Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions .github/workflows/c-coverage.yml
Original file line number Diff line number Diff line change
Expand Up @@ -20,6 +20,7 @@ jobs:

- name: Install Tools
run: |
sudo apt update
sudo apt-get install lcov

- name: Check Tools
Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/c.yml
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ jobs:
runs-on: ubuntu-24.04
strategy:
matrix:
os: ["windows-latest", "ubuntu-latest", "macOS-latest"]
os: ["windows-2022", "ubuntu-24.04", "macos-14"]

steps:
- name: Checkout repository
Expand Down
10 changes: 5 additions & 5 deletions .github/workflows/docker-image.yml
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ jobs:

build:
name: "Build Docker images"
runs-on: ubuntu-latest
runs-on: ubuntu-24.04
steps:
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4

Expand Down Expand Up @@ -73,7 +73,7 @@ jobs:

lint:
name: "Run in docker: LINT"
runs-on: ubuntu-latest
runs-on: ubuntu-24.04
needs: build
steps:
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4
Expand All @@ -98,7 +98,7 @@ jobs:

test:
name: "Run in docker: TEST"
runs-on: ubuntu-latest
runs-on: ubuntu-24.04
needs: build
steps:
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4
Expand All @@ -123,7 +123,7 @@ jobs:

security:
name: "Snyk Container"
runs-on: ubuntu-latest
runs-on: ubuntu-24.04
needs: build
permissions:
actions: read
Expand Down Expand Up @@ -170,7 +170,7 @@ jobs:
sarif_file: 'snyk.sarif'
scan:
name: "Trivy"
runs-on: ubuntu-latest
runs-on: ubuntu-24.04
needs: build
permissions:
actions: read
Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/gitleaks.yml
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ on: # yamllint disable-line rule:truthy
jobs:
scan:
name: gitleaks
runs-on: ubuntu-latest
runs-on: ubuntu-24.04
steps:
- uses: actions/checkout@v4
with:
Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/markdown-lint.yml
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ on: # yamllint disable-line rule:truthy
jobs:
lint:
name: Markdown Lint
runs-on: ubuntu-latest
runs-on: ubuntu-24.04

steps:
- name: Checkout repository
Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/yamllint.yml
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ on: # yamllint disable-line rule:truthy
jobs:
lint:
name: YAML lint
runs-on: ubuntu-latest
runs-on: ubuntu-24.04
steps:
- name: Checkout repository
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4
Expand Down
6 changes: 3 additions & 3 deletions Dockerfile
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
FROM ubuntu:24.10 AS init
FROM ubuntu:noble-20241118.1 AS init

Check warning

Code scanning / Snyk Container

Low severity - Improper Input Validation vulnerability in coreutils Medium

This file introduces a vulnerable coreutils package with a low severity vulnerability.

Check failure

Code scanning / Snyk Container

Low severity - Allocation of Resources Without Limits or Throttling vulnerability in glibc High

This file introduces a vulnerable glibc package with a low severity vulnerability.

Check notice

Code scanning / Snyk Container

Low severity - Out-of-bounds Write vulnerability in gnupg2 Low

This file introduces a vulnerable gnupg2 package with a low severity vulnerability.

Check notice

Code scanning / Snyk Container

Low severity - Information Exposure vulnerability in libgcrypt20 Note

This file introduces a vulnerable libgcrypt20 package with a low severity vulnerability.

Check notice

Code scanning / Snyk Container

Low severity - CVE-2024-41996 vulnerability in openssl Note

This file introduces a vulnerable openssl package with a low severity vulnerability.

Check warning

Code scanning / Snyk Container

Medium severity - Insecure Storage of Sensitive Information vulnerability in pam Medium

This file introduces a vulnerable pam package with a medium severity vulnerability.

Check failure

Code scanning / Snyk Container

Medium severity - Improper Authentication vulnerability in pam High

This file introduces a vulnerable pam package with a medium severity vulnerability.

ENV WORKDIR=/app
WORKDIR ${WORKDIR}
Expand All @@ -15,7 +15,7 @@

# build tools
RUN apt-get update \
&& apt-get -y install --no-install-recommends --no-install-suggests build-essential cmake gcc g++ make pkg-config \
&& apt-get -y install --no-install-recommends --no-install-suggests build-essential cmake g++ gcc make pkg-config \
&& rm -rf /var/lib/apt/lists/* \
&& make --version \
&& cmake --version \
Expand Down Expand Up @@ -112,7 +112,7 @@

CMD ["make", "test"]

FROM ubuntu:24.10 AS production
FROM ubuntu:noble-20241118.1 AS production

ENV LOG_LEVEL=INFO
ENV BRUTEFORCE=false
Expand Down
12 changes: 6 additions & 6 deletions Makefile
Original file line number Diff line number Diff line change
Expand Up @@ -119,24 +119,24 @@ compose/rebuild: env

compose/lint/markdown: compose/build
${DOCKER_COMPOSE} --profile lint build
${DOCKER_COMPOSE} --profile lint run --rm algorithm-exercises-cpp-lint make lint/markdown
${DOCKER_COMPOSE} --profile lint run --rm algorithm-exercises-c-lint make lint/markdown

compose/lint/yaml: compose/build
${DOCKER_COMPOSE} --profile lint run --rm algorithm-exercises-cpp-lint make lint/yaml
${DOCKER_COMPOSE} --profile lint run --rm algorithm-exercises-c-lint make lint/yaml

compose/test/styling: compose/build
${DOCKER_COMPOSE} --profile lint run --rm algorithm-exercises-cpp-lint make test/styling
${DOCKER_COMPOSE} --profile lint run --rm algorithm-exercises-c-lint make test/styling

compose/test/static: compose/build
${DOCKER_COMPOSE} --profile lint run --rm algorithm-exercises-cpp-lint make test/static
${DOCKER_COMPOSE} --profile lint run --rm algorithm-exercises-c-lint make test/static

compose/lint: compose/lint/markdown compose/lint/yaml compose/test/styling compose/test/static

compose/test: compose/build
${DOCKER_COMPOSE} --profile testing run --rm algorithm-exercises-cpp-test make test
${DOCKER_COMPOSE} --profile testing run --rm algorithm-exercises-c-test make test

compose/run: compose/build
${DOCKER_COMPOSE} --profile production run --rm algorithm-exercises-cpp ls -alhR
${DOCKER_COMPOSE} --profile production run --rm algorithm-exercises-c ls -alhR

all: env dependencies test

Expand Down
Loading