Skip to content

Commit

Permalink
Merge pull request #19 from Mijo-Software/mjohne-patch-3
Browse files Browse the repository at this point in the history
Add files via upload
  • Loading branch information
mjohne authored Dec 25, 2019
2 parents 8e4e80b + 104c31f commit 93e772e
Show file tree
Hide file tree
Showing 58 changed files with 6,085 additions and 0 deletions.
575 changes: 575 additions & 0 deletions packages/Microsoft.NetCore.Analyzers.2.9.8/EULA.rtf

Large diffs are not rendered by default.

Binary file not shown.
270 changes: 270 additions & 0 deletions packages/Microsoft.NetCore.Analyzers.2.9.8/ThirdPartyNotices.rtf

Large diffs are not rendered by default.

Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Original file line number Diff line number Diff line change
@@ -0,0 +1,65 @@
<Project DefaultTargets="Build" xmlns="http://schemas.microsoft.com/developer/msbuild/2003">

<!--
This item group adds any .editorconfig file present at the project root directory
as an additional file.
-->
<ItemGroup Condition="'$(SkipDefaultEditorConfigAsAdditionalFile)' != 'true' And Exists('$(MSBuildProjectDirectory)\.editorconfig')" >
<AdditionalFiles Include="$(MSBuildProjectDirectory)\.editorconfig" />
</ItemGroup>

<!--
This property group prevents the rule ids implemented in this package to be bumped to errors when
the 'CodeAnalysisTreatWarningsAsErrors' = 'false'.
-->
<PropertyGroup Condition="'$(CodeAnalysisTreatWarningsAsErrors)' == 'false'">
<WarningsNotAsErrors>$(WarningsNotAsErrors);CA1303;CA1304;CA1305;CA1307;CA1308;CA1309;CA1401;CA1810;CA1813;CA1816;CA1820;CA1824;CA1825;CA1826;CA1827;CA1828;CA1829;CA2000;CA2002;CA2008;CA2009;CA2010;CA2100;CA2101;CA2201;CA2207;CA2208;CA2213;CA2216;CA2229;CA2235;CA2237;CA2241;CA2242;CA2243;CA2300;CA2301;CA2302;CA2305;CA2310;CA2311;CA2312;CA2315;CA2321;CA2322;CA2326;CA2327;CA2328;CA2329;CA2330;CA3001;CA3002;CA3003;CA3004;CA3005;CA3006;CA3007;CA3008;CA3009;CA3010;CA3011;CA3012;CA3061;CA5350;CA5351;CA5358;CA5359;CA5360;CA5361;CA5362;CA5363;CA5364;CA5365;CA5366;CA5367;CA5368;CA5369;CA5370;CA5371;CA5372;CA5373;CA5374;CA5375;CA5376;CA5377;CA5378;CA5379;CA5380;CA5381;CA5382;CA5383;CA5384;CA5385;CA5386;CA5387;CA5388;CA5389;CA5390;CA5391;CA5392;CA5393;CA5394;CA5395;CA5396;CA5397;CA5398;CA5399;CA5400;CA5401;CA5402;CA5403</WarningsNotAsErrors>
</PropertyGroup>

<!--
This property group contains the rules that have been implemented in this package and therefore should be disabled for the binary FxCop.
The format is -[Category]#[ID], e.g., -Microsoft.Design#CA1001;
-->
<PropertyGroup>
<CodeAnalysisRuleSetOverrides>
$(CodeAnalysisRuleSetOverrides);
-Microsoft.Globalization#CA1303;
-Microsoft.Globalization#CA1304;
-Microsoft.Globalization#CA1305;
-Microsoft.Globalization#CA1307;
-Microsoft.Globalization#CA1308;
-Microsoft.Globalization#CA1309;
-Microsoft.Globalization#CA2101;

-Microsoft.Interoperability#CA1401;

-Microsoft.Performance#CA1810;
-Microsoft.Performance#CA1813;
-Microsoft.Performance#CA1820;
-Microsoft.Performance#CA1824;

-Microsoft.Reliability#CA2000;
-Microsoft.Reliability#CA2002;

-Microsoft.Security#CA2100;

-Microsoft.Usage#CA1816;
-Microsoft.Usage#CA2201;
-Microsoft.Usage#CA2207;
-Microsoft.Usage#CA2208;
-Microsoft.Usage#CA2213;
-Microsoft.Usage#CA2216;
-Microsoft.Usage#CA2229;
-Microsoft.Usage#CA2235;
-Microsoft.Usage#CA2237;
-Microsoft.Usage#CA2241;
-Microsoft.Usage#CA2242;
-Microsoft.Usage#CA2243;

</CodeAnalysisRuleSetOverrides>
</PropertyGroup>

<PropertyGroup>
<Features>$(Features);flow-analysis</Features>
</PropertyGroup>
</Project>

Large diffs are not rendered by default.

Large diffs are not rendered by default.

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
@@ -0,0 +1,116 @@
<?xml version="1.0"?>
<RuleSet Name="All Rules with default severity" Description="All Rules with default severity. Rules with IsEnabledByDefault = false are disabled." ToolsVersion="15.0">
<Rules AnalyzerId="Microsoft.NetCore.Analyzers" RuleNamespace="Microsoft.NetCore.Analyzers">
<Rule Id="CA1303" Action="Warning" /> <!-- Do not pass literals as localized parameters -->
<Rule Id="CA1304" Action="Warning" /> <!-- Specify CultureInfo -->
<Rule Id="CA1305" Action="Warning" /> <!-- Specify IFormatProvider -->
<Rule Id="CA1307" Action="Warning" /> <!-- Specify StringComparison -->
<Rule Id="CA1308" Action="Warning" /> <!-- Normalize strings to uppercase -->
<Rule Id="CA1309" Action="None" /> <!-- Use ordinal stringcomparison -->
<Rule Id="CA1401" Action="Warning" /> <!-- P/Invokes should not be visible -->
<Rule Id="CA1810" Action="Warning" /> <!-- Initialize reference type static fields inline -->
<Rule Id="CA1813" Action="None" /> <!-- Avoid unsealed attributes -->
<Rule Id="CA1816" Action="Warning" /> <!-- Dispose methods should call SuppressFinalize -->
<Rule Id="CA1820" Action="Warning" /> <!-- Test for empty strings using string length -->
<Rule Id="CA1824" Action="Warning" /> <!-- Mark assemblies with NeutralResourcesLanguageAttribute -->
<Rule Id="CA1825" Action="Warning" /> <!-- Avoid zero-length array allocations. -->
<Rule Id="CA1826" Action="Warning" /> <!-- Do not use Enumerable methods on indexable collections. Instead use the collection directly -->
<Rule Id="CA1827" Action="Warning" /> <!-- Do not use Count() or LongCount() when Any() can be used -->
<Rule Id="CA1828" Action="Warning" /> <!-- Do not use CountAsync() or LongCountAsync() when AnyAsync() can be used -->
<Rule Id="CA1829" Action="Warning" /> <!-- Use Length/Count property instead of Count() when available -->
<Rule Id="CA2000" Action="Warning" /> <!-- Dispose objects before losing scope -->
<Rule Id="CA2002" Action="Warning" /> <!-- Do not lock on objects with weak identity -->
<Rule Id="CA2008" Action="Warning" /> <!-- Do not create tasks without passing a TaskScheduler -->
<Rule Id="CA2009" Action="Warning" /> <!-- Do not call ToImmutableCollection on an ImmutableCollection value -->
<Rule Id="CA2010" Action="Warning" /> <!-- Always consume the value returned by methods marked with PreserveSigAttribute -->
<Rule Id="CA2100" Action="Warning" /> <!-- Review SQL queries for security vulnerabilities -->
<Rule Id="CA2101" Action="Warning" /> <!-- Specify marshaling for P/Invoke string arguments -->
<Rule Id="CA2201" Action="None" /> <!-- Do not raise reserved exception types -->
<Rule Id="CA2207" Action="Warning" /> <!-- Initialize value type static fields inline -->
<Rule Id="CA2208" Action="Warning" /> <!-- Instantiate argument exceptions correctly -->
<Rule Id="CA2213" Action="Warning" /> <!-- Disposable fields should be disposed -->
<Rule Id="CA2216" Action="Warning" /> <!-- Disposable types should declare finalizer -->
<Rule Id="CA2229" Action="Warning" /> <!-- Implement serialization constructors -->
<Rule Id="CA2235" Action="Warning" /> <!-- Mark all non-serializable fields -->
<Rule Id="CA2237" Action="Warning" /> <!-- Mark ISerializable types with serializable -->
<Rule Id="CA2241" Action="Warning" /> <!-- Provide correct arguments to formatting methods -->
<Rule Id="CA2242" Action="Warning" /> <!-- Test for NaN correctly -->
<Rule Id="CA2243" Action="Warning" /> <!-- Attribute string literals should parse correctly -->
<Rule Id="CA2300" Action="None" /> <!-- Do not use insecure deserializer BinaryFormatter -->
<Rule Id="CA2301" Action="None" /> <!-- Do not call BinaryFormatter.Deserialize without first setting BinaryFormatter.Binder -->
<Rule Id="CA2302" Action="None" /> <!-- Ensure BinaryFormatter.Binder is set before calling BinaryFormatter.Deserialize -->
<Rule Id="CA2305" Action="None" /> <!-- Do not use insecure deserializer LosFormatter -->
<Rule Id="CA2310" Action="None" /> <!-- Do not use insecure deserializer NetDataContractSerializer -->
<Rule Id="CA2311" Action="None" /> <!-- Do not deserialize without first setting NetDataContractSerializer.Binder -->
<Rule Id="CA2312" Action="None" /> <!-- Ensure NetDataContractSerializer.Binder is set before deserializing -->
<Rule Id="CA2315" Action="None" /> <!-- Do not use insecure deserializer ObjectStateFormatter -->
<Rule Id="CA2321" Action="None" /> <!-- Do not deserialize with JavaScriptSerializer using a SimpleTypeResolver -->
<Rule Id="CA2322" Action="None" /> <!-- Ensure JavaScriptSerializer is not initialized with SimpleTypeResolver before deserializing -->
<Rule Id="CA2326" Action="None" /> <!-- Do not use TypeNameHandling values other than None -->
<Rule Id="CA2327" Action="None" /> <!-- Do not use insecure JsonSerializerSettings -->
<Rule Id="CA2328" Action="None" /> <!-- Ensure that JsonSerializerSettings are secure -->
<Rule Id="CA2329" Action="None" /> <!-- Do not deserialize with JsonSerializer using an insecure configuration -->
<Rule Id="CA2330" Action="None" /> <!-- Ensure that JsonSerializer has a secure configuration when deserializing -->
<Rule Id="CA3001" Action="None" /> <!-- Review code for SQL injection vulnerabilities -->
<Rule Id="CA3002" Action="None" /> <!-- Review code for XSS vulnerabilities -->
<Rule Id="CA3003" Action="None" /> <!-- Review code for file path injection vulnerabilities -->
<Rule Id="CA3004" Action="None" /> <!-- Review code for information disclosure vulnerabilities -->
<Rule Id="CA3005" Action="None" /> <!-- Review code for LDAP injection vulnerabilities -->
<Rule Id="CA3006" Action="None" /> <!-- Review code for process command injection vulnerabilities -->
<Rule Id="CA3007" Action="None" /> <!-- Review code for open redirect vulnerabilities -->
<Rule Id="CA3008" Action="None" /> <!-- Review code for XPath injection vulnerabilities -->
<Rule Id="CA3009" Action="None" /> <!-- Review code for XML injection vulnerabilities -->
<Rule Id="CA3010" Action="None" /> <!-- Review code for XAML injection vulnerabilities -->
<Rule Id="CA3011" Action="None" /> <!-- Review code for DLL injection vulnerabilities -->
<Rule Id="CA3012" Action="None" /> <!-- Review code for regex injection vulnerabilities -->
<Rule Id="CA3061" Action="Warning" /> <!-- Do Not Add Schema By URL -->
<Rule Id="CA5350" Action="Warning" /> <!-- Do Not Use Weak Cryptographic Algorithms -->
<Rule Id="CA5351" Action="Warning" /> <!-- Do Not Use Broken Cryptographic Algorithms -->
<Rule Id="CA5358" Action="None" /> <!-- Do Not Use Unsafe Cipher Modes -->
<Rule Id="CA5359" Action="Warning" /> <!-- Do Not Disable Certificate Validation -->
<Rule Id="CA5360" Action="Warning" /> <!-- Do Not Call Dangerous Methods In Deserialization -->
<Rule Id="CA5361" Action="Warning" /> <!-- Do Not Disable SChannel Use of Strong Crypto -->
<Rule Id="CA5362" Action="None" /> <!-- Do Not Refer Self In Serializable Class -->
<Rule Id="CA5363" Action="Warning" /> <!-- Do Not Disable Request Validation -->
<Rule Id="CA5364" Action="Warning" /> <!-- Do Not Use Deprecated Security Protocols -->
<Rule Id="CA5365" Action="Warning" /> <!-- Do Not Disable HTTP Header Checking -->
<Rule Id="CA5366" Action="Warning" /> <!-- Use XmlReader For DataSet Read Xml -->
<Rule Id="CA5367" Action="None" /> <!-- Do Not Serialize Types With Pointer Fields -->
<Rule Id="CA5368" Action="Warning" /> <!-- Set ViewStateUserKey For Classes Derived From Page -->
<Rule Id="CA5369" Action="Warning" /> <!-- Use XmlReader For Deserialize -->
<Rule Id="CA5370" Action="Warning" /> <!-- Use XmlReader For Validating Reader -->
<Rule Id="CA5371" Action="Warning" /> <!-- Use XmlReader For Schema Read -->
<Rule Id="CA5372" Action="Warning" /> <!-- Use XmlReader For XPathDocument -->
<Rule Id="CA5373" Action="Warning" /> <!-- Do not use obsolete key derivation function -->
<Rule Id="CA5374" Action="Warning" /> <!-- Do Not Use XslTransform -->
<Rule Id="CA5375" Action="None" /> <!-- Do Not Use Account Shared Access Signature -->
<Rule Id="CA5376" Action="Warning" /> <!-- Use SharedAccessProtocol HttpsOnly -->
<Rule Id="CA5377" Action="Warning" /> <!-- Use Container Level Access Policy -->
<Rule Id="CA5378" Action="Warning" /> <!-- Do not disable ServicePointManagerSecurityProtocols -->
<Rule Id="CA5379" Action="Warning" /> <!-- Do Not Use Weak Key Derivation Function Algorithm -->
<Rule Id="CA5380" Action="Warning" /> <!-- Do Not Add Certificates To Root Store -->
<Rule Id="CA5381" Action="Warning" /> <!-- Ensure Certificates Are Not Added To Root Store -->
<Rule Id="CA5382" Action="None" /> <!-- Use Secure Cookies In ASP.Net Core -->
<Rule Id="CA5383" Action="None" /> <!-- Ensure Use Secure Cookies In ASP.Net Core -->
<Rule Id="CA5384" Action="Warning" /> <!-- Do Not Use Digital Signature Algorithm (DSA) -->
<Rule Id="CA5385" Action="Warning" /> <!-- Use Rivest–Shamir–Adleman (RSA) Algorithm With Sufficient Key Size -->
<Rule Id="CA5386" Action="None" /> <!-- Avoid hardcoding SecurityProtocolType value -->
<Rule Id="CA5387" Action="None" /> <!-- Do Not Use Weak Key Derivation Function With Insufficient Iteration Count -->
<Rule Id="CA5388" Action="None" /> <!-- Ensure Sufficient Iteration Count When Using Weak Key Derivation Function -->
<Rule Id="CA5389" Action="None" /> <!-- Do Not Add Archive Item's Path To The Target File System Path -->
<Rule Id="CA5390" Action="None" /> <!-- Do not hard-code encryption key -->
<Rule Id="CA5391" Action="None" /> <!-- Use antiforgery tokens in ASP.NET Core MVC controllers -->
<Rule Id="CA5392" Action="None" /> <!-- Use DefaultDllImportSearchPaths attribute for P/Invokes -->
<Rule Id="CA5393" Action="None" /> <!-- Do not use unsafe DllImportSearchPath value -->
<Rule Id="CA5394" Action="None" /> <!-- Do not use insecure randomness -->
<Rule Id="CA5395" Action="None" /> <!-- Miss HttpVerb attribute for action methods -->
<Rule Id="CA5396" Action="None" /> <!-- Set HttpOnly to true for HttpCookie -->
<Rule Id="CA5397" Action="Warning" /> <!-- Do not use deprecated SslProtocols values -->
<Rule Id="CA5398" Action="None" /> <!-- Avoid hardcoded SslProtocols values -->
<Rule Id="CA5399" Action="None" /> <!-- HttpClients should enable certificate revocation list checks -->
<Rule Id="CA5400" Action="None" /> <!-- Ensure HttpClient certificate revocation list check is not disabled -->
<Rule Id="CA5401" Action="None" /> <!-- Do not use CreateEncryptor with non-default IV -->
<Rule Id="CA5402" Action="None" /> <!-- Use CreateEncryptor with the default IV -->
<Rule Id="CA5403" Action="None" /> <!-- Do not hard-code certificate -->
</Rules>
</RuleSet>
Loading

0 comments on commit 93e772e

Please sign in to comment.