aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorप्रथमेश Sonpatki <csonpatki@gmail.com>2016-07-06 21:50:03 +0530
committerGitHub <noreply@github.com>2016-07-06 21:50:03 +0530
commit478077bf4a925962f13cdaff53a31bb73383c7f4 (patch)
treecdfcdea7a2191a632c4b9975972ca372d68efa9f
parent6038a548fd6bf5722f8b4fd19ec2232c887945ce (diff)
parent8a12c7c2f563b2bdaeb630bf66c0a89acf2727c4 (diff)
downloadrails-478077bf4a925962f13cdaff53a31bb73383c7f4.tar.gz
rails-478077bf4a925962f13cdaff53a31bb73383c7f4.tar.bz2
rails-478077bf4a925962f13cdaff53a31bb73383c7f4.zip
Merge pull request #25720 from timrogers/actiondispatch-ssl-defaults-docs
Correct defaults in documentation for ActionDispatch::SSL
-rw-r--r--actionpack/lib/action_dispatch/middleware/ssl.rb9
1 files changed, 5 insertions, 4 deletions
diff --git a/actionpack/lib/action_dispatch/middleware/ssl.rb b/actionpack/lib/action_dispatch/middleware/ssl.rb
index ab3077b308..0e04d3a524 100644
--- a/actionpack/lib/action_dispatch/middleware/ssl.rb
+++ b/actionpack/lib/action_dispatch/middleware/ssl.rb
@@ -18,17 +18,18 @@ module ActionDispatch
# Enabled by default. Configure `config.ssl_options` with `hsts: false` to disable.
#
# Set `config.ssl_options` with `hsts: { … }` to configure HSTS:
- # * `expires`: How long, in seconds, these settings will stick. Defaults to
- # `180.days` (recommended). The minimum required to qualify for browser
- # preload lists is `18.weeks`.
+ # * `expires`: How long, in seconds, these settings will stick. The minimum
+ # required to qualify for browser preload lists is `18.weeks`. Defaults to
+ # `180.days` (recommended).
# * `subdomains`: Set to `true` to tell the browser to apply these settings
# to all subdomains. This protects your cookies from interception by a
- # vulnerable site on a subdomain. Defaults to `true`.
+ # vulnerable site on a subdomain. Defaults to `false`.
# * `preload`: Advertise that this site may be included in browsers'
# preloaded HSTS lists. HSTS protects your site on every visit *except the
# first visit* since it hasn't seen your HSTS header yet. To close this
# gap, browser vendors include a baked-in list of HSTS-enabled sites.
# Go to https://hstspreload.appspot.com to submit your site for inclusion.
+ # Defaults to `false`.
#
# To turn off HSTS, omitting the header is not enough. Browsers will remember the
# original HSTS directive until it expires. Instead, use the header to tell browsers to