checks.external-urls #642
Annotations
3 errors and 1 warning
|
run-check
Process completed with exit code 1.
|
|
../../tests/checks/external-urls/main.spec.ts > all URLs (2832) should be alive:
tests/shared/bootstrap/FailTestOnConsoleError.ts#L20
AssertionError: expected "warn" to not be called at all, but actually been called 3 times
Received:
1st warn call:
Array [
"💀 All retry attempts failed. Final failure to retrieve URL:",
" URL: https://www.sans.org/blog/safari-browser-forensics/
Error:
Error:
{
"code": "ERR_INVALID_URL",
"input": "/blog/safari-browser-forensics"
}
Fetch options:
{
"method": "HEAD",
"headers": {
"User-Agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36 Edg/114.0.1823.51",
"Host": "www.sans.org",
"Upgrade-Insecure-Requests": "1",
"Connection": "keep-alive",
"Accept": "text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8",
"Accept-Encoding": "gzip, deflate, br",
"Cache-Control": "max-age=0",
"Accept-Language": "en-US,en;q=0.9",
"referer": "https://privacy.sexy"
},
"redirect": "manual"
}
Request options:
{
"retryExponentialBaseInMs": 3000,
"additionalHeaders": {
"referer": "https://privacy.sexy"
},
"additionalHeadersUrlIgnore": [],
"requestTimeoutInMs": 60000,
"randomizeTlsFingerprint": true,
"forceHttpGetForUrlPatterns": []
}
TLS:
Ciphers: TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:!DES:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:!SRP:!CAMELLIA:!MD5:!eNULL:!RC4:HIGH:ECDHE-RSA-AES256-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-SHA384:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:!EXPORT:!aNULL:ECDHE-RSA-AES256-GCM-SHA384:!PSK:DHE-RSA-AES256-SHA256:DHE-RSA-AES128-GCM-SHA256
Minimum TLS protocol version: TLSv1.2
Node fingerprint: Masked",
]
2nd warn call:
Array [
"💀 All retry attempts failed. Final failure to retrieve URL:",
" URL: https://archive.today/2025.04.14-225137/https://www.vvave.net/archives/how-to-hide-outlook-classic-try-new-outlook-button.html
Error:
Error:
{}
Fetch options:
{
"method": "HEAD",
"headers": {
"User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36",
"Host": "archive.today",
"Upgrade-Insecure-Requests": "1",
"Connection": "keep-alive",
"Accept": "text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8",
"Accept-Encoding": "gzip, deflate, br",
"Cache-Control": "max-age=0",
"Accept-Language": "en-US,en;q=0.9",
"referer": "https://privacy.sexy"
},
"redirect": "manual"
}
Request options:
{
"retryExponentialBaseInMs": 3000,
"additionalHeaders": {
"referer": "https://privacy.sexy"
},
"additionalHeadersUrlIgnore": [],
"requestTimeoutInMs": 60000,
"randomizeTlsFingerprint": true,
"forceHttpGetForUrlPatterns": []
}
TLS:
Ciphers: TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:!eNULL:HIGH:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:!CAMELLIA:DHE-RSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:!PSK:!aNULL:ECDHE-RSA-AES256-SHA384:!MD5:!SRP:ECDHE-RSA-AES256-SHA256:DHE-RSA-AES128-GCM-SHA256:!RC4:DHE-RSA-AES256-SHA384:!DES:!EXPORT
Minimum TLS protocol version: TLSv1.2
Node fingerprint: Masked",
]
3rd warn call:
Array [
"💀 All retry attempts failed. Final failure to retrieve URL:",
" URL: http://archive.ph/2024.08.10-101158/https://ftpdocs.broadcom.com/cadocs/0/CA%20Network%20Flow%20Analysis%209%201%203-ENU/Bookshelf_Files/HTML/NFA_Upgrade_Guide_en_US/1975755.html
Error:
Error:
{}
Fetch options:
|
|
../../tests/checks/external-urls/main.spec.ts > all URLs (2832) should be alive:
tests/checks/external-urls/main.spec.ts#L53
AssertionError:
---
URL: https://web.archive.org/web/20250129190707/https://orka2.sejm.gov.pl/INT8.nsf/klucz/ATT09BDA103/$FILE/i05984-1o1_2.pdf
Response code: 404
---
URL: https://apps.microsoft.com/detail/9nrx63209r7b?hl=en-US&gl=US
Response code: 403
---
URL: https://apps.microsoft.com/detail/9mv0b5hzvk9z?hl=en-us&gl=US
Response code: 403
---
URL: https://apps.microsoft.com/detail/9ntxgkq8p7n0?hl=en-US&gl=US
Response code: 403
---
URL: https://www.thewindowsclub.com/enable-or-disable-app-launch-tracking-in-windows-10
Response code: 403
---
URL: https://serverfault.com/questions/407838/do-windows-events-from-the-windows-event-log-have-sensitive-information
Response code: 403
---
URL: https://www.sans.org/blog/safari-browser-forensics/
Error:
Error:
{
"code": "ERR_INVALID_URL",
"input": "/blog/safari-browser-forensics"
}
Fetch options:
{
"method": "HEAD",
"headers": {
"User-Agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36 Edg/114.0.1823.51",
"Host": "www.sans.org",
"Upgrade-Insecure-Requests": "1",
"Connection": "keep-alive",
"Accept": "text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8",
"Accept-Encoding": "gzip, deflate, br",
"Cache-Control": "max-age=0",
"Accept-Language": "en-US,en;q=0.9",
"referer": "https://privacy.sexy"
},
"redirect": "manual"
}
Request options:
{
"retryExponentialBaseInMs": 3000,
"additionalHeaders": {
"referer": "https://privacy.sexy"
},
"additionalHeadersUrlIgnore": [],
"requestTimeoutInMs": 60000,
"randomizeTlsFingerprint": true,
"forceHttpGetForUrlPatterns": []
}
TLS:
Ciphers: TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:!DES:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:!SRP:!CAMELLIA:!MD5:!eNULL:!RC4:HIGH:ECDHE-RSA-AES256-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-SHA384:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:!EXPORT:!aNULL:ECDHE-RSA-AES256-GCM-SHA384:!PSK:DHE-RSA-AES256-SHA256:DHE-RSA-AES128-GCM-SHA256
Minimum TLS protocol version: TLSv1.2
Node fingerprint: Masked
---
URL: http://archive.ph/2024.08.10-101158/https://ftpdocs.broadcom.com/cadocs/0/CA%20Network%20Flow%20Analysis%209%201%203-ENU/Bookshelf_Files/HTML/NFA_Upgrade_Guide_en_US/1975755.html
Error:
Error:
{}
Fetch options:
{
"method": "HEAD",
"headers": {
"User-Agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36 Edg/114.0.1823.51",
"Host": "archive.ph",
"Upgrade-Insecure-Requests": "1",
"Connection": "keep-alive",
"Accept": "text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8",
"Accept-Encoding": "gzip, deflate, br",
"Cache-Control": "max-age=0",
"Accept-Language": "en-US,en;q=0.9",
"referer": "https://privacy.sexy"
},
"redirect": "manual"
}
Request options:
{
"retryExponentialBaseInMs": 3000,
"additionalHeaders": {
"referer": "https://privacy.sexy"
},
"additionalHeadersUrlIgnore": [],
"requestTimeoutInMs": 60000,
"randomizeTlsFingerprint": true,
"forceHttpGetForUrlPatterns": []
}
TLS:
Ciphers: TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:DHE-RSA-AES128-SHA256:ECDHE-RSA-AES256-SHA384:HIGH:!RC4:ECDHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:!MD5:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-GCM-SHA256:!EXPORT:!aNULL:!PSK:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:!DES:ECDHE-ECDSA-AES128-GCM-SHA256:!eNULL:ECDHE-RSA-AES128-GCM-SHA256:!CAMELLIA:!SRP
Minimum TLS protocol version: TLSv1.2
Node fingerprint: Masked
---
URL: https://stackoverflow.com/questions/46744840/export-registry-value-to-file-and-then-set-a-variable-in-batch
Response code: 403
---
URL: https://www.aroged.com/2025/02/18/office-how-to-r
|
|
run-check
Node.js 20 actions are deprecated. The following actions are running on Node.js 20 and may not work as expected: actions/checkout@v4, actions/setup-node@v4. Actions will be forced to run with Node.js 24 by default starting June 2nd, 2026. Node.js 20 will be removed from the runner on September 16th, 2026. Please check if updated versions of these actions are available that support Node.js 24. To opt into Node.js 24 now, set the FORCE_JAVASCRIPT_ACTIONS_TO_NODE24=true environment variable on the runner or in your workflow file. Once Node.js 24 becomes the default, you can temporarily opt out by setting ACTIONS_ALLOW_USE_UNSECURE_NODE_VERSION=true. For more information see: https://github.blog/changelog/2025-09-19-deprecation-of-node-20-on-github-actions-runners/
|