Edited Compliance and testing
This commit is contained in:
parent
e1cef70830
commit
3c1df01014
3 changed files with 7 additions and 8 deletions
|
|
@ -2,9 +2,9 @@
|
||||||
= API-Compliance and Testing
|
= API-Compliance and Testing
|
||||||
|
|
||||||
One of the goals of this implementation is to provide compatability to the current version of the vault written in Go.
|
One of the goals of this implementation is to provide compatability to the current version of the vault written in Go.
|
||||||
Therefore, a go client is used for testing.
|
Therefore, a Go-client is used for testing.
|
||||||
|
|
||||||
To ensure compatability, the openapi specification published by HashiCorp is used as a reference. It provides information on input parameters, types and return values.
|
To ensure compatability, the #link("https://github.com/hashicorp/vault-client-go/blob/main/openapi.json")[OpenAPI specification] and the #link("https://developer.hashicorp.com/vault")[Vault documentation], both published by HashiCorp, are used as references. It provides information on input parameters, types and return values.
|
||||||
|
|
||||||
Implemented tests are:
|
Implemented tests are:
|
||||||
- Write a secret
|
- Write a secret
|
||||||
|
|
|
||||||
|
|
@ -3,9 +3,9 @@
|
||||||
#show: arkheion.with(
|
#show: arkheion.with(
|
||||||
title: [Secret Management with rvault],
|
title: [Secret Management with rvault],
|
||||||
authors: (
|
authors: (
|
||||||
(name: "Samuel", email: "inf22036@lehre.dhbw-stuttgart.de", affiliation: "HPE"),
|
(name: "someone", email: "", affiliation: "HPE"),
|
||||||
(name: "Philip Herz", email: "inf22175@lehre.dhbw-stuttgart.de", affiliation: "HPE"),
|
(name: "someone", email: "", affiliation: "HPE"),
|
||||||
(name: "(Laurenz Noffke)", email: "", affiliation: "HPE"),
|
(name: "(someone)", email: "", affiliation: "HPE"),
|
||||||
),
|
),
|
||||||
// Insert your abstract after the colon, wrapped in brackets.
|
// Insert your abstract after the colon, wrapped in brackets.
|
||||||
// Example: `abstract: [This is my abstract...]`
|
// Example: `abstract: [This is my abstract...]`
|
||||||
|
|
@ -13,6 +13,7 @@
|
||||||
// keywords: ("First keyword", "Second keyword", "etc."),
|
// keywords: ("First keyword", "Second keyword", "etc."),
|
||||||
date: "2024-06-02",
|
date: "2024-06-02",
|
||||||
)
|
)
|
||||||
|
#show link:underline
|
||||||
|
|
||||||
#include "./chapters/01-Project-Requirements.typ"
|
#include "./chapters/01-Project-Requirements.typ"
|
||||||
#include "./chapters/02-Project-Goal.typ"
|
#include "./chapters/02-Project-Goal.typ"
|
||||||
|
|
|
||||||
|
|
@ -1,9 +1,7 @@
|
||||||
Secret Management with rvault
|
Secret Management with rvault
|
||||||
|
|
||||||
Groupmembers:
|
Groupmembers:
|
||||||
Samuel Possemeyer - inf22036@lehre.dhbw-stuttgart.de - 2950593
|
[redacted]
|
||||||
Philip Herz - inf22715@lehre.dhbw-stuttgart.de
|
|
||||||
(Laurenz Noffke)
|
|
||||||
|
|
||||||
Description:
|
Description:
|
||||||
The goal is to rewrite a part of the Hashicorp vault in Rust.
|
The goal is to rewrite a part of the Hashicorp vault in Rust.
|
||||||
|
|
|
||||||
Loading…
Reference in a new issue