Skip to content

Commit c82b426

Browse files
authored
Chore: [AEA-0000] - create java image (#50)
## Summary - Routine Change ### Details - create a java image
1 parent 96cc53a commit c82b426

8 files changed

Lines changed: 67 additions & 72 deletions

File tree

src/common_node_24/.trivyignore.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -58,3 +58,8 @@ vulnerabilities:
5858
purls:
5959
- "pkg:npm/tar@7.5.1"
6060
expired_at: 2026-09-09
61+
- id: CVE-2026-31802
62+
statement: "node-tar is a full-featured Tar for Node.js. Prior to version 7.5.10, ..."
63+
purls:
64+
- "pkg:npm/tar@7.5.1"
65+
expired_at: 2026-09-09
Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
python 3.14.3
2+
poetry 2.3.2
3+
java temurin-24.0.2+12
4+
maven 3.9.13
Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
// For format details, see https://aka.ms/devcontainer.json. For config options, see the
2+
// README at: https://github.com/devcontainers/templates/tree/main/src/ubuntu
3+
{
4+
"name": "EPS Devcontainer node_24 python_3.14",
5+
// Or use a Dockerfile or Docker Compose file. More info: https://containers.dev/guide/dockerfile
6+
"build": {
7+
"dockerfile": "../../../common_node_24/Dockerfile",
8+
"args": {
9+
"CONTAINER_NAME": "eps_devcontainer_${localEnv:CONTAINER_NAME}",
10+
"MULTI_ARCH_TAG": "${localEnv:MULTI_ARCH_TAG}",
11+
"BASE_VERSION_TAG": "${localEnv:BASE_VERSION_TAG}",
12+
"IMAGE_TAG": "${localEnv:IMAGE_TAG}"
13+
},
14+
"context": "."
15+
},
16+
"features": {}
17+
}
18+
Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
#!/usr/bin/env bash
2+
set -e
3+
export DEBIAN_FRONTEND=noninteractive
4+
5+
# clean up
6+
apt-get clean
7+
rm -rf /var/lib/apt/lists/* /tmp/* /var/tmp/*
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
#!/usr/bin/env bash
2+
set -e
3+
4+
asdf plugin add python
5+
asdf plugin add poetry https://github.com/asdf-community/asdf-poetry.git
6+
asdf plugin add java
7+
asdf plugin add maven
8+
9+
asdf install python
10+
asdf install
11+
12+
# install cfn-lint
13+
pip install --user cfn-lint
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
vulnerabilities:
2+
- id: CVE-2026-23949
3+
statement: "jaraco.context: jaraco.context: Path traversal via malicious tar archives"
4+
purls:
5+
- "pkg:pypi/jaraco.context@5.3.0"
6+
expired_at: 2026-08-12
7+
- id: CVE-2026-24049
8+
statement: "wheel: wheel: Privilege Escalation or Arbitrary Code Execution via malicious wheel file unpacking"
9+
purls:
10+
- "pkg:pypi/wheel@0.45.1"
11+
expired_at: 2026-08-12
Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
ignorefile: "src/languages/node_24_python_3_14_java_24/.trivyignore_combined.yaml"

src/projects/fhir_facade_api/.trivyignore.yaml

Lines changed: 8 additions & 72 deletions
Original file line numberDiff line numberDiff line change
@@ -2,30 +2,26 @@ vulnerabilities:
22
- id: CVE-2022-25235
33
statement: "expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution"
44
purls:
5-
- "pkg:deb/ubuntu/firefox@147.0.3%2Bbuild1-0ubuntu0.22.04.1~mt1?arch=amd64&distro=ubuntu-22.04"
6-
- "pkg:deb/ubuntu/firefox@148.0%2Bbuild1-0ubuntu0.22.04.1~mt2?arch=arm64&distro=ubuntu-22.04"
7-
- "pkg:deb/ubuntu/firefox@148.0%2Bbuild1-0ubuntu0.22.04.1~mt2?arch=amd64&distro=ubuntu-22.04"
5+
- "pkg:deb/ubuntu/firefox@148.0.2%2Bbuild1-0ubuntu0.22.04.1~mt1?arch=arm64&distro=ubuntu-22.04"
6+
- "pkg:deb/ubuntu/firefox@148.0.2%2Bbuild1-0ubuntu0.22.04.1~mt1?arch=amd64&distro=ubuntu-22.04"
87
expired_at: 2026-08-12
98
- id: CVE-2022-25236
109
statement: "expat: Namespace-separator characters in \"xmlns[:prefix]\" attribute values can lead to arbitrary code execution"
1110
purls:
12-
- "pkg:deb/ubuntu/firefox@147.0.3%2Bbuild1-0ubuntu0.22.04.1~mt1?arch=amd64&distro=ubuntu-22.04"
13-
- "pkg:deb/ubuntu/firefox@148.0%2Bbuild1-0ubuntu0.22.04.1~mt2?arch=arm64&distro=ubuntu-22.04"
14-
- "pkg:deb/ubuntu/firefox@148.0%2Bbuild1-0ubuntu0.22.04.1~mt2?arch=amd64&distro=ubuntu-22.04"
11+
- "pkg:deb/ubuntu/firefox@148.0.2%2Bbuild1-0ubuntu0.22.04.1~mt1?arch=arm64&distro=ubuntu-22.04"
12+
- "pkg:deb/ubuntu/firefox@148.0.2%2Bbuild1-0ubuntu0.22.04.1~mt1?arch=amd64&distro=ubuntu-22.04"
1513
expired_at: 2026-08-12
1614
- id: CVE-2022-26485
1715
statement: "Mozilla: Use-after-free in XSLT parameter processing"
1816
purls:
19-
- "pkg:deb/ubuntu/firefox@147.0.3%2Bbuild1-0ubuntu0.22.04.1~mt1?arch=amd64&distro=ubuntu-22.04"
20-
- "pkg:deb/ubuntu/firefox@148.0%2Bbuild1-0ubuntu0.22.04.1~mt2?arch=arm64&distro=ubuntu-22.04"
21-
- "pkg:deb/ubuntu/firefox@148.0%2Bbuild1-0ubuntu0.22.04.1~mt2?arch=amd64&distro=ubuntu-22.04"
17+
- "pkg:deb/ubuntu/firefox@148.0.2%2Bbuild1-0ubuntu0.22.04.1~mt1?arch=arm64&distro=ubuntu-22.04"
18+
- "pkg:deb/ubuntu/firefox@148.0.2%2Bbuild1-0ubuntu0.22.04.1~mt1?arch=amd64&distro=ubuntu-22.04"
2219
expired_at: 2026-08-12
2320
- id: CVE-2022-26486
2421
statement: "Mozilla: Use-after-free in WebGPU IPC Framework"
2522
purls:
26-
- "pkg:deb/ubuntu/firefox@147.0.3%2Bbuild1-0ubuntu0.22.04.1~mt1?arch=amd64&distro=ubuntu-22.04"
27-
- "pkg:deb/ubuntu/firefox@148.0%2Bbuild1-0ubuntu0.22.04.1~mt2?arch=arm64&distro=ubuntu-22.04"
28-
- "pkg:deb/ubuntu/firefox@148.0%2Bbuild1-0ubuntu0.22.04.1~mt2?arch=amd64&distro=ubuntu-22.04"
23+
- "pkg:deb/ubuntu/firefox@148.0.2%2Bbuild1-0ubuntu0.22.04.1~mt1?arch=arm64&distro=ubuntu-22.04"
24+
- "pkg:deb/ubuntu/firefox@148.0.2%2Bbuild1-0ubuntu0.22.04.1~mt1?arch=amd64&distro=ubuntu-22.04"
2925
expired_at: 2026-08-12
3026
- id: CVE-2026-25547
3127
statement: "brace-expansion: brace-expansion: Denial of Service via unbounded brace range expansion"
@@ -53,63 +49,3 @@ vulnerabilities:
5349
purls:
5450
- "pkg:npm/tar@7.5.1"
5551
expired_at: 2026-08-12
56-
- id: CVE-2022-25235
57-
statement: "expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution"
58-
purls:
59-
- "pkg:deb/ubuntu/firefox@147.0.3%2Bbuild1-0ubuntu0.22.04.1~mt1?arch=arm64&distro=ubuntu-22.04"
60-
expired_at: 2026-08-13
61-
- id: CVE-2022-25236
62-
statement: "expat: Namespace-separator characters in \"xmlns[:prefix]\" attribute values can lead to arbitrary code execution"
63-
purls:
64-
- "pkg:deb/ubuntu/firefox@147.0.3%2Bbuild1-0ubuntu0.22.04.1~mt1?arch=arm64&distro=ubuntu-22.04"
65-
expired_at: 2026-08-13
66-
- id: CVE-2022-26485
67-
statement: "Mozilla: Use-after-free in XSLT parameter processing"
68-
purls:
69-
- "pkg:deb/ubuntu/firefox@147.0.3%2Bbuild1-0ubuntu0.22.04.1~mt1?arch=arm64&distro=ubuntu-22.04"
70-
expired_at: 2026-08-13
71-
- id: CVE-2022-26486
72-
statement: "Mozilla: Use-after-free in WebGPU IPC Framework"
73-
purls:
74-
- "pkg:deb/ubuntu/firefox@147.0.3%2Bbuild1-0ubuntu0.22.04.1~mt1?arch=arm64&distro=ubuntu-22.04"
75-
expired_at: 2026-08-13
76-
- id: CVE-2022-25235
77-
statement: "expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution"
78-
purls:
79-
- "pkg:deb/ubuntu/firefox@147.0.4%2Bbuild1-0ubuntu0.22.04.1~mt1?arch=arm64&distro=ubuntu-22.04"
80-
expired_at: 2026-08-16
81-
- id: CVE-2022-25236
82-
statement: "expat: Namespace-separator characters in \"xmlns[:prefix]\" attribute values can lead to arbitrary code execution"
83-
purls:
84-
- "pkg:deb/ubuntu/firefox@147.0.4%2Bbuild1-0ubuntu0.22.04.1~mt1?arch=arm64&distro=ubuntu-22.04"
85-
expired_at: 2026-08-16
86-
- id: CVE-2022-26485
87-
statement: "Mozilla: Use-after-free in XSLT parameter processing"
88-
purls:
89-
- "pkg:deb/ubuntu/firefox@147.0.4%2Bbuild1-0ubuntu0.22.04.1~mt1?arch=arm64&distro=ubuntu-22.04"
90-
expired_at: 2026-08-16
91-
- id: CVE-2022-26486
92-
statement: "Mozilla: Use-after-free in WebGPU IPC Framework"
93-
purls:
94-
- "pkg:deb/ubuntu/firefox@147.0.4%2Bbuild1-0ubuntu0.22.04.1~mt1?arch=arm64&distro=ubuntu-22.04"
95-
expired_at: 2026-08-16
96-
- id: CVE-2022-25235
97-
statement: "expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code execution"
98-
purls:
99-
- "pkg:deb/ubuntu/firefox@147.0.4%2Bbuild1-0ubuntu0.22.04.1~mt1?arch=amd64&distro=ubuntu-22.04"
100-
expired_at: 2026-08-16
101-
- id: CVE-2022-25236
102-
statement: "expat: Namespace-separator characters in \"xmlns[:prefix]\" attribute values can lead to arbitrary code execution"
103-
purls:
104-
- "pkg:deb/ubuntu/firefox@147.0.4%2Bbuild1-0ubuntu0.22.04.1~mt1?arch=amd64&distro=ubuntu-22.04"
105-
expired_at: 2026-08-16
106-
- id: CVE-2022-26485
107-
statement: "Mozilla: Use-after-free in XSLT parameter processing"
108-
purls:
109-
- "pkg:deb/ubuntu/firefox@147.0.4%2Bbuild1-0ubuntu0.22.04.1~mt1?arch=amd64&distro=ubuntu-22.04"
110-
expired_at: 2026-08-16
111-
- id: CVE-2022-26486
112-
statement: "Mozilla: Use-after-free in WebGPU IPC Framework"
113-
purls:
114-
- "pkg:deb/ubuntu/firefox@147.0.4%2Bbuild1-0ubuntu0.22.04.1~mt1?arch=amd64&distro=ubuntu-22.04"
115-
expired_at: 2026-08-16

0 commit comments

Comments
 (0)