diff options
| author | Claude Paroz <claude@2xlibre.net> | 2015-08-08 12:02:32 +0200 |
|---|---|---|
| committer | Claude Paroz <claude@2xlibre.net> | 2015-08-08 12:02:32 +0200 |
| commit | 64982cc2fb13ebc45982c64e25fdb7865e6d2499 (patch) | |
| tree | 06e65f4201fc67665773350457dfa8ee681b22b5 /docs/ref/middleware.txt | |
| parent | 18f3d4c1bdb4039b13e0b9445553561651dbfa8f (diff) | |
Updated Wikipedia links to use https
Diffstat (limited to 'docs/ref/middleware.txt')
| -rw-r--r-- | docs/ref/middleware.txt | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/docs/ref/middleware.txt b/docs/ref/middleware.txt index 258b61eafc..2adcc0a600 100644 --- a/docs/ref/middleware.txt +++ b/docs/ref/middleware.txt @@ -239,7 +239,7 @@ be vulnerable via an insecure connection to a subdomain. it may be because Django doesn't realize that it's on a secure connection; you may need to set the :setting:`SECURE_PROXY_SSL_HEADER` setting. -.. _"Strict-Transport-Security" header: http://en.wikipedia.org/wiki/Strict_Transport_Security +.. _"Strict-Transport-Security" header: https://en.wikipedia.org/wiki/Strict_Transport_Security .. _x-content-type-options: @@ -298,7 +298,7 @@ header. ``SecurityMiddleware`` will do this for all responses if the browsers support the header. Ensure you are still :ref:`validating and sanitizing <cross-site-scripting>` all input to prevent XSS attacks. -.. _XSS attack: http://en.wikipedia.org/wiki/Cross-site_scripting +.. _XSS attack: https://en.wikipedia.org/wiki/Cross-site_scripting .. _X-XSS-Protection header: http://blogs.msdn.com/b/ie/archive/2008/07/02/ie8-security-part-iv-the-xss-filter.aspx .. _ssl-redirect: |
