-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
We need a pre-check to ensure that NOR requests are checked for illegal URI schemes #91
Comments
My stab at this would be to do a pre-check for each term URI if it contains "obolibrary.org". And if it does, check if it conforms with the overall format "http://purl.obolibrary.org/obo/XXX". Of course this wouldn't catch instances of misspelled obolibrary.org. And there might be a weird case where such a URI is not intended to be an obolibray term - but in those cases I would question if there isn't another problem (I don't think we want to encourage URIs like HTTP://better_than_obolibray.org' or 'google.com?obolibray.org)... |
In my opinion, these checks could initially be carried out manually by the NOR manager until sufficiently reliable automatic checks are available. Right now, I've followed the NOR manager SOP to the letter (maybe too much in fact) that is to configure the NOR dashboard for new ontologies and, when everything is green, pass it to the reviewer. I feel there are additional tasks that could be done prior to the review, tasks that would have to be done manually as a first step. The illegal URIs is one, but there are also problems with the object properties cf. OBOFoundry/obo-nor.github.io#52 Maybe we could split the review process into form and content:
|
I agree, I made a PR to that end, but I put this in the ballpark of the main reviewer. Can you make an alternative PR with your NOR plus review? |
Will do. |
Agreed! |
ROBOT report has:
https://github.com/ontodev/robot/blob/master/robot-core/src/main/resources/report_queries/invalid_entity_uri.rq
https://github.com/ontodev/robot/blob/master/robot-core/src/main/resources/report_profile.txt#L32
However, when someone (see e.g. OBOFoundry/OBOFoundry.github.io#2371) creates completely malformed URIs (https, and different ID scheme), the automatic base extractor misses all classes (e.g. no class is tested in the Report).
We need some efficient way to run the above checks before the base extraction.
The text was updated successfully, but these errors were encountered: