Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp296002ybt; Thu, 9 Jul 2020 23:21:39 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx8eAOrLXCVR9LX8xS1SQVYgIl7hTz20ArlRfTSh7WvV/5zb7TspZfc+6l7rgT5yPYhuRNZ X-Received: by 2002:a17:906:b888:: with SMTP id hb8mr59176376ejb.124.1594362099562; Thu, 09 Jul 2020 23:21:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594362099; cv=none; d=google.com; s=arc-20160816; b=ezK0J3GsBriXRckipta+p9JgDFKTJtJUsa4r3R7U/8g+j8O7meW8Ai/7Ox5nn/YOBB J4TzhMTJiMIhOG/DLZZMtc1U4xWLmAsrVuESFa6cGBXledarPKyI8RNLfPHrSBNIiO/z MygP+CmzZaOTe0KV3fOqXYVoa2R0jfaIDQw8KuuJHAvm0greXswG9jHLEtofxKvBTxKN c95aRjo3aPPA0B2q/82keojO0yeB+nhpRkyFMXmwa3Na7IGBaNtz0l8TLNTeQ+olmZ8w iVKuhInqQYFjqpaXNsVzi9eP3NtvCWMb4Md/84KjdtlfOT86ahBE58qDs99RsgBv1DzP BA/Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=m4R8zpseHorQDQ8u3PUdlUjSyDE/lzco4x5uluWqIhs=; b=Hvd4fZPxJh2zFo/DQSPfE50I/R1nRNmSh308S744FnCuQQ/WTpLpabEFzVki7sbYft Q2kK0bgz30m6w/qNfhPGrwkXYbS3stNlVvOONMkuzY4ViXyyYZB1lYrAluWR4+K+YhFA QCnmJ77F2dtrjXP4ds++vpkKs2swCaLMOCU4KsVQF6EQ+rkjyAg6uZDjlv39mbs5+uMW GbG3dvbCjHkPXd2LLqFk8yRoo+fyxE+1nALOe9cSWV/DvjzELDh+/jU6OAl3SIlnhz8E lLhELTny1k7IAPBYgwK55beIGAUfaPnaNjSPmR/j0IeCBEN+GX0I+RfLK5eAIs8y1+a1 pR5A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id s24si600305ejd.704.2020.07.09.23.21.16; Thu, 09 Jul 2020 23:21:39 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727116AbgGJGU3 (ORCPT + 99 others); Fri, 10 Jul 2020 02:20:29 -0400 Received: from smtp.al2klimov.de ([78.46.175.9]:41122 "EHLO smtp.al2klimov.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725851AbgGJGU3 (ORCPT ); Fri, 10 Jul 2020 02:20:29 -0400 Received: from authenticated-user (PRIMARY_HOSTNAME [PUBLIC_IP]) by smtp.al2klimov.de (Postfix) with ESMTPA id 78888BC0D1; Fri, 10 Jul 2020 06:20:25 +0000 (UTC) From: "Alexander A. Klimov" To: jonas@southpole.se, stefan.kristiansson@saunalahti.fi, shorne@gmail.com, corbet@lwn.net, openrisc@lists.librecores.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org Cc: "Alexander A. Klimov" Subject: [PATCH] OPENRISC ARCHITECTURE: Replace HTTP links with HTTPS ones Date: Fri, 10 Jul 2020 08:20:19 +0200 Message-Id: <20200710062019.28755-1-grandmaster@al2klimov.de> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spamd-Bar: +++++ X-Spam-Level: ***** Authentication-Results: smtp.al2klimov.de; auth=pass smtp.auth=aklimov@al2klimov.de smtp.mailfrom=grandmaster@al2klimov.de Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Rationale: Reduces attack surface on kernel devs opening the links for MITM as HTTPS traffic is much harder to manipulate. Deterministic algorithm: For each file: If not .svg: For each line: If doesn't contain `\bxmlns\b`: For each link, `\bhttp://[^# \t\r\n]*(?:\w|/)`: If neither `\bgnu\.org/license`, nor `\bmozilla\.org/MPL\b`: If both the HTTP and HTTPS versions return 200 OK and serve the same content: Replace HTTP with HTTPS. Signed-off-by: Alexander A. Klimov --- Continuing my work started at 93431e0607e5. See also: git log --oneline '--author=Alexander A. Klimov ' v5.7..master (Actually letting a shell for loop submit all this stuff for me.) If there are any URLs to be removed completely or at least not HTTPSified: Just clearly say so and I'll *undo my change*. See also: https://lkml.org/lkml/2020/6/27/64 If there are any valid, but yet not changed URLs: See: https://lkml.org/lkml/2020/6/26/837 If you apply the patch, please let me know. Documentation/openrisc/openrisc_port.rst | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Documentation/openrisc/openrisc_port.rst b/Documentation/openrisc/openrisc_port.rst index 4b2c437942a0..657ac4af7be6 100644 --- a/Documentation/openrisc/openrisc_port.rst +++ b/Documentation/openrisc/openrisc_port.rst @@ -8,7 +8,7 @@ target architecture, specifically, is the 32-bit OpenRISC 1000 family (or1k). For information about OpenRISC processors and ongoing development: ======= ============================= - website http://openrisc.io + website https://openrisc.io email openrisc@lists.librecores.org ======= ============================= -- 2.27.0