Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

add fundamental redirects for /en-US/Security/CSP #3200

Merged

Conversation

peterbe
Copy link
Contributor

@peterbe peterbe commented Mar 11, 2021

Fixes #3199

I didn't test it but it looks sufficiently safe.

@peterbe peterbe requested a review from escattone March 11, 2021 16:50
libs/fundamental-redirects/index.js Outdated Show resolved Hide resolved
Co-authored-by: Ryan Johnson <escattone@gmail.com>
@peterbe
Copy link
Contributor Author

peterbe commented Mar 11, 2021

This is why PR review is so important! Sorry. I must have rushed it.

@peterbe peterbe requested a review from escattone March 11, 2021 20:24
Copy link
Contributor

@escattone escattone left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@peterbe I forgot one thing. Let's add this to the integration tests as well, so add:

    url_test("/en-US/Security", "/en-US/docs/Security"),
    url_test("/en-US/Security/", "/en-US/docs/Security"),
    url_test("/en-US/Security/CSP/", "/en-US/docs/Security/CSP"),

immediately after this line:

url_test("/en-US/XMLHttpRequest/FormData/", "/en-US/docs/XMLHttpRequest/FormData"),

and we're good to go!

@peterbe peterbe requested a review from escattone March 11, 2021 20:53
Copy link
Contributor

@escattone escattone left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks @peterbe!

@escattone escattone merged commit 6d3e84d into mdn:main Mar 11, 2021
@peterbe peterbe deleted the 3199-add-fundamental-redirects-for-en-ussecuritycsp branch March 11, 2021 20:57
wbamberg pushed a commit to wbamberg/yari that referenced this pull request Mar 15, 2021
* upstream/main: (164 commits)
  skip empty srcs for safe iframe srcs (mdn#3216)
  correct code comment (mdn#3223)
  build(deps): bump ahmadnassri/action-dependabot-auto-merge (mdn#3197)
  build(deps-dev): bump @types/react-dom from 17.0.1 to 17.0.2 (mdn#3164)
  create a whatsdeployed.json for translated-content too (mdn#3221)
  avoid double-slash redirects (mdn#3222)
  build(deps): bump image-size from 0.9.4 to 0.9.5 (mdn#3214)
  build(deps): bump boto3 from 1.17.22 to 1.17.26 in /deployer (mdn#3212)
  Fix our auto-merge workflow (mdn#3218)
  build(deps-dev): bump ts-loader from 8.0.17 to 8.0.18 (mdn#3208)
  disable lighthouse PR check unless relevant changes (mdn#3203)
  hide toolbar for frozen locales (mdn#3213)
  build(deps): bump is-svg from 4.2.1 to 4.2.2 (mdn#3209)
  build(deps): bump @mdn/browser-compat-data from 3.1.3 to 3.2.0 (mdn#3210)
  downloading external images for translated-content (mdn#3207)
  add active locales (mdn#3201)
  add tool command for rendering/removing macros (mdn#2955)
  unsafe html should be a breaking flaw (mdn#3192)
  open editor for translated content (mdn#3196)
  add fundamental redirects for /en-US/Security/CSP (mdn#3200)
  ...
peterbe added a commit to peterbe/yari that referenced this pull request Jun 1, 2021
* add fundamental redirects for /en-US/Security/CSP

Fixes mdn#3199

* Update libs/fundamental-redirects/index.js

Co-authored-by: Ryan Johnson <escattone@gmail.com>

* feedbacked

Co-authored-by: Ryan Johnson <escattone@gmail.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

9k 404s on /en-US/Security/CSP in the last 3 weeks
2 participants