You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/api/package-base-address-resource.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,9 +36,9 @@ All URLs found in the package content resource support the HTTP methods `GET` an
36
36
37
37
## Enumerate package versions
38
38
39
-
If the client knows a package ID and wants to discover which package versions the package source has available, the
40
-
client can construct a predictable URL to enumerate all package versions. This list is meant to be a "directory
41
-
listing" for the package content API mentioned below.
39
+
If the client knows a package ID and wants to discover which package versions the package source has available, the client can construct a predictable URL to enumerate all package versions.
40
+
Every version listed in this list must be available for download.
41
+
This list is meant to be a "directory listing" for the package content API mentioned below.
42
42
43
43
> [!Note]
44
44
> This list contains both listed and unlisted package versions.
Copy file name to clipboardExpand all lines: docs/reference/errors-and-warnings/NU1901-NU1904.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -52,5 +52,5 @@ For example `<NuGetAuditSuppress Include="https://github.com/advisories/GHSA-g3q
52
52
If you do not want NuGet to check for packages with known vulnerabilities during restore, add `<NuGetAudit>false</NuGetAudit>` inside a `<PropertyGroup>` in your project file, or a [`Directory.Build.props` file](/visualstudio/msbuild/customize-by-directory).
53
53
If you would like to run NuGet Audit on developer machines, but disable it on CI pipelines, you can take advantage of MSBuild importing environment variables, and create a NuGetAudit environment variable set to `false` in your pipeline definition.
54
54
55
-
In NuGet 6.12 (Visual Studio/MSBuild 17.12 and .NET 9.0.100 SDK), NuGet changed the default for `NuGetAuditMode` to `all`, which means report on transitive packages with known vulnerabilities.
55
+
In NuGet 6.12 (Visual Studio/MSBuild 17.12 and .NET 9.0.100 SDK), the default setting for `NuGetAuditMode`was changed to `all`. This means that NuGet will now report on transitive packages with known vulnerabilities.
56
56
The value can be explicitly set to `direct` to revert back to .NET 8's default. Alternatively, [the property `SdkAnalysisLevel`](/dotnet/core/project-sdk/msbuild-props#sdkanalysislevel) can be set to `8.0.400` to temporarily disable all new warnings and errors introduced in newer versions of the SDK. Specifically in this case, the default value of `NuGetAuditMode` is changed back to `direct`.
Copy file name to clipboardExpand all lines: docs/release-notes/NuGet-6.12.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,30 +35,30 @@ NuGet 6.12.0 is available in the .NET 9.0.100 SDK.
35
35
36
36
* Add new graph resolution algorithm for better performance with large graphs - [#13692](https://github.com/NuGet/Home/issues/13692)
37
37
38
-
* Owner profile hyperlinks needed in Details Pane of PM UI - [#13686](https://github.com/NuGet/Home/issues/13686)
38
+
* NuGetAudit raises warnings for vulnerable transitive packages by default when the .NET 9 SDK is installed [#13293](https://github.com/NuGet/Home/issues/13293)
39
+
40
+
* Change NuGetAuditMode default from direct to all, raising warnings for vulnerable transitive packages for non-SDK style projects - [#13584](https://github.com/NuGet/Home/issues/13584)
39
41
40
42
* Audit security vulnerabilities without adding nuget.org as package source - [#12698](https://github.com/NuGet/Home/issues/12698)
41
43
44
+
* Owner profile hyperlinks needed in Details Pane of PM UI - [#13686](https://github.com/NuGet/Home/issues/13686)
45
+
42
46
* Deprecate SHA-1 fingerprints usage in NuGet Sign commands in favor of SHA-2 family fingerprints [#13891](https://github.com/NuGet/Home/issues/13891)
43
47
44
-
*Deprecate http usage: Promote from warning to error - [#13289](https://github.com/NuGet/Home/issues/13289)
48
+
*Bubble-up Known Vulnerability Indicators in Solution Explorer for Transitive Packages - [#13636](https://github.com/NuGet/Home/issues/13636)
45
49
46
-
### Breaking changes
50
+
* Enable Transitive Dependencies and vulnerabilities for Solution-level in Visual Studio - [#13216](https://github.com/NuGet/Home/issues/13216)
47
51
48
-
* NuGetAudit should check transitive packages by default when the .NET 9 SDK is installed [#13293](https://github.com/NuGet/Home/issues/13293)
52
+
### Breaking changes
49
53
50
-
*Change NuGetAuditMode default to all for non-SDK style projects - [#13584](https://github.com/NuGet/Home/issues/13584)
54
+
*Deprecate http usage: Promote from warning to error - [#13289](https://github.com/NuGet/Home/issues/13289)
51
55
52
56
### Issues fixed in this release
53
57
54
-
* Bubble-up Known Vulnerability Indicators in Solution Explorer for Transitive Packages - [#13636](https://github.com/NuGet/Home/issues/13636)
* NuGetAuditSuppress for packages.config - [#13575](https://github.com/NuGet/Home/issues/13575)
59
61
60
-
* Enable Transitive Dependencies for Solution-level in Visual Studio - [#13216](https://github.com/NuGet/Home/issues/13216)
61
-
62
62
* Roll-out new breaking change process for SDK tools, respect SdkAnalysisLevel - [#13309](https://github.com/NuGet/Home/issues/13309)
63
63
64
64
* Add property for toggling the to the previous NuGet resolver: RestoreUseLegacyDependencyResolver - [#13700](https://github.com/NuGet/Home/issues/13700)
0 commit comments