Created
June 13, 2023 18:36
-
-
Save ZakiMohammed/2e4d3c84cd7efe1df10b52d683bad8b3 to your computer and use it in GitHub Desktop.
Resharper InspectCode Report
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<?xml version="1.0" encoding="utf-8"?> | |
<RuleSet Name="Dead Code Rules" Description=" " ToolsVersion="12.0"> | |
<Rules AnalyzerId="Microsoft.Analyzers.ManagedCodeAnalysis" RuleNamespace="Microsoft.Rules.Managed"> | |
<Rule Id="CA1801" Action="Warning" /> | |
<Rule Id="CA1804" Action="Warning" /> | |
<Rule Id="CA1811" Action="Warning" /> | |
<Rule Id="CA1812" Action="Warning" /> | |
<Rule Id="CA1823" Action="Warning" /> | |
</Rules> | |
<Rules AnalyzerId="Microsoft.Analyzers.NativeCodeAnalysis" RuleNamespace="Microsoft.Rules.Native"> | |
<Rule Id="C6259" Action="Warning" /> | |
</Rules> | |
</RuleSet> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# resharper clt | |
# article link: | |
https://medium.com/maestral-solutions/code-inspection-with-resharpers-command-line-tools-20dd88b143d1 | |
# download resharper clt: | |
https://www.jetbrains.com/resharper/download/#section=commandline | |
# download xslt files and save it to below location: | |
https://gist.github.com/maartenba/099d79374e5e23c40dc31ba6b7bfd9ca | |
# location: | |
JetBrains.ReSharper.CommandLineTools.2023.1.2 | |
# run in cmd | |
# build project | |
# close visual studio | |
# command to generate .xml file: | |
C:\Users\zshaikh\JetBrains.ReSharper.CommandLineTools.2023.1.2> inspectcode.exe solution-path\solution.sln --output =output-path\file.xml | |
# location: | |
C:\Users\zshaikh | |
# bypass security policy for powershell | |
Set-ExecutionPolicy -Scope Process -ExecutionPolicy Bypass | |
# run in powershell | |
# command to generate .html file: | |
C:\Users\zshaikh> .\Transform-Xslt.ps1 file.xml ic.xslt page.html | |
### | |
# executed commands | |
# run in cmd | |
C:\Zaki\Software\JetBrains.ReSharper.CommandLineTools.2023.1.2> inspectcode.exe C:\Zaki\Clients\CDCN\projects\v4\repos\136644-remove-unused-codes\SRC\V4.API.sln --output=C:\Users\zshaikh\file.xml | |
# run in powershell | |
PS C:\Users\zshaikh> .\Transform-Xslt.ps1 file.xml ic.xslt page.html | |
### | |
# solution locatoin | |
C:\Zaki\Clients\CDCN\projects\v4\repos\136644-remove-unused-codes\SRC | |
V4.API.sln | |
C:\Zaki\Clients\CDCN\projects\v4\repos\136644-remove-unused-codes\SRC\V4.API.sln |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment