lkurzyniec / netcore-boilerplate Goto Github PK
View Code? Open in Web Editor NEWBoilerplate of API in .NET 8
License: GNU General Public License v2.0
Boilerplate of API in .NET 8
License: GNU General Public License v2.0
I'm getting the following warning during the build.
warning NU1701: Package 'Microsoft.EntityFrameworkCore.Design 3.0.0' was restored using '.NETFramework,Version=v4.6.1, .NETFramework,Version=v4.6.2, .NETFramework,Version=v4.7, .NETFramework,Version=v4.7.1, .NETFramework,Version=v4.7.2, .NETFramework,Version=v4.8' instead of the project target framework '.NETStandard,Version=v2.0'.
This package may not be fully compatible with your project.
Because this supposes to be a role model repository it should avoid warnings during the build.
I'm not familiar with EF so I have no idea what this package is responsible for but it looks like it was not designed for .net core 3.0.
Is't possible database first?
Provides a programming interface for modern HTTP applications, including HTTP client components that...
Library home page: https://api.nuget.org/packages/system.net.http.4.3.0.nupkg
Path to dependency file: /src/HappyCode.NetCoreBoilerplate.Db/HappyCode.NetCoreBoilerplate.Db.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/system.net.http/4.3.0/system.net.http.4.3.0.nupkg
Dependency Hierarchy:
Found in base branch: master
An elevation of privilege vulnerability exists when the ASP.NET Core fails to properly sanitize web requests.
Publish Date: 2017-05-12
URL: CVE-2017-0249
Base Score Metrics:
Type: Upgrade version
Release Date: 2017-05-12
Fix Resolution: System.Text.Encodings.Web - 4.0.1,4.3.1;System.Net.Http - 4.1.2,4.3.2;System.Net.Http.WinHttpHandler - 4.0.2,4.3.1;System.Net.Security - 4.0.1,4.3.1;System.Net.WebSockets.Client - 4.0.1,4.3.1;Microsoft.AspNetCore.Mvc - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Core - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Abstractions - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.ApiExplorer - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Cors - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.DataAnnotations - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Formatters.Json - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Formatters.Xml - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Localization - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Razor.Host - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Razor - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.TagHelpers - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.ViewFeatures - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.WebApiCompatShim - 1.0.4,1.1.3
Step up your Open Source Security Game with Mend here
Provides a programming interface for modern HTTP applications, including HTTP client components that allow applications to consume web services over HTTP and HTTP components that can be used by both clients and servers for parsing HTTP headers.
Library home page: https://api.nuget.org/packages/system.net.http.4.3.0.nupkg
Path to dependency file: /test/HappyCode.NetCoreBoilerplate.Api.UnitTests/HappyCode.NetCoreBoilerplate.Api.UnitTests.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/system.net.http/4.3.0/system.net.http.4.3.0.nupkg
Dependency Hierarchy:
Found in base branch: master
An information disclosure vulnerability exists in .NET Core when authentication information is inadvertently exposed in a redirect, aka ".NET Core Information Disclosure Vulnerability." This affects .NET Core 2.1, .NET Core 1.0, .NET Core 1.1, PowerShell Core 6.0.
Publish Date: 2018-10-10
URL: CVE-2018-8292
Base Score Metrics:
Type: Upgrade version
Release Date: 2018-10-10
Fix Resolution: System.Net.Http - 4.3.4;Microsoft.PowerShell.Commands.Utility - 6.1.0-rc.1
Step up your Open Source Security Game with Mend here
I have read the docs and details , just a suggestion what if I add Postgres database along with other two?
Provides a programming interface for modern HTTP applications, including HTTP client components that...
Library home page: https://api.nuget.org/packages/system.net.http.4.3.0.nupkg
Path to dependency file: /src/HappyCode.NetCoreBoilerplate.Db/HappyCode.NetCoreBoilerplate.Db.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/system.net.http/4.3.0/system.net.http.4.3.0.nupkg
Dependency Hierarchy:
Found in base branch: master
A denial of service vulnerability exists when the ASP.NET Core fails to properly validate web requests. NOTE: Microsoft has not commented on third-party claims that the issue is that the TextEncoder.EncodeCore function in the System.Text.Encodings.Web package in ASP.NET Core Mvc before 1.0.4 and 1.1.x before 1.1.3 allows remote attackers to cause a denial of service by leveraging failure to properly calculate the length of 4-byte characters in the Unicode Non-Character range.
Publish Date: 2017-05-12
URL: CVE-2017-0247
Base Score Metrics:
Type: Upgrade version
Release Date: 2017-05-12
Fix Resolution: System.Text.Encodings.Web - 4.0.1,4.3.1;System.Net.Http - 4.1.2,4.3.2;System.Net.Http.WinHttpHandler - 4.0.2,4.5.4;System.Net.Security - 4.0.1,4.3.1;System.Net.WebSockets.Client - 4.0.1,4.3.1;Microsoft.AspNetCore.Mvc - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Core - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Abstractions - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.ApiExplorer - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Cors - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.DataAnnotations - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Formatters.Json - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Formatters.Xml - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Localization - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Razor.Host - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Razor - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.TagHelpers - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.ViewFeatures - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.WebApiCompatShim - 1.0.4,1.1.3
Step up your Open Source Security Game with Mend here
This is the implementation of the Azure SDK Client Library for Azure Identity
Library home page: https://api.nuget.org/packages/azure.identity.1.7.0.nupkg
Path to dependency file: /src/HappyCode.NetCoreBoilerplate.Db/HappyCode.NetCoreBoilerplate.Db.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/azure.identity/1.7.0/azure.identity.1.7.0.nupkg
Dependency Hierarchy:
Found in base branch: master
Azure Identity SDK Remote Code Execution Vulnerability
Publish Date: 2023-10-10
URL: CVE-2023-36414
Base Score Metrics:
Step up your Open Source Security Game with Mend here
Provides a programming interface for modern HTTP applications, including HTTP client components that...
Library home page: https://api.nuget.org/packages/system.net.http.4.3.0.nupkg
Path to dependency file: /src/HappyCode.NetCoreBoilerplate.Db/HappyCode.NetCoreBoilerplate.Db.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/system.net.http/4.3.0/system.net.http.4.3.0.nupkg
Dependency Hierarchy:
Found in base branch: master
Microsoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 allow an attacker to bypass Enhanced Security Usage taggings when they present a certificate that is invalid for a specific use, aka ".NET Security Feature Bypass Vulnerability."
Publish Date: 2017-05-12
URL: CVE-2017-0248
Base Score Metrics:
Type: Upgrade version
Release Date: 2017-05-12
Fix Resolution: System.Text.Encodings.Web - 4.0.1, 4.3.1;System.Net.Http - 4.1.2, 4.3.2;System.Net.Http.WinHttpHandler - 4.0.2, 4.3.1;System.Net.Security - 4.0.1, 4.3.1;System.Net.WebSockets.Client - 4.0.1, 4.3.1;Microsoft.AspNetCore.Mvc - 1.0.4, 1.1.3;Microsoft.AspNetCore.Mvc.Core - 1.0.4, 1.1.3;Microsoft.AspNetCore.Mvc.Abstractions - 1.0.4, 1.1.3;Microsoft.AspNetCore.Mvc.ApiExplorer - 1.0.4, 1.1.3;Microsoft.AspNetCore.Mvc.Cors - 1.0.4, 1.1.3;Microsoft.AspNetCore.Mvc.DataAnnotations - 1.0.4, 1.1.3;Microsoft.AspNetCore.Mvc.Formatters.Json - 1.0.4, 1.1.3;Microsoft.AspNetCore.Mvc.Formatters.Xml - 1.0.4, 1.1.3;Microsoft.AspNetCore.Mvc.Localization - 1.0.4, 1.1.3;Microsoft.AspNetCore.Mvc.Razor.Host - 1.0.4, 1.1.3;Microsoft.AspNetCore.Mvc.Razor - 1.0.4, 1.1.3;Microsoft.AspNetCore.Mvc.TagHelpers - 1.0.4, 1.1.3;Microsoft.AspNetCore.Mvc.ViewFeatures - 1.0.4, 1.1.3;Microsoft.AspNetCore.Mvc.WebApiCompatShim - 1.0.4, 1.1.3
Step up your Open Source Security Game with Mend here
Json.NET is a popular high-performance JSON framework for .NET
Library home page: https://api.nuget.org/packages/newtonsoft.json.9.0.1.nupkg
Path to dependency file: /test/HappyCode.NetCoreBoilerplate.Api.UnitTests/HappyCode.NetCoreBoilerplate.Api.UnitTests.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/newtonsoft.json/9.0.1/newtonsoft.json.9.0.1.nupkg
Dependency Hierarchy:
Found in base branch: master
Improper Handling of Exceptional Conditions in Newtonsoft.Json.
Newtonsoft.Json prior to version 13.0.1 is vulnerable to Insecure Defaults due to improper handling of StackOverFlow exception (SOE) whenever nested expressions are being processed. Exploiting this vulnerability results in Denial Of Service (DoS), and it is exploitable when an attacker sends 5 requests that cause SOE in time frame of 5 minutes. This vulnerability affects Internet Information Services (IIS) Applications.
Publish Date: 2022-06-22
URL: WS-2022-0161
Base Score Metrics:
Type: Upgrade version
Release Date: 2022-06-22
Fix Resolution: Newtonsoft.Json - 13.0.1;Microsoft.Extensions.ApiDescription.Server - 6.0.0
Step up your Open Source Security Game with Mend here
What is the purpose of adding [FromHeader(Name = "x-correlation-id")] string correlationId = null,
to every controller's method? At first, it seems to be redundant and indeed - a boilerplate code that should be somehow handled globally (if really is necessary).
Provides the System.Text.RegularExpressions.Regex class, an implementation of a regular expression e...
Library home page: https://api.nuget.org/packages/system.text.regularexpressions.4.3.0.nupkg
Path to dependency file: /src/HappyCode.NetCoreBoilerplate.Db/HappyCode.NetCoreBoilerplate.Db.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/system.text.regularexpressions/4.3.0/system.text.regularexpressions.4.3.0.nupkg
Dependency Hierarchy:
Found in base branch: master
A denial of service vulnerability exists when .NET Framework and .NET Core improperly process RegEx strings, aka '.NET Framework and .NET Core Denial of Service Vulnerability'. This CVE ID is unique from CVE-2019-0980, CVE-2019-0981.
Mend Note: After conducting further research, Mend has determined that CVE-2019-0820 only affects environments with versions 4.3.0 and 4.3.1 only on netcore50 environment of system.text.regularexpressions.nupkg.
Publish Date: 2019-05-16
URL: CVE-2019-0820
Base Score Metrics:
Type: Upgrade version
Origin: GHSA-cmhx-cq75-c4mj
Release Date: 2019-05-16
Fix Resolution: System.Text.RegularExpressions - 4.3.1
Step up your Open Source Security Game with Mend here
Provides access to GDI+ graphics functionality.
Commonly Used Types:
System.Drawing.Bitmap
System.D...
Library home page: https://api.nuget.org/packages/system.drawing.common.5.0.0.nupkg
Path to dependency file: /src/HappyCode.NetCoreBoilerplate.Db/HappyCode.NetCoreBoilerplate.Db.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/system.drawing.common/5.0.0/system.drawing.common.5.0.0.nupkg
Dependency Hierarchy:
Found in base branch: master
.NET Core Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26701.
Publish Date: 2021-02-25
URL: CVE-2021-24112
Base Score Metrics:
Type: Upgrade version
Origin: GHSA-rxg9-xrhp-64gj
Release Date: 2021-02-25
Fix Resolution: System.Drawing.Common - 4.7.2,5.0.3
Step up your Open Source Security Game with Mend here
Provides a programming interface for modern HTTP applications, including HTTP client components that...
Library home page: https://api.nuget.org/packages/system.net.http.4.3.0.nupkg
Path to dependency file: /src/HappyCode.NetCoreBoilerplate.Db/HappyCode.NetCoreBoilerplate.Db.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/system.net.http/4.3.0/system.net.http.4.3.0.nupkg
Dependency Hierarchy:
Found in base branch: master
A spoofing vulnerability exists when the ASP.NET Core fails to properly sanitize web requests.
Publish Date: 2017-05-12
URL: CVE-2017-0256
Base Score Metrics:
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2017-0256
Release Date: 2017-05-12
Fix Resolution: Microsoft.AspNetCore.Mvc.ApiExplorer - 1.1.3,1.0.4;Microsoft.AspNetCore.Mvc.Abstractions - 1.1.3,1.0.4;Microsoft.AspNetCore.Mvc.Core - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Cors - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Localization - 1.1.3,1.0.4;System.Net.Http - 4.1.2,4.3.2;Microsoft.AspNetCore.Mvc.Razor - 1.1.3,1.0.4;System.Net.Http.WinHttpHandler - 4.0.2,4.3.0-preview1-24530-04;System.Net.Security - 4.3.0-preview1-24530-04,4.0.1;Microsoft.AspNetCore.Mvc.ViewFeatures - 1.1.3,1.0.4;Microsoft.AspNetCore.Mvc.TagHelpers - 1.0.4,1.1.3;System.Text.Encodings.Web - 4.3.0-preview1-24530-04,4.0.1;Microsoft.AspNetCore.Mvc.Razor.Host - 1.1.3,1.0.4;Microsoft.AspNetCore.Mvc.Formatters.Json - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.WebApiCompatShim - 1.0.4,1.1.3;System.Net.WebSockets.Client - 4.3.0-preview1-24530-04,4.0.1;Microsoft.AspNetCore.Mvc.Formatters.Xml - 1.1.3,1.0.4;Microsoft.AspNetCore.Mvc.DataAnnotations - 1.0.4,1.1.3
Step up your Open Source Security Game with Mend here
Includes types that provide support for creating, serializing and validating JSON Web Tokens.
Library home page: https://api.nuget.org/packages/microsoft.identitymodel.jsonwebtokens.6.24.0.nupkg
Path to dependency file: /test/HappyCode.NetCoreBoilerplate.Api.UnitTests/HappyCode.NetCoreBoilerplate.Api.UnitTests.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/microsoft.identitymodel.jsonwebtokens/6.24.0/microsoft.identitymodel.jsonwebtokens.6.24.0.nupkg
Dependency Hierarchy:
Includes types that provide support for creating, serializing and validating JSON Web Tokens.
Library home page: https://api.nuget.org/packages/system.identitymodel.tokens.jwt.6.24.0.nupkg
Path to dependency file: /test/HappyCode.NetCoreBoilerplate.Api.UnitTests/HappyCode.NetCoreBoilerplate.Api.UnitTests.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/system.identitymodel.tokens.jwt/6.24.0/system.identitymodel.tokens.jwt.6.24.0.nupkg
Dependency Hierarchy:
Found in base branch: master
Microsoft Identity Denial of service vulnerability
Publish Date: 2024-01-09
URL: CVE-2024-21319
Base Score Metrics:
Type: Upgrade version
Origin: GHSA-8g9c-28fc-mcx2
Release Date: 2024-01-09
Fix Resolution: System.IdentityModel.Tokens.Jwt - 5.7.0,6.34.0,7.1.2, Microsoft.IdentityModel.JsonWebTokens - 5.7.0,6.34.0,7.1.2
Step up your Open Source Security Game with Mend here
[internal] load metadata for mcr.microsoft.com/dotnet/sdk:7.0 0.2s
=> CANCELED [build 1/8] FROM mcr.microsoft.com/dotnet/sdk:7.0@sha256:1015914ba9e3d3ab350f522aa446d17d7ee68190e431a25c0c11e678081327c7 0.0s
=> => resolve mcr.microsoft.com/dotnet/sdk:7.0@sha256:1015914ba9e3d3ab350f522aa446d17d7ee68190e431a25c0c11e678081327c7 0.0s > => sha256:1015914ba9e3d3ab350f522aa446d17d7ee68190e431a25c0c11e678081327c7 1.82kB / 1.82kB 0.0s
=> => sha256:1015914ba9e3d3ab350f522aa446d17d7ee68190e431a25c0c11e678081327c7 1.82kB / 1.82kB 0.0s > => sha256:a1acc0e30787b76c634d2482aaa13e92a0ec9643abccada4c38e1eda26557981 7.16kB / 7.16kB 0.0s
=> => sha256:a2d065a38471c9e4709745012f2fca26a715cfc6975eef5611c65000d4943259 2.01kB / 2.01kB 0.0s > => resolve mcr.microsoft.com/dotnet/aspnet:7.0@sha256:d43cb7cae013b5411fb9c1065d126585f50b6ccfc42d4c6d8e4e4114eadfb7cf 0.0s
=> => sha256:a1acc0e30787b76c634d2482aaa13e92a0ec9643abccada4c38e1eda26557981 7.16kB / 7.16kB 0.0s > => sha256:093335d9beee34ed3c51a18def2161f62c15da8b3a21143f2478d10d70d3e3c6 1.37kB / 1.37kB 0.0s
=> CANCELED [final 1/3] FROM mcr.microsoft.com/dotnet/aspnet:7.0@sha256:d43cb7cae013b5411fb9c1065d126585f50b6ccfc42d4c6d8e4e4114eadfb7cf 0.0s > ERROR [internal] load build context 0.0s
=> => resolve mcr.microsoft.com/dotnet/aspnet:7.0@sha256:d43cb7cae013b5411fb9c1065d126585f50b6ccfc42d4c6d8e4e4114eadfb7cf 0.0s => => resolve mcr.microsoft.com/dotnet/sdk:7.0@sha256:1015914ba9e3d3ab350f522aa446d17d7ee68190e431a25c0c11e678081327c7 0.0s
=> => sha256:1015914ba9e3d3ab350f522aa446d17d7ee68190e431a25c0c11e678081327c7 1.82kB / 1.82kB 0.0s
=> => sha256:a2d065a38471c9e4709745012f2fca26a715cfc6975eef5611c65000d4943259 2.01kB / 2.01kB 0.0s
=> => sha256:a1acc0e30787b76c634d2482aaa13e92a0ec9643abccada4c38e1eda26557981 7.16kB / 7.16kB 0.0s
=> CANCELED [final 1/3] FROM mcr.microsoft.com/dotnet/aspnet:7.0@sha256:d43cb7cae013b5411fb9c1065d126585f50b6ccfc42d4c6d8e4e4114eadfb7cf 0.0s
=> => resolve mcr.microsoft.com/dotnet/aspnet:7.0@sha256:d43cb7cae013b5411fb9c1065d126585f50b6ccfc42d4c6d8e4e4114eadfb7cf 0.0s
=> => sha256:d43cb7cae013b5411fb9c1065d126585f50b6ccfc42d4c6d8e4e4114eadfb7cf 1.82kB / 1.82kB 0.0s
=> => sha256:093335d9beee34ed3c51a18def2161f62c15da8b3a21143f2478d10d70d3e3c6 1.37kB / 1.37kB 0.0s
=> => sha256:ee7a11c84975fa708fcfc261370e09b844f99fd3a3fc7541ed7c08915eb5112c 3.25kB / 3.25kB 0.0s
=> ERROR [internal] load build context 0.0s
=> => transferring context: 124B 0.0s
[internal] load build context:
failed to solve: error from sender: readdir: open C:\Downloads\netcore-boilerplate\src*: The filename, directory name, or volume label syntax is incorrect.
PS C:\Downloads\netcore-boilerplate>
Hi,
I have forked out your repository as a boilerplate and added npgsql to support postgres database. However, I am facing an "Autofac.Core.DependencyResolutionException" error even though I have injected the dependency at GeneralRegisterModule
file. Did I inject the repository wrongly?
The flow that I am trying to implement is
Controller --> Service --> Repository
Error
"Autofac.Core.DependencyResolutionException: An exception was thrown while activating ShippingService.Core.Services.ShippingRateService.\r\n ---> Autofac.Core.DependencyResolutionException: None of the constructors found with 'Autofac.Core.Activators.Reflection.DefaultConstructorFinder' on type 'ShippingService.Core.Services.ShippingRateService' can be invoked with the available services and parameters:\r\nCannot resolve parameter 'ShippingService.Core.Repositories.ShippingExpressRepository shippingExpressRepository' of constructor 'Void .ctor(ShippingService.Core.Repositories.ShippingExpressRepository)'.
GeneralRegisterModule.cs
builder.RegisterType<ShippingExpressRepository>().As<IShippingExpressRepository>(); builder.RegisterType<ShippingRateService>().As<IShippingRateService>();
ShippingRateService
`
private readonly IShippingExpressRepository _shippingExpressRepository;
public ShippingRateService(ShippingExpressRepository shippingExpressRepository)
{
_shippingExpressRepository = shippingExpressRepository;
}
`
This is the implementation of the Azure SDK Client Library for Azure Identity
Library home page: https://api.nuget.org/packages/azure.identity.1.10.3.nupkg
Path to dependency file: /src/HappyCode.NetCoreBoilerplate.Db/HappyCode.NetCoreBoilerplate.Db.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/azure.identity/1.10.3/azure.identity.1.10.3.nupkg
Dependency Hierarchy:
Found in base branch: master
Azure Identity Library for .NET Information Disclosure Vulnerability
Publish Date: 2024-04-09
URL: CVE-2024-29992
Base Score Metrics:
Type: Upgrade version
Origin: GHSA-wvxc-855f-jvrv
Release Date: 2024-04-09
Fix Resolution: Azure.Identity - 1.11.0
Step up your Open Source Security Game with Mend here
work done. waiting for dependencies
Hi Thanks for putting this together. When I run dotnet test unit tests pass pur issues with perf tests. Any ideas?
Test Run Successful.
Total tests: 8
Passed: 8
Total time: 12.7045 Seconds
Test Run Successful.
Total tests: 19
Passed: 19
Total time: 15.5701 Seconds
Test Run Successful.
Total tests: 8
Passed: 8
Total time: 17.6956 Seconds
[xUnit.net 00:00:17.85] HappyCode.NetCoreBoilerplate.Api.LoadTests.CarsControllerTests.GetAll_load_test [FAIL]
X HappyCode.NetCoreBoilerplate.Api.LoadTests.CarsControllerTests.GetAll_load_test [9s 108ms]
Error Message:
Expected stepStats.RPS to be greater or equal to 20, but found 0.
Stack Trace:
at FluentAssertions.Execution.XUnit2TestFramework.Throw(String message)
at FluentAssertions.Execution.TestFrameworkProvider.Throw(String message)
at FluentAssertions.Execution.DefaultAssertionStrategy.HandleFailure(String message)
at FluentAssertions.Execution.AssertionScope.FailWith(Func1 failReasonFunc) at FluentAssertions.Execution.AssertionScope.FailWith(Func
1 failReasonFunc)
at FluentAssertions.Execution.AssertionScope.FailWith(String message, Object[] args)
at FluentAssertions.Numeric.NumericAssertions1.BeGreaterOrEqualTo(T expected, String because, Object[] becauseArgs) at HappyCode.NetCoreBoilerplate.Api.LoadTests.LoadTestsBase.<>c.<AssertResults>b__7_0(StepStats stepStats) in C:\Train\netcore EF services\netcore-boilerplate-master\test\HappyCode.NetCoreBoilerplate.Api.LoadTests\LoadTestsBase.cs:line 75 at System.Collections.Generic.List
1.ForEach(Action1 action) at HappyCode.NetCoreBoilerplate.Api.LoadTests.LoadTestsBase.AssertResults(NodeStats stats) in C:\Train\netcore EF services\netcore-boilerplate-master\test\HappyCode.NetCoreBoilerplate.Api.LoadTests\LoadTestsBase.cs:line 72 at HappyCode.NetCoreBoilerplate.Api.LoadTests.LoadTestsBase.ExecuteLoadTest(String action, String method, HttpContent body) in C:\Train\netcore EF services\netcore-boilerplate-master\test\HappyCode.NetCoreBoilerplate.Api.LoadTests\LoadTestsBase.cs:line 33 at HappyCode.NetCoreBoilerplate.Api.LoadTests.CarsControllerTests.GetAll_load_test() in C:\Train\netcore EF services\netcore-boilerplate-master\test\HappyCode.NetCoreBoilerplate.Api.LoadTests\CarsControllerTests.cs:line 12 [xUnit.net 00:00:24.87] HappyCode.NetCoreBoilerplate.Api.LoadTests.EmployeesControllerTests.Post_with_Get_load_test [FAIL] X HappyCode.NetCoreBoilerplate.Api.LoadTests.EmployeesControllerTests.Post_with_Get_load_test [7s 254ms] Error Message: ****Expected scenarioStats.LatencyCount.Less800 to be greater or equal to 450, but found 230.**** Stack Trace: at FluentAssertions.Execution.XUnit2TestFramework.Throw(String message) at FluentAssertions.Execution.TestFrameworkProvider.Throw(String message) at FluentAssertions.Execution.DefaultAssertionStrategy.HandleFailure(String message) at FluentAssertions.Execution.AssertionScope.FailWith(Func
1 failReasonFunc)
at FluentAssertions.Execution.AssertionScope.FailWith(Func1 failReasonFunc) at FluentAssertions.Execution.AssertionScope.FailWith(String message, Object[] args) at FluentAssertions.Numeric.NumericAssertions
1.BeGreaterOrEqualTo(T expected, String because, Object[] becauseArgs)
at HappyCode.NetCoreBoilerplate.Api.LoadTests.LoadTestsBase.AssertResults(NodeStats stats) in C:\Train\netcore EF services\netcore-boilerplate-master\test\HappyCode.NetCoreBoilerplate.Api.LoadTests\LoadTestsBase.cs:line 70
at HappyCode.NetCoreBoilerplate.Api.LoadTests.LoadTestsBase.ExecuteLoadTests(IStep[] steps) in C:\Train\netcore EF services\netcore-boilerplate-master\test\HappyCode.NetCoreBoilerplate.Api.LoadTests\LoadTestsBase.cs:line 43
at HappyCode.NetCoreBoilerplate.Api.LoadTests.EmployeesControllerTests.Post_with_Get_load_test() in C:\Train\netcore EF services\netcore-boilerplate-master\test\HappyCode.NetCoreBoilerplate.Api.LoadTests\EmployeesControllerTests.cs:line 54
Test Run Failed.
Total tests: 4
Passed: 2
Failed: 2
Total time: 35.4091 Seconds
A declarative, efficient, and flexible JavaScript library for building user interfaces.
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
An Open Source Machine Learning Framework for Everyone
The Web framework for perfectionists with deadlines.
A PHP framework for web artisans
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Some thing interesting about web. New door for the world.
A server is a program made to process requests and deliver data to clients.
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Some thing interesting about visualization, use data art
Some thing interesting about game, make everyone happy.
We are working to build community through open source technology. NB: members must have two-factor auth.
Open source projects and samples from Microsoft.
Google ❤️ Open Source for everyone.
Alibaba Open Source for everyone
Data-Driven Documents codes.
China tencent open source team.