|
Ran
|
Jobs
2
|
Files
104
|
Run time
41s
|
Badge
README BADGES
|
push
travis-ci
<a href="https://github.com/TykTechnologies/tyk/commit/<a class=hub.com/TykTechnologies/tyk/commit/d12d245ddc1ddd8cdbb3fb6118dd216eeeb5d38c">d12d245dd<a href="https://github.com/TykTechnologies/tyk/commit/d12d245ddc1ddd8cdbb3fb6118dd216eeeb5d38c">">Add support for `sha256`, `sha384` and `sha512` hmac signatures (#2071) Now HMAC middleware will actually read Algorithm header value, and based on its value will pick the hashing algorithm. You can also whitelist allowed hashing algorithms by setting new string array API definition variable`hmac_allowed_algorithms` to smth like: [&quot;hmac-sha512&quot;]. Accepted values: &quot;hmac-sha1&quot;, &quot;hmac-sha256&quot;, &quot;hmac-sha384&quot;, &quot;hmac-sha512&quot;. Fix https://github.com/TykTechnologies/tyk/issues/2066 (cherry picked from commit </a><a class="double-link" href="https://github.com/TykTechnologies/tyk/commit/<a class="double-link" href="https://github.com/TykTechnologies/tyk/commit/6dd39358c42ba3d7e363bac7c6317219950a285e">6dd39358c</a>">6dd39358c</a><a href="https://github.com/TykTechnologies/tyk/commit/d12d245ddc1ddd8cdbb3fb6118dd216eeeb5d38c">)
9929 of 16262 relevant lines covered (61.06%)
1.35 hits per line
| ID | Job ID | Ran | Files | Coverage | |
|---|---|---|---|---|---|
| 1 | 6060.1 (LATEST_GO=true) | 0 |
60.58 |
Travis Job 6060.1 | |
| 2 | 6060.2 (LATEST_GO=true) | 0 |
61.05 |
Travis Job 6060.2 |