Skip to content

Commit 991beab

Browse files
Fix broken Markdown links [ci-skip]
Follow-up to rails#50879.
1 parent 5884388 commit 991beab

File tree

2 files changed

+6
-8
lines changed

2 files changed

+6
-8
lines changed

actionpack/lib/action_controller/metal/conditional_get.rb

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -76,8 +76,7 @@ def etag(&etagger)
7676
# `:cache_control`
7777
# : When given, will overwrite an existing `Cache-Control` header. For a list
7878
# of `Cache-Control` directives, see the [article on
79-
# MDN](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Cache-Contr
80-
# ol).
79+
# MDN](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Cache-Control).
8180
#
8281
# `:template`
8382
# : By default, the template digest for the current controller/action is

actionpack/lib/action_dispatch/middleware/remote_ip.rb

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -18,8 +18,8 @@ module ActionDispatch
1818
# 2616](https://www.w3.org/Protocols/rfc2616/rfc2616-sec4.html#sec4.2) requires.
1919
# Some Rack servers simply drop preceding headers, and only report the value
2020
# that was [given in the last
21-
# header](https://andre.arko.net/2011/12/26/repeated-headers-and-ruby-web-server
22-
# s). If you are behind multiple proxy servers (like NGINX to HAProxy to
21+
# header](https://andre.arko.net/2011/12/26/repeated-headers-and-ruby-web-servers).
22+
# If you are behind multiple proxy servers (like NGINX to HAProxy to
2323
# Unicorn) then you should test your Rack server to make sure your data is good.
2424
#
2525
# IF YOU DON'T USE A PROXY, THIS MAKES YOU VULNERABLE TO IP SPOOFING. This
@@ -117,10 +117,9 @@ def initialize(req, check_ip, proxies)
117117
# instead, so we check that too.
118118
#
119119
# As discussed in [this post about Rails IP
120-
# Spoofing](https://web.archive.org/web/20170626095448/https://blog.gingerlime.c
121-
# om/2012/rails-ip-spoofing-vulnerabilities-and-protection/), while the first IP
122-
# in the list is likely to be the "originating" IP, it could also have been set
123-
# by the client maliciously.
120+
# Spoofing](https://web.archive.org/web/20170626095448/https://blog.gingerlime.com/2012/rails-ip-spoofing-vulnerabilities-and-protection/),
121+
# while the first IP in the list is likely to be the "originating" IP, it
122+
# could also have been set by the client maliciously.
124123
#
125124
# In order to find the first address that is (probably) accurate, we take the
126125
# list of IPs, remove known and trusted proxies, and then take the last address

0 commit comments

Comments
 (0)