diff --git a/acceptance/framework/vault/helpers.go b/acceptance/framework/vault/helpers.go index 5d8cf1f49c..0cf64e6d02 100644 --- a/acceptance/framework/vault/helpers.go +++ b/acceptance/framework/vault/helpers.go @@ -166,12 +166,12 @@ func (config *SaveVaultSecretConfiguration) Save(t *testing.T, vaultClient *vapi path "%s" { capabilities = ["read"] }`, config.Path) - // Create the Vault Policy for the gossip key. + // Create a Vault Policy for the secret with read capabilities. logger.Log(t, "Creating policy") err := vaultClient.Sys().PutPolicy(config.PolicyName, policy) require.NoError(t, err) - // Create the gossip secret. + // Create the KV2 secret. logger.Logf(t, "Creating the %s secret", config.Path) params := map[string]interface{}{ "data": map[string]interface{}{ @@ -182,7 +182,7 @@ func (config *SaveVaultSecretConfiguration) Save(t *testing.T, vaultClient *vapi require.NoError(t, err) } -// CreateConnectCAPolicyForDatacenter creates the Vault Policy for the connect-ca in a given datacenter. +// CreateConnectCARootAndIntermediatePKIPolicy creates the Vault Policy for the connect-ca in a given datacenter. func CreateConnectCARootAndIntermediatePKIPolicy(t *testing.T, vaultClient *vapi.Client, policyName, rootPath, intermediatePath string) { // connectCAPolicy allows Consul to bootstrap all certificates for the service mesh in Vault. // Adapted from https://www.consul.io/docs/connect/ca/vault#consul-managed-pki-paths.