Skip to content

Commit 7f11575

Browse files
committed
Merge pull request #484 from fmarier/sri-issue440
SRI: fix broken links in the spec and upgrade them to HTTPS (fixes #440)
2 parents be4aeaa + 7e8c487 commit 7f11575

File tree

1 file changed

+17
-17
lines changed

1 file changed

+17
-17
lines changed

specs/subresourceintegrity/spec.markdown

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -54,8 +54,8 @@ Scripts, of course, are not the only response type which would benefit
5454
from integrity validation. The scheme specified here also applies to `link`
5555
and future versions of the specification are likely to expand this coverage.
5656

57-
[HSTS]: http://tools.ietf.org/html/rfc6797
58-
[pinned public keys]: http://tools.ietf.org/html/draft-ietf-websec-key-pinning
57+
[HSTS]: https://tools.ietf.org/html/rfc6797
58+
[pinned public keys]: https://tools.ietf.org/html/rfc7469
5959

6060
<section>
6161
### Goals
@@ -127,11 +127,11 @@ The term <dfn>origin</dfn> is defined in the Origin specification.
127127
[[!RFC6454]]
128128

129129
The terms <dfn>secure document</dfn> and
130-
<dfn>secure context</dfn> are defined in [section 2 of the Secure
130+
<dfn>secure context</dfn> are defined in section 2 of the [Secure
131131
Contexts][securecontext] specification. An example of a secure document is a
132132
document loaded over HTTPS. A counterexample is a document loaded over HTTP.
133133

134-
[securecontext]: https://w3c.github.io/webappsec/specs/powerfulfeatures/#terms
134+
[securecontext]: http://www.w3.org/TR/powerful-features/
135135
[secure context]: #dfn-secure-context
136136
[secure document]: #dfn-secure-document
137137

@@ -145,17 +145,17 @@ is an origin whose scheme component is <code>HTTPS</code>.
145145
The <dfn>message body</dfn> and the <dfn>transfer encoding</dfn> of a resource
146146
are defined by [RFC7230, section 3][messagebody]. [[!RFC7230]]
147147

148-
[messagebody]: http://tools.ietf.org/html/rfc7230#section-3
148+
[messagebody]: https://tools.ietf.org/html/rfc7230#section-3
149149

150150
The <dfn>representation data</dfn> and <dfn>content encoding</dfn> of a resource
151151
are defined by [RFC7231, section 3][representationdata]. [[!RFC7231]]
152152

153-
[representationdata]: http://tools.ietf.org/html/rfc7231#section-3
153+
[representationdata]: https://tools.ietf.org/html/rfc7231#section-3
154154

155155
A <dfn>base64 encoding</dfn> is defined in [RFC 4648, section 4][base64].
156156
[[!RFC4648]]
157157

158-
[base64]: http://tools.ietf.org/html/rfc4648#section-4
158+
[base64]: https://tools.ietf.org/html/rfc4648#section-4
159159

160160
The <dfn>SHA-256</dfn>, <dfn>SHA-384</dfn>, and <dfn>SHA-512</dfn> are part
161161
of the <dfn>SHA-2</dfn> set of cryptographic hash functions defined by the
@@ -223,8 +223,8 @@ result of the following command line:
223223

224224
echo -n "alert('Hello, world.');" | openssl dgst -sha256 -binary | openssl enc -base64 -A
225225

226-
[csp2-section42]: http://www.w3.org/TR/CSP11/#source-list-syntax
227-
[openssl]: http://www.openssl.org/
226+
[csp2-section42]: http://www.w3.org/TR/CSP2/#source-list-syntax
227+
[openssl]: https://www.openssl.org/
228228
</div>
229229

230230
[sha2]: #dfn-sha-2
@@ -341,8 +341,8 @@ only deliver integrity metadata on a [potentially secure origin][]. See
341341

342342
{:.note}
343343

344-
[uri-origin]: http://tools.ietf.org/html/rfc6454#section-4
345-
[Non-secure contexts remain non-secure]: #non-secure-contexts-remain-non-secure-1
344+
[uri-origin]: https://tools.ietf.org/html/rfc6454#section-4
345+
[Non-secure contexts remain non-secure]: #non-secure-contexts-remain-non-secure
346346

347347
The following algorithm details these restrictions:
348348

@@ -359,8 +359,8 @@ fetch failed the CORS checks, it won't be available to us for integrity
359359
checking because it won't have loaded successfully.
360360
{:.note}
361361

362-
[fetch-mode]: http://fetch.spec.whatwg.org/#concept-request-mode
363-
[fetch-origin]: http://fetch.spec.whatwg.org/#concept-request-origin
362+
[fetch-mode]: https://fetch.spec.whatwg.org/#concept-request-mode
363+
[fetch-origin]: https://fetch.spec.whatwg.org/#concept-request-origin
364364
</section><!-- Algorithms::eligible -->
365365
<section>
366366
#### Parse <var>metadata</var>.
@@ -450,7 +450,7 @@ SHA256 hash value.
450450
User agents may allow users to modify the result of this algorithm via user
451451
preferences, bookmarklets, third-party additions to the user agent, and other
452452
such mechanisms. For example, redirects generated by an extension like
453-
[HTTPSEverywhere](https://www.eff.org/https-everywhere) could load and execute
453+
[HTTPS Everywhere](https://www.eff.org/https-everywhere) could load and execute
454454
correctly, even if the HTTPS version of a resource differs from the HTTP
455455
version.
456456
{:.note}
@@ -668,8 +668,8 @@ To help inform intermediate servers, those serving the resources SHOULD
668668
send along with the resource a [`Cache-Control`][cachecontrol] header
669669
with a value of [`no-transform`][notransform].
670670

671-
[cachecontrol]: http://tools.ietf.org/html/rfc7234#section-5.2
672-
[notransform]: http://tools.ietf.org/html/rfc7234#section-5.2.1.6
671+
[cachecontrol]: https://tools.ietf.org/html/rfc7234#section-5.2
672+
[notransform]: https://tools.ietf.org/html/rfc7234#section-5.2.1.6
673673

674674
</section><!-- /Implementation -->
675675

@@ -693,7 +693,7 @@ algorithms as defined in [section 5 of the Mixed
693693
Content][mixedcontent-algorithms]
694694
specification.
695695

696-
[Securing the Web]: https://w3ctag.github.io/web-https/
696+
[Securing the Web]: http://www.w3.org/2001/tag/doc/web-https
697697
[mixedcontent-algorithms]: http://www.w3.org/TR/mixed-content/#algorithms
698698
</section><!-- /Security::Non-secure contexts remain non-secure -->
699699

0 commit comments

Comments
 (0)