From 3c1df0101473de191503e1d465b2d48389b8433e Mon Sep 17 00:00:00 2001 From: someone Date: Sun, 2 Jun 2024 21:53:11 +0200 Subject: [PATCH] Edited Compliance and testing --- chapters/05-API-Compliance-and-Testing.typ | 4 ++-- documentation.typ | 7 ++++--- rvault_description.txt | 4 +--- 3 files changed, 7 insertions(+), 8 deletions(-) diff --git a/chapters/05-API-Compliance-and-Testing.typ b/chapters/05-API-Compliance-and-Testing.typ index 42df1bd..4911299 100644 --- a/chapters/05-API-Compliance-and-Testing.typ +++ b/chapters/05-API-Compliance-and-Testing.typ @@ -2,9 +2,9 @@ = API-Compliance and Testing One of the goals of this implementation is to provide compatability to the current version of the vault written in Go. -Therefore, a go client is used for testing. +Therefore, a Go-client is used for testing. -To ensure compatability, the openapi specification published by HashiCorp is used as a reference. It provides information on input parameters, types and return values. +To ensure compatability, the #link("https://github.com/hashicorp/vault-client-go/blob/main/openapi.json")[OpenAPI specification] and the #link("https://developer.hashicorp.com/vault")[Vault documentation], both published by HashiCorp, are used as references. It provides information on input parameters, types and return values. Implemented tests are: - Write a secret diff --git a/documentation.typ b/documentation.typ index a01176d..fee43ca 100644 --- a/documentation.typ +++ b/documentation.typ @@ -3,9 +3,9 @@ #show: arkheion.with( title: [Secret Management with rvault], authors: ( - (name: "Samuel", email: "inf22036@lehre.dhbw-stuttgart.de", affiliation: "HPE"), - (name: "Philip Herz", email: "inf22175@lehre.dhbw-stuttgart.de", affiliation: "HPE"), - (name: "(Laurenz Noffke)", email: "", affiliation: "HPE"), + (name: "someone", email: "", affiliation: "HPE"), + (name: "someone", email: "", affiliation: "HPE"), + (name: "(someone)", email: "", affiliation: "HPE"), ), // Insert your abstract after the colon, wrapped in brackets. // Example: `abstract: [This is my abstract...]` @@ -13,6 +13,7 @@ // keywords: ("First keyword", "Second keyword", "etc."), date: "2024-06-02", ) +#show link:underline #include "./chapters/01-Project-Requirements.typ" #include "./chapters/02-Project-Goal.typ" diff --git a/rvault_description.txt b/rvault_description.txt index 6ae040b..3c1d4b5 100644 --- a/rvault_description.txt +++ b/rvault_description.txt @@ -1,9 +1,7 @@ Secret Management with rvault Groupmembers: -Samuel Possemeyer - inf22036@lehre.dhbw-stuttgart.de - 2950593 -Philip Herz - inf22715@lehre.dhbw-stuttgart.de -(Laurenz Noffke) +[redacted] Description: The goal is to rewrite a part of the Hashicorp vault in Rust.