ves-io-schema-secret_policy-API-Get

Examples of getting secret_policy

Usecase:

Get secret-policy-1

Request using vesctl:

vesctl configuration get secret_policy secret-policy-1 --namespace documentation

vesctl yaml response:

metadata:
  annotations: {}
  labels: {}
  name: secret-policy-1
  namespace: documentation
object:
  metadata:
    annotations: {}
    labels: {}
    name: secret-policy-1
    namespace: documentation
    uid: 6ee7661a-cb96-435e-91f5-7f418e45e07d
  spec:
    gcSpec:
      rules:
      - kind: secret_policy_rule
        name: secret-policy-rule-1
        namespace: documentation
        tenant: acmecorp
  systemMetadata:
    creationTimestamp: "2020-09-16T10:50:47.604142100Z"
    creatorClass: examplesvc
    creatorId: examplesvc
    finalizers: []
    namespace:
    - kind: namespace
      name: documentation
      tenant: acmecorp
    tenant: acmecorp
    traceInfo: 40058eafb00694c0:40058eafb00694c0:0:1
    uid: 6ee7661a-cb96-435e-91f5-7f418e45e07d
resourceVersion: "562"
spec:
  rules:
  - kind: secret_policy_rule
    name: secret-policy-rule-1
    namespace: documentation
    tenant: acmecorp
status: []
systemMetadata:
  creationTimestamp: "2020-09-16T10:50:47.604142100Z"
  creatorClass: examplesvc
  creatorId: examplesvc
  finalizers: []
  tenant: acmecorp
  uid: 6ee7661a-cb96-435e-91f5-7f418e45e07d

Request using curl:

curl -X 'GET' -H 'X-Volterra-Useragent: v1/pgm=_tmp_go-build013258245_b001_apidocs.test/host=docker-desktop' 'https://acmecorp.console.ves.volterra.io/api/secret_management/namespaces/documentation/secret_policys/secret-policy-1?response_format=0'

curl response:

HTTP/1.1 200 OK
Content-Type: application/json
Date: Wed, 16 Sep 2020 10:50:47 GMT
Vary: Accept-Encoding

{
  "object": {
    "metadata": {
      "name": "secret-policy-1",
      "namespace": "documentation",
      "uid": "6ee7661a-cb96-435e-91f5-7f418e45e07d",
      "labels": {
      },
      "annotations": {
      },
      "description": "",
      "disable": false
    },
    "system_metadata": {
      "uid": "6ee7661a-cb96-435e-91f5-7f418e45e07d",
      "creation_timestamp": "2020-09-16T10:50:47.604142100Z",
      "deletion_timestamp": null,
      "modification_timestamp": null,
      "initializers": null,
      "finalizers": [
      ],
      "tenant": "acmecorp",
      "creator_class": "examplesvc",
      "creator_id": "examplesvc",
      "creator_cookie": "",
      "trace_info": "40058eafb00694c0:40058eafb00694c0:0:1",
      "object_index": 0,
      "namespace": [
        {
          "kind": "namespace",
          "uid": "",
          "tenant": "acmecorp",
          "namespace": "",
          "name": "documentation"
        }
      ],
      "owner_view": null
    },
    "spec": {
      "gc_spec": {
        "algo": "FIRST_MATCH",
        "rules": [
          {
            "kind": "secret_policy_rule",
            "uid": "",
            "tenant": "acmecorp",
            "namespace": "documentation",
            "name": "secret-policy-rule-1"
          }
        ],
        "allow_volterra": false
      }
    }
  },
  "create_form": null,
  "replace_form": null,
  "resource_version": "562",
  "metadata": {
    "name": "secret-policy-1",
    "namespace": "documentation",
    "labels": {
    },
    "annotations": {
    },
    "description": "",
    "disable": false
  },
  "system_metadata": {
    "uid": "6ee7661a-cb96-435e-91f5-7f418e45e07d",
    "creation_timestamp": "2020-09-16T10:50:47.604142100Z",
    "deletion_timestamp": null,
    "modification_timestamp": null,
    "initializers": null,
    "finalizers": [
    ],
    "tenant": "acmecorp",
    "creator_class": "examplesvc",
    "creator_id": "examplesvc",
    "object_index": 0,
    "owner_view": null
  },
  "spec": {
    "algo": "FIRST_MATCH",
    "rules": [
      {
        "kind": "secret_policy_rule",
        "uid": "",
        "tenant": "acmecorp",
        "namespace": "documentation",
        "name": "secret-policy-rule-1"
      }
    ],
    "allow_volterra": false
  },
  "status": [
  ]
}