mirror of
https://github.com/hashicorp/vault.git
synced 2025-11-28 14:11:10 +01:00
enable gcpkms
This commit is contained in:
parent
021192ce18
commit
d46fa5bd58
@ -43,6 +43,12 @@ const MOUNTABLE_SECRET_ENGINES = [
|
||||
type: 'gcp',
|
||||
category: 'cloud',
|
||||
},
|
||||
{
|
||||
displayName: 'Google Cloud KMS',
|
||||
value: 'gcpkms',
|
||||
type: 'gcpkms',
|
||||
category: 'cloud',
|
||||
},
|
||||
{
|
||||
displayName: 'KV',
|
||||
value: 'kv',
|
||||
|
||||
10
ui/app/templates/components/wizard/gcpkms-engine.hbs
Normal file
10
ui/app/templates/components/wizard/gcpkms-engine.hbs
Normal file
@ -0,0 +1,10 @@
|
||||
<WizardSection
|
||||
@headerText="Google Cloud KMS"
|
||||
@headerIcon="enable/gcpkms"
|
||||
@docText="Docs: Google Cloud Secrets"
|
||||
@docPath="/docs/secrets/gcpkms/index.html"
|
||||
>
|
||||
<p>
|
||||
The Google Cloud KMS Vault secrets engine provides encryption and key management via Google Cloud KMS. It supports management of keys, including creation, rotation, and revocation, as well as encrypting and decrypting data with managed keys. This enables management of KMS keys through Vault's policies and IAM system.
|
||||
</p>
|
||||
</WizardSection>
|
||||
1
ui/app/templates/svg/icons/enable/gcpkms.hbs
Normal file
1
ui/app/templates/svg/icons/enable/gcpkms.hbs
Normal file
@ -0,0 +1 @@
|
||||
<svg width="{{size}}" height="{{size}}" viewBox="0 0 48 48" xmlns="http://www.w3.org/2000/svg"><g fill="none" fill-rule="nonzero"><path d="M29.218 15.807h1.213l3.454-3.454.17-1.467a15.527 15.527 0 0 0-25.26 7.576 1.879 1.879 0 0 1 1.211-.073l6.91-1.14s.351-.581.533-.545a8.618 8.618 0 0 1 11.794-.897h-.025z" fill="#EA4335"/><path d="M38.806 18.462a15.564 15.564 0 0 0-4.69-7.564l-4.849 4.849a8.618 8.618 0 0 1 3.164 6.836v.86a4.315 4.315 0 0 1 0 8.631H23.8l-.861.873v5.176l.86.86h8.63a11.224 11.224 0 0 0 6.376-20.521z" fill="#4285F4"/><path d="M15.158 38.935h8.63v-6.91h-8.63a4.29 4.29 0 0 1-1.782-.387l-1.212.375-3.479 3.455-.303 1.212a11.164 11.164 0 0 0 6.776 2.255z" fill="#34A853"/><path d="M15.158 16.523a11.224 11.224 0 0 0-6.776 20.12l5.006-5.005a4.315 4.315 0 1 1 5.71-5.71l5.005-5.005a11.212 11.212 0 0 0-8.945-4.4z" fill="#FBBC05"/></g></svg>
|
||||
|
After Width: | Height: | Size: 856 B |
31
ui/tests/acceptance/secrets/backend/gcpkms/secrets-test.js
Normal file
31
ui/tests/acceptance/secrets/backend/gcpkms/secrets-test.js
Normal file
@ -0,0 +1,31 @@
|
||||
import { currentRouteName } from '@ember/test-helpers';
|
||||
import { module, test } from 'qunit';
|
||||
import { setupApplicationTest } from 'ember-qunit';
|
||||
import mountSecrets from 'vault/tests/pages/settings/mount-secret-backend';
|
||||
import backendsPage from 'vault/tests/pages/secrets/backends';
|
||||
import authPage from 'vault/tests/pages/auth';
|
||||
import withFlash from 'vault/tests/helpers/with-flash';
|
||||
|
||||
module('Acceptance | gcpkms/enable', function(hooks) {
|
||||
setupApplicationTest(hooks);
|
||||
|
||||
hooks.beforeEach(function() {
|
||||
return authPage.login();
|
||||
});
|
||||
|
||||
test('enable gcpkms', async function(assert) {
|
||||
let enginePath = `gcpkms-${new Date().getTime()}`;
|
||||
await mountSecrets.visit();
|
||||
await mountSecrets.selectType('gcpkms');
|
||||
await withFlash(
|
||||
mountSecrets
|
||||
.next()
|
||||
.path(enginePath)
|
||||
.submit()
|
||||
);
|
||||
|
||||
assert.equal(currentRouteName(), 'vault.cluster.secrets.backends', 'redirects to the backends page');
|
||||
|
||||
assert.ok(backendsPage.rows.filterBy('path', `${enginePath}/`)[0], 'shows the gcpkms engine');
|
||||
});
|
||||
});
|
||||
Loading…
x
Reference in New Issue
Block a user