@@ -18,17 +18,18 @@ module ActionDispatch
18
18
# Enabled by default. Configure `config.ssl_options` with `hsts: false` to disable.
19
19
#
20
20
# Set `config.ssl_options` with `hsts: { … }` to configure HSTS:
21
- # * `expires`: How long, in seconds, these settings will stick. Defaults to
22
- # `180.days` (recommended). The minimum required to qualify for browser
23
- # preload lists is `18.weeks` .
21
+ # * `expires`: How long, in seconds, these settings will stick. The minimum
22
+ # required to qualify for browser preload lists is `18.weeks`. Defaults to
23
+ # `180.days` (recommended) .
24
24
# * `subdomains`: Set to `true` to tell the browser to apply these settings
25
25
# to all subdomains. This protects your cookies from interception by a
26
- # vulnerable site on a subdomain. Defaults to `true `.
26
+ # vulnerable site on a subdomain. Defaults to `false `.
27
27
# * `preload`: Advertise that this site may be included in browsers'
28
28
# preloaded HSTS lists. HSTS protects your site on every visit *except the
29
29
# first visit* since it hasn't seen your HSTS header yet. To close this
30
30
# gap, browser vendors include a baked-in list of HSTS-enabled sites.
31
31
# Go to https://hstspreload.appspot.com to submit your site for inclusion.
32
+ # Defaults to `false`.
32
33
#
33
34
# To turn off HSTS, omitting the header is not enough. Browsers will remember the
34
35
# original HSTS directive until it expires. Instead, use the header to tell browsers to
0 commit comments