|
Ran
|
Jobs
1
|
Files
145
|
Run time
11s
|
Badge
README BADGES
|
push
travis-ci
Renew symlink safety (#3560) Re-do the fix for #3497 to ensure it works in all cases. * If lineages are in an inconsistent (non-deployed) state, deploy them * Test new _handle_identical_cert case * Move lineage.has_pending_deployment() check up to _auth_from_domains Less conceptually nice, but in the "renew" verb case it wasn't being called :( * Swap _auth_from_domains return type * It now matches _treat_as_renewal & _handle_identical_cert_request etc * Revert "Move lineage.has_pending_deployment() check up to _auth_from_domains" This reverts commit a7fe734d7. * Move test back to handle_identical_cert_request * We need to check for non-deployment on two separate code paths - Once high up in "renew" (because failure to be deployed stops us from divind down the stack) - Once way down in _handle_identical_cert_request (because that's where it makes the most sense for run / certonly) - So refactor that work into storage.py * We don't necessarily reinstall
28 of 28 new or added lines in 6 files covered. (100.0%)
16303 of 16514 relevant lines covered (98.72%)
0.99 hits per line
| Lines | Coverage | ∆ | File |
|---|---|---|---|
| 1 |
100.0 |
certbot/main.py |
| ID | Job ID | Ran | Files | Coverage | |
|---|---|---|---|---|---|
| 1 | 5544.1 (TOXENV=cover BOULDER_INTEGRATION=1) | 0 |
98.72 |
Travis Job 5544.1 |