Test your content
TL;DR: There’s another workflow that version-controlled, collaborative content enables: continuous integration for prose.
I’ve written before about how we should treat prose and data with the same respect that developers treat code and how Jekyll forces you to do just that, but there’s another workflow that version-controlled, collaborative content enables: continuous integration.
Continuous integration (CI) is the idea that for every change, whether proposed or realized, a standard battery of tests run, to confirm the change does what you intend it to do. In most developer tools, like GitHub, you get instant feedback, in the form of a green light, to let you know that is in fact the case, or a red light, if something went awry, detailing exactly what doesn’t match you specified expectations.
When you treat content as code, you get the opportunity to co-opt best-of-breed developer workflows, and continuous integration is no exception. We’ve all been there. You make a simple change and end up breaking two or three other things. Links get out of date. Images move. Imagine if every time you made a change, all those things that you consciously or subconsciously worry about were automatically checked. Are my links accurate? Did any of my images break? Does this darn thing actually render the way I want it to?
With CI services like Travis CI, whether public or private, adding continuous integration to a repository of prose content, whether an entire site or a collection of HTML or Markdown files becomes trivial, especially when you use open source tools like HTML Proofer.
Checking links and images
Let’s say you have a Jekyll site, versioned on GitHub and published on GitHub Pages, and you’d like Travis to give your content a quick checkup every time you make a change. First, you’ll want to add the following to your site’s
group :test do gem 'html-proofer' gem 'rake' end
Next, create a file called
Rakefile in your site’s root, and add the following:
require 'html/proofer' task :test do sh "bundle exec jekyll build" HTML::Proofer.new("./_site").run end
After that, you’ll want to configure Travis by adding a
.travis.yml file with the following contents:
language: ruby script: "rake test" # You may need to use "bundle exec rake test" if Travis fails on the require for the HTML/Proofer
And finally, you need to head over to travis-ci.org/profile to enable Travis for your repository.
You can see this in action on this site. Each time I make a change (or someone proposes one), every link and image is checked to confirm nothing broke. You’ll get something that looks like:
Running ["ScriptCheck", "LinkCheck", "ImageCheck"] checks on ./_site on *.html... Checking 1187 external links... Ran on 120 files! HTML-Proofer finished successfully.
And with that, you can merge confidently.
Beyond “does this thing work?”
Having accurate links and images is a great baseline (that sadly, as I’ve learned through my own continuous integration, many sites don’t check), but what about checking the things you can’t see like accessibility? In the case of §508 compliance, I wrote Ra11y, but automated tools exist to check all sorts of things.
If you regularly author content for the web, especially if it’s collaborative, I’d encourage you to take a look at what developer tools and philosophies your can co-opt for your own workflows, CI or otherwise. You content deserves it.
If you enjoyed this post, you might also enjoy:
- Ten ways to make a product great
- Five best practices in open source: external engagement
- 19 reasons why technologists don't want to work at your government agency
- 15 rules for communicating at GitHub
- How I re-over-engineered my home network for privacy and security
- Twelve tips for growing communities around your open source project
- Four characteristics of modern collaboration tools
- Why open source
- Why everything should have a URL
- Why WordPress
- Using GitHub Pages to showcase your organization's open source efforts
Ben Balter is Chief of Staff for Security at GitHub, the world’s largest software development platform. Previously, as a Staff Technical Program manager for Enterprise and Compliance, Ben managed GitHub’s on-premises and SaaS enterprise offerings, and as the Senior Product Manager overseeing the platform’s Trust and Safety efforts, Ben shipped more than 500 features in support of community management, privacy, compliance, content moderation, product security, platform health, and open source workflows to ensure the GitHub community and platform remained safe, secure, and welcoming for all software developers. Before joining GitHub’s Product team, Ben served as GitHub’s Government Evangelist, leading the efforts to encourage more than 2,000 government organizations across 75 countries to adopt open source philosophies for code, data, and policy development. More about the author →