• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

kubevirt / containerized-data-importer
59%
main: 59%

Build:
Build:
LAST BUILD BRANCH: fix-dataimportcron-nil-map-assignment
DEFAULT BRANCH: main
Repo Added 25 Jul 2018 03:35PM UTC
Files 155
Badge
Embed ▾
README BADGES
x

If you need to use a raster PNG badge, change the '.svg' to '.png' in the link

Markdown

Textile

RDoc

HTML

Rst

LAST BUILD ON BRANCH change-metrics-port
branch: change-metrics-port
CHANGE BRANCH
x
Reset
  • change-metrics-port
  • 1-32-kvci
  • 1-33-kvci
  • 2550-assume-fixed
  • 31-deps-bump
  • 3466
  • 3556
  • Fix-functional-tests-ginkgo-args-building
  • add-clone-populator-watches
  • add-operator-probes
  • add-pxcsi-support
  • add-test-filter-capability
  • add-vcenter-decription-test
  • add_prom_unit_tests
  • allow-access-cluster-services-csv
  • autoupdate
  • bazeldnf-caret-fix
  • bugfix/snapshot-volumemode-diff
  • build-functest-shebang
  • cbt-query-usage
  • cephfs-typo
  • change-cdi-deploy-selectors
  • change-termination-message-policy
  • chore-remove-deprecated-buildnametocertificate
  • cnv-44140
  • cnv-52722
  • cnv-58645
  • cnv64424
  • comment-fix
  • consolidate-stream-data-to-file
  • container_image_poller
  • csv-dump-network-policies
  • datasource-pointer
  • debug-certrotation-ut
  • decompose-ds-controller-watches
  • dep-update-common-pkg
  • dependabot/go_modules/github.com/docker/docker-28.0.0incompatible
  • dependabot/go_modules/github.com/go-jose/go-jose/v3-3.0.4
  • dependabot/go_modules/github.com/ulikunitz/xz-0.5.14
  • dependabot/go_modules/golang.org/x/crypto-0.35.0
  • dependabot/go_modules/golang.org/x/net-0.38.0
  • dependabot/go_modules/staging/src/kubevirt.io/containerized-data-importer-api/golang.org/x/net-0.33.0
  • dependabot/go_modules/staging/src/kubevirt.io/containerized-data-importer-api/golang.org/x/net-0.36.0
  • deprecation-typo-v2-transfer
  • dic-poller-get-acknowledge-arch-digest
  • dic_pvc_source
  • dv-events-from-pvc
  • dv-recreated-status
  • enable_webhook_pvc_rendering_featuregate
  • exclude-scratch-pvcs-from-backup
  • feat/snapshot-restore-sc-selection
  • feature/add-status-subresource-to-storageprofile-crd
  • fix-cdi-space-calculations
  • fix-dataimportcron-nil-map-assignment
  • fix-datasource-references
  • fix-doc-dv
  • fix-doc-sources
  • fix-error-formatting
  • fix-label-regex
  • fix-multi-stage-import-test
  • fix-schedulable-running-condition
  • fix-upload-tests
  • fix/cephfs_capabilities
  • fix/storageprofile-error-message-status
  • fix_CDIDataVolumeUnusualRestartCount_alert
  • fix_clone_target_size_validation
  • fix_dic_image_pull_failed
  • fix_dv_bound_cond_unknown
  • fix_dv_events_test
  • fix_empty_storageprofile_test_event_check
  • fix_flaky_dic_snapshot_cond_test
  • fix_registry_datasource_import_without_certConfigMap
  • fix_storageprofile_rendering
  • fix_test_storage_profile_snapshot_source
  • fix_vddk_volume_import_source_update_test
  • flake-upload-proxy-static
  • gcnv_caps
  • http-ds-validate-image-size
  • hyperdisk-caps
  • ibmc-vpc-block-csi
  • importer-report-scratch-space-message
  • improve-dv-testsc
  • issue-3878
  • kvci-1-31
  • kvci-nfs-fix
  • label-datasources-architecture
  • label-tests-vmware-and-imageio
  • main
  • metrics-io-timeout
  • move-destructive-flag-to-label-filter
  • multi-arch-release
  • multiarch-test-images
  • mutate_pvc_min_size
  • network-policies-mapping-cdi-dnm
  • new-builder-1-23
  • oci-clone-strategy
  • pass-annotation-removal
  • portworx_rwx_block
  • portworx_rwx_block_conditionally
  • propogate-labels-from-dv
  • pvc-clone-doc
  • rebind-capacity-present
  • reconcile-ds-on-reference-update
  • reconcile_storageprofile_min_pvc_size_annotation
  • release-v1.1
  • release-v1.10
  • release-v1.11
  • release-v1.12
  • release-v1.13
  • release-v1.14
  • release-v1.15
  • release-v1.16
  • release-v1.17
  • release-v1.18
  • release-v1.19
  • release-v1.2
  • release-v1.20
  • release-v1.21
  • release-v1.22
  • release-v1.23
  • release-v1.24
  • release-v1.25
  • release-v1.26
  • release-v1.28
  • release-v1.3
  • release-v1.4
  • release-v1.5
  • release-v1.6
  • release-v1.60
  • release-v1.7
  • release-v1.8
  • release-v1.9
  • releases-docs-dead-link
  • report-upload-error-message-on-write-error
  • required-scc
  • revert-3644-portworx_rwx_block
  • revert-multi-arch-temporarily
  • revert-snap-manual-cleanup
  • safe-cwe-79
  • scc-volumes-hotloop
  • selected-node-tmp-host-assisted
  • set_min_pvc_size_per_sc_ann
  • sparse-check-tests
  • support-multiarch-registry-import
  • sync-scc-restricted-v2
  • targeted-sync-ci-err
  • test-https-proxy-no-certdir
  • tinycore-multiarch
  • update-builder-go-124
  • update-default-fsoverhead
  • update_CDIDataVolumeUnusualRestartCount_health_impact_label
  • update_CDI_alerts_health_and_eval_time
  • update_builder_go_123
  • update_oauth_to_027
  • update_x_net_0_33_0
  • use-operator-observability-toolkit
  • v1.60.1
  • v1.60.4
  • v1.60.5
  • v1.61.0
  • v1.62.0
  • v1.63.0
  • v1.63.0-alpha.0
  • vddk-extra-args-crd
  • volume-capabilities-oracle
  • watch_resource_quota
  • webhook-ns-selector

14 Jul 2025 01:24PM UTC coverage: 59.489% (-0.03%) from 59.518%
#5466

Pull #3837

travis-ci

Acedus
metrics-server: use SecureServing option

As part of an effort to standardize metric exposure across KubeVirt
components on port 8443, we are transitioning to HTTPS with TLS
encryption for the metrics-server.

To facilitate this, we leverage the controller-runtime's SecureServing
option, which creates a self-signed certificate and configures it as the
server certificate for the metrics endpoint when no external certificate
is provided[1].

Subsequent PRs will replace this self-signed certificate with a CDI
generated one to enable a fully trusted and secure connection between
the Prometheus instance and the target metrics endpoints as specified by
the CDI ServiceMonitor. Until that integration is complete, the
ServiceMonitor will be configured with insecureSkipVerify to allow
scraping despite the untrusted certificate.

[1] https://github.com/kubernetes-sigs/controller-runtime/pull/2407

Signed-off-by: Adi Aloni <aaloni@redhat.com>
Pull Request #3837: metrics-server: use SecureServing option

3 of 20 new or added lines in 5 files covered. (15.0%)

2 existing lines in 1 file now uncovered.

17097 of 28740 relevant lines covered (59.49%)

0.66 hits per line

Relevant lines Covered
Build:
Build:
28740 RELEVANT LINES 17097 COVERED LINES
0.66 HITS PER LINE
Source Files on change-metrics-port
  • Tree
  • List 155
  • Changed 3
  • Source Changed 0
  • Coverage Changed 3
Coverage ∆ File Lines Relevant Covered Missed Hits/Line

Recent builds

Builds Branch Commit Type Ran Committer Via Coverage
#5466 change-metrics-port metrics-server: use SecureServing option As part of an effort to standardize metric exposure across KubeVirt components on port 8443, we are transitioning to HTTPS with TLS encryption for the metrics-server. To facilitate this, we leverage the c... Pull #3837 14 Jul 2025 01:36PM UTC Acedus travis-ci
59.49
See All Builds (5598)
  • Repo on GitHub
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2025 Coveralls, Inc