From f1ace61bee7a7e5875d66e1ab828fe47d6145688 Mon Sep 17 00:00:00 2001 From: Iryna Shustava Date: Mon, 22 Nov 2021 15:38:34 -0700 Subject: [PATCH] rename rules->policy --- acceptance/tests/vault/vault_test.go | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/acceptance/tests/vault/vault_test.go b/acceptance/tests/vault/vault_test.go index 78fe92ded7..d5069f389a 100644 --- a/acceptance/tests/vault/vault_test.go +++ b/acceptance/tests/vault/vault_test.go @@ -15,14 +15,14 @@ import ( ) const ( - gossipRules = ` + gossipPolicy = ` path "consul/data/secret/gossip" { capabilities = ["read"] }` // connectCAPolicy allows Consul to bootstrap all certificates for the service mesh in Vault. // Adapted from https://www.consul.io/docs/connect/ca/vault#consul-managed-pki-paths. - connectCARules = ` + connectCAPolicy = ` path "/sys/mounts" { capabilities = [ "read" ] } @@ -65,10 +65,10 @@ func TestVault(t *testing.T) { // Create the Vault Policy for the gossip key. logger.Log(t, "Creating policies") - err := vaultClient.Sys().PutPolicy("consul-gossip", gossipRules) + err := vaultClient.Sys().PutPolicy("consul-gossip", gossipPolicy) require.NoError(t, err) - err = vaultClient.Sys().PutPolicy("connect-ca", connectCARules) + err = vaultClient.Sys().PutPolicy("connect-ca", connectCAPolicy) require.NoError(t, err) // Create the Auth Roles for consul-server and consul-client.