diff options
author | Ryuta Kamizono <kamipo@gmail.com> | 2017-08-22 12:27:18 +0900 |
---|---|---|
committer | GitHub <noreply@github.com> | 2017-08-22 12:27:18 +0900 |
commit | 1cc45ade33f437762af07575bfdc0d2acabed0d8 (patch) | |
tree | 857e8c532a26f07be51ad06115583bb4ce1cdce7 /actionpack/lib/action_dispatch/middleware | |
parent | 633e9745f8eafb0d1d5523ec761fdee420bcbc91 (diff) | |
parent | 001ad88909016771c5dd41d01e7748baf2b9b7eb (diff) | |
download | rails-1cc45ade33f437762af07575bfdc0d2acabed0d8.tar.gz rails-1cc45ade33f437762af07575bfdc0d2acabed0d8.tar.bz2 rails-1cc45ade33f437762af07575bfdc0d2acabed0d8.zip |
Merge pull request #30353 from yhirano55/use_https_instead_of_http_in_actionpack
[actionpack] Update links to use https link instead of http [ci skip]
Diffstat (limited to 'actionpack/lib/action_dispatch/middleware')
-rw-r--r-- | actionpack/lib/action_dispatch/middleware/remote_ip.rb | 4 | ||||
-rw-r--r-- | actionpack/lib/action_dispatch/middleware/ssl.rb | 2 |
2 files changed, 3 insertions, 3 deletions
diff --git a/actionpack/lib/action_dispatch/middleware/remote_ip.rb b/actionpack/lib/action_dispatch/middleware/remote_ip.rb index 7ccb99c7f0..35158f9062 100644 --- a/actionpack/lib/action_dispatch/middleware/remote_ip.rb +++ b/actionpack/lib/action_dispatch/middleware/remote_ip.rb @@ -12,7 +12,7 @@ module ActionDispatch # by @gingerlime. A more detailed explanation of the algorithm is given # at GetIp#calculate_ip. # - # Some Rack servers concatenate repeated headers, like {HTTP RFC 2616}[http://www.w3.org/Protocols/rfc2616/rfc2616-sec4.html#sec4.2] + # Some Rack servers concatenate repeated headers, like {HTTP RFC 2616}[https://www.w3.org/Protocols/rfc2616/rfc2616-sec4.html#sec4.2] # requires. Some Rack servers simply drop preceding headers, and only report # the value that was {given in the last header}[http://andre.arko.net/2011/12/26/repeated-headers-and-ruby-web-servers]. # If you are behind multiple proxy servers (like NGINX to HAProxy to Unicorn) @@ -31,7 +31,7 @@ module ActionDispatch # The default trusted IPs list simply includes IP addresses that are # guaranteed by the IP specification to be private addresses. Those will # not be the ultimate client IP in production, and so are discarded. See - # http://en.wikipedia.org/wiki/Private_network for details. + # https://en.wikipedia.org/wiki/Private_network for details. TRUSTED_PROXIES = [ "127.0.0.1", # localhost IPv4 "::1", # localhost IPv6 diff --git a/actionpack/lib/action_dispatch/middleware/ssl.rb b/actionpack/lib/action_dispatch/middleware/ssl.rb index fb2bfbb41e..45290b6ac3 100644 --- a/actionpack/lib/action_dispatch/middleware/ssl.rb +++ b/actionpack/lib/action_dispatch/middleware/ssl.rb @@ -94,7 +94,7 @@ module ActionDispatch end end - # http://tools.ietf.org/html/rfc6797#section-6.1 + # https://tools.ietf.org/html/rfc6797#section-6.1 def build_hsts_header(hsts) value = "max-age=#{hsts[:expires].to_i}".dup value << "; includeSubDomains" if hsts[:subdomains] |