Skip to content

Commit b241908

Browse files
committedOct 3, 2019
update https urls [ci skip]
1 parent ae5df8b commit b241908

File tree

10 files changed

+19
-19
lines changed

10 files changed

+19
-19
lines changed
 

‎RELEASING_RAILS.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ sure the code samples in his book
2525
all work. These are valuable system tests
2626
for Rails. You can check the status of these tests here:
2727

28-
[http://intertwingly.net/projects/dashboard.html](http://intertwingly.net/projects/dashboard.html)
28+
[https://intertwingly.net/projects/dashboard.html](https://intertwingly.net/projects/dashboard.html)
2929

3030
Do not release with Red AWDwR tests.
3131

‎actionpack/lib/action_dispatch/middleware/remote_ip.rb

+3-3
Original file line numberDiff line numberDiff line change
@@ -8,13 +8,13 @@ module ActionDispatch
88
# contain the address, and then picking the last-set address that is not
99
# on the list of trusted IPs. This follows the precedent set by e.g.
1010
# {the Tomcat server}[https://issues.apache.org/bugzilla/show_bug.cgi?id=50453],
11-
# with {reasoning explained at length}[http://blog.gingerlime.com/2012/rails-ip-spoofing-vulnerabilities-and-protection]
11+
# with {reasoning explained at length}[https://blog.gingerlime.com/2012/rails-ip-spoofing-vulnerabilities-and-protection]
1212
# by @gingerlime. A more detailed explanation of the algorithm is given
1313
# at GetIp#calculate_ip.
1414
#
1515
# Some Rack servers concatenate repeated headers, like {HTTP RFC 2616}[https://www.w3.org/Protocols/rfc2616/rfc2616-sec4.html#sec4.2]
1616
# requires. Some Rack servers simply drop preceding headers, and only report
17-
# the value that was {given in the last header}[http://andre.arko.net/2011/12/26/repeated-headers-and-ruby-web-servers].
17+
# the value that was {given in the last header}[https://andre.arko.net/2011/12/26/repeated-headers-and-ruby-web-servers].
1818
# If you are behind multiple proxy servers (like NGINX to HAProxy to Unicorn)
1919
# then you should test your Rack server to make sure your data is good.
2020
#
@@ -102,7 +102,7 @@ def initialize(req, check_ip, proxies)
102102
# proxies, that header may contain a list of IPs. Other proxy services
103103
# set the Client-Ip header instead, so we check that too.
104104
#
105-
# As discussed in {this post about Rails IP Spoofing}[http://blog.gingerlime.com/2012/rails-ip-spoofing-vulnerabilities-and-protection/],
105+
# As discussed in {this post about Rails IP Spoofing}[https://blog.gingerlime.com/2012/rails-ip-spoofing-vulnerabilities-and-protection/],
106106
# while the first IP in the list is likely to be the "originating" IP,
107107
# it could also have been set by the client maliciously.
108108
#

‎actionpack/lib/action_dispatch/routing/mapper.rb

+1-1
Original file line numberDiff line numberDiff line change
@@ -2078,7 +2078,7 @@ module CustomUrls
20782078
# of routing helpers, e.g:
20792079
#
20802080
# direct :homepage do
2081-
# "http://www.rubyonrails.org"
2081+
# "https://rubyonrails.org"
20822082
# end
20832083
#
20842084
# direct :commentable do |model|

‎actionview/test/ujs/public/test/call-remote.js

+1-1
Original file line numberDiff line numberDiff line change
@@ -223,7 +223,7 @@ asyncTest('allow empty form "action"', 1, function() {
223223

224224
// Actual location (strip out settings.data that jQuery serializes and appends)
225225
// HACK: can no longer use settings.data below to see what was appended to URL, as of
226-
// jQuery 1.6.3 (see http://bugs.jquery.com/ticket/10202 and https://github.com/jquery/jquery/pull/544)
226+
// jQuery 1.6.3 (see https://bugs.jquery.com/ticket/10202 and https://github.com/jquery/jquery/pull/544)
227227
ajaxLocation = settings.url.replace('user_name=john', '').replace(/&$/, '').replace(/\?$/, '')
228228
equal(ajaxLocation.match(/^(.*)/)[1], currentLocation, 'URL should be current page by default')
229229

‎activesupport/lib/active_support/duration.rb

+2-2
Original file line numberDiff line numberDiff line change
@@ -341,8 +341,8 @@ def to_s
341341
# 1.year.to_i # => 31556952
342342
#
343343
# In such cases, Ruby's core
344-
# Date[http://ruby-doc.org/stdlib/libdoc/date/rdoc/Date.html] and
345-
# Time[http://ruby-doc.org/stdlib/libdoc/time/rdoc/Time.html] should be used for precision
344+
# Date[https://ruby-doc.org/stdlib/libdoc/date/rdoc/Date.html] and
345+
# Time[https://ruby-doc.org/stdlib/libdoc/time/rdoc/Time.html] should be used for precision
346346
# date and time arithmetic.
347347
def to_i
348348
@value.to_i

‎activesupport/lib/active_support/ordered_hash.rb

+1-1
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ module ActiveSupport
1616
# oh.keys # => [:a, :b], this order is guaranteed
1717
#
1818
# Also, maps the +omap+ feature for YAML files
19-
# (See http://yaml.org/type/omap.html) to support ordered items
19+
# (See https://yaml.org/type/omap.html) to support ordered items
2020
# when loading from yaml.
2121
#
2222
# <tt>ActiveSupport::OrderedHash</tt> is namespaced to prevent conflicts

‎guides/source/generators.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ class InitializerGenerator < Rails::Generators::Base
5050
end
5151
```
5252

53-
NOTE: `create_file` is a method provided by `Thor::Actions`. Documentation for `create_file` and other Thor methods can be found in [Thor's documentation](http://rdoc.info/github/erikhuda/thor/master/Thor/Actions.html)
53+
NOTE: `create_file` is a method provided by `Thor::Actions`. Documentation for `create_file` and other Thor methods can be found in [Thor's documentation](https://rdoc.info/github/erikhuda/thor/master/Thor/Actions.html)
5454

5555
Our new generator is quite simple: it inherits from `Rails::Generators::Base` and has one method definition. When a generator is invoked, each public method in the generator is executed sequentially in the order that it is defined. Finally, we invoke the `create_file` method that will create a file at the given destination with the given content. If you are familiar with the Rails Application Templates API, you'll feel right at home with the new generators API.
5656

@@ -464,7 +464,7 @@ Whilst the final section of this guide doesn't cover how to generate the most aw
464464
465465
Adding Command Line Arguments
466466
-----------------------------
467-
Rails generators can be easily modified to accept custom command line arguments. This functionality comes from [Thor](http://www.rubydoc.info/github/erikhuda/thor/master/Thor/Base/ClassMethods#class_option-instance_method):
467+
Rails generators can be easily modified to accept custom command line arguments. This functionality comes from [Thor](https://www.rubydoc.info/github/erikhuda/thor/master/Thor/Base/ClassMethods#class_option-instance_method):
468468
469469
```
470470
class_option :scope, type: :string, default: 'read_products'
@@ -487,7 +487,7 @@ Generator methods
487487
488488
The following are methods available for both generators and templates for Rails.
489489
490-
NOTE: Methods provided by Thor are not covered this guide and can be found in [Thor's documentation](http://rdoc.info/github/erikhuda/thor/master/Thor/Actions.html)
490+
NOTE: Methods provided by Thor are not covered this guide and can be found in [Thor's documentation](https://rdoc.info/github/erikhuda/thor/master/Thor/Actions.html)
491491
492492
### `gem`
493493

‎guides/source/maintenance_policy.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ follows, all versions in `X.Y.Z` format.
99

1010
--------------------------------------------------------------------------------
1111

12-
Rails follows a shifted version of [semver](http://semver.org/):
12+
Rails follows a shifted version of [semver](https://semver.org/):
1313

1414
**Patch `Z`**
1515

‎guides/source/plugins.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -480,5 +480,5 @@ $ bundle exec rake rdoc
480480
### References
481481

482482
* [Developing a RubyGem using Bundler](https://github.com/radar/guides/blob/master/gem-development.md)
483-
* [Using .gemspecs as Intended](http://yehudakatz.com/2010/04/02/using-gemspecs-as-intended/)
483+
* [Using .gemspecs as Intended](https://yehudakatz.com/2010/04/02/using-gemspecs-as-intended/)
484484
* [Gemspec Reference](https://guides.rubygems.org/specification-reference/)

‎guides/source/security.md

+5-5
Original file line numberDiff line numberDiff line change
@@ -493,7 +493,7 @@ However, the attacker may also take over the account by changing the e-mail addr
493493

494494
#### Other
495495

496-
Depending on your web application, there may be more ways to hijack the user's account. In many cases CSRF and XSS will help to do so. For example, as in a CSRF vulnerability in [Google Mail](http://www.gnucitizen.org/blog/google-gmail-e-mail-hijack-technique/). In this proof-of-concept attack, the victim would have been lured to a web site controlled by the attacker. On that site is a crafted IMG-tag which results in an HTTP GET request that changes the filter settings of Google Mail. If the victim was logged in to Google Mail, the attacker would change the filters to forward all e-mails to their e-mail address. This is nearly as harmful as hijacking the entire account. As a countermeasure, _review your application logic and eliminate all XSS and CSRF vulnerabilities_.
496+
Depending on your web application, there may be more ways to hijack the user's account. In many cases CSRF and XSS will help to do so. For example, as in a CSRF vulnerability in [Google Mail](https://www.gnucitizen.org/blog/google-gmail-e-mail-hijack-technique/). In this proof-of-concept attack, the victim would have been lured to a web site controlled by the attacker. On that site is a crafted IMG-tag which results in an HTTP GET request that changes the filter settings of Google Mail. If the victim was logged in to Google Mail, the attacker would change the filters to forward all e-mails to their e-mail address. This is nearly as harmful as hijacking the entire account. As a countermeasure, _review your application logic and eliminate all XSS and CSRF vulnerabilities_.
497497

498498
### CAPTCHAs
499499

@@ -516,7 +516,7 @@ Here are some ideas how to hide honeypot fields by JavaScript and/or CSS:
516516

517517
The most simple negative CAPTCHA is one hidden honeypot field. On the server side, you will check the value of the field: If it contains any text, it must be a bot. Then, you can either ignore the post or return a positive result, but not saving the post to the database. This way the bot will be satisfied and moves on.
518518

519-
You can find more sophisticated negative CAPTCHAs in Ned Batchelder's [blog post](http://nedbatchelder.com/text/stopbots.html):
519+
You can find more sophisticated negative CAPTCHAs in Ned Batchelder's [blog post](https://nedbatchelder.com/text/stopbots.html):
520520

521521
* Include a field with the current UTC time-stamp in it and check it on the server. If it is too far in the past, or if it is in the future, the form is invalid.
522522
* Randomize the field names
@@ -758,7 +758,7 @@ With web page defacement an attacker can do a lot of things, for example, presen
758758
<iframe name="StatPage" src="http://58.xx.xxx.xxx" width=5 height=5 style="display:none"></iframe>
759759
```
760760

761-
This loads arbitrary HTML and/or JavaScript from an external source and embeds it as part of the site. This iframe is taken from an actual attack on legitimate Italian sites using the [Mpack attack framework](http://isc.sans.org/diary.html?storyid=3015). Mpack tries to install malicious software through security holes in the web browser - very successfully, 50% of the attacks succeed.
761+
This loads arbitrary HTML and/or JavaScript from an external source and embeds it as part of the site. This iframe is taken from an actual attack on legitimate Italian sites using the [Mpack attack framework](https://isc.sans.edu/diary/MPack+Analysis/3015). Mpack tries to install malicious software through security holes in the web browser - very successfully, 50% of the attacks succeed.
762762

763763
A more specialized attack could overlap the entire web site or display a login form, which looks the same as the site's original, but transmits the user name and password to the attacker's site. Or it could use CSS and/or JavaScript to hide a legitimate link in the web application, and display another one at its place which redirects to a fake web site.
764764

@@ -819,7 +819,7 @@ The worms exploit a hole in Yahoo's HTML/JavaScript filter, which usually filter
819819

820820
Another proof-of-concept webmail worm is Nduja, a cross-domain worm for four Italian webmail services. Find more details on [Rosario Valotta's paper](http://www.xssed.com/news/37/Nduja_Connection_A_cross_webmail_worm_XWW/). Both webmail worms have the goal to harvest email addresses, something a criminal hacker could make money with.
821821

822-
In December 2006, 34,000 actual user names and passwords were stolen in a [MySpace phishing attack](http://news.netcraft.com/archives/2006/10/27/myspace_accounts_compromised_by_phishers.html). The idea of the attack was to create a profile page named "login_home_index_html", so the URL looked very convincing. Specially-crafted HTML and CSS was used to hide the genuine MySpace content from the page and instead display its own login form.
822+
In December 2006, 34,000 actual user names and passwords were stolen in a [MySpace phishing attack](https://news.netcraft.com/archives/2006/10/27/myspace_accounts_compromised_by_phishers.html). The idea of the attack was to create a profile page named "login_home_index_html", so the URL looked very convincing. Specially-crafted HTML and CSS was used to hide the genuine MySpace content from the page and instead display its own login form.
823823

824824
### CSS Injection
825825

@@ -855,7 +855,7 @@ Another problem for the worm's author was the [CSRF security tokens](#cross-site
855855

856856
In the end, he got a 4 KB worm, which he injected into his profile page.
857857

858-
The [moz-binding](http://www.securiteam.com/securitynews/5LP051FHPE.html) CSS property proved to be another way to introduce JavaScript in CSS in Gecko-based browsers (Firefox, for example).
858+
The [moz-binding](https://www.securiteam.com/securitynews/5LP051FHPE.html) CSS property proved to be another way to introduce JavaScript in CSS in Gecko-based browsers (Firefox, for example).
859859

860860
#### Countermeasures
861861

0 commit comments

Comments
 (0)
Please sign in to comment.