Replace HTTP links with HTTPS ones: security
Rationale: Reduces attack surface on kernel devs opening the links for MITM as HTTPS traffic is much harder to manipulate. Deterministic algorithm: For each file: If not .svg: For each line: If doesn't contain `\bxmlns\b`: For each link, `\bhttp://[^# \t\r\n]*(?:\w|/)`: If both the HTTP and HTTPS versions return 200 OK and serve the same content: Replace HTTP with HTTPS. Signed-off-by: Alexander A. Klimov <grandmaster@al2klimov.de> Acked-by: John Johansen <john.johansen@canonical.com> Signed-off-by: James Morris <jmorris@namei.org>
This commit is contained in:
parent
3d77e6a880
commit
c9fecf505a
|
@ -118,7 +118,7 @@ config INTEL_TXT
|
||||||
it was configured with, especially since they may be responsible for
|
it was configured with, especially since they may be responsible for
|
||||||
providing such assurances to VMs and services running on it.
|
providing such assurances to VMs and services running on it.
|
||||||
|
|
||||||
See <http://www.intel.com/technology/security/> for more information
|
See <https://www.intel.com/technology/security/> for more information
|
||||||
about Intel(R) TXT.
|
about Intel(R) TXT.
|
||||||
See <http://tboot.sourceforge.net> for more information about tboot.
|
See <http://tboot.sourceforge.net> for more information about tboot.
|
||||||
See Documentation/x86/intel_txt.rst for a description of how to enable
|
See Documentation/x86/intel_txt.rst for a description of how to enable
|
||||||
|
|
|
@ -76,7 +76,7 @@ config SECURITY_APPARMOR_KUNIT_TEST
|
||||||
This builds the AppArmor KUnit tests.
|
This builds the AppArmor KUnit tests.
|
||||||
|
|
||||||
KUnit tests run during boot and output the results to the debug log
|
KUnit tests run during boot and output the results to the debug log
|
||||||
in TAP format (http://testanything.org/). Only useful for kernel devs
|
in TAP format (https://testanything.org/). Only useful for kernel devs
|
||||||
running KUnit test harness and are not for inclusion into a
|
running KUnit test harness and are not for inclusion into a
|
||||||
production build.
|
production build.
|
||||||
|
|
||||||
|
|
|
@ -26,7 +26,7 @@ config IMA
|
||||||
an aggregate integrity value over this list inside the
|
an aggregate integrity value over this list inside the
|
||||||
TPM hardware, so that the TPM can prove to a third party
|
TPM hardware, so that the TPM can prove to a third party
|
||||||
whether or not critical system files have been modified.
|
whether or not critical system files have been modified.
|
||||||
Read <http://www.usenix.org/events/sec04/tech/sailer.html>
|
Read <https://www.usenix.org/events/sec04/tech/sailer.html>
|
||||||
to learn more about IMA.
|
to learn more about IMA.
|
||||||
If unsure, say N.
|
If unsure, say N.
|
||||||
|
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
// SPDX-License-Identifier: GPL-2.0-only
|
// SPDX-License-Identifier: GPL-2.0-only
|
||||||
/*
|
/*
|
||||||
* Copyright (C) 2013 Politecnico di Torino, Italy
|
* Copyright (C) 2013 Politecnico di Torino, Italy
|
||||||
* TORSEC group -- http://security.polito.it
|
* TORSEC group -- https://security.polito.it
|
||||||
*
|
*
|
||||||
* Author: Roberto Sassu <roberto.sassu@polito.it>
|
* Author: Roberto Sassu <roberto.sassu@polito.it>
|
||||||
*
|
*
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
// SPDX-License-Identifier: GPL-2.0-only
|
// SPDX-License-Identifier: GPL-2.0-only
|
||||||
/*
|
/*
|
||||||
* Copyright (C) 2013 Politecnico di Torino, Italy
|
* Copyright (C) 2013 Politecnico di Torino, Italy
|
||||||
* TORSEC group -- http://security.polito.it
|
* TORSEC group -- https://security.polito.it
|
||||||
*
|
*
|
||||||
* Author: Roberto Sassu <roberto.sassu@polito.it>
|
* Author: Roberto Sassu <roberto.sassu@polito.it>
|
||||||
*
|
*
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
/* SPDX-License-Identifier: GPL-2.0-only */
|
/* SPDX-License-Identifier: GPL-2.0-only */
|
||||||
/*
|
/*
|
||||||
* Copyright (C) 2013 Politecnico di Torino, Italy
|
* Copyright (C) 2013 Politecnico di Torino, Italy
|
||||||
* TORSEC group -- http://security.polito.it
|
* TORSEC group -- https://security.polito.it
|
||||||
*
|
*
|
||||||
* Author: Roberto Sassu <roberto.sassu@polito.it>
|
* Author: Roberto Sassu <roberto.sassu@polito.it>
|
||||||
*
|
*
|
||||||
|
|
|
@ -4,7 +4,7 @@
|
||||||
*
|
*
|
||||||
* Copyright (C) 2006 International Business Machines Corp.
|
* Copyright (C) 2006 International Business Machines Corp.
|
||||||
* Copyright (C) 2010 Politecnico di Torino, Italy
|
* Copyright (C) 2010 Politecnico di Torino, Italy
|
||||||
* TORSEC group -- http://security.polito.it
|
* TORSEC group -- https://security.polito.it
|
||||||
*
|
*
|
||||||
* Authors:
|
* Authors:
|
||||||
* Michael A. Halcrow <mahalcro@us.ibm.com>
|
* Michael A. Halcrow <mahalcro@us.ibm.com>
|
||||||
|
|
|
@ -4,7 +4,7 @@
|
||||||
*
|
*
|
||||||
* Copyright (C) 2006 International Business Machines Corp.
|
* Copyright (C) 2006 International Business Machines Corp.
|
||||||
* Copyright (C) 2010 Politecnico di Torino, Italy
|
* Copyright (C) 2010 Politecnico di Torino, Italy
|
||||||
* TORSEC group -- http://security.polito.it
|
* TORSEC group -- https://security.polito.it
|
||||||
*
|
*
|
||||||
* Authors:
|
* Authors:
|
||||||
* Michael A. Halcrow <mahalcro@us.ibm.com>
|
* Michael A. Halcrow <mahalcro@us.ibm.com>
|
||||||
|
|
|
@ -2,7 +2,7 @@
|
||||||
/*
|
/*
|
||||||
* Copyright (C) 2010 IBM Corporation
|
* Copyright (C) 2010 IBM Corporation
|
||||||
* Copyright (C) 2010 Politecnico di Torino, Italy
|
* Copyright (C) 2010 Politecnico di Torino, Italy
|
||||||
* TORSEC group -- http://security.polito.it
|
* TORSEC group -- https://security.polito.it
|
||||||
*
|
*
|
||||||
* Authors:
|
* Authors:
|
||||||
* Mimi Zohar <zohar@us.ibm.com>
|
* Mimi Zohar <zohar@us.ibm.com>
|
||||||
|
|
|
@ -2,7 +2,7 @@
|
||||||
/*
|
/*
|
||||||
* Copyright (C) 2010 IBM Corporation
|
* Copyright (C) 2010 IBM Corporation
|
||||||
* Copyright (C) 2010 Politecnico di Torino, Italy
|
* Copyright (C) 2010 Politecnico di Torino, Italy
|
||||||
* TORSEC group -- http://security.polito.it
|
* TORSEC group -- https://security.polito.it
|
||||||
*
|
*
|
||||||
* Authors:
|
* Authors:
|
||||||
* Mimi Zohar <zohar@us.ibm.com>
|
* Mimi Zohar <zohar@us.ibm.com>
|
||||||
|
|
Loading…
Reference in New Issue