diff --git a/.github/workflows/PublishNugetPackage.yml b/.github/workflows/PublishNugetPackage.yml new file mode 100644 index 0000000..04e29e4 --- /dev/null +++ b/.github/workflows/PublishNugetPackage.yml @@ -0,0 +1,28 @@ +name: PublishNuget + +on: + push: + branches: [ "main" ] + pull_request: + branches: [ "main" ] + schedule: + - cron: '16 12 * * 2' + +permissions: + contents: read + +jobs: + build: + permissions: + contents: read # for actions/checkout to fetch code + security-events: write # for github/codeql-action/upload-sarif to upload SARIF results + actions: read # only required for a private repository by github/codeql-action/upload-sarif to get the Action run status + name: PublishNugetModule + runs-on: ubuntu-latest + steps: + - uses: actions/checkout@v3 + - name: Publish Module to PowerShell Gallery + uses: pcgeek86/publish-powershell-module-action@v20 + id: publish-module + with: + NuGetApiKey: ${{ secrets.PS_GALLERY_KEY }} diff --git a/.github/workflows/ScriptAnalyser.yml b/.github/workflows/ScriptAnalyser.yml new file mode 100644 index 0000000..7b3d6a3 --- /dev/null +++ b/.github/workflows/ScriptAnalyser.yml @@ -0,0 +1,49 @@ +# This workflow uses actions that are not certified by GitHub. +# They are provided by a third-party and are governed by +# separate terms of service, privacy policy, and support +# documentation. +# +# https://github.com/microsoft/action-psscriptanalyzer +# For more information on PSScriptAnalyzer in general, see +# https://github.com/PowerShell/PSScriptAnalyzer + +name: PSScriptAnalyzer + +on: + push: + branches: [ "main" ] + pull_request: + branches: [ "main" ] + schedule: + - cron: '16 12 * * 2' + +permissions: + contents: read + +jobs: + build: + permissions: + contents: read # for actions/checkout to fetch code + security-events: write # for github/codeql-action/upload-sarif to upload SARIF results + actions: read # only required for a private repository by github/codeql-action/upload-sarif to get the Action run status + name: PSScriptAnalyzer + runs-on: ubuntu-latest + steps: + - uses: actions/checkout@v3 + + - name: Run PSScriptAnalyzer + uses: microsoft/psscriptanalyzer-action@6b2948b1944407914a58661c49941824d149734f + with: + # Check https://github.com/microsoft/action-psscriptanalyzer for more info about the options. + # The below set up runs PSScriptAnalyzer to your entire repository and runs some basic security rules. + path: .\ + recurse: true + # Include your own basic security rules. Removing this option will run all the rules + includeRule: '"PSAvoidGlobalAliases", "PSAvoidUsingConvertToSecureStringWithPlainText"' + output: results.sarif + + # Upload the SARIF file generated in the previous step + - name: Upload SARIF results file + uses: github/codeql-action/upload-sarif@v2 + with: + sarif_file: results.sarif diff --git a/PowerDataOps.psd1 b/PowerDataOps.psd1 index 99ae305..5dacf6a 100644 --- a/PowerDataOps.psd1 +++ b/PowerDataOps.psd1 @@ -3,7 +3,7 @@ # # Generated by: Aymeric Mouillé # -# Generated on: 28/07/2023 +# Generated on: 31/10/2023 # @{ diff --git a/src/Administration/Watch-XrmOperation.ps1 b/src/Administration/Watch-XrmOperation.ps1 index cca2687..0c8e47f 100644 --- a/src/Administration/Watch-XrmOperation.ps1 +++ b/src/Administration/Watch-XrmOperation.ps1 @@ -33,10 +33,7 @@ function Watch-XrmOperation { while ($monitor) { Start-Sleep -Seconds $PollingIntervalSeconds; - $operationData = Get-AdminPowerAppOperationStatus -OperationStatusUrl $OperationUrl; - if(-not $operationData) { - continue; - } + $operationData = Get-AdminPowerAppOperationStatus -OperationStatusUrl $OperationUrl; if(-not $operationData.Internal.Content) { continue; }