Skip to content

Commit

Permalink
Merge pull request #284 from ddosify/master
Browse files Browse the repository at this point in the history
Develop
  • Loading branch information
fatihbaltaci authored Apr 18, 2024
2 parents e7b7169 + 8bbade5 commit 7f451fb
Show file tree
Hide file tree
Showing 5 changed files with 16 additions and 16 deletions.
16 changes: 8 additions & 8 deletions core/engine_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -342,11 +342,11 @@ func TestRequestData(t *testing.T) {
}

if header1 != "Test1Value" {
t.Errorf("invalid header1 receieved: %s", header1)
t.Errorf("invalid header1 received: %s", header1)
}

if header2 != "Test2Value" {
t.Errorf("invalid header2 receieved: %s", header2)
t.Errorf("invalid header2 received: %s", header2)
}

if body != "Body content" {
Expand Down Expand Up @@ -414,27 +414,27 @@ func TestRequestDataForMultiScenarioStep(t *testing.T) {
expected := []string{"/api_get", "/api_post"}
if !reflect.DeepEqual(uri, expected) {
t.Logf("%#v - %#v", uri, expected)
t.Errorf("invalid uri receieved: %#v expected %#v", uri, expected)
t.Errorf("invalid uri received: %#v expected %#v", uri, expected)
}

expected = []string{"HTTP/1.1", "HTTP/1.1"}
if !reflect.DeepEqual(protocol, expected) {
t.Errorf("invalid protocol receieved: %#v expected %#v", protocol, expected)
t.Errorf("invalid protocol received: %#v expected %#v", protocol, expected)
}

expected = []string{"GET", "POST"}
if !reflect.DeepEqual(method, expected) {
t.Errorf("invalid method receieved: %#v expected %#v", method, expected)
t.Errorf("invalid method received: %#v expected %#v", method, expected)
}

expected = []string{"h1", "h2"}
if !reflect.DeepEqual(header, expected) {
t.Errorf("invalid header receieved: %#v expected %#v", header, expected)
t.Errorf("invalid header received: %#v expected %#v", header, expected)
}

expected = []string{"Body 1", "Body 2"}
if !reflect.DeepEqual(body, expected) {
t.Errorf("invalid body receieved: %#v expected %#v", body, expected)
t.Errorf("invalid body received: %#v expected %#v", body, expected)
}
}

Expand Down Expand Up @@ -1907,7 +1907,7 @@ func TestInvalidCsvEnvs(t *testing.T) {
err := h.Validate()

if err == nil {
t.Errorf("TestInvalidCsvEnvs shoul be errored")
t.Errorf("TestInvalidCsvEnvs should be errored")
}
}

Expand Down
2 changes: 1 addition & 1 deletion core/scenario/scripting/injection/init.go
Original file line number Diff line number Diff line change
Expand Up @@ -165,7 +165,7 @@ func init() {
"randomLoremLines": dataFaker.RandomLoremLines,

/*
* Spesific to us.
* Specific to us.
*/
"randomFloat": dataFaker.RandomFloat,
"randomString": dataFaker.RandomString,
Expand Down
2 changes: 1 addition & 1 deletion core/types/response.go
Original file line number Diff line number Diff line change
Expand Up @@ -84,7 +84,7 @@ type ScenarioStepResult struct {
// Response Body
RespBody []byte

// Protocol spesific metrics. For ex: DNSLookupDuration: 1s for HTTP
// Protocol specific metrics. For ex: DNSLookupDuration: 1s for HTTP
Custom map[string]interface{}

// Usable envs in this step
Expand Down
2 changes: 1 addition & 1 deletion core/types/scenario.go
Original file line number Diff line number Diff line change
Expand Up @@ -225,7 +225,7 @@ type ScenarioStep struct {
// Sleep duration after running the step. Can be a time range like "300-500" or an exact duration like "350" in ms
Sleep string

// Protocol spesific request parameters. For ex: DisableRedirects:true for Http requests
// Protocol specific request parameters. For ex: DisableRedirects:true for Http requests
Custom map[string]interface{}

// Envs to capture from response of this step
Expand Down
10 changes: 5 additions & 5 deletions engine_docs/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -70,14 +70,14 @@ brew install ddosify/tap/ddosify

```bash
# For Redhat based (Fedora, CentOS, RHEL, etc.)
rpm -i https://github.com/ddosify/ddosify/releases/latest/download/ddosify_amd64.rpm
rpm -i https://github.com/ddosify/ddosify/releases/download/v1.0.6/ddosify_amd64.rpm

# For Debian based (Ubuntu, Linux Mint, etc.)
wget https://github.com/ddosify/ddosify/releases/latest/download/ddosify_amd64.deb
wget https://github.com/ddosify/ddosify/releases/download/v1.0.6/ddosify_amd64.deb
dpkg -i ddosify_amd64.deb

# For Alpine
wget https://github.com/ddosify/ddosify/releases/latest/download/ddosify_amd64.apk
wget https://github.com/ddosify/ddosify/releases/download/v1.0.6/ddosify_amd64.apk
apk add --allow-untrusted ddosify_amd64.apk

# For Arch Linux
Expand All @@ -89,7 +89,7 @@ makepkg -sri
pkg install ddosify
```

### Windows exe from the [releases page](https://github.com/ddosify/ddosify/releases/latest)
### Windows exe from the [releases page](https://github.com/ddosify/ddosify/releases/tag/v1.0.6)

- Download *.zip file for your architecture. For example download ddosify version vx.x.x with amd64 architecture: ddosify_x.x.x.zip_windows_amd64
- Unzip `ddosify_x.x.x_windows_amd64.zip`
Expand Down Expand Up @@ -1097,4 +1097,4 @@ Ddosify is created for testing the performance of web applications. Users must b

## License

Licensed under the AGPLv3: https://www.gnu.org/licenses/agpl-3.0.html
Licensed under the AGPLv3: https://www.gnu.org/licenses/agpl-3.0.html

0 comments on commit 7f451fb

Please sign in to comment.