This script periodically crawls all Apache project and podling websites to check them for a few specific links or text blocks that all projects are expected to have. The checks include verifying that all required links appear on a project homepage, along with an "image" check if project logo files are in apache.org/img
The script also checks for 3rd party resource references that might be in conflict with our privacy policy.
View the crawler code, website display code, validation checks details, and raw JSON data.
Last crawl time: Wed, 05 Mar 2025 14:13:32 GMT over 216 websites.
Check Type | Check Results | Check Description |
---|---|---|
Uri | https://xerces.apache.org/ | |
Foundation | Apache Software Foundation | |
Events | http://www.apache.org/events/current-event.html | |
License | http://www.apache.org/licenses/ | |
Thanks | http://www.apache.org/foundation/thanks.html | |
Security | http://www.apache.org/security/ | |
Sponsorship | http://www.apache.org/foundation/sponsorship.html | |
Trademarks | Apache Xerces, Xerces, Apache, the Apache feather logo, and the Apache Xerces logo are trademarks of The Apache Software Foundation. | |
Copyright | Copyright © 1999-2022 The Apache Software Foundation. | |
Privacy |
URL expected to match regular expression:
\Ahttps://privacy\.apache\.org/policies/privacy-policy-public\.html\z
|
\Ahttps?://(?:www\.)?apache\.org/foundation/policies/privacy\.html\z
All websites must link to the Privacy Policy. |
|
Resources | Found 12 external resources: {"WARN Mixed Content: The page at 'https://xerces.apache.org/' was loaded over HTTPS, but requested an insecure element 'http://www.apache.org/events/current-event-125x125.png'. This request was automatically upgraded to HTTPS, For more information see https://blog.chromium.org/2019/10/no-more-mixed-messages-about-https.html"=>2, "WARN Mixed Content: The page at 'https://xerces.apache.org/' was loaded over HTTPS, but requested an insecure element 'http://www.apache.org/images/10yearsASF_170x101.jpg'. This request was automatically upgraded to HTTPS, For more information see https://blog.chromium.org/2019/10/no-more-mixed-messages-about-https.html"=>2, "WARN Mixed Content: The page at 'https://xerces.apache.org/' was loaded over a secure connection, but contains a form that targets an insecure endpoint 'http://www.google.com/search'. This endpoint should be made available over a secure connection."=>1, "ERROR Refused to load the script 'http://www.ohloh.net/p/3465/widgets/project_users_logo.js' because it violates the following Content Security Policy directive: \"script-src 'self' 'unsafe-inline' 'unsafe-eval' https://analytics.apache.org/ https://www.apachecon.com/\". Note that 'script-src-elem' was not explicitly set, so 'script-src' is used as a fallback."=>1, ""=>3, "ERROR Refused to load the script 'http://www.ohloh.net/p/3466/widgets/project_users_logo.js' because it violates the following Content Security Policy directive: \"script-src 'self' 'unsafe-inline' 'unsafe-eval' https://analytics.apache.org/ https://www.apachecon.com/\". Note that 'script-src-elem' was not explicitly set, so 'script-src' is used as a fallback."=>1, "ERROR Refused to load the script 'http://www.ohloh.net/p/12649/widgets/project_users_logo.js' because it violates the following Content Security Policy directive: \"script-src 'self' 'unsafe-inline' 'unsafe-eval' https://analytics.apache.org/ https://www.apachecon.com/\". Note that 'script-src-elem' was not explicitly set, so 'script-src' is used as a fallback."=>1, "ERROR Refused to load the script 'http://www.ohloh.net/p/5471/widgets/project_users_logo.js' because it violates the following Content Security Policy directive: \"script-src 'self' 'unsafe-inline' 'unsafe-eval' https://analytics.apache.org/ https://www.apachecon.com/\". Note that 'script-src-elem' was not explicitly set, so 'script-src' is used as a fallback."=>1} |
Text of a link expected to match regular expression:
Found \d+ external resources
Websites must not link to externally hosted resources |
Image | xerces.svg |