ves-io-schema-secret_policy_rule-API-Replace

Examples of replacing secretpolicyrule

Usecase:

Replace secret-policy-rule-1

Request using vesctl:

vesctl configuration replace secret_policy_rule -i secret_policy_rule.yaml

where file secretpolicyrule.yaml has following contents (secretpolicyrule.ReplaceRequest):

metadata:
  name: secret-policy-rule-1
  namespace: documentation
spec:
  action: ALLOW
  clientNameMatcher:
    regexValues:
    - rakar\.re(\d)*\.int\.ves\.io

vesctl yaml response: None

Request using curl:

curl -X 'PUT' -d '{"metadata":{"name":"secret-policy-rule-1","namespace":"documentation"},"spec":{"action":"ALLOW","clientNameMatcher":{"regexValues":["rakar\.re(\d)*\.int\.ves\.io"]}}}' -H 'X-Volterra-Useragent: v1/pgm=_tmp_go-build823219857_b001_apidocs.test/host=docker-desktop' 'https://acmecorp.console.ves.volterra.io/api/secret_management/namespaces/documentation/secret_policy_rules/secret-policy-rule-1'

curl response:

HTTP/1.1 200 OK
Content-Length: 4
Content-Type: application/json
Date: Wed, 23 Sep 2020 09:53:57 GMT
Vary: Accept-Encoding

{

}