chore(deps): bump DavidAnson/markdownlint-cli2-action (#3923)
* chore(docs): address `no-generic-link-test` lint (#3923)
this addresses errors observed by dependabot when upgrading to the
latest version of `markdownlint`.
there is a new lint, added in DavidAnson/markdownlint#1459, that
introduces forbidden link text to discourage generic `here` text in
links.
this fixes sentences that included a link labeled "here".
* https://github.com/linkerd/linkerd2-proxy/pull/3918
* https://github.com/linkerd/linkerd2-proxy/actions/runs/15043224730/job/42279610780?pr=3918
* https://github.com/DavidAnson/markdownlint/blob/v0.38.0/doc/md059.md
* https://github.com/DavidAnson/markdownlint/pull/1459
* https://github.com/DavidAnson/markdownlint/issues/681
```
Summary: 3 error(s)
Error: docs/FUZZING.md:17:13 MD059/descriptive-link-text Link text should be descriptive [Context: "[here]"] https://github.com/DavidAnson/markdownlint/blob/v0.38.0/doc/md059.md
Error: docs/FUZZING.md💯2 MD059/descriptive-link-text Link text should be descriptive [Context: "[here]"] https://github.com/DavidAnson/markdownlint/blob/v0.38.0/doc/md059.md
Error: README.md:90:2 MD059/descriptive-link-text Link text should be descriptive [Context: "[here]"] https://github.com/DavidAnson/markdownlint/blob/v0.38.0/doc/md059.md
Error: Failed with exit code: 1
```
Signed-off-by: katelyn martin <kate@buoyant.io>
* build(deps): bump DavidAnson/markdownlint-cli2-action (#3923)
Bumps [DavidAnson/markdownlint-cli2-action](https://github.com/davidanson/markdownlint-cli2-action) from 19.1.0 to 20.0.0.
- [Release notes](https://github.com/davidanson/markdownlint-cli2-action/releases)
- [Commits](05f32210e8...992badcdf2)
---
updated-dependencies:
- dependency-name: DavidAnson/markdownlint-cli2-action
dependency-version: 20.0.0
dependency-type: direct:production
update-type: version-update:semver-major
...
Signed-off-by: dependabot[bot] <support@github.com>
---------
Signed-off-by: katelyn martin <kate@buoyant.io>
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
This commit is contained in:
parent
1eeae37018
commit
478e1e151f
|
|
@ -15,6 +15,6 @@ jobs:
|
|||
runs-on: ubuntu-24.04
|
||||
steps:
|
||||
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683
|
||||
- uses: DavidAnson/markdownlint-cli2-action@05f32210e84442804257b2a6f20b273450ec8265
|
||||
- uses: DavidAnson/markdownlint-cli2-action@992badcdf24e3b8eb7e87ff9287fe931bcb00c6e
|
||||
with:
|
||||
globs: "**/*.md"
|
||||
|
|
|
|||
|
|
@ -86,8 +86,9 @@ minutes to review our [code of conduct][coc].
|
|||
We test our code by way of fuzzing and this is described in [FUZZING.md](/docs/FUZZING.md).
|
||||
|
||||
A third party security audit focused on fuzzing Linkerd2-proxy was performed by
|
||||
Ada Logics in 2021. The full report is available
|
||||
[here](/docs/reports/linkerd2-proxy-fuzzing-report.pdf).
|
||||
Ada Logics in 2021. The
|
||||
[full report](/docs/reports/linkerd2-proxy-fuzzing-report.pdf) can be found in
|
||||
the `docs/reports/` directory.
|
||||
|
||||
## License
|
||||
|
||||
|
|
|
|||
|
|
@ -12,9 +12,12 @@ engine.
|
|||
We place the fuzz tests into folders within the individual crates that the fuzz
|
||||
tests target. For example, we have a fuzz test that that target the crate
|
||||
`/linkerd/addr` and the code in `/linkerd/addr/src` and thus the fuzz test that
|
||||
targets this crate is put in `/linkerd/addr/fuzz`. The folder set up we use for
|
||||
each of the fuzz tests is automatically generated by `cargo fuzz init`
|
||||
(described [here](https://github.com/rust-fuzz/cargo-fuzz#cargo-fuzz-init)).
|
||||
targets this crate is put in `/linkerd/addr/fuzz`.
|
||||
|
||||
The folder structure for each of the fuzz tests is automatically generated by
|
||||
`cargo fuzz init`. See cargo fuzz's
|
||||
[`README.md`](https://github.com/rust-fuzz/cargo-fuzz#cargo-fuzz-init) for more
|
||||
information.
|
||||
|
||||
### Fuzz targets
|
||||
|
||||
|
|
@ -96,6 +99,5 @@ unit-test-like fuzzers, but are essentially just more substantial in nature. The
|
|||
idea behind these fuzzers is to test end-to-end concepts more so than individual
|
||||
components of the proxy.
|
||||
|
||||
The inbound fuzzer
|
||||
[here](/linkerd/app/inbound/fuzz/fuzz_targets/fuzz_target_1.rs) is an example of
|
||||
this.
|
||||
The [inbound fuzzer](/linkerd/app/inbound/fuzz/fuzz_targets/fuzz_target_1.rs)
|
||||
is an example of this.
|
||||
|
|
|
|||
Loading…
Reference in New Issue