Closed mredolatti closed 1 year ago
How to test manually:
if you don't want to create your own certs skip the next 4 bullet points:
cd test/certs/https
make clean all
cd ../../..
(continued)
make split-proxy
/etc/hosts
127.0.0.1 split-proxy 127.0.0.1 split-proxy-admin
./split-proxy \ -apikey=<YOUR_APIKEY> \ -server-tls-enabled \ -server-tls-private-key-fn=./test/certs/https/proxy.key \ -server-tls-cert-chain-fn=./test/certs/https/proxy.crt \ -server-tls-min-tls-version=1.3 \ -server-tls-allowed-cipher-suites=TLS_CHACHA20_POLY1305_SHA256
curl -v \ https://split-proxy:3000/api/splitChanges \ -H"Authorization: Bearer SDK_API_KEY" \ --cacert test/certs/https/ca.crt
curl -v \ https://split-proxy-admin:3010/health/application \ --cacert test/certs/https/ca.crt
SonarQube Quality Gate
0 Bugs 0 Vulnerabilities 0 Security Hotspots 3 Code Smells
66.3% Coverage 0.0% Duplication
55.6% Coverage on New Code (is less than 80%)
See analysis details on SonarQube
How to test manually:
if you don't want to create your own certs skip the next 4 bullet points:
cd test/certs/https
make clean all
cd ../../..
(continued)
make split-proxy
/etc/hosts
: