It has been a while since my last post so let’s get back on track with some “interesting” things I’ve discovered while working on another project for another blog post (or two).

The project involves taking almost all the modules in the PowerShell Gallery and pulling all their help data into a graph database (Neo4j) and then doing some analytics on it. That’s still in progress but I thought I’d blog about some of the worst practices I’ve seen while doing this work.

The proces was split into 3 steps:

  • Import the module and add a node to the DB
  • Get all the public commands in the module and add each as a node in the DB
  • Get the help for each command and update the command node with some properties

Ignoring the various performance improvements I could have made in this process (more on those in the other post), there were a number of problems that jumped out from these steps. We’ll start with the most annoying ones and work from there.

Do not prompt for credentials on import

The Problem

This covers using Get-Credential, Read-Host, or various other ways and it goes beyond just normal credentials but any sort of values to access things, like API keys or access tokens. This stops any sort of automation dead if you haven’t previously run the import manually and set up these values, assuming they can be persisted to disk securely somewhere.

The Solution

Provide functions for this: a simple Connect-MyService -Credential cmdlet is often enough as then that credential object creation can be automated. Other options include making it configurable using something like Set-MyServiceConfiguration -Credential. This is especially useful if you’ve got a number of other configurable settings and modules. PSFramework can make this a lot easier to work with.

Storing credentials of any sort securely can be another problem to deal with. Data Protection Application Programming Interface (DPAPI) helps a lot in keeping them secured to just the user who created them on the machine they were created. But that’s often going to cause further issues when you run your scripts as dedicated service accounts. There are a few possible solutions to this:

  • Better Credentials stores credentials in the Windows Credential Store for easier retrieval
  • ProtectedData lets you encrypt pretty much anything with either a certificate or a password and supports all the way back to PSv2
  • Protect-CmsMessage and the other CmsMessage cmdlets perform a similar role to ProtectedData but only work on strings and only work on PSv4+

Before implementing any of these (or your own method) always consider your use case and the possible points of failure.

Don’t change the prompt or console without warning

The Problem

Suddenly finding your prompt has changed from whatever you had before, even if you didn’t intentionally set it up that way, can be a jarring user experience. Some modules are specifically designed to make changes to the prompt or add extra functionality. They can be very powerful in what they offer beyond the basics offered by the console. The problem comes when they make those changes on import and then don’t offer a way to reverse it on removal.

An equally annoying one is changing the colours of the text or background colour; I’ve also seen at least one instance of a module clearing the screen on import before dumping some module information to it. These were bad user experiences and no matter how good those modules were at what they did I was considerably less likely to be using them.

The Solution

At a minimum take a backup of the current settings that you’re about to modify and store that somewhere sensible for the user like $HOME. Preferably in the form of a script they can run to revert the changes. Beyond that provide functions to enable and disable the functionality your module is providing. See Posh-Git as an example; it has a Write-VcsStatus function that you can place in your custom Prompt function and have it work.

You can add some behaviour to your module that deals with what happens when someone runs Remove-Module MyModule. The process for doing this is detailed in the Notes section of the help for Remove-Module.

Don’t Set-PSDebug -Strict and leave it there

The Problem

Set-PSDebug -Strict is very helpful for ensuring you haven’t made any obvious mistakes in your code. For example, ensuring variables are declared assigned before use in another operation. But it comes with a problem that many people are apparently not aware of: It applies to the global scope and not just to your module or function.

The Solution

The solution is to just use Set-StrictMode -Version Latest (or another version as appropriate). This will grant the benefits of StrictMode but only within the scope of your module. The downside to StrictMode from a users perspective is that it is not always obvious when it has been enabled. There isn’t a built-in cmdlet to find out if it is enabled and to what level. Thankfully Chris Dent has written this helpful function to solve this problem.

There are other ways around needing to even enable StrictMode. The best option would be Pester tests for all your functions to help ensure you know that all of your code paths will work and that your function will correctly handle null inputs in places etc. If you’re primarily worried about users not inputting values for some parameters then use the Mandatory parameter attribute, or validation attributes like [ValidateNotNullOrEmpty()] and others.

Don’t throw an error and fail importing if non-PowerShell dependencies aren’t there

The Problem

Some modules rely on tools outside of PowerShell, we’re writing PowerShell to automate almost anything. That often means we need third party applications installed on the machines the functions will run on. The solution some module authors have chosen is to check for it on import and throw an error when it is not present. Others have chosen to prompt for an optional download of the relevant application. There is some sense in this, you likely can’t make much use of the module without that application. But it doesn’t account for situations such as an application which has restrictions, such as license costs, in place that prevent it being run on a machine that is being used to write the scripts that make use of it.

The Solution

The simplest solution is to write a warning on import if you don’t detect the application or other dependency is there. This lets the user know it is needed but doesn’t prevent them from exploring the module, its commands and, importantly, the help. You can extend this further to have it documented in the Readme for the module detailing these dependencies, this should also be present on the page on the PowerShell Gallery, and its Github page if it is open source.

Ensure your module manifest has the correct attributes

The Problem

A number of modules I looked at were missing the RootModule attribute, and didn’t make use of NestedModules or the other attributes that also work for this. By missing out these attributes the module wasn’t exporting any commands, which means when I run Get-Module MyModule -ListAvailable or Get-Command -Module MyModule I get no output for what commands are available. The other common issue I’ve seen was FunctionsToExport = @() which also results in no commands being exported, even if you’ve called Export-ModuleMember -Function at the end of your psm1 file. The main cause of this is when a module developer has been working with the psm1 file and only adds the psd1 file to publish it to the PowerShell Gallery and doesn’t fully understand what all the attributes are for, they’ll keep importing just the psm1 and it works fine for them.

The Solution

This is a very simple one to fix, set the RootModule attribute of your psd1 to point at your psm1 or compiled dll. If you’ve got multiple psm1 files then you can make use of the NestedModules attribute, but I’d also set one of them as the RootModule to allow you to Pester test them correctly.

FunctionsToExport is a bit more interesting, it should only list the functions you actually want to present to users. Keeping this up to date as you add new functions can be a bit of a pain especially with multiple people working on the module, the solution is to update it dynamically as part of your process to publish it to the gallery. The Configuration module has a very useful function for handling this called Update-Metadata and I’d highly recommend making use of it, it’ll also allow you to update the version number as you publish new versions.

Conclusion

These are some of the problems I’ve encountered as part of the larger project I’m working on. I’m sure I’ll find more as I get closer to being finished with it so check back in future for more updates or other blog posts about them.

If you’ve encountered anything you think is a “worst practice”, disagree with any of these, or want alternate ways to solve some problem then feel free to tweet me @halbaradkenafin or find me on the PowerShell Slack.