to set YAML
Set-PSRuleOption -OutputJobSummaryPath 'reports/summary.md';
# YAML: Using the output/jobSummaryPath property
output:
  jobSummaryPath: 'reports/summary.md'
# Bash: Using environment variable
export PSRULE_OUTPUT_JOBSUMMARYPATH='reports/summary.md'
# PowerShell: Using environment variable
$env:PSRULE_OUTPUT_JOBSUMMARYPATH = 'reports/summary.md';
# GitHub Actions: Using environment variable
env:
  PSRULE_OUTPUT_JOBSUMMARYPATH: reports/summary.md
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_OUTPUT_JOBSUMMARYPATH
  value: reports/summary.md

Output.JsonIndent#

Configures the number of spaces to indent JSON properties and elements. The default number of spaces is 0.

This option applies to output generated from -OutputFormat Json for Get-PSRule and Invoke-PSRule. This option also applies to output generated from -OutputPath for Assert-PSRule.

The range of indentation accepts a minimum of 0 (machine first) spaces and a maximum of 4 spaces.

This option can be specified using:

# PowerShell: Using the OutputJsonIndent parameter
$option = New-PSRuleOption -OutputJsonIndent 2;
# PowerShell: Using the Output.JsonIndent hashtable key
$option = New-PSRuleOption -Option @{ 'Output.JsonIndent' = 2 };
# PowerShell: Using the OutputJsonIndent parameter to set YAML
Set-PSRuleOption -OutputJsonIndent 2;
# YAML: Using the output/jsonIndent property
output:
  jsonIndent: 2
# Bash: Using environment variable
export PSRULE_OUTPUT_JSONINDENT=2
# PowerShell: Using environment variable
$env:PSRULE_OUTPUT_JSONINDENT = 2;
# GitHub Actions: Using environment variable
env:
  PSRULE_OUTPUT_JSONINDENT: 2
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_OUTPUT_JSONINDENT
  value: 2

Repository.BaseRef#

This option is used for specify the base branch for pull requests. When evaluating changes files only PSRule uses this option for comparison with the current branch. By default, the base ref is detected from environment variables set by the build system.

This option can be specified using:

# PowerShell: Using the RepositoryBaseRef parameter
$option = New-PSRuleOption -RepositoryBaseRef 'main';
# PowerShell: Using the Repository.BaseRef hashtable key
$option = New-PSRuleOption -Option @{ 'Repository.BaseRef' = 'main' };
# PowerShell: Using the RepositoryBaseRef parameter to set YAML
Set-PSRuleOption -RepositoryBaseRef 'main';
# YAML: Using the repository/baseRef property
repository:
  baseRef: main
# Bash: Using environment variable
export PSRULE_REPOSITORY_BASEREF='main'
# PowerShell: Using environment variable
$env:PSRULE_REPOSITORY_BASEREF = 'main';

Repository.Url#

This option can be configured to set the repository URL reported in output. By default, the repository URL is detected from environment variables set by the build system.

  • In GitHub Actions, the repository URL is detected from the GITHUB_REPOSITORY environment variable.
  • In Azure Pipelines, the repository URL is detected from the BUILD_REPOSITORY_URI environment variable.

This option can be specified using:

# PowerShell: Using the RepositoryUrl parameter
$option = New-PSRuleOption -RepositoryUrl 'https://github.com/microsoft/PSRule';
# PowerShell: Using the Repository.Url hashtable key
$option = New-PSRuleOption -Option @{ 'Repository.Url' = 'https://github.com/microsoft/PSRule' };
# PowerShell: Using the RepositoryUrl parameter to set YAML
Set-PSRuleOption -RepositoryUrl 'https://github.com/microsoft/PSRule';
# YAML: Using the repository/url property
repository:
  url: 'https://github.com/microsoft/PSRule'
# Bash: Using environment variable
export PSRULE_REPOSITORY_URL='https://github.com/microsoft/PSRule'
# PowerShell: Using environment variable
$env:PSRULE_REPOSITORY_URL = 'https://github.com/microsoft/PSRule';

Requires#

Specifies module version constraints for running PSRule. When set PSRule will error if a module version is used that does not satisfy the requirements. The format for version constraints are the same as the Version assertion method. See [about_PSRule_Assert] for more information.

Module version constraints a not enforced prior to PSRule v0.19.0.

The version constraint for a rule module is enforced when the module is included with -Module. A version constraint does not require a rule module to be included. Use the Include.Module option to automatically include a rule module.

This option can be specified using:

# PowerShell: Using the Requires.module hashtable key
$option = New-PSRuleOption -Option @{ 'Requires.PSRule' = '>=1.0.0' };
# YAML: Using the requires property
requires:
  PSRule: '>=1.0.0'                 # Require v1.0.0 or greater.
  PSRule.Rules.Azure: '>=1.0.0'     # Require v1.0.0 or greater.
  PSRule.Rules.CAF: '@pre >=0.1.0'  # Require stable or pre-releases v0.1.0 or greater.

This option can be configured using environment variables. To specify a module version constraint, prefix the module name with PSRULE_REQUIRES_. When the module name includes a dot (.) use an underscore (_) instead.

# Bash: Using environment variable
export PSRULE_REQUIRES_PSRULE='>=1.0.0'
export PSRULE_REQUIRES_PSRULE_RULES_AZURE='>=1.0.0'
export PSRULE_REQUIRES_PSRULE_RULES_CAF='@pre >=0.1.0'
# GitHub Actions: Using environment variable
env:
  PSRULE_REQUIRES_PSRULE: '>=1.0.0'
  PSRULE_REQUIRES_PSRULE_RULES_AZURE: '>=1.0.0'
  PSRULE_REQUIRES_PSRULE_RULES_CAF: '@pre >=0.1.0'
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_REQUIRES_PSRULE
  value: '>=1.0.0'
- name: PSRULE_REQUIRES_PSRULE_RULES_AZURE
  value: '>=1.0.0'
- name: PSRULE_REQUIRES_PSRULE_RULES_CAF
  value: '@pre >=0.1.0'

Rule.Baseline#

The name of a default baseline to use for the module. Currently this option can only be set within a module configuration resource.

For example:

---
# Synopsis: Example module configuration for Enterprise.Rules module.
apiVersion: github.com/microsoft/PSRule/v1
kind: ModuleConfig
metadata:
  name: Enterprise.Rules
spec:
  rule:
    baseline: Enterprise.Baseline1

Rule.Include#

The name of specific rules to evaluate. If this option is not specified all rules in search paths will be evaluated.

This option can be overridden at runtime by using the -Name cmdlet parameter.

This option can be specified using:

# PowerShell: Using the Rule.Include hashtable key
$option = New-PSRuleOption -Option @{ 'Rule.Include' = 'Rule1','Rule2' };
# YAML: Using the rule/include property
rule:
  include:
  - Rule1
  - Rule2
# Bash: Using environment variable
export PSRULE_RULE_INCLUDE='Rule1;Rule2'
# GitHub Actions: Using environment variable
env:
  PSRULE_RULE_INCLUDE: 'Rule1;Rule2'
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_RULE_INCLUDE
  value: 'Rule1;Rule2'

Rule.IncludeLocal#

Automatically include all local rules in the search path unless they have been explicitly excluded. This option will include local rules even when they do not match Rule.Include or Rule.Tag filters. By default, local rules will be filtered with Rule.Include and Rule.Tag filters.

This option is useful when you want to include local rules not included in a baseline.

This option can be specified using:

# PowerShell: Using the RuleIncludeLocal parameter
$option = New-PSRuleOption -RuleIncludeLocal $True;
# PowerShell: Using the Rule.IncludeLocal hashtable key
$option = New-PSRuleOption -Option @{ 'Rule.IncludeLocal' = $True };
# PowerShell: Using the RuleIncludeLocal parameter to set YAML
Set-PSRuleOption -RuleIncludeLocal $True;
# YAML: Using the rule/includeLocal property
rule:
  includeLocal: true
# Bash: Using environment variable
export PSRULE_RULE_INCLUDELOCAL=true
# GitHub Actions: Using environment variable
env:
  PSRULE_RULE_INCLUDELOCAL: true
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_RULE_INCLUDELOCAL
  value: true

Rule.Exclude#

The name of specific rules to exclude from being evaluated. This will exclude rules specified by Rule.Include or discovered from a search path.

This option can be specified using:

# PowerShell: Using the Rule.Exclude hashtable key
$option = New-PSRuleOption -Option @{ 'Rule.Exclude' = 'Rule3','Rule4' };
# YAML: Using the rule/exclude property
rule:
  exclude:
  - Rule3
  - Rule4
# Bash: Using environment variable
export PSRULE_RULE_EXCLUDE='Rule3;Rule4'
# GitHub Actions: Using environment variable
env:
  PSRULE_RULE_EXCLUDE: 'Rule3;Rule4'
# Azure Pipelines: Using environment variable
variables:
- name: PSRULE_RULE_EXCLUDE
  value: 'Rule3;Rule4'

Rule.Tag#

A set of required key value pairs (tags) that rules must have applied to them to be included.

Multiple values can be specified for the same tag. When multiple values are used, only one must match.

This option can be overridden at runtime by using the -Tag cmdlet parameter.

This option can be specified using:

# PowerShell: Using the Rule.Tag hashtable key
$option = New-PSRuleOption -Option @{ 'Rule.Tag' = @{ severity = 'Critical','Warning' } };
# YAML: Using the rule/tag property
rule:
  tag:
    severity: Critical
# YAML: Using the rule/tag property, with multiple values
rule:
  tag:
    severity:
    - Critical
    - Warning

In the example above, rules must have a tag of severity set to either Critical or Warning to be included.

Suppression#

In certain circumstances it may be necessary to exclude or suppress rules from processing objects that are in a known failed state.

PSRule allows objects to be suppressed for a rule by TargetName. Objects that are suppressed are not processed by the rule at all but will continue to be processed by other rules.

Rule suppression complements pre-filtering and pre-conditions.

This option can be specified using:

# PowerShell: Using the SuppressTargetName option with a hashtable
$option = New-PSRuleOption -SuppressTargetName @{ 'storageAccounts.UseHttps' = 'TestObject1', 'TestObject3' };
# YAML: Using the suppression property
suppression:
  storageAccounts.UseHttps:
    targetName:
    - TestObject1
    - TestObject3

In both of the above examples, TestObject1 and TestObject3 have been suppressed from being processed by a rule named storageAccounts.UseHttps.

When to use rule suppression:

  • A temporary exclusion for an object that is in a known failed state.

When not to use rule suppression:

  • An object should never be processed by any rule. Pre-filter the pipeline instead.
  • The rule is not applicable because the object is the wrong type. Use pre-conditions on the rule instead.

An example of pre-filtering:

# Define objects to validate
$items = @();
$items += [PSCustomObject]@{ Name = 'Fridge'; Type = 'Equipment'; Category = 'White goods'; };
$items += [PSCustomObject]@{ Name = 'Apple'; Type = 'Food'; Category = 'Produce'; };
$items += [PSCustomObject]@{ Name = 'Carrot'; Type = 'Food'; Category = 'Produce'; };

# Example of pre-filtering, only food items are sent to Invoke-PSRule
$items | Where-Object { $_.Type -eq 'Food' } | Invoke-PSRule;

An example of pre-conditions:

# A rule with a pre-condition to only process produce
Rule 'isFruit' -If { $TargetObject.Category -eq 'Produce' } {
    # Condition to determine if the object is fruit
    $TargetObject.Name -in 'Apple', 'Orange', 'Pear'
}

Examples#

Example ps-rule.yaml#

#
# PSRule example configuration
#

# Configures the repository
repository:
  url: https://github.com/microsoft/PSRule
  baseRef: main

# Configure required module versions
requires:
  PSRule.Rules.Azure: '>=1.1.0'

# Configure convention options
convention:
  include:
  - 'Convention1'

# Configure execution options
execution:
  aliasReferenceWarning: false
  duplicateResourceId: Warn
  languageMode: ConstrainedLanguage
  inconclusiveWarning: false
  notProcessedWarning: false
  suppressedRuleWarning: false
  suppressionGroupExpired: Error

# Configure include options
include:
  module:
  - 'PSRule.Rules.Azure'
  path: [ ]

# Configures input options
input:
  format: Yaml
  ignoreGitPath: false
  ignoreObjectSource: true
  ignoreRepositoryCommon: false
  ignoreUnchangedPath: true
  objectPath: items
  pathIgnore:
  - '*.Designer.cs'
  targetType:
  - Microsoft.Compute/virtualMachines
  - Microsoft.Network/virtualNetworks

# Configures outcome logging options
logging:
  limitDebug:
  - Rule1
  - Rule2
  limitVerbose:
  - Rule1
  - Rule2
  ruleFail: Error
  rulePass: Information

output:
  as: Summary
  banner: Minimal
  culture:
  - en-US
  encoding: UTF8
  footer: RuleCount
  format: Json
  jobSummaryPath: reports/summary.md
  outcome: Fail
  sarifProblemsOnly: false
  style: GitHubActions

# Configure rule suppression
suppression:
  storageAccounts.UseHttps:
    targetName:
    - TestObject1
    - TestObject3

# Configure baseline options
binding:
  field:
    id:
    - ResourceId
    - AlternativeId
  ignoreCase: false
  nameSeparator: '::'
  preferTargetInfo: true
  targetName:
  - ResourceName
  - AlternateName
  targetType:
  - ResourceType
  - kind
  useQualifiedName: true

configuration:
  appServiceMinInstanceCount: 2

rule:
  include:
  - rule1
  - rule2
  includeLocal: true
  exclude:
  - rule3
  - rule4
  tag:
    severity:
    - Critical
    - Warning

Default ps-rule.yaml#

#
# PSRule defaults
#

# Note: Only properties that differ from the default values need to be specified.

# Configure required module versions
requires: { }

# Configure convention options
convention:
  include: [ ]

# Configure execution options
execution:
  aliasReference: Warn
  duplicateResourceId: Error
  invariantCulture: Warn
  languageMode: FullLanguage
  ruleInconclusive: Warn
  ruleSuppressed: Warn
  suppressionGroupExpired: Warn
  unprocessedObject: Warn

# Configure include options
include:
  module: [ ]
  path:
  - '.ps-rule/'

# Configures input options
input:
  format: Detect
  ignoreGitPath: true
  ignoreObjectSource: false
  ignoreRepositoryCommon: true
  ignoreUnchangedPath: false
  objectPath: null
  pathIgnore: [ ]
  targetType: [ ]

# Configures outcome logging options
logging:
  limitDebug: [ ]
  limitVerbose: [ ]
  ruleFail: None
  rulePass: None

output:
  as: Detail
  banner: Default
  culture: [ ]
  encoding: Default
  footer: Default
  format: None
  jobSummaryPath: null
  outcome: Processed
  sarifProblemsOnly: true
  style: Detect

# Configure rule suppression
suppression: { }

# Configure baseline options
binding:
  field: { }
  ignoreCase: true
  nameSeparator: '/'
  preferTargetInfo: false
  targetName:
  - TargetName
  - Name
  targetType:
  - PSObject.TypeNames[0]
  useQualifiedName: false

configuration: { }

rule:
  include: [ ]
  includeLocal: false
  exclude: [ ]
  tag: { }

Comments