import * as pulumi from "@pulumi/pulumi"; /** * ## Example Usage * * ```typescript * import * as pulumi from "@pulumi/pulumi"; * import * as vault from "@pulumi/vault"; * * const config = new vault.NomadSecretBackend("config", { * backend: "nomad", * description: "test description", * defaultLeaseTtlSeconds: 3600, * maxLeaseTtlSeconds: 7200, * address: "https://127.0.0.1:4646", * token: "ae20ceaa-...", * }); * const test = new vault.NomadSecretRole("test", { * backend: config.backend, * role: "test", * type: "client", * policies: ["readonly"], * }); * const token = pulumi.all([config.backend, test.role]).apply(([backend, role]) => vault.getNomadAccessTokenOutput({ * backend: backend, * role: role, * })); * ``` */ export declare function getNomadAccessToken(args: GetNomadAccessTokenArgs, opts?: pulumi.InvokeOptions): Promise; /** * A collection of arguments for invoking getNomadAccessToken. */ export interface GetNomadAccessTokenArgs { /** * The path to the Nomad secret backend to * read credentials from, with no leading or trailing `/`s. */ backend: string; /** * The namespace of the target resource. * The value should not contain leading or trailing forward slashes. * The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace). * *Available only for Vault Enterprise*. */ namespace?: string; /** * The name of the Nomad secret backend role to generate * a token for, with no leading or trailing `/`s. */ role: string; } /** * A collection of values returned by getNomadAccessToken. */ export interface GetNomadAccessTokenResult { /** * The public identifier for a specific token. It can be used * to look up information about a token or to revoke a token. */ readonly accessorId: string; readonly backend: string; /** * The provider-assigned unique ID for this managed resource. */ readonly id: string; readonly namespace?: string; readonly role: string; /** * The token to be used when making requests to Nomad and should be kept private. */ readonly secretId: string; } /** * ## Example Usage * * ```typescript * import * as pulumi from "@pulumi/pulumi"; * import * as vault from "@pulumi/vault"; * * const config = new vault.NomadSecretBackend("config", { * backend: "nomad", * description: "test description", * defaultLeaseTtlSeconds: 3600, * maxLeaseTtlSeconds: 7200, * address: "https://127.0.0.1:4646", * token: "ae20ceaa-...", * }); * const test = new vault.NomadSecretRole("test", { * backend: config.backend, * role: "test", * type: "client", * policies: ["readonly"], * }); * const token = pulumi.all([config.backend, test.role]).apply(([backend, role]) => vault.getNomadAccessTokenOutput({ * backend: backend, * role: role, * })); * ``` */ export declare function getNomadAccessTokenOutput(args: GetNomadAccessTokenOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output; /** * A collection of arguments for invoking getNomadAccessToken. */ export interface GetNomadAccessTokenOutputArgs { /** * The path to the Nomad secret backend to * read credentials from, with no leading or trailing `/`s. */ backend: pulumi.Input; /** * The namespace of the target resource. * The value should not contain leading or trailing forward slashes. * The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace). * *Available only for Vault Enterprise*. */ namespace?: pulumi.Input; /** * The name of the Nomad secret backend role to generate * a token for, with no leading or trailing `/`s. */ role: pulumi.Input; }