-
Notifications
You must be signed in to change notification settings - Fork 9
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Replace HTTP links with HTTPS ones: security
Rationale: Reduces attack surface on kernel devs opening the links for MITM as HTTPS traffic is much harder to manipulate. Deterministic algorithm: For each file: If not .svg: For each line: If doesn't contain `\bxmlns\b`: For each link, `\bhttp://[^# \t\r\n]*(?:\w|/)`: If both the HTTP and HTTPS versions return 200 OK and serve the same content: Replace HTTP with HTTPS. Signed-off-by: Alexander A. Klimov <[email protected]> Acked-by: John Johansen <[email protected]> Signed-off-by: James Morris <[email protected]>
- Loading branch information
Showing
10 changed files
with
10 additions
and
10 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,7 +1,7 @@ | ||
// SPDX-License-Identifier: GPL-2.0-only | ||
/* | ||
* Copyright (C) 2013 Politecnico di Torino, Italy | ||
* TORSEC group -- http://security.polito.it | ||
* TORSEC group -- https://security.polito.it | ||
* | ||
* Author: Roberto Sassu <[email protected]> | ||
* | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,7 +1,7 @@ | ||
// SPDX-License-Identifier: GPL-2.0-only | ||
/* | ||
* Copyright (C) 2013 Politecnico di Torino, Italy | ||
* TORSEC group -- http://security.polito.it | ||
* TORSEC group -- https://security.polito.it | ||
* | ||
* Author: Roberto Sassu <[email protected]> | ||
* | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,7 +1,7 @@ | ||
/* SPDX-License-Identifier: GPL-2.0-only */ | ||
/* | ||
* Copyright (C) 2013 Politecnico di Torino, Italy | ||
* TORSEC group -- http://security.polito.it | ||
* TORSEC group -- https://security.polito.it | ||
* | ||
* Author: Roberto Sassu <[email protected]> | ||
* | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -4,7 +4,7 @@ | |
* | ||
* Copyright (C) 2006 International Business Machines Corp. | ||
* Copyright (C) 2010 Politecnico di Torino, Italy | ||
* TORSEC group -- http://security.polito.it | ||
* TORSEC group -- https://security.polito.it | ||
* | ||
* Authors: | ||
* Michael A. Halcrow <[email protected]> | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -4,7 +4,7 @@ | |
* | ||
* Copyright (C) 2006 International Business Machines Corp. | ||
* Copyright (C) 2010 Politecnico di Torino, Italy | ||
* TORSEC group -- http://security.polito.it | ||
* TORSEC group -- https://security.polito.it | ||
* | ||
* Authors: | ||
* Michael A. Halcrow <[email protected]> | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,7 +2,7 @@ | |
/* | ||
* Copyright (C) 2010 IBM Corporation | ||
* Copyright (C) 2010 Politecnico di Torino, Italy | ||
* TORSEC group -- http://security.polito.it | ||
* TORSEC group -- https://security.polito.it | ||
* | ||
* Authors: | ||
* Mimi Zohar <[email protected]> | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,7 +2,7 @@ | |
/* | ||
* Copyright (C) 2010 IBM Corporation | ||
* Copyright (C) 2010 Politecnico di Torino, Italy | ||
* TORSEC group -- http://security.polito.it | ||
* TORSEC group -- https://security.polito.it | ||
* | ||
* Authors: | ||
* Mimi Zohar <[email protected]> | ||
|