[or-cvs] [https-everywhere/master 255/291] encrypt developer/customer interface for aws.amazon.com (this is NOT a rule to encrypt aws-hosted materials accessed by end-users)
schoen at torproject.org
schoen at torproject.org
Sat Oct 30 00:32:44 UTC 2010
Author: Seth Schoen <schoen at eff.org>
Date: Thu, 21 Oct 2010 15:57:48 -0700
Subject: encrypt developer/customer interface for aws.amazon.com (this is NOT a
Commit: 276a8637a641e506fdf345fb383505ade8b8e5dd
---
src/chrome/content/rules/Amazon.xml | 6 +++++-
1 files changed, 5 insertions(+), 1 deletions(-)
diff --git a/src/chrome/content/rules/Amazon.xml b/src/chrome/content/rules/Amazon.xml
index 9e53565..ece3497 100644
--- a/src/chrome/content/rules/Amazon.xml
+++ b/src/chrome/content/rules/Amazon.xml
@@ -6,7 +6,8 @@
<!-- We totally need to figure out if we can have a blanket redirect
for Amazon Web Services, which are a very popular CDN that appears
- to support HTTPS! -->
+ to support HTTPS! The aws.amazon.com rule below does not do this
+ because it only applies to the developer signup page. -->
<rule from="^http://(www\.)?amazon\.com/" to="https://www.amazon.com/" />
@@ -16,4 +17,7 @@
<rule from="^http://(www\.)?amazon\.(ca|cn|de|fr)/"
to="https://www.amazon.$2/" />
+ <rule from="^http://aws\.amazon\.com/"
+ to="https://aws.amazon.com/" />
+
</ruleset>
--
1.7.1
More information about the tor-commits
mailing list