Skip to content

Bump Azure.Identity from 1.10.4 to 1.11.0 in /src #167

Bump Azure.Identity from 1.10.4 to 1.11.0 in /src

Bump Azure.Identity from 1.10.4 to 1.11.0 in /src #167

Triggered via push April 9, 2024 20:31
Status Success
Total duration 4m 0s
Artifacts 1

codequality.yml

on: push
Fit to window
Zoom out
Zoom in

Annotations

10 warnings
code-scanning: src/repository-webapi-client/Api/UserProfileApi.cs#L56
Define a constant instead of using this literal 'user-profile' 5 times. (https://rules.sonarsource.com/csharp/RSPEC-1192)
code-scanning: src/repository-webapi-client/RepositoryApiClient.cs#L7
Constructor has 17 parameters, which is greater than the 7 authorized. (https://rules.sonarsource.com/csharp/RSPEC-107)
code-scanning: src/repository-webapi/Controllers/GameServersSecretsController.cs#L36
Define a constant instead of using this literal 'gameservers-keyvault-endpoint' 4 times. (https://rules.sonarsource.com/csharp/RSPEC-1192)
code-scanning: src/repository-webapi/Controllers/UserProfileController.cs#L186
Define a constant instead of using this literal 'Could not deserialize request body' 4 times. (https://rules.sonarsource.com/csharp/RSPEC-1192)
code-scanning: src/repository-webapi/Extensions/GameTypeExtensions.cs#L45
'System.ApplicationException' should not be thrown by user code. (https://rules.sonarsource.com/csharp/RSPEC-112)
code-scanning: src/repository-webapi/Controllers/DataMaintenanceController.cs#L37
Make sure using a dynamically formatted SQL query is safe here. (https://rules.sonarsource.com/csharp/RSPEC-2077)
code-scanning: src/repository-webapi/Controllers/DataMaintenanceController.cs#L52
Make sure using a dynamically formatted SQL query is safe here. (https://rules.sonarsource.com/csharp/RSPEC-2077)
code-scanning: src/repository-webapi/Controllers/DataMaintenanceController.cs#L52
Method 'ExecuteSqlRawAsync' inserts interpolated strings directly into the SQL, without any protection against SQL injection. Consider using 'ExecuteSqlAsync' instead, which protects against SQL injection, or make sure that the value is sanitized and suppress the warning.
code-scanning: src/repository-webapi/Controllers/DataMaintenanceController.cs#L37
Method 'ExecuteSqlRawAsync' inserts interpolated strings directly into the SQL, without any protection against SQL injection. Consider using 'ExecuteSqlAsync' instead, which protects against SQL injection, or make sure that the value is sanitized and suppress the warning.
code-scanning: src/repository-webapi/Controllers/DataMaintenanceController.cs#L67
Make sure using a dynamically formatted SQL query is safe here. (https://rules.sonarsource.com/csharp/RSPEC-2077)

Artifacts

Produced during runtime
Name Size
nuget-packages Expired
54.9 KB