summaryrefslogtreecommitdiff
path: root/docs/ref/middleware.txt
diff options
context:
space:
mode:
authorClaude Paroz <claude@2xlibre.net>2015-08-08 12:02:32 +0200
committerClaude Paroz <claude@2xlibre.net>2015-08-08 12:02:32 +0200
commit64982cc2fb13ebc45982c64e25fdb7865e6d2499 (patch)
tree06e65f4201fc67665773350457dfa8ee681b22b5 /docs/ref/middleware.txt
parent18f3d4c1bdb4039b13e0b9445553561651dbfa8f (diff)
Updated Wikipedia links to use https
Diffstat (limited to 'docs/ref/middleware.txt')
-rw-r--r--docs/ref/middleware.txt4
1 files changed, 2 insertions, 2 deletions
diff --git a/docs/ref/middleware.txt b/docs/ref/middleware.txt
index 258b61eafc..2adcc0a600 100644
--- a/docs/ref/middleware.txt
+++ b/docs/ref/middleware.txt
@@ -239,7 +239,7 @@ be vulnerable via an insecure connection to a subdomain.
it may be because Django doesn't realize that it's on a secure connection;
you may need to set the :setting:`SECURE_PROXY_SSL_HEADER` setting.
-.. _"Strict-Transport-Security" header: http://en.wikipedia.org/wiki/Strict_Transport_Security
+.. _"Strict-Transport-Security" header: https://en.wikipedia.org/wiki/Strict_Transport_Security
.. _x-content-type-options:
@@ -298,7 +298,7 @@ header. ``SecurityMiddleware`` will do this for all responses if the
browsers support the header. Ensure you are still :ref:`validating and
sanitizing <cross-site-scripting>` all input to prevent XSS attacks.
-.. _XSS attack: http://en.wikipedia.org/wiki/Cross-site_scripting
+.. _XSS attack: https://en.wikipedia.org/wiki/Cross-site_scripting
.. _X-XSS-Protection header: http://blogs.msdn.com/b/ie/archive/2008/07/02/ie8-security-part-iv-the-xss-filter.aspx
.. _ssl-redirect: