Spelling fixes
This commit is contained in:
parent
7c624d013e
commit
5f7ec2217e
|
@ -145,7 +145,7 @@ func (cdr *CAADistributedResolver) queryCAA(ctx context.Context, url string, ic
|
||||||
if respObj.Comment != "" {
|
if respObj.Comment != "" {
|
||||||
return nil, fmt.Errorf("Query failed with %s: %s", dns.RcodeToString[respObj.Status], respObj.Comment)
|
return nil, fmt.Errorf("Query failed with %s: %s", dns.RcodeToString[respObj.Status], respObj.Comment)
|
||||||
}
|
}
|
||||||
return nil, fmt.Errorf("Query failed wtih %s", dns.RcodeToString[respObj.Status])
|
return nil, fmt.Errorf("Query failed with %s", dns.RcodeToString[respObj.Status])
|
||||||
}
|
}
|
||||||
|
|
||||||
return parseAnswer(respObj.Answer)
|
return parseAnswer(respObj.Answer)
|
||||||
|
|
|
@ -466,7 +466,7 @@ type CertificateStatus struct {
|
||||||
|
|
||||||
// For performance reasons[0] we duplicate the `Expires` field of the
|
// For performance reasons[0] we duplicate the `Expires` field of the
|
||||||
// `Certificates` object/table in `CertificateStatus` to avoid a costly `JOIN`
|
// `Certificates` object/table in `CertificateStatus` to avoid a costly `JOIN`
|
||||||
// later on just to retreive this `Time` value. This helps both the OCSP
|
// later on just to retrieve this `Time` value. This helps both the OCSP
|
||||||
// updater and the expiration-mailer stay performant.
|
// updater and the expiration-mailer stay performant.
|
||||||
//
|
//
|
||||||
// Similarly, we add an explicit `IsExpired` boolean to `CertificateStatus`
|
// Similarly, we add an explicit `IsExpired` boolean to `CertificateStatus`
|
||||||
|
|
|
@ -1345,7 +1345,7 @@ func TestDeactivateAuthorization(t *testing.T) {
|
||||||
err = ra.DeactivateAuthorization(ctx, authz)
|
err = ra.DeactivateAuthorization(ctx, authz)
|
||||||
test.AssertNotError(t, err, "Could not deactivate authorization")
|
test.AssertNotError(t, err, "Could not deactivate authorization")
|
||||||
deact, err := sa.GetAuthorization(ctx, authz.ID)
|
deact, err := sa.GetAuthorization(ctx, authz.ID)
|
||||||
test.AssertNotError(t, err, "Could not get deactivated authorization wtih ID "+authz.ID)
|
test.AssertNotError(t, err, "Could not get deactivated authorization with ID "+authz.ID)
|
||||||
test.AssertEquals(t, deact.Status, core.StatusDeactivated)
|
test.AssertEquals(t, deact.Status, core.StatusDeactivated)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
2
sa/sa.go
2
sa/sa.go
|
@ -788,7 +788,7 @@ func (ssa *SQLStorageAuthority) RevokeAuthorizationsByDomain(ctx context.Context
|
||||||
}
|
}
|
||||||
|
|
||||||
// AddCertificate stores an issued certificate and returns the digest as
|
// AddCertificate stores an issued certificate and returns the digest as
|
||||||
// a string, or an error if any occured.
|
// a string, or an error if any occurred.
|
||||||
func (ssa *SQLStorageAuthority) AddCertificate(ctx context.Context, certDER []byte, regID int64) (string, error) {
|
func (ssa *SQLStorageAuthority) AddCertificate(ctx context.Context, certDER []byte, regID int64) (string, error) {
|
||||||
parsedCertificate, err := x509.ParseCertificate(certDER)
|
parsedCertificate, err := x509.ParseCertificate(certDER)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
|
Loading…
Reference in New Issue