Skip to content

Commit 02ff49b

Browse files
committed
ci: Always call apt-get update before apt-get install.
I saw a recent build failure in build_renesas_ra_board. It appears to be the case that a security update for this package was recently issued by ubuntu for CVE-2025-4565 and the buggy version is no longer on package servers. However, it is still referred to by the cached apt metadata in the GitHub runners. I added apt-get update there, and audited for other sites in ci.sh where it might be necessary. Signed-off-by: Jeff Epler <jepler@gmail.com>
1 parent 5dda061 commit 02ff49b

File tree

1 file changed

+5
-0
lines changed

1 file changed

+5
-0
lines changed

tools/ci.sh

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,11 +13,13 @@ ulimit -n 1024
1313
# general helper functions
1414

1515
function ci_gcc_arm_setup {
16+
sudo apt-get update
1617
sudo apt-get install gcc-arm-none-eabi libnewlib-arm-none-eabi
1718
arm-none-eabi-gcc --version
1819
}
1920

2021
function ci_gcc_riscv_setup {
22+
sudo apt-get update
2123
sudo apt-get install gcc-riscv64-unknown-elf picolibc-riscv64-unknown-elf
2224
riscv64-unknown-elf-gcc --version
2325
}
@@ -45,6 +47,7 @@ function ci_picotool_setup {
4547
# c code formatting
4648

4749
function ci_c_code_formatting_setup {
50+
sudo apt-get update
4851
sudo apt-get install uncrustify
4952
uncrustify --version
5053
}
@@ -723,6 +726,7 @@ function ci_unix_float_run_tests {
723726
}
724727

725728
function ci_unix_clang_setup {
729+
sudo apt-get update
726730
sudo apt-get install clang
727731
clang --version
728732
}
@@ -862,6 +866,7 @@ function ci_unix_qemu_riscv64_run_tests {
862866
# ports/windows
863867

864868
function ci_windows_setup {
869+
sudo apt-get update
865870
sudo apt-get install gcc-mingw-w64
866871
}
867872

0 commit comments

Comments
 (0)
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy