Skip to content

Bump Microsoft.Identity.Web from 2.16.0 to 2.16.1 in /src #100

Bump Microsoft.Identity.Web from 2.16.0 to 2.16.1 in /src

Bump Microsoft.Identity.Web from 2.16.0 to 2.16.1 in /src #100

Triggered via push January 9, 2024 20:26
Status Success
Total duration 3m 56s
Artifacts 1

codequality.yml

on: push
Fit to window
Zoom out
Zoom in

Annotations

11 warnings
code-scanning: src/repository-webapi-client/RepositoryApiClient.cs#L7
Constructor has 17 parameters, which is greater than the 7 authorized. (https://rules.sonarsource.com/csharp/RSPEC-107)
code-scanning: src/repository-webapi/Program.cs#L17
Make sure that this logger's configuration is safe. (https://rules.sonarsource.com/csharp/RSPEC-4792)
code-scanning: src/repository-webapi/Extensions/GameTypeExtensions.cs#L45
'System.ApplicationException' should not be thrown by user code. (https://rules.sonarsource.com/csharp/RSPEC-112)
code-scanning: src/repository-webapi/Controllers/DataMaintenanceController.cs#L37
Make sure using a dynamically formatted SQL query is safe here. (https://rules.sonarsource.com/csharp/RSPEC-2077)
code-scanning: src/repository-webapi/Controllers/DataMaintenanceController.cs#L37
Method 'ExecuteSqlRawAsync' inserts interpolated strings directly into the SQL, without any protection against SQL injection. Consider using 'ExecuteSqlAsync' instead, which protects against SQL injection, or make sure that the value is sanitized and suppress the warning.
code-scanning: src/repository-webapi/Controllers/DataMaintenanceController.cs#L52
Make sure using a dynamically formatted SQL query is safe here. (https://rules.sonarsource.com/csharp/RSPEC-2077)
code-scanning: src/repository-webapi/Controllers/DataMaintenanceController.cs#L67
Make sure using a dynamically formatted SQL query is safe here. (https://rules.sonarsource.com/csharp/RSPEC-2077)
code-scanning: src/repository-webapi/Controllers/DataMaintenanceController.cs#L52
Method 'ExecuteSqlRawAsync' inserts interpolated strings directly into the SQL, without any protection against SQL injection. Consider using 'ExecuteSqlAsync' instead, which protects against SQL injection, or make sure that the value is sanitized and suppress the warning.
code-scanning: src/repository-webapi/Controllers/DataMaintenanceController.cs#L67
Method 'ExecuteSqlRawAsync' inserts interpolated strings directly into the SQL, without any protection against SQL injection. Consider using 'ExecuteSqlAsync' instead, which protects against SQL injection, or make sure that the value is sanitized and suppress the warning.
code-scanning: src/repository-webapi/Controllers/DataMaintenanceController.cs#L82
Make sure using a dynamically formatted SQL query is safe here. (https://rules.sonarsource.com/csharp/RSPEC-2077)
code-scanning
The "paths"/"paths-ignore" fields of the config only have effect for JavaScript, Python, and Ruby

Artifacts

Produced during runtime
Name Size
nuget-packages Expired
56.2 KB