cleanup:
ap_log_rerror(APLOG_MARK, APLOG_TRACE1, rv, r,
- "delay_handler: request cleanup, r->status=%d, aborte=%d",
+ "delay_handler: request cleanup, r->status=%d, aborted=%d",
r->status, c->aborted);
if (rv == APR_SUCCESS
|| r->status != HTTP_OK
assert log_h2_full['bytes_rx_I'] > 0
assert log_h2_full['bytes_resp_B'] == full_length
assert log_h2_full['bytes_tx_O'] > full_length
- assert log_h1['bytes_rx_I'] > 0 # input bytes recieved
+ assert log_h1['bytes_rx_I'] > 0 # input bytes received
assert log_h1['bytes_resp_B'] == chunk # response bytes sent (payload)
assert log_h1['bytes_tx_O'] > chunk # output bytes sent
assert log_h2['bytes_rx_I'] > 0
assert 1 == len(promises)
assert '/006/006.js' == promises[0]["request"]["header"][":path"]
- # 2 Links, only one with correct rel attribue
+ # 2 Links, only one with correct rel attribute
def test_h2_400_03(self, env):
url = env.mkurl("https", "push", "/006-push3.html")
r = env.nghttp().get(url)
# setup: drive it
r = env.a2md(["-v", "drive", name])
- assert r.exit_code == 0, "drive not successfull: {0}".format(r.stderr)
+ assert r.exit_code == 0, "drive not successful: {0}".format(r.stderr)
assert env.a2md(["list", name]).json['output'][0]['state'] == env.MD_S_COMPLETE
# remove one domain -> status stays COMPLETE
-# test wildcard certifcates
+# test wildcard certificates
import os
import pytest
# use a curve unsupported by LE
# only works with mod_ssl as rustls refuses to load such a weak key
@pytest.mark.skipif(MDTestEnv.get_ssl_module() != "mod_ssl", reason="only for mod_ssl")
- @pytest.mark.skipif(MDTestEnv.get_acme_server() != 'boulder', reason="onyl boulder rejects this")
+ @pytest.mark.skipif(MDTestEnv.get_acme_server() != 'boulder', reason="only boulder rejects this")
def test_md_810_004(self, env):
domain = self.test_domain
# generate config with one MD
conf.install()
assert env.apache_restart() == 0
assert env.await_completion([domain], restart=False)
- # In the stats JSON, we excpect 2 certificates under 'renewal'
+ # In the stats JSON, we expect 2 certificates under 'renewal'
stat = env.get_md_status(domain)
assert 'renewal' in stat
assert 'cert' in stat['renewal']
assert 'rsa' in stat['renewal']['cert']
assert 'secp256r1' in stat['renewal']['cert']
- # In /.httpd/certificate-status 'renewal' we excpect 2 certificates
+ # In /.httpd/certificate-status 'renewal' we expect 2 certificates
status = env.get_certificate_status(domain)
assert 'renewal' in status
assert 'cert' in status['renewal']
assert r.exit_code != 0
def test_03_sni_request_other_same_config(self, env):
- # do we see the first vhost respone for another domain with different certs?
+ # do we see the first vhost response for another domain with different certs?
r = env.tls_get(env.domain_a, "/index.json", options=[
"-vvvv", "--header", "Host: {0}".format(env.domain_b)
])
if env.curl_supports_tls_1_3():
# can't do this test then
return
- # do we see the first vhost respone for an unknown domain?
+ # do we see the first vhost response for an unknown domain?
conf = TlsTestConf(env=env, extras={
env.domain_a: "TLSProtocol TLSv1.2+",
env.domain_b: "TLSProtocol TLSv1.3+"
env.apache_restart()
def test_06_ciphers_pref_unsupported(self, env):
- # a warning on prefering a known, but not supported cipher
+ # a warning on preferring a known, but not supported cipher
env.httpd_error_log.ignore_recent()
conf = TlsTestConf(env=env, extras={
env.domain_b: "TLSCiphersPrefer TLS_NULL_WITH_NULL_NULL"