InfraOwner 3684aa1c6a
[Snyk] Security upgrade ubuntu from mantic-20231011 to 23.10 (#4788)
<p>This PR was automatically created by Snyk using the credentials of a real user.</p><br />Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

#### Changes included in this PR 


- website/Dockerfile

We recommend upgrading to `ubuntu:23.10`, as this image has only 8 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.



Some of the most important vulnerabilities in your base image include:

| Severity                                                                                                                 | Priority Score / 1000  | Issue                                                                     | Exploit Maturity      |
| :------:                                                                                                                 | :--------------------  | :----                                                                     | :---------------      |
| ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity")   | **586**  | CVE-2023-5981 <br/>[SNYK-UBUNTU2310-GNUTLS28-6069047](https://snyk.io/vuln/SNYK-UBUNTU2310-GNUTLS28-6069047)   | No Known Exploit   |
| ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity")   | **586**  | CVE-2023-47038 <br/>[SNYK-UBUNTU2310-PERL-6085371](https://snyk.io/vuln/SNYK-UBUNTU2310-PERL-6085371)   | No Known Exploit   |
| ![low severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/l.png "low severity")   | **364**  | Out-of-bounds Write <br/>[SNYK-UBUNTU2310-PROCPS-5972730](https://snyk.io/vuln/SNYK-UBUNTU2310-PROCPS-5972730)   | No Known Exploit   |
| ![low severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/l.png "low severity")   | **364**  | Out-of-bounds Write <br/>[SNYK-UBUNTU2310-PROCPS-5972730](https://snyk.io/vuln/SNYK-UBUNTU2310-PROCPS-5972730)   | No Known Exploit   |
| ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png "medium severity")   | **371**  | CVE-2023-39804 <br/>[SNYK-UBUNTU2310-TAR-6096092](https://snyk.io/vuln/SNYK-UBUNTU2310-TAR-6096092)   | No Known Exploit   |



---

**Note:** _You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs._

For more information: <img src="https://api.segment.io/v1/pixel/track?data=eyJ3cml0ZUtleSI6InJyWmxZcEdHY2RyTHZsb0lYd0dUcVg4WkFRTnNCOUEwIiwiYW5vbnltb3VzSWQiOiI5NjQ5YzkwMi05YWUxLTQyNTYtYTU3OS0xMmJmNWVlNGE3MzAiLCJldmVudCI6IlBSIHZpZXdlZCIsInByb3BlcnRpZXMiOnsicHJJZCI6Ijk2NDljOTAyLTlhZTEtNDI1Ni1hNTc5LTEyYmY1ZWU0YTczMCJ9fQ==" width="0" height="0"/>
🧐 [View latest project report](https://app.snyk.io/org/alcion/project/be35e6c9-5393-4702-af3c-f4aebb53488e?utm_source&#x3D;github-enterprise&amp;utm_medium&#x3D;referral&amp;page&#x3D;fix-pr)

🛠 [Adjust project settings](https://app.snyk.io/org/alcion/project/be35e6c9-5393-4702-af3c-f4aebb53488e?utm_source&#x3D;github-enterprise&amp;utm_medium&#x3D;referral&amp;page&#x3D;fix-pr/settings)

[//]: # 'snyk:metadata:{"prId":"9649c902-9ae1-4256-a579-12bf5ee4a730","prPublicId":"9649c902-9ae1-4256-a579-12bf5ee4a730","dependencies":[{"name":"ubuntu","from":"mantic-20231011","to":"23.10"}],"packageManager":"dockerfile","projectPublicId":"be35e6c9-5393-4702-af3c-f4aebb53488e","projectUrl":"https://app.snyk.io/org/alcion/project/be35e6c9-5393-4702-af3c-f4aebb53488e?utm_source=github-enterprise&utm_medium=referral&page=fix-pr","type":"auto","patch":[],"vulns":["SNYK-UBUNTU2310-GNUTLS28-6069047","SNYK-UBUNTU2310-PERL-6085371","SNYK-UBUNTU2310-TAR-6096092","SNYK-UBUNTU2310-PROCPS-5972730"],"upgrade":["SNYK-UBUNTU2310-GNUTLS28-6069047","SNYK-UBUNTU2310-PERL-6085371","SNYK-UBUNTU2310-PROCPS-5972730","SNYK-UBUNTU2310-PROCPS-5972730","SNYK-UBUNTU2310-TAR-6096092"],"isBreakingChange":false,"env":"prod","prType":"fix","templateVariants":["updated-fix-title","priorityScore"],"priorityScoreList":[586,586,371,364],"remediationStrategy":"vuln"}'

---

**Learn how to fix vulnerabilities with free interactive lessons:**

 🦉 [Learn about vulnerability in an interactive lesson of Snyk Learn.](https://learn.snyk.io/?loc&#x3D;fix-pr)
2023-12-05 04:19:06 +00:00
..
2023-09-04 18:12:18 +00:00

Corso documentation

Corso documentation uses Docusaurus 2, a modern static website generator. Mermaid provides support for native diagrams in Markdown.

Requirements

Developing documentation for Corso requires the following tools on your machine:

  • make
  • Docker

Installation

make buildimage

Live documentation development

make dev

This command starts a local development server within the Docker container and will expose docs at http://localhost:3000.

Generating Corso CLI docs

make genclidocs

Corso's CLI documents are auto generated. This command explicitly triggers generating these docs. This step will happen automatically for the other commands where this is relevant.

Building static documentation

make build

This command generates static content into the build directory for integration with any static contents hosting service.

Serving static documentation

make serve

This command will serve the static content generated with make build at http://localhost:3000.

Style and linting

# Lint all docs
make check
# Lint specific files and/or folders
make check VALE_TARGET="README.md docs/concepts"

This command will lint all Markdown files and check them for style issues using the Docker container

Documentation platform development

make shell

Use this command to interactively (and temporarily!) change the contents or configuration of the live documentation container image (for example, when experimenting with new plugins).