|
Ran
|
Files
104
|
Run time
18s
|
Badge
README BADGES
|
push
travis-ci
<a href="https://github.com/TykTechnologies/tyk/commit/<a class=hub.com/TykTechnologies/tyk/commit/d12d245ddc1ddd8cdbb3fb6118dd216eeeb5d38c">d12d245dd<a href="https://github.com/TykTechnologies/tyk/commit/d12d245ddc1ddd8cdbb3fb6118dd216eeeb5d38c">">Add support for `sha256`, `sha384` and `sha512` hmac signatures (#2071) Now HMAC middleware will actually read Algorithm header value, and based on its value will pick the hashing algorithm. You can also whitelist allowed hashing algorithms by setting new string array API definition variable`hmac_allowed_algorithms` to smth like: [&quot;hmac-sha512&quot;]. Accepted values: &quot;hmac-sha1&quot;, &quot;hmac-sha256&quot;, &quot;hmac-sha384&quot;, &quot;hmac-sha512&quot;. Fix https://github.com/TykTechnologies/tyk/issues/2066 (cherry picked from commit </a><a class="double-link" href="https://github.com/TykTechnologies/tyk/commit/<a class="double-link" href="https://github.com/TykTechnologies/tyk/commit/6dd39358c42ba3d7e363bac7c6317219950a285e">6dd39358c</a>">6dd39358c</a><a href="https://github.com/TykTechnologies/tyk/commit/d12d245ddc1ddd8cdbb3fb6118dd216eeeb5d38c">)
9932 of 16268 relevant lines covered (61.05%)
0.68 hits per line
| Coverage | ∆ | File | Lines | Relevant | Covered | Missed | Hits/Line |
|---|