Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Adding check URLs to GH actions #1518

Closed
wants to merge 0 commits into from
Closed

Conversation

dwertent
Copy link
Contributor

I've noticed some invalid URLs in the repository. This GitHub Action will help detect these invalid URLs when opening a pull request or during a scheduled scan. I recommend setting force_pass to false to prevent the approval of pull requests containing invalid URLs. You can see an example here.

image

@dwertent
Copy link
Contributor Author

Working on this PR made me realize that the package should support SARIF format output. As a result, I opened this PR and this PR to enhance the informativeness of the GitHub Action results.

Copy link
Contributor

@EnriqueL8 EnriqueL8 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for the contribution here

I'm torn on the force pass always being true as we won't notice if thing have broken without looking at logs but at the same time I don't want this to gate PRs into the repo

So if there is a way to be notified that it has failed on the schedule it would be good.

As part of this PR would be a great contribution if the existing URL highlighted in the description are fixed as well

file_types: .md
force_pass: true
save: results.csv
exclude_patterns: 127.0.0.1,localhost,ipfs_,ca_org,ethconnect_,dataexchange_
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Also add tokens_0_0 here

@EnriqueL8
Copy link
Contributor

I can't edit my review seems like you put in your description I recommend setting force_pass to false to prevent the approval of pull requests containing invalid URLs. that is valid to me then

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants