Skip to content

checks.external-urls #642

checks.external-urls

checks.external-urls #642

Triggered via schedule April 5, 2026 01:12
Status Failure
Total duration 5h 14m 46s
Artifacts
Fit to window
Zoom out
Zoom in

Annotations

3 errors and 1 warning
run-check
Process completed with exit code 1.
../../tests/checks/external-urls/main.spec.ts > all URLs (2832) should be alive: tests/shared/bootstrap/FailTestOnConsoleError.ts#L20
AssertionError: expected "warn" to not be called at all, but actually been called 3 times Received: 1st warn call: Array [ "💀 All retry attempts failed. Final failure to retrieve URL:", " URL: https://www.sans.org/blog/safari-browser-forensics/ Error: Error: { "code": "ERR_INVALID_URL", "input": "/blog/safari-browser-forensics" } Fetch options: { "method": "HEAD", "headers": { "User-Agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36 Edg/114.0.1823.51", "Host": "www.sans.org", "Upgrade-Insecure-Requests": "1", "Connection": "keep-alive", "Accept": "text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8", "Accept-Encoding": "gzip, deflate, br", "Cache-Control": "max-age=0", "Accept-Language": "en-US,en;q=0.9", "referer": "https://privacy.sexy" }, "redirect": "manual" } Request options: { "retryExponentialBaseInMs": 3000, "additionalHeaders": { "referer": "https://privacy.sexy" }, "additionalHeadersUrlIgnore": [], "requestTimeoutInMs": 60000, "randomizeTlsFingerprint": true, "forceHttpGetForUrlPatterns": [] } TLS: Ciphers: TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:!DES:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:!SRP:!CAMELLIA:!MD5:!eNULL:!RC4:HIGH:ECDHE-RSA-AES256-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-SHA384:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:!EXPORT:!aNULL:ECDHE-RSA-AES256-GCM-SHA384:!PSK:DHE-RSA-AES256-SHA256:DHE-RSA-AES128-GCM-SHA256 Minimum TLS protocol version: TLSv1.2 Node fingerprint: Masked", ] 2nd warn call: Array [ "💀 All retry attempts failed. Final failure to retrieve URL:", " URL: https://archive.today/2025.04.14-225137/https://www.vvave.net/archives/how-to-hide-outlook-classic-try-new-outlook-button.html Error: Error: {} Fetch options: { "method": "HEAD", "headers": { "User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36", "Host": "archive.today", "Upgrade-Insecure-Requests": "1", "Connection": "keep-alive", "Accept": "text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8", "Accept-Encoding": "gzip, deflate, br", "Cache-Control": "max-age=0", "Accept-Language": "en-US,en;q=0.9", "referer": "https://privacy.sexy" }, "redirect": "manual" } Request options: { "retryExponentialBaseInMs": 3000, "additionalHeaders": { "referer": "https://privacy.sexy" }, "additionalHeadersUrlIgnore": [], "requestTimeoutInMs": 60000, "randomizeTlsFingerprint": true, "forceHttpGetForUrlPatterns": [] } TLS: Ciphers: TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:!eNULL:HIGH:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:!CAMELLIA:DHE-RSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:!PSK:!aNULL:ECDHE-RSA-AES256-SHA384:!MD5:!SRP:ECDHE-RSA-AES256-SHA256:DHE-RSA-AES128-GCM-SHA256:!RC4:DHE-RSA-AES256-SHA384:!DES:!EXPORT Minimum TLS protocol version: TLSv1.2 Node fingerprint: Masked", ] 3rd warn call: Array [ "💀 All retry attempts failed. Final failure to retrieve URL:", " URL: http://archive.ph/2024.08.10-101158/https://ftpdocs.broadcom.com/cadocs/0/CA%20Network%20Flow%20Analysis%209%201%203-ENU/Bookshelf_Files/HTML/NFA_Upgrade_Guide_en_US/1975755.html Error: Error: {} Fetch options:
../../tests/checks/external-urls/main.spec.ts > all URLs (2832) should be alive: tests/checks/external-urls/main.spec.ts#L53
AssertionError: --- URL: https://web.archive.org/web/20250129190707/https://orka2.sejm.gov.pl/INT8.nsf/klucz/ATT09BDA103/$FILE/i05984-1o1_2.pdf Response code: 404 --- URL: https://apps.microsoft.com/detail/9nrx63209r7b?hl=en-US&gl=US Response code: 403 --- URL: https://apps.microsoft.com/detail/9mv0b5hzvk9z?hl=en-us&gl=US Response code: 403 --- URL: https://apps.microsoft.com/detail/9ntxgkq8p7n0?hl=en-US&gl=US Response code: 403 --- URL: https://www.thewindowsclub.com/enable-or-disable-app-launch-tracking-in-windows-10 Response code: 403 --- URL: https://serverfault.com/questions/407838/do-windows-events-from-the-windows-event-log-have-sensitive-information Response code: 403 --- URL: https://www.sans.org/blog/safari-browser-forensics/ Error: Error: { "code": "ERR_INVALID_URL", "input": "/blog/safari-browser-forensics" } Fetch options: { "method": "HEAD", "headers": { "User-Agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36 Edg/114.0.1823.51", "Host": "www.sans.org", "Upgrade-Insecure-Requests": "1", "Connection": "keep-alive", "Accept": "text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8", "Accept-Encoding": "gzip, deflate, br", "Cache-Control": "max-age=0", "Accept-Language": "en-US,en;q=0.9", "referer": "https://privacy.sexy" }, "redirect": "manual" } Request options: { "retryExponentialBaseInMs": 3000, "additionalHeaders": { "referer": "https://privacy.sexy" }, "additionalHeadersUrlIgnore": [], "requestTimeoutInMs": 60000, "randomizeTlsFingerprint": true, "forceHttpGetForUrlPatterns": [] } TLS: Ciphers: TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:!DES:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:!SRP:!CAMELLIA:!MD5:!eNULL:!RC4:HIGH:ECDHE-RSA-AES256-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-SHA384:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:!EXPORT:!aNULL:ECDHE-RSA-AES256-GCM-SHA384:!PSK:DHE-RSA-AES256-SHA256:DHE-RSA-AES128-GCM-SHA256 Minimum TLS protocol version: TLSv1.2 Node fingerprint: Masked --- URL: http://archive.ph/2024.08.10-101158/https://ftpdocs.broadcom.com/cadocs/0/CA%20Network%20Flow%20Analysis%209%201%203-ENU/Bookshelf_Files/HTML/NFA_Upgrade_Guide_en_US/1975755.html Error: Error: {} Fetch options: { "method": "HEAD", "headers": { "User-Agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36 Edg/114.0.1823.51", "Host": "archive.ph", "Upgrade-Insecure-Requests": "1", "Connection": "keep-alive", "Accept": "text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8", "Accept-Encoding": "gzip, deflate, br", "Cache-Control": "max-age=0", "Accept-Language": "en-US,en;q=0.9", "referer": "https://privacy.sexy" }, "redirect": "manual" } Request options: { "retryExponentialBaseInMs": 3000, "additionalHeaders": { "referer": "https://privacy.sexy" }, "additionalHeadersUrlIgnore": [], "requestTimeoutInMs": 60000, "randomizeTlsFingerprint": true, "forceHttpGetForUrlPatterns": [] } TLS: Ciphers: TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:DHE-RSA-AES128-SHA256:ECDHE-RSA-AES256-SHA384:HIGH:!RC4:ECDHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:!MD5:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-GCM-SHA256:!EXPORT:!aNULL:!PSK:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:!DES:ECDHE-ECDSA-AES128-GCM-SHA256:!eNULL:ECDHE-RSA-AES128-GCM-SHA256:!CAMELLIA:!SRP Minimum TLS protocol version: TLSv1.2 Node fingerprint: Masked --- URL: https://stackoverflow.com/questions/46744840/export-registry-value-to-file-and-then-set-a-variable-in-batch Response code: 403 --- URL: https://www.aroged.com/2025/02/18/office-how-to-r
run-check
Node.js 20 actions are deprecated. The following actions are running on Node.js 20 and may not work as expected: actions/checkout@v4, actions/setup-node@v4. Actions will be forced to run with Node.js 24 by default starting June 2nd, 2026. Node.js 20 will be removed from the runner on September 16th, 2026. Please check if updated versions of these actions are available that support Node.js 24. To opt into Node.js 24 now, set the FORCE_JAVASCRIPT_ACTIONS_TO_NODE24=true environment variable on the runner or in your workflow file. Once Node.js 24 becomes the default, you can temporarily opt out by setting ACTIONS_ALLOW_USE_UNSECURE_NODE_VERSION=true. For more information see: https://github.blog/changelog/2025-09-19-deprecation-of-node-20-on-github-actions-runners/