veza/.github/workflows/container-scan.yml
senke b4c0b9283b
Some checks failed
Backend API CI / test-unit (push) Failing after 4m11s
Backend API CI / test-integration (push) Failing after 7m49s
Veza CD / Build and push images (push) Failing after 1m16s
Veza CI/CD / TMT Vital — Backend (Go) (push) Failing after 2m45s
Veza CI/CD / TMT Vital — Rust Services (push) Failing after 3s
Veza CI/CD / TMT Vital — Frontend (Web) (push) Failing after 4m26s
Veza CI/CD / Storybook Audit (push) Failing after 6m39s
Veza CI/CD / E2E Critical (@critical) (push) Failing after 5m16s
Veza CI/CD / E2E Full (shard 1/4) (push) Failing after 5m18s
Veza CI/CD / E2E Full (shard 2/4) (push) Failing after 5m11s
Veza CI/CD / E2E Full (shard 3/4) (push) Failing after 5m7s
Veza CI/CD / E2E Full (shard 4/4) (push) Failing after 5m7s
Frontend CI / test (push) Failing after 1m9s
CodeQL SAST / analyze (go) (push) Failing after 4s
CodeQL SAST / analyze (javascript-typescript) (push) Failing after 3s
Security Scan / Secret Scanning (gitleaks) (push) Failing after 4s
Storybook Audit / Build & audit Storybook (push) Failing after 1m11s
Stream Server CI / test (push) Failing after 4s
Veza CD / Deploy to staging (push) Has been skipped
Veza CI/CD / Notify on failure (push) Successful in 3s
Veza CD / Smoke tests post-deploy (push) Has been skipped
ci: fix duplicate env block in staging-validation workflow
Merge SSL env vars into existing env block instead of creating a
duplicate (YAML doesn't allow duplicate top-level keys).

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2026-04-09 14:51:10 +02:00

88 lines
3.1 KiB
YAML

name: Container Image Scan
on:
push:
branches: [main]
paths:
- "veza-backend-api/Dockerfile*"
- "apps/web/Dockerfile*"
- "veza-stream-server/Dockerfile*"
pull_request:
branches: [main]
paths:
- "veza-backend-api/Dockerfile*"
- "apps/web/Dockerfile*"
- "veza-stream-server/Dockerfile*"
workflow_dispatch:
env:
GIT_SSL_NO_VERIFY: "true"
NODE_TLS_REJECT_UNAUTHORIZED: "0"
jobs:
scan-backend:
name: Scan Backend Image
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
- name: Build backend image
run: docker build -t veza-backend:scan -f veza-backend-api/Dockerfile.production veza-backend-api/
- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@76071ef0d7ec797419534a183b498b4d6366cf37 # v0.28.0
with:
image-ref: "veza-backend:scan"
format: "table"
exit-code: "1"
severity: "CRITICAL,HIGH"
ignore-unfixed: true
scan-stream-server:
name: Scan Stream Server Image
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
- name: Build stream server image
run: docker build -t veza-stream:scan -f veza-stream-server/Dockerfile .
- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@76071ef0d7ec797419534a183b498b4d6366cf37 # v0.28.0
with:
image-ref: "veza-stream:scan"
format: "table"
exit-code: "1"
severity: "CRITICAL,HIGH"
ignore-unfixed: true
scan-frontend:
name: Scan Frontend Image
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
- name: Check if frontend Dockerfile exists
id: check
run: |
if [ -f "apps/web/Dockerfile" ] || [ -f "apps/web/Dockerfile.production" ]; then
echo "exists=true" >> $GITHUB_OUTPUT
else
echo "exists=false" >> $GITHUB_OUTPUT
fi
- name: Build frontend image
if: steps.check.outputs.exists == 'true'
run: |
DOCKERFILE=$([ -f "apps/web/Dockerfile.production" ] && echo "apps/web/Dockerfile.production" || echo "apps/web/Dockerfile")
docker build -t veza-frontend:scan -f "$DOCKERFILE" apps/web/
- name: Run Trivy vulnerability scanner
if: steps.check.outputs.exists == 'true'
uses: aquasecurity/trivy-action@76071ef0d7ec797419534a183b498b4d6366cf37 # v0.28.0
with:
image-ref: "veza-frontend:scan"
format: "table"
exit-code: "1"
severity: "CRITICAL,HIGH"
ignore-unfixed: true