• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

keycloak / keycloak-nodejs-connect / 294 / 4
81%
master: 81%

Build:
DEFAULT BRANCH: master
Ran 21 Mar 2018 01:14PM UTC
Files 16
Run time 2s
Badge
Embed ▾
README BADGES
x

If you need to use a raster PNG badge, change the '.svg' to '.png' in the link

Markdown

Textile

RDoc

HTML

Rst

21 Mar 2018 12:58PM UTC coverage: 85.766%. Remained the same
294.4

push

travis-ci

abstractj
[KEYCLOAK-6093] grant_type refresh_token throws 'invalid_client_credentials', when client_id is missing

grant_type refresh_token throws 'invalid_client_credentials', when
client_id is not a part of openid-connect/token request
When token is renewed on POST request to
'/auth/realms/master/protocol/openid-connect/token', RHEL-SSO 7.1 throws
back error as below.
{"error":"unauthorized_client","error_description":"UNKNOWN_CLIENT:
Client was not identified by any client authenticator"}

This is fixed by adding client_id to the http request getting token
renewed.

192 of 251 branches covered (76.49%)

Branch coverage included in aggregate %.

519 of 578 relevant lines covered (89.79%)

22.3 hits per line

Source Files on job 294.4
  • Tree
  • List 0
  • Changed 6
  • Source Changed 1
  • Coverage Changed 6
Coverage ∆ File Lines Relevant Covered Missed Hits/Line Branch Hits Branch Misses
  • Back to Build 1
  • Travis Job 294.4
  • fe34e778 on github
  • Prev Job for on master (#282.3)
  • Next Job for on master (#296.2)
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc