Skip to content

Bump Microsoft.Data.SqlClient from 5.1.2 to 5.1.4 in /src #99

Bump Microsoft.Data.SqlClient from 5.1.2 to 5.1.4 in /src

Bump Microsoft.Data.SqlClient from 5.1.2 to 5.1.4 in /src #99

Triggered via push January 9, 2024 20:25
Status Success
Total duration 3m 51s
Artifacts 1

codequality.yml

on: push
Fit to window
Zoom out
Zoom in

Annotations

11 warnings
code-scanning: src/repository-webapi-client/RepositoryApiClient.cs#L7
Constructor has 17 parameters, which is greater than the 7 authorized. (https://rules.sonarsource.com/csharp/RSPEC-107)
code-scanning: src/repository-webapi/Program.cs#L17
Make sure that this logger's configuration is safe. (https://rules.sonarsource.com/csharp/RSPEC-4792)
code-scanning: src/repository-webapi/Extensions/GameTypeExtensions.cs#L45
'System.ApplicationException' should not be thrown by user code. (https://rules.sonarsource.com/csharp/RSPEC-112)
code-scanning: src/repository-webapi/Controllers/DataMaintenanceController.cs#L37
Make sure using a dynamically formatted SQL query is safe here. (https://rules.sonarsource.com/csharp/RSPEC-2077)
code-scanning: src/repository-webapi/Controllers/DataMaintenanceController.cs#L52
Make sure using a dynamically formatted SQL query is safe here. (https://rules.sonarsource.com/csharp/RSPEC-2077)
code-scanning: src/repository-webapi/Controllers/DataMaintenanceController.cs#L52
Method 'ExecuteSqlRawAsync' inserts interpolated strings directly into the SQL, without any protection against SQL injection. Consider using 'ExecuteSqlAsync' instead, which protects against SQL injection, or make sure that the value is sanitized and suppress the warning.
code-scanning: src/repository-webapi/Controllers/DataMaintenanceController.cs#L67
Make sure using a dynamically formatted SQL query is safe here. (https://rules.sonarsource.com/csharp/RSPEC-2077)
code-scanning: src/repository-webapi/Controllers/DataMaintenanceController.cs#L37
Method 'ExecuteSqlRawAsync' inserts interpolated strings directly into the SQL, without any protection against SQL injection. Consider using 'ExecuteSqlAsync' instead, which protects against SQL injection, or make sure that the value is sanitized and suppress the warning.
code-scanning: src/repository-webapi/Controllers/DataMaintenanceController.cs#L82
Make sure using a dynamically formatted SQL query is safe here. (https://rules.sonarsource.com/csharp/RSPEC-2077)
code-scanning: src/repository-webapi/Controllers/DataMaintenanceController.cs#L67
Method 'ExecuteSqlRawAsync' inserts interpolated strings directly into the SQL, without any protection against SQL injection. Consider using 'ExecuteSqlAsync' instead, which protects against SQL injection, or make sure that the value is sanitized and suppress the warning.
code-scanning
The "paths"/"paths-ignore" fields of the config only have effect for JavaScript, Python, and Ruby

Artifacts

Produced during runtime
Name Size
nuget-packages Expired
56.2 KB