Triple cleanup, landed together because they share the same cleanup branch intent and touch non-overlapping trees. 1. 38× tracked .playwright-mcp/*.yml stage-deleted MCP session recordings that had been inadvertently committed. .gitignore already covers .playwright-mcp/ (post-audit J2 block added in98ee449f4). Working tree copies removed separately. 2. 19× disabled CI workflows moved to docs/archive/workflows/ Legacy .yml.disabled files in .github/workflows/ were 1676 LOC of dead config (backend-ci, cd, staging-validation, accessibility, chromatic, visual-regression, storybook-audit, contract-testing, zap-dast, container-scan, semgrep, sast, mutation-testing, rust-mutation, load-test-nightly, flaky-report, openapi-lint, commitlint, performance). Preserved in docs/archive/workflows/ for historical reference; `.github/workflows/` now only lists the 5 actually-running pipelines. 3. Orphan code removed (0 consumers confirmed via grep) - veza-backend-api/internal/repository/user_repository.go In-memory UserRepository mock, never imported anywhere. - proto/chat/chat.proto Chat server Rust deleted 2026-02-22 (commit05d02386d); proto file was orphan spec. Chat lives 100% in Go backend now. - veza-common/src/types/chat.rs (Conversation, Message, MessageType, Attachment, Reaction) - veza-common/src/types/websocket.rs (WebSocketMessage, PresenceStatus, CallType — depended on chat::MessageType) - veza-common/src/types/mod.rs updated: removed `pub mod chat;`, `pub mod websocket;`, and their re-exports. Only `veza_common::logging` is consumed by veza-stream-server (verified with `grep -r "veza_common::"`). `cargo check` on veza-common passes post-removal. Refs: AUDIT_REPORT.md §8.2 "Code mort / orphelin" + §9.1. Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
88 lines
3.1 KiB
Text
88 lines
3.1 KiB
Text
name: Container Image Scan
|
|
|
|
on:
|
|
push:
|
|
branches: [main]
|
|
paths:
|
|
- "veza-backend-api/Dockerfile*"
|
|
- "apps/web/Dockerfile*"
|
|
- "veza-stream-server/Dockerfile*"
|
|
pull_request:
|
|
branches: [main]
|
|
paths:
|
|
- "veza-backend-api/Dockerfile*"
|
|
- "apps/web/Dockerfile*"
|
|
- "veza-stream-server/Dockerfile*"
|
|
workflow_dispatch:
|
|
|
|
env:
|
|
GIT_SSL_NO_VERIFY: "true"
|
|
NODE_TLS_REJECT_UNAUTHORIZED: "0"
|
|
|
|
jobs:
|
|
scan-backend:
|
|
name: Scan Backend Image
|
|
runs-on: ubuntu-latest
|
|
steps:
|
|
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
|
|
|
- name: Build backend image
|
|
run: docker build -t veza-backend:scan -f veza-backend-api/Dockerfile.production veza-backend-api/
|
|
|
|
- name: Run Trivy vulnerability scanner
|
|
uses: aquasecurity/trivy-action@76071ef0d7ec797419534a183b498b4d6366cf37 # v0.28.0
|
|
with:
|
|
image-ref: "veza-backend:scan"
|
|
format: "table"
|
|
exit-code: "1"
|
|
severity: "CRITICAL,HIGH"
|
|
ignore-unfixed: true
|
|
|
|
scan-stream-server:
|
|
name: Scan Stream Server Image
|
|
runs-on: ubuntu-latest
|
|
steps:
|
|
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
|
|
|
- name: Build stream server image
|
|
run: docker build -t veza-stream:scan -f veza-stream-server/Dockerfile .
|
|
|
|
- name: Run Trivy vulnerability scanner
|
|
uses: aquasecurity/trivy-action@76071ef0d7ec797419534a183b498b4d6366cf37 # v0.28.0
|
|
with:
|
|
image-ref: "veza-stream:scan"
|
|
format: "table"
|
|
exit-code: "1"
|
|
severity: "CRITICAL,HIGH"
|
|
ignore-unfixed: true
|
|
|
|
scan-frontend:
|
|
name: Scan Frontend Image
|
|
runs-on: ubuntu-latest
|
|
steps:
|
|
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
|
|
|
- name: Check if frontend Dockerfile exists
|
|
id: check
|
|
run: |
|
|
if [ -f "apps/web/Dockerfile" ] || [ -f "apps/web/Dockerfile.production" ]; then
|
|
echo "exists=true" >> $GITHUB_OUTPUT
|
|
else
|
|
echo "exists=false" >> $GITHUB_OUTPUT
|
|
fi
|
|
|
|
- name: Build frontend image
|
|
if: steps.check.outputs.exists == 'true'
|
|
run: |
|
|
DOCKERFILE=$([ -f "apps/web/Dockerfile.production" ] && echo "apps/web/Dockerfile.production" || echo "apps/web/Dockerfile")
|
|
docker build -t veza-frontend:scan -f "$DOCKERFILE" apps/web/
|
|
|
|
- name: Run Trivy vulnerability scanner
|
|
if: steps.check.outputs.exists == 'true'
|
|
uses: aquasecurity/trivy-action@76071ef0d7ec797419534a183b498b4d6366cf37 # v0.28.0
|
|
with:
|
|
image-ref: "veza-frontend:scan"
|
|
format: "table"
|
|
exit-code: "1"
|
|
severity: "CRITICAL,HIGH"
|
|
ignore-unfixed: true
|