​
Select Service
ves-io-schema-secret_policy_rule-API-Replace
Published April 5, 2023 | Last modified May 30, 2025
Examples of replacing secret_policy_rule
Usecase:
Replace secret-policy-rule-1
Request using vesctl:
vesctl configuration replace secret_policy_rule -i secret_policy_rule.yaml
where file secret_policy_rule.yaml has following contents (secret_policy_rule.ReplaceRequest):
RequestJSON:
{
"metadata": {
"name": "secret-policy-rule-1",
"namespace": "documentation"
},
"spec": {
"action": "ALLOW",
"client_name_matcher": {
"regex_values": [
"rakar\\.re(\\d)*\\.int\\.ves\\.io"
]
}
}
}
Copied!
vesctl yaml response: None
Request using curl:
curl -X 'PUT' -d '{"metadata":{"name":"secret-policy-rule-1","namespace":"documentation"},"spec":{"action":"ALLOW","client_name_matcher":{"regex_values":["rakar\\.re(\\d)*\\.int\\.ves\\.io"]}}}' -H 'X-Volterra-Useragent: v1/pgm=_var_folders_q2_3kp8z3zs0x5_m7pk1bgb0_ph0000gp_T_go-build1497866850_b001_apidocs.test/host=MTY6VVHQPH/svc=S:examplesvc/site=mytestce01' 'https://acmecorp.console.ves.volterra.io/api/secret_management/namespaces/documentation/secret_policy_rules/secret-policy-rule-1'
Copied!
curl response:
HTTP/1.1 200 OK
Content-Length: 4
Content-Type: application/json
Date: Fri, 30 May 2025 01:21:22 GMT
Vary: Accept-Encoding
{
}
Copied!