Skip to content

Commit 6f197e2

Browse files
committed
create java image
1 parent 12e73aa commit 6f197e2

File tree

6 files changed

+54
-0
lines changed

6 files changed

+54
-0
lines changed
Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
python 3.14.3
2+
poetry 2.3.2
3+
java temurin-24.0.2+12
4+
maven 3.9.13
Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
// For format details, see https://aka.ms/devcontainer.json. For config options, see the
2+
// README at: https://github.com/devcontainers/templates/tree/main/src/ubuntu
3+
{
4+
"name": "EPS Devcontainer node_24 python_3.14",
5+
// Or use a Dockerfile or Docker Compose file. More info: https://containers.dev/guide/dockerfile
6+
"build": {
7+
"dockerfile": "../../../common_node_24/Dockerfile",
8+
"args": {
9+
"CONTAINER_NAME": "eps_devcontainer_${localEnv:CONTAINER_NAME}",
10+
"MULTI_ARCH_TAG": "${localEnv:MULTI_ARCH_TAG}",
11+
"BASE_VERSION_TAG": "${localEnv:BASE_VERSION_TAG}",
12+
"IMAGE_TAG": "${localEnv:IMAGE_TAG}"
13+
},
14+
"context": "."
15+
},
16+
"features": {}
17+
}
18+
Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
#!/usr/bin/env bash
2+
set -e
3+
export DEBIAN_FRONTEND=noninteractive
4+
5+
# clean up
6+
apt-get clean
7+
rm -rf /var/lib/apt/lists/* /tmp/* /var/tmp/*
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
#!/usr/bin/env bash
2+
set -e
3+
4+
asdf plugin add python
5+
asdf plugin add poetry https://github.com/asdf-community/asdf-poetry.git
6+
asdf plugin add java
7+
asdf plugin add maven
8+
9+
asdf install python
10+
asdf install
11+
12+
# install cfn-lint
13+
pip install --user cfn-lint
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
vulnerabilities:
2+
- id: CVE-2026-23949
3+
statement: "jaraco.context: jaraco.context: Path traversal via malicious tar archives"
4+
purls:
5+
- "pkg:pypi/jaraco.context@5.3.0"
6+
expired_at: 2026-08-12
7+
- id: CVE-2026-24049
8+
statement: "wheel: wheel: Privilege Escalation or Arbitrary Code Execution via malicious wheel file unpacking"
9+
purls:
10+
- "pkg:pypi/wheel@0.45.1"
11+
expired_at: 2026-08-12
Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
ignorefile: "src/languages/node_24_python_3_14/.trivyignore_combined.yaml"

0 commit comments

Comments
 (0)