Replace HTTP links with HTTPS ones: security

Rationale:
Reduces attack surface on kernel devs opening the links for MITM
as HTTPS traffic is much harder to manipulate.

Deterministic algorithm:
For each file:
  If not .svg:
    For each line:
      If doesn't contain `\bxmlns\b`:
        For each link, `\bhttp://[^# \t\r\n]*(?:\w|/)`:
          If both the HTTP and HTTPS versions
          return 200 OK and serve the same content:
            Replace HTTP with HTTPS.

Signed-off-by: Alexander A. Klimov <grandmaster@al2klimov.de>
Acked-by: John Johansen <john.johansen@canonical.com>
Signed-off-by: James Morris <jmorris@namei.org>
This commit is contained in:
Alexander A. Klimov 2020-07-05 23:45:12 +02:00 committed by James Morris
parent 3d77e6a880
commit c9fecf505a
10 changed files with 10 additions and 10 deletions

View File

@ -118,7 +118,7 @@ config INTEL_TXT
it was configured with, especially since they may be responsible for it was configured with, especially since they may be responsible for
providing such assurances to VMs and services running on it. providing such assurances to VMs and services running on it.
See <http://www.intel.com/technology/security/> for more information See <https://www.intel.com/technology/security/> for more information
about Intel(R) TXT. about Intel(R) TXT.
See <http://tboot.sourceforge.net> for more information about tboot. See <http://tboot.sourceforge.net> for more information about tboot.
See Documentation/x86/intel_txt.rst for a description of how to enable See Documentation/x86/intel_txt.rst for a description of how to enable

View File

@ -76,7 +76,7 @@ config SECURITY_APPARMOR_KUNIT_TEST
This builds the AppArmor KUnit tests. This builds the AppArmor KUnit tests.
KUnit tests run during boot and output the results to the debug log KUnit tests run during boot and output the results to the debug log
in TAP format (http://testanything.org/). Only useful for kernel devs in TAP format (https://testanything.org/). Only useful for kernel devs
running KUnit test harness and are not for inclusion into a running KUnit test harness and are not for inclusion into a
production build. production build.

View File

@ -26,7 +26,7 @@ config IMA
an aggregate integrity value over this list inside the an aggregate integrity value over this list inside the
TPM hardware, so that the TPM can prove to a third party TPM hardware, so that the TPM can prove to a third party
whether or not critical system files have been modified. whether or not critical system files have been modified.
Read <http://www.usenix.org/events/sec04/tech/sailer.html> Read <https://www.usenix.org/events/sec04/tech/sailer.html>
to learn more about IMA. to learn more about IMA.
If unsure, say N. If unsure, say N.

View File

@ -1,7 +1,7 @@
// SPDX-License-Identifier: GPL-2.0-only // SPDX-License-Identifier: GPL-2.0-only
/* /*
* Copyright (C) 2013 Politecnico di Torino, Italy * Copyright (C) 2013 Politecnico di Torino, Italy
* TORSEC group -- http://security.polito.it * TORSEC group -- https://security.polito.it
* *
* Author: Roberto Sassu <roberto.sassu@polito.it> * Author: Roberto Sassu <roberto.sassu@polito.it>
* *

View File

@ -1,7 +1,7 @@
// SPDX-License-Identifier: GPL-2.0-only // SPDX-License-Identifier: GPL-2.0-only
/* /*
* Copyright (C) 2013 Politecnico di Torino, Italy * Copyright (C) 2013 Politecnico di Torino, Italy
* TORSEC group -- http://security.polito.it * TORSEC group -- https://security.polito.it
* *
* Author: Roberto Sassu <roberto.sassu@polito.it> * Author: Roberto Sassu <roberto.sassu@polito.it>
* *

View File

@ -1,7 +1,7 @@
/* SPDX-License-Identifier: GPL-2.0-only */ /* SPDX-License-Identifier: GPL-2.0-only */
/* /*
* Copyright (C) 2013 Politecnico di Torino, Italy * Copyright (C) 2013 Politecnico di Torino, Italy
* TORSEC group -- http://security.polito.it * TORSEC group -- https://security.polito.it
* *
* Author: Roberto Sassu <roberto.sassu@polito.it> * Author: Roberto Sassu <roberto.sassu@polito.it>
* *

View File

@ -4,7 +4,7 @@
* *
* Copyright (C) 2006 International Business Machines Corp. * Copyright (C) 2006 International Business Machines Corp.
* Copyright (C) 2010 Politecnico di Torino, Italy * Copyright (C) 2010 Politecnico di Torino, Italy
* TORSEC group -- http://security.polito.it * TORSEC group -- https://security.polito.it
* *
* Authors: * Authors:
* Michael A. Halcrow <mahalcro@us.ibm.com> * Michael A. Halcrow <mahalcro@us.ibm.com>

View File

@ -4,7 +4,7 @@
* *
* Copyright (C) 2006 International Business Machines Corp. * Copyright (C) 2006 International Business Machines Corp.
* Copyright (C) 2010 Politecnico di Torino, Italy * Copyright (C) 2010 Politecnico di Torino, Italy
* TORSEC group -- http://security.polito.it * TORSEC group -- https://security.polito.it
* *
* Authors: * Authors:
* Michael A. Halcrow <mahalcro@us.ibm.com> * Michael A. Halcrow <mahalcro@us.ibm.com>

View File

@ -2,7 +2,7 @@
/* /*
* Copyright (C) 2010 IBM Corporation * Copyright (C) 2010 IBM Corporation
* Copyright (C) 2010 Politecnico di Torino, Italy * Copyright (C) 2010 Politecnico di Torino, Italy
* TORSEC group -- http://security.polito.it * TORSEC group -- https://security.polito.it
* *
* Authors: * Authors:
* Mimi Zohar <zohar@us.ibm.com> * Mimi Zohar <zohar@us.ibm.com>

View File

@ -2,7 +2,7 @@
/* /*
* Copyright (C) 2010 IBM Corporation * Copyright (C) 2010 IBM Corporation
* Copyright (C) 2010 Politecnico di Torino, Italy * Copyright (C) 2010 Politecnico di Torino, Italy
* TORSEC group -- http://security.polito.it * TORSEC group -- https://security.polito.it
* *
* Authors: * Authors:
* Mimi Zohar <zohar@us.ibm.com> * Mimi Zohar <zohar@us.ibm.com>