X Tutup
Skip to content

Commit 8adf9d4

Browse files
jsorefcpu
authored andcommitted
Spelling (letsencrypt#2500)
Various spelling fixes.
1 parent 0a36796 commit 8adf9d4

File tree

17 files changed

+21
-21
lines changed

17 files changed

+21
-21
lines changed

CONTRIBUTING.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@ Thanks for helping us build Boulder! This page contains requirements and guideli
22

33
# Patch Requirements
44
* All new functionality and fixed bugs must be accompanied by tests.
5-
* Boulder currently implements the ACME-01 draft as defined by [acme-spec](https://tools.ietf.org/html/draft-ietf-acme-acme-01). If a spec change is required for Boulder functionality, you should propose it on the ACME mailing list (acme@ietf.org), possibly accompanid by a pull request on the [spec repo](https://github.com/ietf-wg-acme/acme/).
5+
* Boulder currently implements the ACME-01 draft as defined by [acme-spec](https://tools.ietf.org/html/draft-ietf-acme-acme-01). If a spec change is required for Boulder functionality, you should propose it on the ACME mailing list (acme@ietf.org), possibly accompanied by a pull request on the [spec repo](https://github.com/ietf-wg-acme/acme/).
66
* All patches must meet the deployability requirements listed below.
77
* We prefer pull requests from external forks be created with the ["Allow edits from maintainers"](https://github.com/blog/2247-improving-collaboration-with-forks) checkbox selected.
88

DESIGN.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -125,7 +125,7 @@ Notes:
125125
* Parse the challenge object (i.e., the response)
126126

127127
* 2-3: RA does the following:
128-
* Merge the response with the challenge in the authorzation object
128+
* Merge the response with the challenge in the authorization object
129129
* Store the updated authorization object
130130

131131
* 3-4: VA does the following:
@@ -183,7 +183,7 @@ Notes:
183183
* Verify that the CSR has a non-zero number of domain names
184184
* Verify that the public key in the CSR is different from the account key
185185
* For each authorization referenced in the certificate request
186-
* Retreive the authorization from the database
186+
* Retrieve the authorization from the database
187187
* Verify that the authorization corresponds to the account key
188188
* Verify that the authorization is valid
189189
* Verify that the authorization is still valid

ca/ca.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -174,7 +174,7 @@ func makeInternalIssuers(
174174
}
175175

176176
// NewCertificateAuthorityImpl creates a CA instance that can sign certificates
177-
// from a single issuer (the first first in the issers slice), and can sign OCSP
177+
// from a single issuer (the first first in the issuers slice), and can sign OCSP
178178
// for any of the issuer certificates provided.
179179
func NewCertificateAuthorityImpl(
180180
config cmd.CAConfig,

cmd/cert-checker/main_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -236,7 +236,7 @@ func (db mismatchedCountDB) SelectOne(output interface{}, _ string, _ ...interfa
236236
}
237237

238238
// `getCerts` then calls `Select` to retrieve the Certificate rows. We pull
239-
// a dasterdly switch-a-roo here and return an empty set
239+
// a dastardly switch-a-roo here and return an empty set
240240
func (db mismatchedCountDB) Select(output interface{}, _ string, _ ...interface{}) ([]interface{}, error) {
241241
// But actually return nothing
242242
outputPtr, _ := output.(*[]core.Certificate)

cmd/config.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -200,7 +200,7 @@ type IssuerConfig struct {
200200
NumSessions int
201201
}
202202

203-
// TLSConfig reprents certificates and a key for authenticated TLS.
203+
// TLSConfig represents certificates and a key for authenticated TLS.
204204
type TLSConfig struct {
205205
CertFile *string
206206
KeyFile *string

cmd/expiration-mailer/main_test.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -220,7 +220,7 @@ func TestFindExpiringCertificates(t *testing.T) {
220220

221221
test.AssertEquals(t, mocks.MailerMessage{
222222
To: emailARaw,
223-
// A certificte with only one domain should have only one domain listed in
223+
// A certificate with only one domain should have only one domain listed in
224224
// the subject
225225
Subject: "Certificate expiration notice for domain \"example-a.com\"",
226226
Body: "hi, cert for DNS names example-a.com is going to expire in 0 days (03 Jan 06 14:04 +0000)",
@@ -442,7 +442,7 @@ func TestFindCertsAtCapacity(t *testing.T) {
442442
// findExpiringCertificates() ends up invoking sendNags which calls
443443
// TimingDuration so we need to EXPECT that with the mock
444444
statter.EXPECT().TimingDuration("Expiration.SendLatency", time.Duration(0), float32(1.0))
445-
// Similarly, findExpiringCerticates() sends its latency as well
445+
// Similarly, findExpiringCertificates() sends its latency as well
446446
statter.EXPECT().TimingDuration("Expiration.ProcessingCertificatesLatency", time.Duration(0), float32(1.0))
447447

448448
err := testCtx.m.findExpiringCertificates()

cmd/ocsp-updater/main.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ type OCSPUpdater struct {
5656

5757
// Used to calculate how far back stale OCSP responses should be looked for
5858
ocspMinTimeToExpiry time.Duration
59-
// Used to caculate how far back in time the findStaleOCSPResponse will look
59+
// Used to calculate how far back in time the findStaleOCSPResponse will look
6060
ocspStaleMaxAge time.Duration
6161
// Used to calculate how far back missing SCT receipts should be looked for
6262
oldestIssuedSCT time.Duration

cmd/ocsp-updater/main_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -396,7 +396,7 @@ func TestOldOCSPResponsesTick(t *testing.T) {
396396
test.AssertEquals(t, len(certs), 0)
397397
}
398398

399-
// TestOldOCSPResponesTickIsExpired checks that the old OCSP responses tick
399+
// TestOldOCSPResponsesTickIsExpired checks that the old OCSP responses tick
400400
// updates the `IsExpired` field opportunistically as it encounters certificates
401401
// that are expired but whose certificate status rows do not have `IsExpired`
402402
// set.

log/mock.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ func newMockWriter() *mockWriter {
7676
return w
7777
}
7878

79-
// GetAll returns all messages logged since insantiation or the last call to
79+
// GetAll returns all messages logged since instantiation or the last call to
8080
// Clear().
8181
//
8282
// The caller must not modify the returned slice or its elements.

ra/ra_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1282,7 +1282,7 @@ func (m mockSAWithFQDNSet) FQDNSetExists(_ context.Context, names []string) (boo
12821282
}
12831283

12841284
// Return a map of domain -> certificate count. Note: This naive implementation
1285-
// ignores names, earliest and latest paremeters and always returns the same
1285+
// ignores names, earliest and latest parameters and always returns the same
12861286
// nameCount map.
12871287
func (m mockSAWithFQDNSet) CountCertificatesByNames(ctx context.Context, names []string, earliest, latest time.Time) (ret map[string]int, err error) {
12881288
return m.nameCounts, nil

0 commit comments

Comments
 (0)
X Tutup