Skip to content

Bump XtremeIdiots.CallOfDuty.DemoReader in /src #154

Bump XtremeIdiots.CallOfDuty.DemoReader in /src

Bump XtremeIdiots.CallOfDuty.DemoReader in /src #154

Status Success
Total duration 4m 10s
Artifacts 1

codequality.yml

on: push
code-scanning
4m 2s
code-scanning
Fit to window
Zoom out
Zoom in

Annotations

10 warnings
code-scanning: src/repository-webapi-client/Api/UserProfileApi.cs#L56
Define a constant instead of using this literal 'user-profile' 5 times. (https://rules.sonarsource.com/csharp/RSPEC-1192)
code-scanning: src/repository-webapi-client/RepositoryApiClient.cs#L7
Constructor has 17 parameters, which is greater than the 7 authorized. (https://rules.sonarsource.com/csharp/RSPEC-107)
code-scanning: src/repository-webapi/Controllers/UserProfileController.cs#L186
Define a constant instead of using this literal 'Could not deserialize request body' 4 times. (https://rules.sonarsource.com/csharp/RSPEC-1192)
code-scanning: src/repository-webapi/Controllers/GameServersSecretsController.cs#L36
Define a constant instead of using this literal 'gameservers-keyvault-endpoint' 4 times. (https://rules.sonarsource.com/csharp/RSPEC-1192)
code-scanning: src/repository-webapi/Extensions/GameTypeExtensions.cs#L45
'System.ApplicationException' should not be thrown by user code. (https://rules.sonarsource.com/csharp/RSPEC-112)
code-scanning: src/repository-webapi/Controllers/DataMaintenanceController.cs#L37
Make sure using a dynamically formatted SQL query is safe here. (https://rules.sonarsource.com/csharp/RSPEC-2077)
code-scanning: src/repository-webapi/Controllers/DataMaintenanceController.cs#L52
Make sure using a dynamically formatted SQL query is safe here. (https://rules.sonarsource.com/csharp/RSPEC-2077)
code-scanning: src/repository-webapi/Controllers/DataMaintenanceController.cs#L37
Method 'ExecuteSqlRawAsync' inserts interpolated strings directly into the SQL, without any protection against SQL injection. Consider using 'ExecuteSqlAsync' instead, which protects against SQL injection, or make sure that the value is sanitized and suppress the warning.
code-scanning: src/repository-webapi/Controllers/DataMaintenanceController.cs#L52
Method 'ExecuteSqlRawAsync' inserts interpolated strings directly into the SQL, without any protection against SQL injection. Consider using 'ExecuteSqlAsync' instead, which protects against SQL injection, or make sure that the value is sanitized and suppress the warning.
code-scanning: src/repository-webapi/Controllers/DataMaintenanceController.cs#L67
Make sure using a dynamically formatted SQL query is safe here. (https://rules.sonarsource.com/csharp/RSPEC-2077)

Artifacts

Produced during runtime
Name Size
nuget-packages Expired
54.9 KB