diff options
author | Bruno Haible <bruno@clisp.org> | 2017-09-14 00:35:56 +0200 |
---|---|---|
committer | Bruno Haible <bruno@clisp.org> | 2017-09-14 00:35:56 +0200 |
commit | 03eac9d394567d707a74826dfc9c305555946597 (patch) | |
tree | df5743f58e2f39dd8ad3b30da118b3afad285c9e /top | |
parent | b7773f3f796588544f36b45be274f42b36b42149 (diff) | |
download | gnulib-03eac9d394567d707a74826dfc9c305555946597.tar.gz |
all: Replace many more http URLs by https URLs. Update stale URLs.
* users.txt: Remove mention of 'newts'.
* lib/localename.c: Update comment about LANG_SOTHO.
Diffstat (limited to 'top')
-rw-r--r-- | top/README-release | 2 | ||||
-rw-r--r-- | top/maint.mk | 8 |
2 files changed, 5 insertions, 5 deletions
diff --git a/top/README-release b/top/README-release index b3654d2d72..a173203a1f 100644 --- a/top/README-release +++ b/top/README-release @@ -21,7 +21,7 @@ Here are most of the steps we (maintainers) follow when making a release. * Check that the NixOS/Hydra autobuilder is reporting all is well: - http://hydra.nixos.org/jobset/gnu/@PACKAGE@-master + https://hydra.nixos.org/project/gnu/@PACKAGE@-master * Run the following command to download any new translations: diff --git a/top/maint.mk b/top/maint.mk index 339681aede..c462d24608 100644 --- a/top/maint.mk +++ b/top/maint.mk @@ -871,7 +871,7 @@ sc_GFDL_version: $(_sc_search_regexp) # Don't use Texinfo's @acronym{}. -# http://lists.gnu.org/archive/html/bug-gnulib/2010-03/msg00321.html +# https://lists.gnu.org/archive/html/bug-gnulib/2010-03/msg00321.html texinfo_suffix_re_ ?= \.(txi|texi(nfo)?)$$ sc_texinfo_acronym: @prohibit='@acronym\{' \ @@ -1269,7 +1269,7 @@ sc_vulnerable_makefile_CVE-2009-4029: halt=$$(printf '%s\n' \ 'the above files are vulnerable; beware of running' \ ' "make dist*" rules, and upgrade to fixed automake' \ - ' see http://bugzilla.redhat.com/542609 for details') \ + ' see https://bugzilla.redhat.com/show_bug.cgi?id=542609 for details') \ $(_sc_search_regexp) sc_vulnerable_makefile_CVE-2012-3386: @@ -1278,7 +1278,7 @@ sc_vulnerable_makefile_CVE-2012-3386: halt=$$(printf '%s\n' \ 'the above files are vulnerable; beware of running' \ ' "make distcheck", and upgrade to fixed automake' \ - ' see http://bugzilla.redhat.com/CVE-2012-3386 for details') \ + ' see https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-3386 for details') \ $(_sc_search_regexp) vc-diff-check: @@ -1535,7 +1535,7 @@ refresh-gnulib-patches: # Update gettext files. PACKAGE ?= $(shell basename $(PWD)) PO_DOMAIN ?= $(PACKAGE) -POURL = http://translationproject.org/latest/$(PO_DOMAIN)/ +POURL = https://translationproject.org/latest/$(PO_DOMAIN)/ PODIR ?= po refresh-po: rm -f $(PODIR)/*.po && \ |