Nomad v0.4.1, Apr 25 23
Nomad v0.4.1, Apr 25 23
nomad.AclToken
Explore with Pulumi AI
Example Usage
Creating a token with limited policies
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Nomad = Pulumi.Nomad;
return await Deployment.RunAsync(() =>
{
var dakota = new Nomad.AclToken("dakota", new()
{
Policies = new[]
{
"dev",
"qa",
},
Type = "client",
});
});
package main
import (
"github.com/pulumi/pulumi-nomad/sdk/go/nomad"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := nomad.NewAclToken(ctx, "dakota", &nomad.AclTokenArgs{
Policies: pulumi.StringArray{
pulumi.String("dev"),
pulumi.String("qa"),
},
Type: pulumi.String("client"),
})
if err != nil {
return err
}
return nil
})
}
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.nomad.AclToken;
import com.pulumi.nomad.AclTokenArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var dakota = new AclToken("dakota", AclTokenArgs.builder()
.policies(
"dev",
"qa")
.type("client")
.build());
}
}
import pulumi
import pulumi_nomad as nomad
dakota = nomad.AclToken("dakota",
policies=[
"dev",
"qa",
],
type="client")
import * as pulumi from "@pulumi/pulumi";
import * as nomad from "@pulumi/nomad";
const dakota = new nomad.AclToken("dakota", {
policies: [
"dev",
"qa",
],
type: "client",
});
resources:
dakota:
type: nomad:AclToken
properties:
policies:
- dev
- qa
type: client
Creating a global token that will be replicated to all regions
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Nomad = Pulumi.Nomad;
return await Deployment.RunAsync(() =>
{
var dakota = new Nomad.AclToken("dakota", new()
{
Global = true,
Policies = new[]
{
"dev",
"qa",
},
Type = "client",
});
});
package main
import (
"github.com/pulumi/pulumi-nomad/sdk/go/nomad"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := nomad.NewAclToken(ctx, "dakota", &nomad.AclTokenArgs{
Global: pulumi.Bool(true),
Policies: pulumi.StringArray{
pulumi.String("dev"),
pulumi.String("qa"),
},
Type: pulumi.String("client"),
})
if err != nil {
return err
}
return nil
})
}
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.nomad.AclToken;
import com.pulumi.nomad.AclTokenArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var dakota = new AclToken("dakota", AclTokenArgs.builder()
.global(true)
.policies(
"dev",
"qa")
.type("client")
.build());
}
}
import pulumi
import pulumi_nomad as nomad
dakota = nomad.AclToken("dakota",
global_=True,
policies=[
"dev",
"qa",
],
type="client")
import * as pulumi from "@pulumi/pulumi";
import * as nomad from "@pulumi/nomad";
const dakota = new nomad.AclToken("dakota", {
global: true,
policies: [
"dev",
"qa",
],
type: "client",
});
resources:
dakota:
type: nomad:AclToken
properties:
global: true
policies:
- dev
- qa
type: client
Creating a token with full access to the cluster
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Nomad = Pulumi.Nomad;
return await Deployment.RunAsync(() =>
{
var iman = new Nomad.AclToken("iman", new()
{
Type = "management",
});
});
package main
import (
"github.com/pulumi/pulumi-nomad/sdk/go/nomad"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := nomad.NewAclToken(ctx, "iman", &nomad.AclTokenArgs{
Type: pulumi.String("management"),
})
if err != nil {
return err
}
return nil
})
}
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.nomad.AclToken;
import com.pulumi.nomad.AclTokenArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var iman = new AclToken("iman", AclTokenArgs.builder()
.type("management")
.build());
}
}
import pulumi
import pulumi_nomad as nomad
iman = nomad.AclToken("iman", type="management")
import * as pulumi from "@pulumi/pulumi";
import * as nomad from "@pulumi/nomad";
const iman = new nomad.AclToken("iman", {type: "management"});
resources:
iman:
type: nomad:AclToken
properties:
type: management
Accessing the token
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Nomad = Pulumi.Nomad;
return await Deployment.RunAsync(() =>
{
var token = new Nomad.AclToken("token", new()
{
Type = "client",
Policies = new[]
{
"dev",
},
});
return new Dictionary<string, object?>
{
["nomadToken"] = token.SecretId,
};
});
package main
import (
"github.com/pulumi/pulumi-nomad/sdk/go/nomad"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
token, err := nomad.NewAclToken(ctx, "token", &nomad.AclTokenArgs{
Type: pulumi.String("client"),
Policies: pulumi.StringArray{
pulumi.String("dev"),
},
})
if err != nil {
return err
}
ctx.Export("nomadToken", token.SecretId)
return nil
})
}
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.nomad.AclToken;
import com.pulumi.nomad.AclTokenArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var token = new AclToken("token", AclTokenArgs.builder()
.type("client")
.policies("dev")
.build());
ctx.export("nomadToken", token.secretId());
}
}
import pulumi
import pulumi_nomad as nomad
token = nomad.AclToken("token",
type="client",
policies=["dev"])
pulumi.export("nomadToken", token.secret_id)
import * as pulumi from "@pulumi/pulumi";
import * as nomad from "@pulumi/nomad";
const token = new nomad.AclToken("token", {
type: "client",
policies: ["dev"],
});
export const nomadToken = token.secretId;
resources:
token:
type: nomad:AclToken
properties:
type: client
policies:
- dev
outputs:
nomadToken: ${token.secretId}
Create AclToken Resource
new AclToken(name: string, args: AclTokenArgs, opts?: CustomResourceOptions);
@overload
def AclToken(resource_name: str,
opts: Optional[ResourceOptions] = None,
expiration_ttl: Optional[str] = None,
global_: Optional[bool] = None,
name: Optional[str] = None,
policies: Optional[Sequence[str]] = None,
roles: Optional[Sequence[AclTokenRoleArgs]] = None,
type: Optional[str] = None)
@overload
def AclToken(resource_name: str,
args: AclTokenArgs,
opts: Optional[ResourceOptions] = None)
func NewAclToken(ctx *Context, name string, args AclTokenArgs, opts ...ResourceOption) (*AclToken, error)
public AclToken(string name, AclTokenArgs args, CustomResourceOptions? opts = null)
public AclToken(String name, AclTokenArgs args)
public AclToken(String name, AclTokenArgs args, CustomResourceOptions options)
type: nomad:AclToken
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args AclTokenArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args AclTokenArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args AclTokenArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args AclTokenArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args AclTokenArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
AclToken Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
The AclToken resource accepts the following input properties:
- Type string
(string: <required>)
- The type of token this is. Useclient
for tokens that will have policies associated with them. Usemanagement
for tokens that can perform any action.- Expiration
Ttl string (string: "")
- Provides a TTL for the token in the form of a time duration such as"5m"
or"1h"
.- Global bool
(bool: false)
- Whether the token should be replicated to all regions, or if it will only be used in the region it was created in.- Name string
(string: "")
- A human-friendly name for this token.- Policies List<string>
(set: [])
- A set of policy names to associate with this token. Must be set onclient
-type tokens, must not be set onmanagement
-type tokens. Policies do not need to exist before being used here.- Roles
List<Acl
Token Role Args> (set: [])
- The list of roles attached to the token. Each entry hasname
andid
attributes. It may be used multiple times.
- Type string
(string: <required>)
- The type of token this is. Useclient
for tokens that will have policies associated with them. Usemanagement
for tokens that can perform any action.- Expiration
Ttl string (string: "")
- Provides a TTL for the token in the form of a time duration such as"5m"
or"1h"
.- Global bool
(bool: false)
- Whether the token should be replicated to all regions, or if it will only be used in the region it was created in.- Name string
(string: "")
- A human-friendly name for this token.- Policies []string
(set: [])
- A set of policy names to associate with this token. Must be set onclient
-type tokens, must not be set onmanagement
-type tokens. Policies do not need to exist before being used here.- Roles
[]Acl
Token Role Args (set: [])
- The list of roles attached to the token. Each entry hasname
andid
attributes. It may be used multiple times.
- type String
(string: <required>)
- The type of token this is. Useclient
for tokens that will have policies associated with them. Usemanagement
for tokens that can perform any action.- expiration
Ttl String (string: "")
- Provides a TTL for the token in the form of a time duration such as"5m"
or"1h"
.- global Boolean
(bool: false)
- Whether the token should be replicated to all regions, or if it will only be used in the region it was created in.- name String
(string: "")
- A human-friendly name for this token.- policies List<String>
(set: [])
- A set of policy names to associate with this token. Must be set onclient
-type tokens, must not be set onmanagement
-type tokens. Policies do not need to exist before being used here.- roles
List<Acl
Token Role Args> (set: [])
- The list of roles attached to the token. Each entry hasname
andid
attributes. It may be used multiple times.
- type string
(string: <required>)
- The type of token this is. Useclient
for tokens that will have policies associated with them. Usemanagement
for tokens that can perform any action.- expiration
Ttl string (string: "")
- Provides a TTL for the token in the form of a time duration such as"5m"
or"1h"
.- global boolean
(bool: false)
- Whether the token should be replicated to all regions, or if it will only be used in the region it was created in.- name string
(string: "")
- A human-friendly name for this token.- policies string[]
(set: [])
- A set of policy names to associate with this token. Must be set onclient
-type tokens, must not be set onmanagement
-type tokens. Policies do not need to exist before being used here.- roles
Acl
Token Role Args[] (set: [])
- The list of roles attached to the token. Each entry hasname
andid
attributes. It may be used multiple times.
- type str
(string: <required>)
- The type of token this is. Useclient
for tokens that will have policies associated with them. Usemanagement
for tokens that can perform any action.- expiration_
ttl str (string: "")
- Provides a TTL for the token in the form of a time duration such as"5m"
or"1h"
.- global_ bool
(bool: false)
- Whether the token should be replicated to all regions, or if it will only be used in the region it was created in.- name str
(string: "")
- A human-friendly name for this token.- policies Sequence[str]
(set: [])
- A set of policy names to associate with this token. Must be set onclient
-type tokens, must not be set onmanagement
-type tokens. Policies do not need to exist before being used here.- roles
Sequence[Acl
Token Role Args] (set: [])
- The list of roles attached to the token. Each entry hasname
andid
attributes. It may be used multiple times.
- type String
(string: <required>)
- The type of token this is. Useclient
for tokens that will have policies associated with them. Usemanagement
for tokens that can perform any action.- expiration
Ttl String (string: "")
- Provides a TTL for the token in the form of a time duration such as"5m"
or"1h"
.- global Boolean
(bool: false)
- Whether the token should be replicated to all regions, or if it will only be used in the region it was created in.- name String
(string: "")
- A human-friendly name for this token.- policies List<String>
(set: [])
- A set of policy names to associate with this token. Must be set onclient
-type tokens, must not be set onmanagement
-type tokens. Policies do not need to exist before being used here.- roles List<Property Map>
(set: [])
- The list of roles attached to the token. Each entry hasname
andid
attributes. It may be used multiple times.
Outputs
All input properties are implicitly available as output properties. Additionally, the AclToken resource produces the following output properties:
- Accessor
Id string (string)
- A non-sensitive identifier for this token that can be logged and shared safely without granting any access to the cluster.- Create
Time string (string)
- The timestamp the token was created.- Expiration
Time string (string)
- The timestamp after which the token is considered expired and eligible for destruction.- Id string
The provider-assigned unique ID for this managed resource.
- Secret
Id string (string)
- The token value itself, which is presented for access to the cluster.
- Accessor
Id string (string)
- A non-sensitive identifier for this token that can be logged and shared safely without granting any access to the cluster.- Create
Time string (string)
- The timestamp the token was created.- Expiration
Time string (string)
- The timestamp after which the token is considered expired and eligible for destruction.- Id string
The provider-assigned unique ID for this managed resource.
- Secret
Id string (string)
- The token value itself, which is presented for access to the cluster.
- accessor
Id String (string)
- A non-sensitive identifier for this token that can be logged and shared safely without granting any access to the cluster.- create
Time String (string)
- The timestamp the token was created.- expiration
Time String (string)
- The timestamp after which the token is considered expired and eligible for destruction.- id String
The provider-assigned unique ID for this managed resource.
- secret
Id String (string)
- The token value itself, which is presented for access to the cluster.
- accessor
Id string (string)
- A non-sensitive identifier for this token that can be logged and shared safely without granting any access to the cluster.- create
Time string (string)
- The timestamp the token was created.- expiration
Time string (string)
- The timestamp after which the token is considered expired and eligible for destruction.- id string
The provider-assigned unique ID for this managed resource.
- secret
Id string (string)
- The token value itself, which is presented for access to the cluster.
- accessor_
id str (string)
- A non-sensitive identifier for this token that can be logged and shared safely without granting any access to the cluster.- create_
time str (string)
- The timestamp the token was created.- expiration_
time str (string)
- The timestamp after which the token is considered expired and eligible for destruction.- id str
The provider-assigned unique ID for this managed resource.
- secret_
id str (string)
- The token value itself, which is presented for access to the cluster.
- accessor
Id String (string)
- A non-sensitive identifier for this token that can be logged and shared safely without granting any access to the cluster.- create
Time String (string)
- The timestamp the token was created.- expiration
Time String (string)
- The timestamp after which the token is considered expired and eligible for destruction.- id String
The provider-assigned unique ID for this managed resource.
- secret
Id String (string)
- The token value itself, which is presented for access to the cluster.
Look up Existing AclToken Resource
Get an existing AclToken resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: AclTokenState, opts?: CustomResourceOptions): AclToken
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
accessor_id: Optional[str] = None,
create_time: Optional[str] = None,
expiration_time: Optional[str] = None,
expiration_ttl: Optional[str] = None,
global_: Optional[bool] = None,
name: Optional[str] = None,
policies: Optional[Sequence[str]] = None,
roles: Optional[Sequence[AclTokenRoleArgs]] = None,
secret_id: Optional[str] = None,
type: Optional[str] = None) -> AclToken
func GetAclToken(ctx *Context, name string, id IDInput, state *AclTokenState, opts ...ResourceOption) (*AclToken, error)
public static AclToken Get(string name, Input<string> id, AclTokenState? state, CustomResourceOptions? opts = null)
public static AclToken get(String name, Output<String> id, AclTokenState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Accessor
Id string (string)
- A non-sensitive identifier for this token that can be logged and shared safely without granting any access to the cluster.- Create
Time string (string)
- The timestamp the token was created.- Expiration
Time string (string)
- The timestamp after which the token is considered expired and eligible for destruction.- Expiration
Ttl string (string: "")
- Provides a TTL for the token in the form of a time duration such as"5m"
or"1h"
.- Global bool
(bool: false)
- Whether the token should be replicated to all regions, or if it will only be used in the region it was created in.- Name string
(string: "")
- A human-friendly name for this token.- Policies List<string>
(set: [])
- A set of policy names to associate with this token. Must be set onclient
-type tokens, must not be set onmanagement
-type tokens. Policies do not need to exist before being used here.- Roles
List<Acl
Token Role Args> (set: [])
- The list of roles attached to the token. Each entry hasname
andid
attributes. It may be used multiple times.- Secret
Id string (string)
- The token value itself, which is presented for access to the cluster.- Type string
(string: <required>)
- The type of token this is. Useclient
for tokens that will have policies associated with them. Usemanagement
for tokens that can perform any action.
- Accessor
Id string (string)
- A non-sensitive identifier for this token that can be logged and shared safely without granting any access to the cluster.- Create
Time string (string)
- The timestamp the token was created.- Expiration
Time string (string)
- The timestamp after which the token is considered expired and eligible for destruction.- Expiration
Ttl string (string: "")
- Provides a TTL for the token in the form of a time duration such as"5m"
or"1h"
.- Global bool
(bool: false)
- Whether the token should be replicated to all regions, or if it will only be used in the region it was created in.- Name string
(string: "")
- A human-friendly name for this token.- Policies []string
(set: [])
- A set of policy names to associate with this token. Must be set onclient
-type tokens, must not be set onmanagement
-type tokens. Policies do not need to exist before being used here.- Roles
[]Acl
Token Role Args (set: [])
- The list of roles attached to the token. Each entry hasname
andid
attributes. It may be used multiple times.- Secret
Id string (string)
- The token value itself, which is presented for access to the cluster.- Type string
(string: <required>)
- The type of token this is. Useclient
for tokens that will have policies associated with them. Usemanagement
for tokens that can perform any action.
- accessor
Id String (string)
- A non-sensitive identifier for this token that can be logged and shared safely without granting any access to the cluster.- create
Time String (string)
- The timestamp the token was created.- expiration
Time String (string)
- The timestamp after which the token is considered expired and eligible for destruction.- expiration
Ttl String (string: "")
- Provides a TTL for the token in the form of a time duration such as"5m"
or"1h"
.- global Boolean
(bool: false)
- Whether the token should be replicated to all regions, or if it will only be used in the region it was created in.- name String
(string: "")
- A human-friendly name for this token.- policies List<String>
(set: [])
- A set of policy names to associate with this token. Must be set onclient
-type tokens, must not be set onmanagement
-type tokens. Policies do not need to exist before being used here.- roles
List<Acl
Token Role Args> (set: [])
- The list of roles attached to the token. Each entry hasname
andid
attributes. It may be used multiple times.- secret
Id String (string)
- The token value itself, which is presented for access to the cluster.- type String
(string: <required>)
- The type of token this is. Useclient
for tokens that will have policies associated with them. Usemanagement
for tokens that can perform any action.
- accessor
Id string (string)
- A non-sensitive identifier for this token that can be logged and shared safely without granting any access to the cluster.- create
Time string (string)
- The timestamp the token was created.- expiration
Time string (string)
- The timestamp after which the token is considered expired and eligible for destruction.- expiration
Ttl string (string: "")
- Provides a TTL for the token in the form of a time duration such as"5m"
or"1h"
.- global boolean
(bool: false)
- Whether the token should be replicated to all regions, or if it will only be used in the region it was created in.- name string
(string: "")
- A human-friendly name for this token.- policies string[]
(set: [])
- A set of policy names to associate with this token. Must be set onclient
-type tokens, must not be set onmanagement
-type tokens. Policies do not need to exist before being used here.- roles
Acl
Token Role Args[] (set: [])
- The list of roles attached to the token. Each entry hasname
andid
attributes. It may be used multiple times.- secret
Id string (string)
- The token value itself, which is presented for access to the cluster.- type string
(string: <required>)
- The type of token this is. Useclient
for tokens that will have policies associated with them. Usemanagement
for tokens that can perform any action.
- accessor_
id str (string)
- A non-sensitive identifier for this token that can be logged and shared safely without granting any access to the cluster.- create_
time str (string)
- The timestamp the token was created.- expiration_
time str (string)
- The timestamp after which the token is considered expired and eligible for destruction.- expiration_
ttl str (string: "")
- Provides a TTL for the token in the form of a time duration such as"5m"
or"1h"
.- global_ bool
(bool: false)
- Whether the token should be replicated to all regions, or if it will only be used in the region it was created in.- name str
(string: "")
- A human-friendly name for this token.- policies Sequence[str]
(set: [])
- A set of policy names to associate with this token. Must be set onclient
-type tokens, must not be set onmanagement
-type tokens. Policies do not need to exist before being used here.- roles
Sequence[Acl
Token Role Args] (set: [])
- The list of roles attached to the token. Each entry hasname
andid
attributes. It may be used multiple times.- secret_
id str (string)
- The token value itself, which is presented for access to the cluster.- type str
(string: <required>)
- The type of token this is. Useclient
for tokens that will have policies associated with them. Usemanagement
for tokens that can perform any action.
- accessor
Id String (string)
- A non-sensitive identifier for this token that can be logged and shared safely without granting any access to the cluster.- create
Time String (string)
- The timestamp the token was created.- expiration
Time String (string)
- The timestamp after which the token is considered expired and eligible for destruction.- expiration
Ttl String (string: "")
- Provides a TTL for the token in the form of a time duration such as"5m"
or"1h"
.- global Boolean
(bool: false)
- Whether the token should be replicated to all regions, or if it will only be used in the region it was created in.- name String
(string: "")
- A human-friendly name for this token.- policies List<String>
(set: [])
- A set of policy names to associate with this token. Must be set onclient
-type tokens, must not be set onmanagement
-type tokens. Policies do not need to exist before being used here.- roles List<Property Map>
(set: [])
- The list of roles attached to the token. Each entry hasname
andid
attributes. It may be used multiple times.- secret
Id String (string)
- The token value itself, which is presented for access to the cluster.- type String
(string: <required>)
- The type of token this is. Useclient
for tokens that will have policies associated with them. Usemanagement
for tokens that can perform any action.
Supporting Types
AclTokenRole
Package Details
- Repository
- HashiCorp Nomad pulumi/pulumi-nomad
- License
- Apache-2.0
- Notes
This Pulumi package is based on the
nomad
Terraform Provider.