[or-cvs] [https-everywhere/master 255/291] encrypt developer/customer interface for aws.amazon.com (this is NOT a rule to encrypt aws-hosted materials accessed by end-users)

schoen at torproject.org schoen at torproject.org
Sat Oct 30 00:32:44 UTC 2010


Author: Seth Schoen <schoen at eff.org>
Date: Thu, 21 Oct 2010 15:57:48 -0700
Subject: encrypt developer/customer interface for aws.amazon.com (this is NOT a
Commit: 276a8637a641e506fdf345fb383505ade8b8e5dd

---
 src/chrome/content/rules/Amazon.xml |    6 +++++-
 1 files changed, 5 insertions(+), 1 deletions(-)

diff --git a/src/chrome/content/rules/Amazon.xml b/src/chrome/content/rules/Amazon.xml
index 9e53565..ece3497 100644
--- a/src/chrome/content/rules/Amazon.xml
+++ b/src/chrome/content/rules/Amazon.xml
@@ -6,7 +6,8 @@
 
   <!-- We totally need to figure out if we can have a blanket redirect
   for Amazon Web Services, which are a very popular CDN that appears
-  to support HTTPS! -->
+  to support HTTPS!  The aws.amazon.com rule below does not do this
+  because it only applies to the developer signup page. -->
 
   <rule from="^http://(www\.)?amazon\.com/" to="https://www.amazon.com/" />
 
@@ -16,4 +17,7 @@
   <rule from="^http://(www\.)?amazon\.(ca|cn|de|fr)/" 
           to="https://www.amazon.$2/" />  
 
+  <rule from="^http://aws\.amazon\.com/"
+          to="https://aws.amazon.com/" />
+
 </ruleset>
-- 
1.7.1




More information about the tor-commits mailing list