1
0
mirror of https://github.com/thib8956/nginx-proxy synced 2025-02-24 01:38:15 +00:00

chore: spelling fixes for #2468 (#2471)

This commit is contained in:
Niek 2024-05-31 17:07:07 +02:00 committed by GitHub
parent 57e86561eb
commit 7922c925af
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
4 changed files with 6 additions and 6 deletions

View File

@ -424,7 +424,7 @@ If you are running the container in a virtualized environment (Hyper-V, VirtualB
By default nginx-proxy generates location blocks to handle ACME HTTP Challenge, excepted when `HTTPS_METHOD=noredirect` or there is no certificate for the domain. Ths behavior can be changed with environment variable `ACME_HTTP_CHALLENGE_LOCATION`. It accepts these values: By default nginx-proxy generates location blocks to handle ACME HTTP Challenge, excepted when `HTTPS_METHOD=noredirect` or there is no certificate for the domain. Ths behavior can be changed with environment variable `ACME_HTTP_CHALLENGE_LOCATION`. It accepts these values:
* `legacy`: default value; current default behavior * `legacy`: default value; current default behavior
* `true`: handle ACME HTTP Challenge in all cases * `true`: handle ACME HTTP Challenge in all cases
* `false`: do not handle ACME HTTP Chalenge at all. * `false`: do not handle ACME HTTP Challenge at all.
### Diffie-Hellman Groups ### Diffie-Hellman Groups

View File

@ -15,14 +15,14 @@ def test_redirect_acme_challenge_location_enabled(docker_compose, nginxproxy, ac
) )
assert r.status_code == 200 assert r.status_code == 200
def test_noderirect_acme_challenge_location_disabled(docker_compose, nginxproxy, acme_challenge_path): def test_noredirect_acme_challenge_location_disabled(docker_compose, nginxproxy, acme_challenge_path):
r = nginxproxy.get( r = nginxproxy.get(
f"http://web3.nginx-proxy.tld/{acme_challenge_path}", f"http://web3.nginx-proxy.tld/{acme_challenge_path}",
allow_redirects=False allow_redirects=False
) )
assert r.status_code == 404 assert r.status_code == 404
def test_noderirect_acme_challenge_location_enabled(docker_compose, nginxproxy, acme_challenge_path): def test_noredirect_acme_challenge_location_enabled(docker_compose, nginxproxy, acme_challenge_path):
r = nginxproxy.get( r = nginxproxy.get(
f"http://web4.nginx-proxy.tld/{acme_challenge_path}", f"http://web4.nginx-proxy.tld/{acme_challenge_path}",
allow_redirects=False allow_redirects=False

View File

@ -15,14 +15,14 @@ def test_redirect_acme_challenge_location_disabled(docker_compose, nginxproxy, a
) )
assert r.status_code == 301 assert r.status_code == 301
def test_noderirect_acme_challenge_location_enabled(docker_compose, nginxproxy, acme_challenge_path): def test_noredirect_acme_challenge_location_enabled(docker_compose, nginxproxy, acme_challenge_path):
r = nginxproxy.get( r = nginxproxy.get(
f"http://web3.nginx-proxy.tld/{acme_challenge_path}", f"http://web3.nginx-proxy.tld/{acme_challenge_path}",
allow_redirects=False allow_redirects=False
) )
assert r.status_code == 200 assert r.status_code == 200
def test_noderirect_acme_challenge_location_disabled(docker_compose, nginxproxy, acme_challenge_path): def test_noredirect_acme_challenge_location_disabled(docker_compose, nginxproxy, acme_challenge_path):
r = nginxproxy.get( r = nginxproxy.get(
f"http://web4.nginx-proxy.tld/{acme_challenge_path}", f"http://web4.nginx-proxy.tld/{acme_challenge_path}",
allow_redirects=False allow_redirects=False

View File

@ -8,7 +8,7 @@ def test_redirect_acme_challenge_location_legacy(docker_compose, nginxproxy, acm
) )
assert r.status_code == 200 assert r.status_code == 200
def test_noderirect_acme_challenge_location_legacy(docker_compose, nginxproxy, acme_challenge_path): def test_noredirect_acme_challenge_location_legacy(docker_compose, nginxproxy, acme_challenge_path):
r = nginxproxy.get( r = nginxproxy.get(
f"http://web2.nginx-proxy.tld/{acme_challenge_path}", f"http://web2.nginx-proxy.tld/{acme_challenge_path}",
allow_redirects=False allow_redirects=False