Skip to content

Bump Microsoft.NET.Test.Sdk from 17.10.0 to 17.11.1 #413

Bump Microsoft.NET.Test.Sdk from 17.10.0 to 17.11.1

Bump Microsoft.NET.Test.Sdk from 17.10.0 to 17.11.1 #413

Triggered via pull request September 6, 2024 04:10
Status Success
Total duration 1m 16s
Artifacts

dotnet-core-pr.yml

on: pull_request
Fit to window
Zoom out
Zoom in

Annotations

6 warnings
build
The following actions uses node12 which is deprecated and will be forced to run on node16: actions/checkout@v2, actions/setup-dotnet@v1. For more info: https://github.blog/changelog/2023-06-13-github-actions-all-actions-will-run-on-node16-instead-of-node12-by-default/
build
The following actions use a deprecated Node.js version and will be forced to run on node20: actions/checkout@v2, actions/setup-dotnet@v1. For more info: https://github.blog/changelog/2024-03-07-github-actions-all-actions-will-run-on-node20-instead-of-node16-by-default/
build: Microting.eFormMonitoringBase.Unit.Tests/DbTestFixture.cs#L123
'Assembly.CodeBase' is obsolete: 'Assembly.CodeBase and Assembly.EscapedCodeBase are only included for .NET Framework compatibility. Use Assembly.Location.' (https://aka.ms/dotnet-warnings/SYSLIB0012)
build: Microting.eFormMonitoringBase.Unit.Tests/DbTestFixture.cs#L102
Method 'ExecuteSqlRaw' inserts interpolated strings directly into the SQL, without any protection against SQL injection. Consider using 'ExecuteSql' instead, which protects against SQL injection, or make sure that the value is sanitized and suppress the warning.
build: Microting.eFormMonitoringBase.Unit.Tests/DbTestFixture.cs#L123
'Assembly.CodeBase' is obsolete: 'Assembly.CodeBase and Assembly.EscapedCodeBase are only included for .NET Framework compatibility. Use Assembly.Location.' (https://aka.ms/dotnet-warnings/SYSLIB0012)
build: Microting.eFormMonitoringBase.Unit.Tests/DbTestFixture.cs#L102
Method 'ExecuteSqlRaw' inserts interpolated strings directly into the SQL, without any protection against SQL injection. Consider using 'ExecuteSql' instead, which protects against SQL injection, or make sure that the value is sanitized and suppress the warning.