@@ -197,19 +197,19 @@ func httpMultiSrv(t *testing.T, token string, allowedUAs map[string]bool) *multi
197197 return ms
198198}
199199
200- // canceledVA is a mock that always returns context.Canceled for
200+ // cancelledVA is a mock that always returns context.Canceled for
201201// PerformValidation calls
202- type canceledVA struct {}
202+ type cancelledVA struct {}
203203
204- func (v canceledVA ) PerformValidation (_ context.Context , _ * vapb.PerformValidationRequest , _ ... grpc.CallOption ) (* vapb.ValidationResult , error ) {
204+ func (v cancelledVA ) PerformValidation (_ context.Context , _ * vapb.PerformValidationRequest , _ ... grpc.CallOption ) (* vapb.ValidationResult , error ) {
205205 return nil , context .Canceled
206206}
207207
208- func (v canceledVA ) IsCAAValid (_ context.Context , _ * vapb.IsCAAValidRequest , _ ... grpc.CallOption ) (* vapb.IsCAAValidResponse , error ) {
208+ func (v cancelledVA ) IsCAAValid (_ context.Context , _ * vapb.IsCAAValidRequest , _ ... grpc.CallOption ) (* vapb.IsCAAValidResponse , error ) {
209209 return nil , context .Canceled
210210}
211211
212- func (v canceledVA ) DoDCV (_ context.Context , _ * vapb.DCVRequest , _ ... grpc.CallOption ) (* vapb.ValidationResult , error ) {
212+ func (v cancelledVA ) DoDCV (_ context.Context , _ * vapb.DCVRequest , _ ... grpc.CallOption ) (* vapb.ValidationResult , error ) {
213213 return nil , context .Canceled
214214}
215215
@@ -396,8 +396,8 @@ func TestMultiVA(t *testing.T) {
396396 CAAClient : brokenRemoteVA {},
397397 }
398398 cancelledVA := RemoteClients {
399- VAClient : canceledVA {},
400- CAAClient : canceledVA {},
399+ VAClient : cancelledVA {},
400+ CAAClient : cancelledVA {},
401401 }
402402
403403 unauthorized := probs .Unauthorized (fmt .Sprintf (
@@ -822,7 +822,7 @@ func setupRVAs(confs []rvaConf, mockDNSClient bdns.Client, srv *httptest.Server)
822822 return remoteVAs
823823}
824824
825- func createValidationRequest (domain string , challengeType core.AcmeChallenge ) * vapb.DCVRequest {
825+ func createDoDCVRequest (domain string , challengeType core.AcmeChallenge ) * vapb.DCVRequest {
826826 return & vapb.DCVRequest {
827827 Identifier : & corepb.Identifier {
828828 Type : string (identifier .TypeDNS ),
@@ -843,7 +843,7 @@ func TestDoDCVInvalid(t *testing.T) {
843843 rvas := setupRVAs ([]rvaConf {{rir : "ARIN" }, {rir : "RIPE" }, {rir : "APNIC" }}, nil , nil )
844844 va , mockLog := setupVA (nil , "" , rvas , nil )
845845
846- req := createValidationRequest ("foo.com" , core .ChallengeTypeDNS01 )
846+ req := createDoDCVRequest ("foo.com" , core .ChallengeTypeDNS01 )
847847
848848 res , err := va .DoDCV (context .Background (), req )
849849 test .AssertNotError (t , err , "DoDCV failed, expected success" )
@@ -867,7 +867,7 @@ func TestDoDCVInternalErrorLogged(t *testing.T) {
867867 ctx , cancel := context .WithTimeout (context .Background (), 1 * time .Millisecond )
868868 defer cancel ()
869869
870- req := createValidationRequest ("nonexistent.com" , core .ChallengeTypeHTTP01 )
870+ req := createDoDCVRequest ("nonexistent.com" , core .ChallengeTypeHTTP01 )
871871
872872 _ , err := va .DoDCV (ctx , req )
873873 test .AssertNotError (t , err , "Failed validation should be a prob but not an error" )
@@ -887,7 +887,7 @@ func TestDoDCVValid(t *testing.T) {
887887 rvas := setupRVAs ([]rvaConf {{rir : "ARIN" }, {rir : "RIPE" }, {rir : "APNIC" }}, nil , nil )
888888 va , mockLog := setupVA (nil , "" , rvas , nil )
889889
890- req := createValidationRequest ("good-dns01.com" , core .ChallengeTypeDNS01 )
890+ req := createDoDCVRequest ("good-dns01.com" , core .ChallengeTypeDNS01 )
891891
892892 res , err := va .DoDCV (context .Background (), req )
893893 test .AssertNotError (t , err , "validating challenge resulted in unexpected error" )
@@ -910,7 +910,7 @@ func TestDoDCVWildcard(t *testing.T) {
910910 rvas := setupRVAs ([]rvaConf {{rir : "ARIN" }, {rir : "RIPE" }, {rir : "APNIC" }}, nil , nil )
911911 va , mockLog := setupVA (nil , "" , rvas , nil )
912912
913- req := createValidationRequest ("*.good-dns01.com" , core .ChallengeTypeDNS01 )
913+ req := createDoDCVRequest ("*.good-dns01.com" , core .ChallengeTypeDNS01 )
914914
915915 res , _ := va .DoDCV (context .Background (), req )
916916 test .Assert (t , res .Problems == nil , fmt .Sprintf ("validation failed: %#v" , res .Problems ))
@@ -937,7 +937,7 @@ func TestDoDCVValidWithBrokenRVA(t *testing.T) {
937937 rvas = append (rvas , RemoteVA {brokenRVA , "broken" })
938938 va , _ := setupVA (nil , "" , rvas , nil )
939939
940- req := createValidationRequest ("good-dns01.com" , core .ChallengeTypeDNS01 )
940+ req := createDoDCVRequest ("good-dns01.com" , core .ChallengeTypeDNS01 )
941941
942942 res , err := va .DoDCV (context .Background (), req )
943943 test .AssertNotError (t , err , "validating challenge resulted in unexpected error" )
@@ -946,11 +946,11 @@ func TestDoDCVValidWithBrokenRVA(t *testing.T) {
946946
947947func TestDoDCVValidWithCancelledRVA (t * testing.T ) {
948948 rvas := setupRVAs ([]rvaConf {{rir : "ARIN" }, {rir : "RIPE" }}, nil , nil )
949- cancelledRVA := RemoteClients {VAClient : canceledVA {}, CAAClient : canceledVA {}}
949+ cancelledRVA := RemoteClients {VAClient : cancelledVA {}, CAAClient : cancelledVA {}}
950950 rvas = append (rvas , RemoteVA {cancelledRVA , "cancelled" })
951951 va , _ := setupVA (nil , "" , rvas , nil )
952952
953- req := createValidationRequest ("good-dns01.com" , core .ChallengeTypeDNS01 )
953+ req := createDoDCVRequest ("good-dns01.com" , core .ChallengeTypeDNS01 )
954954
955955 res , err := va .DoDCV (context .Background (), req )
956956 test .AssertNotError (t , err , "validating challenge resulted in unexpected error" )
@@ -963,7 +963,7 @@ func TestDoDCVFailsWithTooManyBrokenRVAs(t *testing.T) {
963963 rvas = append (rvas , RemoteVA {brokenRVA , "broken" }, RemoteVA {brokenRVA , "broken" })
964964 va , _ := setupVA (nil , "" , rvas , nil )
965965
966- req := createValidationRequest ("good-dns01.com" , core .ChallengeTypeDNS01 )
966+ req := createDoDCVRequest ("good-dns01.com" , core .ChallengeTypeDNS01 )
967967
968968 res , err := va .DoDCV (context .Background (), req )
969969 test .AssertNotError (t , err , "Failed validation should be a prob but not an error" )
@@ -979,11 +979,11 @@ func TestDoDCVFailsWithTooManyBrokenRVAs(t *testing.T) {
979979
980980func TestDoDCVFailsWithTooManyCanceledRVAs (t * testing.T ) {
981981 rvas := setupRVAs ([]rvaConf {{rir : "ARIN" }}, nil , nil )
982- canceledRVA := RemoteClients {VAClient : canceledVA {}, CAAClient : canceledVA {}}
983- rvas = append (rvas , RemoteVA {canceledRVA , "canceled " }, RemoteVA {canceledRVA , "canceled " })
982+ canceledRVA := RemoteClients {VAClient : cancelledVA {}, CAAClient : cancelledVA {}}
983+ rvas = append (rvas , RemoteVA {canceledRVA , "cancelled " }, RemoteVA {canceledRVA , "cancelled " })
984984 va , _ := setupVA (nil , "" , rvas , nil )
985985
986- req := createValidationRequest ("good-dns01.com" , core .ChallengeTypeDNS01 )
986+ req := createDoDCVRequest ("good-dns01.com" , core .ChallengeTypeDNS01 )
987987
988988 res , err := va .DoDCV (context .Background (), req )
989989 test .AssertNotError (t , err , "Failed validation should be a prob but not an error" )
@@ -1019,7 +1019,7 @@ func parseMPICSummary(t *testing.T, log []string) mpicSummary {
10191019}
10201020
10211021func TestDoDCVMPIC (t * testing.T ) {
1022- req := createValidationRequest ("localhost" , core .ChallengeTypeHTTP01 )
1022+ req := createDoDCVRequest ("localhost" , core .ChallengeTypeHTTP01 )
10231023
10241024 // srv is used for the Primary VA and the Remote VAs. The srv.Server
10251025 // produced will be used to mock the challenge recipient. When a VA (primary
0 commit comments