Edited Compliance and testing

This commit is contained in:
someone 2024-06-02 21:53:11 +02:00 committed by C0ffeeCode
parent e1cef70830
commit 3c1df01014
Signed by: C0ffeeCode
SSH key fingerprint: SHA256:prvFOyBjButRypyXm7X8lbbCkly2Dq1PF7e/mrsPVjw
3 changed files with 7 additions and 8 deletions

View file

@ -2,9 +2,9 @@
= API-Compliance and Testing = API-Compliance and Testing
One of the goals of this implementation is to provide compatability to the current version of the vault written in Go. One of the goals of this implementation is to provide compatability to the current version of the vault written in Go.
Therefore, a go client is used for testing. Therefore, a Go-client is used for testing.
To ensure compatability, the openapi specification published by HashiCorp is used as a reference. It provides information on input parameters, types and return values. To ensure compatability, the #link("https://github.com/hashicorp/vault-client-go/blob/main/openapi.json")[OpenAPI specification] and the #link("https://developer.hashicorp.com/vault")[Vault documentation], both published by HashiCorp, are used as references. It provides information on input parameters, types and return values.
Implemented tests are: Implemented tests are:
- Write a secret - Write a secret

View file

@ -3,9 +3,9 @@
#show: arkheion.with( #show: arkheion.with(
title: [Secret Management with rvault], title: [Secret Management with rvault],
authors: ( authors: (
(name: "Samuel", email: "inf22036@lehre.dhbw-stuttgart.de", affiliation: "HPE"), (name: "someone", email: "", affiliation: "HPE"),
(name: "Philip Herz", email: "inf22175@lehre.dhbw-stuttgart.de", affiliation: "HPE"), (name: "someone", email: "", affiliation: "HPE"),
(name: "(Laurenz Noffke)", email: "", affiliation: "HPE"), (name: "(someone)", email: "", affiliation: "HPE"),
), ),
// Insert your abstract after the colon, wrapped in brackets. // Insert your abstract after the colon, wrapped in brackets.
// Example: `abstract: [This is my abstract...]` // Example: `abstract: [This is my abstract...]`
@ -13,6 +13,7 @@
// keywords: ("First keyword", "Second keyword", "etc."), // keywords: ("First keyword", "Second keyword", "etc."),
date: "2024-06-02", date: "2024-06-02",
) )
#show link:underline
#include "./chapters/01-Project-Requirements.typ" #include "./chapters/01-Project-Requirements.typ"
#include "./chapters/02-Project-Goal.typ" #include "./chapters/02-Project-Goal.typ"

View file

@ -1,9 +1,7 @@
Secret Management with rvault Secret Management with rvault
Groupmembers: Groupmembers:
Samuel Possemeyer - inf22036@lehre.dhbw-stuttgart.de - 2950593 [redacted]
Philip Herz - inf22715@lehre.dhbw-stuttgart.de
(Laurenz Noffke)
Description: Description:
The goal is to rewrite a part of the Hashicorp vault in Rust. The goal is to rewrite a part of the Hashicorp vault in Rust.