Scaling CI enforcement rollout
Modes
toestub / vox ci toestub-scoped:
--mode | Exit behavior |
|---|---|
legacy (default) | Fail if any finding ≥ Error (unchanged historical behavior) |
audit | Never fail; report Info+ (use with --format json for snapshots) |
enforce-warn | Fail if any Critical (not default CI mode) |
enforce-strict | Fail if any Warning+ |
Recommended rollout
- Now:
toestub-scopedstayslegacy; scaling findings are mostlyWarning/Infoso they surface without failing CI. - After backlog burn-down: run scoped paths with
enforce-strictin optional workflows. - Critical-only gate: introduce targeted
Criticalrules (e.g. confirmed blocking HTTP without timeouts) and useenforce-warnonly on explicitly approved hot paths.
Commands
vox ci scaling-audit verify— schema + embedded policy parse.vox ci scaling-audit emit-reports— per-crate markdown + rollup + TOESTUB JSON snapshot undercontracts/reports/scaling-audit/. HonorsVOX_TOESTUB_MAX_RUST_PARSE_FAILURESon the JSON envelope’srust_parse_failuresfield (see env-vars SSOT).
PR CI additionally runs a full toestub --format json scan on crates/ with the same env cap so syn::parse_file regressions fail before merge.
SSOT
- Policy:
contracts/scaling/policy.yaml - Task templates:
contracts/scaling/task-templates.yaml - Contract index:
contracts/index.yaml(scaling-policy,scaling-policy-schema)