


javascript - How to deal with link problems after the website is changed to https?
The website did not have the https protocol enabled before.
All links are absolute links, almost no relative links.
The current situation is that after turning on https, all absolute links and images become invalid. Since the website has many pages, is there any way to change the links in batches?
Reply content:
The website did not have the https protocol enabled before.
All links are absolute links, almost no relative links.
The current situation is that after turning on https, all absolute links and images become invalid. Since the website has many pages, is there any way to change the links in batches?
Directly use the WEB
server for permanent redirection, NGINX
as an example
<code>server{ listen 80; server_name test.com; #告诉浏览器2年有效期内只准用 https 访问 add_header Strict-Transport-Security "max-age=63072000; includeSubdomains; preload"; #永久重定向到 https 站点 return 301 https://$server_name$request_uri; }</code>
If you really don’t have permission to set the configuration, then write a script to replace it in batches, or download the code to the local, and then use IDE to replace it in batches. Please make a backup before modifying
Scripts with similar functions
<code>sed -i "s/http:\/\/www.old.com/https:\/\/www.old.com/g" `grep http://www.old.com -rl /path/to/project`</code>
https://imququ.com/post/sth-a...
In the process of migrating a long-established website to HTTPS, the workload is often very huge. Especially in the step of replacing all resources with HTTPS, it is easy to make omissions. Even if all the code confirms that there are no problems, it is possible that there are still HTTP links in some of the fields read from the database.
With the upgrade-insecure-requests CSP directive, the browser can help with this conversion. After enabling this policy, there are two changes:
All HTTP resources on the page will be replaced with HTTPS addresses before making requests;
All on-site links on the page will be replaced with HTTPS addresses before jumping after being clicked;
With all other CSP rules Similarly, there are two ways to enable this command. Please refer to the previous section for the specific format. It should be noted that upgrade-insecure-requests only replaces the protocol part, so it is only applicable to scenarios where the HTTP/HTTPS domain name and path are exactly the same.
General compilation software has a one-click replacement function.
Rewriting the url should work
Your website won’t be a fully static page, right? If not, then change the template. Also, the URL is usually generated through a specified function. Just change the function. If the image path is in the database, just replace it in batches. For the page image file, change the template. That’ll be fine
Now you know the importance of packaging
403 jump;

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics











AI can help optimize the use of Composer. Specific methods include: 1. Dependency management optimization: AI analyzes dependencies, recommends the best version combination, and reduces conflicts. 2. Automated code generation: AI generates composer.json files that conform to best practices. 3. Improve code quality: AI detects potential problems, provides optimization suggestions, and improves code quality. These methods are implemented through machine learning and natural language processing technologies to help developers improve efficiency and code quality.

DMA in C refers to DirectMemoryAccess, a direct memory access technology, allowing hardware devices to directly transmit data to memory without CPU intervention. 1) DMA operation is highly dependent on hardware devices and drivers, and the implementation method varies from system to system. 2) Direct access to memory may bring security risks, and the correctness and security of the code must be ensured. 3) DMA can improve performance, but improper use may lead to degradation of system performance. Through practice and learning, we can master the skills of using DMA and maximize its effectiveness in scenarios such as high-speed data transmission and real-time signal processing.

Handling high DPI display in C can be achieved through the following steps: 1) Understand DPI and scaling, use the operating system API to obtain DPI information and adjust the graphics output; 2) Handle cross-platform compatibility, use cross-platform graphics libraries such as SDL or Qt; 3) Perform performance optimization, improve performance through cache, hardware acceleration, and dynamic adjustment of the details level; 4) Solve common problems, such as blurred text and interface elements are too small, and solve by correctly applying DPI scaling.

session_start()iscrucialinPHPformanagingusersessions.1)Itinitiatesanewsessionifnoneexists,2)resumesanexistingsession,and3)setsasessioncookieforcontinuityacrossrequests,enablingapplicationslikeuserauthenticationandpersonalizedcontent.

macOS and Linux have their own advantages in compatibility and user experience. macOS has excellent compatibility within the Apple ecosystem, and the user experience is simple and intuitive; Linux has outstanding hardware compatibility and software flexibility. The user experience varies from distribution to distribution, emphasizing personalization and control.

To safely and thoroughly uninstall MySQL and clean all residual files, follow the following steps: 1. Stop MySQL service; 2. Uninstall MySQL packages; 3. Clean configuration files and data directories; 4. Verify that the uninstallation is thorough.

How to achieve the effect of mouse scrolling event penetration? When we browse the web, we often encounter some special interaction designs. For example, on deepseek official website, �...

MySQL functions can be used for data processing and calculation. 1. Basic usage includes string processing, date calculation and mathematical operations. 2. Advanced usage involves combining multiple functions to implement complex operations. 3. Performance optimization requires avoiding the use of functions in the WHERE clause and using GROUPBY and temporary tables.
