• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

projectatomic / osbs-client / 763 / 2
70%
master: 86%

Build:
Build:
LAST BUILD BRANCH: obsb7503
DEFAULT BRANCH: master
Ran 18 Aug 2015 08:14AM UTC
Files 15
Run time 0s
Badge
Embed ▾
README BADGES
x

If you need to use a raster PNG badge, change the '.svg' to '.png' in the link

Markdown

Textile

RDoc

HTML

Rst

18 Aug 2015 08:12AM UTC coverage: 68.703% (+2.2%) from 66.504%
763.2

push

travis-ci

mmilata
Implement authentication with client certificates

Closes #160.

To test:

* Create cert/key pair for your OpenShift instance for user user_name
  and place them in the api_config directory:

      oadm create-api-client-config \
        --user=user_name \
        --client-dir=api_config \
        --certificate-authority=/etc/openshift/master/ca.crt \
        --signer-cert=/etc/openshift/master/master/ca.crt \
        --signer-key=/etc/openshift/master/ca.key \
        --signer-serial=/etc/openshift/master/ca.serial.txt

* Copy the api_config directory to your machine.
* Use osbs-client with client certificate authentication:

      osbs \
        -i yourinstance \
        --client-cert api_config/user_name.crt \
        --client-key api_config/user_name.key \
        --without-auth \
        get-user

  You should see Name: "user_name" in the output. Note that OAuth is not
  used here.

1181 of 1719 relevant lines covered (68.7%)

0.69 hits per line

Source Files on job 763.2
  • Tree
  • List 0
  • Changed 10
  • Source Changed 9
  • Coverage Changed 10
Coverage ∆ File Lines Relevant Covered Missed Hits/Line
  • Back to Build 763
  • Travis Job 763.2
  • 922a8b82 on github
  • Prev Job for on 160-client-cert-auth (#659.2)
  • Next Job for on 160-client-cert-auth (#765.2)
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc