updated Compliance and testing
This commit is contained in:
parent
480d4f7e3d
commit
8f358517e5
3 changed files with 14 additions and 2 deletions
|
|
@ -1,2 +1,14 @@
|
|||
|
||||
= API-Compliance and Testing
|
||||
|
||||
One of the goals of this implementation is to provide compatability to the current version of the vault written in Go.
|
||||
Therefore, a go client is used for testing.
|
||||
|
||||
To ensure compatability, the openapi specification published by HashiCorp is used as a reference. It provides information on input parameters, types and return values.
|
||||
|
||||
Implemented tests are:
|
||||
- Write a secret
|
||||
- Destroy specific versions of a secret
|
||||
- Read a secret
|
||||
- Read a metadata entry
|
||||
- Write a metadata entry
|
||||
|
|
@ -3,7 +3,7 @@
|
|||
|
||||
This issue has previously been adressed as "dynamic routing".
|
||||
|
||||
Problem can be split in two, // TODO
|
||||
// Problem can be split in two, // TODO
|
||||
|
||||
In Axum, routers can be configured using a fluid-like API #footnote[Term borrowed from C\# and OOP].
|
||||
|
||||
|
|
|
|||
|
|
@ -15,4 +15,4 @@ Achieved features include:
|
|||
|
||||
- Design of the architecture
|
||||
- Implementation of dynamic routing to allow for exchangeable secret engines
|
||||
- Basic kv-store examples
|
||||
- Basic kv-store
|
||||
Loading…
Reference in a new issue