nomad.AclToken
Explore with Pulumi AI
Example Usage
Creating a token with limited policies:
import * as pulumi from "@pulumi/pulumi";
import * as nomad from "@pulumi/nomad";
const dakota = new nomad.AclToken("dakota", {
name: "Dakota",
type: "client",
policies: [
"dev",
"qa",
],
});
import pulumi
import pulumi_nomad as nomad
dakota = nomad.AclToken("dakota",
name="Dakota",
type="client",
policies=[
"dev",
"qa",
])
package main
import (
"github.com/pulumi/pulumi-nomad/sdk/v2/go/nomad"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := nomad.NewAclToken(ctx, "dakota", &nomad.AclTokenArgs{
Name: pulumi.String("Dakota"),
Type: pulumi.String("client"),
Policies: pulumi.StringArray{
pulumi.String("dev"),
pulumi.String("qa"),
},
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Nomad = Pulumi.Nomad;
return await Deployment.RunAsync(() =>
{
var dakota = new Nomad.AclToken("dakota", new()
{
Name = "Dakota",
Type = "client",
Policies = new[]
{
"dev",
"qa",
},
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.nomad.AclToken;
import com.pulumi.nomad.AclTokenArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var dakota = new AclToken("dakota", AclTokenArgs.builder()
.name("Dakota")
.type("client")
.policies(
"dev",
"qa")
.build());
}
}
resources:
dakota:
type: nomad:AclToken
properties:
name: Dakota
type: client
policies:
- dev
- qa
Creating a global token that will be replicated to all regions:
import * as pulumi from "@pulumi/pulumi";
import * as nomad from "@pulumi/nomad";
const dakota = new nomad.AclToken("dakota", {
name: "Dakota",
type: "client",
policies: [
"dev",
"qa",
],
global: true,
});
import pulumi
import pulumi_nomad as nomad
dakota = nomad.AclToken("dakota",
name="Dakota",
type="client",
policies=[
"dev",
"qa",
],
global_=True)
package main
import (
"github.com/pulumi/pulumi-nomad/sdk/v2/go/nomad"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := nomad.NewAclToken(ctx, "dakota", &nomad.AclTokenArgs{
Name: pulumi.String("Dakota"),
Type: pulumi.String("client"),
Policies: pulumi.StringArray{
pulumi.String("dev"),
pulumi.String("qa"),
},
Global: pulumi.Bool(true),
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Nomad = Pulumi.Nomad;
return await Deployment.RunAsync(() =>
{
var dakota = new Nomad.AclToken("dakota", new()
{
Name = "Dakota",
Type = "client",
Policies = new[]
{
"dev",
"qa",
},
Global = true,
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.nomad.AclToken;
import com.pulumi.nomad.AclTokenArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var dakota = new AclToken("dakota", AclTokenArgs.builder()
.name("Dakota")
.type("client")
.policies(
"dev",
"qa")
.global(true)
.build());
}
}
resources:
dakota:
type: nomad:AclToken
properties:
name: Dakota
type: client
policies:
- dev
- qa
global: true
Creating a token with full access to the cluster:
import * as pulumi from "@pulumi/pulumi";
import * as nomad from "@pulumi/nomad";
const iman = new nomad.AclToken("iman", {
name: "Iman",
type: "management",
});
import pulumi
import pulumi_nomad as nomad
iman = nomad.AclToken("iman",
name="Iman",
type="management")
package main
import (
"github.com/pulumi/pulumi-nomad/sdk/v2/go/nomad"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := nomad.NewAclToken(ctx, "iman", &nomad.AclTokenArgs{
Name: pulumi.String("Iman"),
Type: pulumi.String("management"),
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Nomad = Pulumi.Nomad;
return await Deployment.RunAsync(() =>
{
var iman = new Nomad.AclToken("iman", new()
{
Name = "Iman",
Type = "management",
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.nomad.AclToken;
import com.pulumi.nomad.AclTokenArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var iman = new AclToken("iman", AclTokenArgs.builder()
.name("Iman")
.type("management")
.build());
}
}
resources:
iman:
type: nomad:AclToken
properties:
name: Iman
type: management
Accessing the token:
import * as pulumi from "@pulumi/pulumi";
import * as nomad from "@pulumi/nomad";
const token = new nomad.AclToken("token", {
type: "client",
policies: ["dev"],
});
export const nomadToken = token.secretId;
import pulumi
import pulumi_nomad as nomad
token = nomad.AclToken("token",
type="client",
policies=["dev"])
pulumi.export("nomadToken", token.secret_id)
package main
import (
"github.com/pulumi/pulumi-nomad/sdk/v2/go/nomad"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
token, err := nomad.NewAclToken(ctx, "token", &nomad.AclTokenArgs{
Type: pulumi.String("client"),
Policies: pulumi.StringArray{
pulumi.String("dev"),
},
})
if err != nil {
return err
}
ctx.Export("nomadToken", token.SecretId)
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Nomad = Pulumi.Nomad;
return await Deployment.RunAsync(() =>
{
var token = new Nomad.AclToken("token", new()
{
Type = "client",
Policies = new[]
{
"dev",
},
});
return new Dictionary<string, object?>
{
["nomadToken"] = token.SecretId,
};
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.nomad.AclToken;
import com.pulumi.nomad.AclTokenArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var token = new AclToken("token", AclTokenArgs.builder()
.type("client")
.policies("dev")
.build());
ctx.export("nomadToken", token.secretId());
}
}
resources:
token:
type: nomad:AclToken
properties:
type: client
policies:
- dev
outputs:
nomadToken: ${token.secretId}
Create AclToken Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new AclToken(name: string, args: AclTokenArgs, opts?: CustomResourceOptions);
@overload
def AclToken(resource_name: str,
args: AclTokenArgs,
opts: Optional[ResourceOptions] = None)
@overload
def AclToken(resource_name: str,
opts: Optional[ResourceOptions] = None,
type: Optional[str] = None,
expiration_ttl: Optional[str] = None,
global_: Optional[bool] = None,
name: Optional[str] = None,
policies: Optional[Sequence[str]] = None,
roles: Optional[Sequence[AclTokenRoleArgs]] = None)
func NewAclToken(ctx *Context, name string, args AclTokenArgs, opts ...ResourceOption) (*AclToken, error)
public AclToken(string name, AclTokenArgs args, CustomResourceOptions? opts = null)
public AclToken(String name, AclTokenArgs args)
public AclToken(String name, AclTokenArgs args, CustomResourceOptions options)
type: nomad:AclToken
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args AclTokenArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args AclTokenArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args AclTokenArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args AclTokenArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args AclTokenArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var aclTokenResource = new Nomad.AclToken("aclTokenResource", new()
{
Type = "string",
ExpirationTtl = "string",
Global = false,
Name = "string",
Policies = new[]
{
"string",
},
Roles = new[]
{
new Nomad.Inputs.AclTokenRoleArgs
{
Id = "string",
Name = "string",
},
},
});
example, err := nomad.NewAclToken(ctx, "aclTokenResource", &nomad.AclTokenArgs{
Type: pulumi.String("string"),
ExpirationTtl: pulumi.String("string"),
Global: pulumi.Bool(false),
Name: pulumi.String("string"),
Policies: pulumi.StringArray{
pulumi.String("string"),
},
Roles: nomad.AclTokenRoleArray{
&nomad.AclTokenRoleArgs{
Id: pulumi.String("string"),
Name: pulumi.String("string"),
},
},
})
var aclTokenResource = new AclToken("aclTokenResource", AclTokenArgs.builder()
.type("string")
.expirationTtl("string")
.global(false)
.name("string")
.policies("string")
.roles(AclTokenRoleArgs.builder()
.id("string")
.name("string")
.build())
.build());
acl_token_resource = nomad.AclToken("aclTokenResource",
type="string",
expiration_ttl="string",
global_=False,
name="string",
policies=["string"],
roles=[{
"id": "string",
"name": "string",
}])
const aclTokenResource = new nomad.AclToken("aclTokenResource", {
type: "string",
expirationTtl: "string",
global: false,
name: "string",
policies: ["string"],
roles: [{
id: "string",
name: "string",
}],
});
type: nomad:AclToken
properties:
expirationTtl: string
global: false
name: string
policies:
- string
roles:
- id: string
name: string
type: string
AclToken Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The AclToken resource accepts the following input properties:
- Type string
(string: <required>)
- The type of token this is. Useclient
for tokens that will have policies associated with them. Usemanagement
for tokens that can perform any action.- Expiration
Ttl string (string: "")
- Provides a TTL for the token in the form of a time duration such as"5m"
or"1h"
.In addition to the above arguments, the following attributes are exported and can be referenced:
- Global bool
(bool: false)
- Whether the token should be replicated to all regions, or if it will only be used in the region it was created in.- Name string
(string: "")
- A human-friendly name for this token.- Policies List<string>
(set: [])
- A set of policy names to associate with this token. Must be set onclient
-type tokens, must not be set onmanagement
-type tokens. Policies do not need to exist before being used here.- Roles
List<Acl
Token Role> (set: [])
- The list of roles attached to the token. Each entry hasname
andid
attributes. It may be used multiple times.
- Type string
(string: <required>)
- The type of token this is. Useclient
for tokens that will have policies associated with them. Usemanagement
for tokens that can perform any action.- Expiration
Ttl string (string: "")
- Provides a TTL for the token in the form of a time duration such as"5m"
or"1h"
.In addition to the above arguments, the following attributes are exported and can be referenced:
- Global bool
(bool: false)
- Whether the token should be replicated to all regions, or if it will only be used in the region it was created in.- Name string
(string: "")
- A human-friendly name for this token.- Policies []string
(set: [])
- A set of policy names to associate with this token. Must be set onclient
-type tokens, must not be set onmanagement
-type tokens. Policies do not need to exist before being used here.- Roles
[]Acl
Token Role Args (set: [])
- The list of roles attached to the token. Each entry hasname
andid
attributes. It may be used multiple times.
- type String
(string: <required>)
- The type of token this is. Useclient
for tokens that will have policies associated with them. Usemanagement
for tokens that can perform any action.- expiration
Ttl String (string: "")
- Provides a TTL for the token in the form of a time duration such as"5m"
or"1h"
.In addition to the above arguments, the following attributes are exported and can be referenced:
- global Boolean
(bool: false)
- Whether the token should be replicated to all regions, or if it will only be used in the region it was created in.- name String
(string: "")
- A human-friendly name for this token.- policies List<String>
(set: [])
- A set of policy names to associate with this token. Must be set onclient
-type tokens, must not be set onmanagement
-type tokens. Policies do not need to exist before being used here.- roles
List<Acl
Token Role> (set: [])
- The list of roles attached to the token. Each entry hasname
andid
attributes. It may be used multiple times.
- type string
(string: <required>)
- The type of token this is. Useclient
for tokens that will have policies associated with them. Usemanagement
for tokens that can perform any action.- expiration
Ttl string (string: "")
- Provides a TTL for the token in the form of a time duration such as"5m"
or"1h"
.In addition to the above arguments, the following attributes are exported and can be referenced:
- global boolean
(bool: false)
- Whether the token should be replicated to all regions, or if it will only be used in the region it was created in.- name string
(string: "")
- A human-friendly name for this token.- policies string[]
(set: [])
- A set of policy names to associate with this token. Must be set onclient
-type tokens, must not be set onmanagement
-type tokens. Policies do not need to exist before being used here.- roles
Acl
Token Role[] (set: [])
- The list of roles attached to the token. Each entry hasname
andid
attributes. It may be used multiple times.
- type str
(string: <required>)
- The type of token this is. Useclient
for tokens that will have policies associated with them. Usemanagement
for tokens that can perform any action.- expiration_
ttl str (string: "")
- Provides a TTL for the token in the form of a time duration such as"5m"
or"1h"
.In addition to the above arguments, the following attributes are exported and can be referenced:
- global_ bool
(bool: false)
- Whether the token should be replicated to all regions, or if it will only be used in the region it was created in.- name str
(string: "")
- A human-friendly name for this token.- policies Sequence[str]
(set: [])
- A set of policy names to associate with this token. Must be set onclient
-type tokens, must not be set onmanagement
-type tokens. Policies do not need to exist before being used here.- roles
Sequence[Acl
Token Role Args] (set: [])
- The list of roles attached to the token. Each entry hasname
andid
attributes. It may be used multiple times.
- type String
(string: <required>)
- The type of token this is. Useclient
for tokens that will have policies associated with them. Usemanagement
for tokens that can perform any action.- expiration
Ttl String (string: "")
- Provides a TTL for the token in the form of a time duration such as"5m"
or"1h"
.In addition to the above arguments, the following attributes are exported and can be referenced:
- global Boolean
(bool: false)
- Whether the token should be replicated to all regions, or if it will only be used in the region it was created in.- name String
(string: "")
- A human-friendly name for this token.- policies List<String>
(set: [])
- A set of policy names to associate with this token. Must be set onclient
-type tokens, must not be set onmanagement
-type tokens. Policies do not need to exist before being used here.- roles List<Property Map>
(set: [])
- The list of roles attached to the token. Each entry hasname
andid
attributes. It may be used multiple times.
Outputs
All input properties are implicitly available as output properties. Additionally, the AclToken resource produces the following output properties:
- Accessor
Id string (string)
- A non-sensitive identifier for this token that can be logged and shared safely without granting any access to the cluster.- Create
Time string (string)
- The timestamp the token was created.- Expiration
Time string (string)
- The timestamp after which the token is considered expired and eligible for destruction.- Id string
- The provider-assigned unique ID for this managed resource.
- Secret
Id string (string)
- The token value itself, which is presented for access to the cluster.
- Accessor
Id string (string)
- A non-sensitive identifier for this token that can be logged and shared safely without granting any access to the cluster.- Create
Time string (string)
- The timestamp the token was created.- Expiration
Time string (string)
- The timestamp after which the token is considered expired and eligible for destruction.- Id string
- The provider-assigned unique ID for this managed resource.
- Secret
Id string (string)
- The token value itself, which is presented for access to the cluster.
- accessor
Id String (string)
- A non-sensitive identifier for this token that can be logged and shared safely without granting any access to the cluster.- create
Time String (string)
- The timestamp the token was created.- expiration
Time String (string)
- The timestamp after which the token is considered expired and eligible for destruction.- id String
- The provider-assigned unique ID for this managed resource.
- secret
Id String (string)
- The token value itself, which is presented for access to the cluster.
- accessor
Id string (string)
- A non-sensitive identifier for this token that can be logged and shared safely without granting any access to the cluster.- create
Time string (string)
- The timestamp the token was created.- expiration
Time string (string)
- The timestamp after which the token is considered expired and eligible for destruction.- id string
- The provider-assigned unique ID for this managed resource.
- secret
Id string (string)
- The token value itself, which is presented for access to the cluster.
- accessor_
id str (string)
- A non-sensitive identifier for this token that can be logged and shared safely without granting any access to the cluster.- create_
time str (string)
- The timestamp the token was created.- expiration_
time str (string)
- The timestamp after which the token is considered expired and eligible for destruction.- id str
- The provider-assigned unique ID for this managed resource.
- secret_
id str (string)
- The token value itself, which is presented for access to the cluster.
- accessor
Id String (string)
- A non-sensitive identifier for this token that can be logged and shared safely without granting any access to the cluster.- create
Time String (string)
- The timestamp the token was created.- expiration
Time String (string)
- The timestamp after which the token is considered expired and eligible for destruction.- id String
- The provider-assigned unique ID for this managed resource.
- secret
Id String (string)
- The token value itself, which is presented for access to the cluster.
Look up Existing AclToken Resource
Get an existing AclToken resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: AclTokenState, opts?: CustomResourceOptions): AclToken
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
accessor_id: Optional[str] = None,
create_time: Optional[str] = None,
expiration_time: Optional[str] = None,
expiration_ttl: Optional[str] = None,
global_: Optional[bool] = None,
name: Optional[str] = None,
policies: Optional[Sequence[str]] = None,
roles: Optional[Sequence[AclTokenRoleArgs]] = None,
secret_id: Optional[str] = None,
type: Optional[str] = None) -> AclToken
func GetAclToken(ctx *Context, name string, id IDInput, state *AclTokenState, opts ...ResourceOption) (*AclToken, error)
public static AclToken Get(string name, Input<string> id, AclTokenState? state, CustomResourceOptions? opts = null)
public static AclToken get(String name, Output<String> id, AclTokenState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Accessor
Id string (string)
- A non-sensitive identifier for this token that can be logged and shared safely without granting any access to the cluster.- Create
Time string (string)
- The timestamp the token was created.- Expiration
Time string (string)
- The timestamp after which the token is considered expired and eligible for destruction.- Expiration
Ttl string (string: "")
- Provides a TTL for the token in the form of a time duration such as"5m"
or"1h"
.In addition to the above arguments, the following attributes are exported and can be referenced:
- Global bool
(bool: false)
- Whether the token should be replicated to all regions, or if it will only be used in the region it was created in.- Name string
(string: "")
- A human-friendly name for this token.- Policies List<string>
(set: [])
- A set of policy names to associate with this token. Must be set onclient
-type tokens, must not be set onmanagement
-type tokens. Policies do not need to exist before being used here.- Roles
List<Acl
Token Role> (set: [])
- The list of roles attached to the token. Each entry hasname
andid
attributes. It may be used multiple times.- Secret
Id string (string)
- The token value itself, which is presented for access to the cluster.- Type string
(string: <required>)
- The type of token this is. Useclient
for tokens that will have policies associated with them. Usemanagement
for tokens that can perform any action.
- Accessor
Id string (string)
- A non-sensitive identifier for this token that can be logged and shared safely without granting any access to the cluster.- Create
Time string (string)
- The timestamp the token was created.- Expiration
Time string (string)
- The timestamp after which the token is considered expired and eligible for destruction.- Expiration
Ttl string (string: "")
- Provides a TTL for the token in the form of a time duration such as"5m"
or"1h"
.In addition to the above arguments, the following attributes are exported and can be referenced:
- Global bool
(bool: false)
- Whether the token should be replicated to all regions, or if it will only be used in the region it was created in.- Name string
(string: "")
- A human-friendly name for this token.- Policies []string
(set: [])
- A set of policy names to associate with this token. Must be set onclient
-type tokens, must not be set onmanagement
-type tokens. Policies do not need to exist before being used here.- Roles
[]Acl
Token Role Args (set: [])
- The list of roles attached to the token. Each entry hasname
andid
attributes. It may be used multiple times.- Secret
Id string (string)
- The token value itself, which is presented for access to the cluster.- Type string
(string: <required>)
- The type of token this is. Useclient
for tokens that will have policies associated with them. Usemanagement
for tokens that can perform any action.
- accessor
Id String (string)
- A non-sensitive identifier for this token that can be logged and shared safely without granting any access to the cluster.- create
Time String (string)
- The timestamp the token was created.- expiration
Time String (string)
- The timestamp after which the token is considered expired and eligible for destruction.- expiration
Ttl String (string: "")
- Provides a TTL for the token in the form of a time duration such as"5m"
or"1h"
.In addition to the above arguments, the following attributes are exported and can be referenced:
- global Boolean
(bool: false)
- Whether the token should be replicated to all regions, or if it will only be used in the region it was created in.- name String
(string: "")
- A human-friendly name for this token.- policies List<String>
(set: [])
- A set of policy names to associate with this token. Must be set onclient
-type tokens, must not be set onmanagement
-type tokens. Policies do not need to exist before being used here.- roles
List<Acl
Token Role> (set: [])
- The list of roles attached to the token. Each entry hasname
andid
attributes. It may be used multiple times.- secret
Id String (string)
- The token value itself, which is presented for access to the cluster.- type String
(string: <required>)
- The type of token this is. Useclient
for tokens that will have policies associated with them. Usemanagement
for tokens that can perform any action.
- accessor
Id string (string)
- A non-sensitive identifier for this token that can be logged and shared safely without granting any access to the cluster.- create
Time string (string)
- The timestamp the token was created.- expiration
Time string (string)
- The timestamp after which the token is considered expired and eligible for destruction.- expiration
Ttl string (string: "")
- Provides a TTL for the token in the form of a time duration such as"5m"
or"1h"
.In addition to the above arguments, the following attributes are exported and can be referenced:
- global boolean
(bool: false)
- Whether the token should be replicated to all regions, or if it will only be used in the region it was created in.- name string
(string: "")
- A human-friendly name for this token.- policies string[]
(set: [])
- A set of policy names to associate with this token. Must be set onclient
-type tokens, must not be set onmanagement
-type tokens. Policies do not need to exist before being used here.- roles
Acl
Token Role[] (set: [])
- The list of roles attached to the token. Each entry hasname
andid
attributes. It may be used multiple times.- secret
Id string (string)
- The token value itself, which is presented for access to the cluster.- type string
(string: <required>)
- The type of token this is. Useclient
for tokens that will have policies associated with them. Usemanagement
for tokens that can perform any action.
- accessor_
id str (string)
- A non-sensitive identifier for this token that can be logged and shared safely without granting any access to the cluster.- create_
time str (string)
- The timestamp the token was created.- expiration_
time str (string)
- The timestamp after which the token is considered expired and eligible for destruction.- expiration_
ttl str (string: "")
- Provides a TTL for the token in the form of a time duration such as"5m"
or"1h"
.In addition to the above arguments, the following attributes are exported and can be referenced:
- global_ bool
(bool: false)
- Whether the token should be replicated to all regions, or if it will only be used in the region it was created in.- name str
(string: "")
- A human-friendly name for this token.- policies Sequence[str]
(set: [])
- A set of policy names to associate with this token. Must be set onclient
-type tokens, must not be set onmanagement
-type tokens. Policies do not need to exist before being used here.- roles
Sequence[Acl
Token Role Args] (set: [])
- The list of roles attached to the token. Each entry hasname
andid
attributes. It may be used multiple times.- secret_
id str (string)
- The token value itself, which is presented for access to the cluster.- type str
(string: <required>)
- The type of token this is. Useclient
for tokens that will have policies associated with them. Usemanagement
for tokens that can perform any action.
- accessor
Id String (string)
- A non-sensitive identifier for this token that can be logged and shared safely without granting any access to the cluster.- create
Time String (string)
- The timestamp the token was created.- expiration
Time String (string)
- The timestamp after which the token is considered expired and eligible for destruction.- expiration
Ttl String (string: "")
- Provides a TTL for the token in the form of a time duration such as"5m"
or"1h"
.In addition to the above arguments, the following attributes are exported and can be referenced:
- global Boolean
(bool: false)
- Whether the token should be replicated to all regions, or if it will only be used in the region it was created in.- name String
(string: "")
- A human-friendly name for this token.- policies List<String>
(set: [])
- A set of policy names to associate with this token. Must be set onclient
-type tokens, must not be set onmanagement
-type tokens. Policies do not need to exist before being used here.- roles List<Property Map>
(set: [])
- The list of roles attached to the token. Each entry hasname
andid
attributes. It may be used multiple times.- secret
Id String (string)
- The token value itself, which is presented for access to the cluster.- type String
(string: <required>)
- The type of token this is. Useclient
for tokens that will have policies associated with them. Usemanagement
for tokens that can perform any action.
Supporting Types
AclTokenRole, AclTokenRoleArgs
Package Details
- Repository
- HashiCorp Nomad pulumi/pulumi-nomad
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
nomad
Terraform Provider.