ves-io-schema-secret_policy_rule-API-Get

Examples of getting secretpolicyrule

Usecase:

Get secret-policy-rule-1

Request using vesctl:

vesctl configuration get secret_policy_rule secret-policy-rule-1 --namespace documentation

vesctl yaml response:

metadata:
  annotations: {}
  labels: {}
  name: secret-policy-rule-1
  namespace: documentation
object:
  metadata:
    annotations: {}
    labels: {}
    name: secret-policy-rule-1
    namespace: documentation
    uid: 4d2d334c-4e7d-4ff1-8d84-366116f7e31d
  spec:
    gcSpec:
      action: ALLOW
      clientNameMatcher:
        exactValues: []
        regexValues:
        - akar\.gc(\d)*\.int\.ves\.io
        transformers: []
  systemMetadata:
    creationTimestamp: "2020-09-23T09:53:57.282782200Z"
    creatorClass: examplesvc
    creatorId: examplesvc
    finalizers: []
    namespace:
    - kind: namespace
      name: documentation
      tenant: acmecorp
    tenant: acmecorp
    traceInfo: 706abd903fc63e5b:706abd903fc63e5b:0:1
    uid: 4d2d334c-4e7d-4ff1-8d84-366116f7e31d
resourceVersion: "623"
spec:
  action: ALLOW
  clientNameMatcher:
    exactValues: []
    regexValues:
    - akar\.gc(\d)*\.int\.ves\.io
status: []
systemMetadata:
  creationTimestamp: "2020-09-23T09:53:57.282782200Z"
  creatorClass: examplesvc
  creatorId: examplesvc
  finalizers: []
  tenant: acmecorp
  uid: 4d2d334c-4e7d-4ff1-8d84-366116f7e31d

Request using curl:

curl -X 'GET' -H 'X-Volterra-Useragent: v1/pgm=_tmp_go-build823219857_b001_apidocs.test/host=docker-desktop' 'https://acmecorp.console.ves.volterra.io/api/secret_management/namespaces/documentation/secret_policy_rules/secret-policy-rule-1?response_format=0'

curl response:

HTTP/1.1 200 OK
Content-Type: application/json
Date: Wed, 23 Sep 2020 09:53:57 GMT
Vary: Accept-Encoding

{
  "object": {
    "metadata": {
      "name": "secret-policy-rule-1",
      "namespace": "documentation",
      "uid": "4d2d334c-4e7d-4ff1-8d84-366116f7e31d",
      "labels": {
      },
      "annotations": {
      },
      "description": "",
      "disable": false
    },
    "system_metadata": {
      "uid": "4d2d334c-4e7d-4ff1-8d84-366116f7e31d",
      "creation_timestamp": "2020-09-23T09:53:57.282782200Z",
      "deletion_timestamp": null,
      "modification_timestamp": null,
      "initializers": null,
      "finalizers": [
      ],
      "tenant": "acmecorp",
      "creator_class": "examplesvc",
      "creator_id": "examplesvc",
      "creator_cookie": "",
      "trace_info": "706abd903fc63e5b:706abd903fc63e5b:0:1",
      "object_index": 0,
      "namespace": [
        {
          "kind": "namespace",
          "uid": "",
          "tenant": "acmecorp",
          "namespace": "",
          "name": "documentation"
        }
      ],
      "owner_view": null
    },
    "spec": {
      "gc_spec": {
        "action": "ALLOW",
        "client_name": "",
        "client_selector": null,
        "client_name_matcher": {
          "exact_values": [
          ],
          "regex_values": [
            "akar\.gc(\d)*\.int\.ves\.io"
          ],
          "transformers": [
          ]
        },
        "label_matcher": null
      }
    }
  },
  "create_form": null,
  "replace_form": null,
  "resource_version": "623",
  "metadata": {
    "name": "secret-policy-rule-1",
    "namespace": "documentation",
    "labels": {
    },
    "annotations": {
    },
    "description": "",
    "disable": false
  },
  "system_metadata": {
    "uid": "4d2d334c-4e7d-4ff1-8d84-366116f7e31d",
    "creation_timestamp": "2020-09-23T09:53:57.282782200Z",
    "deletion_timestamp": null,
    "modification_timestamp": null,
    "initializers": null,
    "finalizers": [
    ],
    "tenant": "acmecorp",
    "creator_class": "examplesvc",
    "creator_id": "examplesvc",
    "object_index": 0,
    "owner_view": null
  },
  "spec": {
    "action": "ALLOW",
    "client_name": "",
    "client_selector": null,
    "client_name_matcher": {
      "exact_values": [
      ],
      "regex_values": [
        "akar\.gc(\d)*\.int\.ves\.io"
      ]
    },
    "label_matcher": null
  },
  "status": [
  ]
}