mirror of
https://github.com/kemko/nomad.git
synced 2026-01-01 16:05:42 +03:00
This introduces a new HTTP endpoint (and an associated CLI command) for querying ACL policies associated with a workload identity. It allows users that want to learn about the ACL capabilities from within WI-tasks to know what sort of policies are enabled. --------- Co-authored-by: Tim Gross <tgross@hashicorp.com> Co-authored-by: Aimee Ukasick <aimee.ukasick@hashicorp.com>
52 lines
2.1 KiB
Plaintext
52 lines
2.1 KiB
Plaintext
---
|
|
layout: docs
|
|
page_title: 'nomad acl token self command reference'
|
|
description: >
|
|
The `nomad acl token self` command fetches information about the currently set access control list (ACL) token. Review accessor ID, secret ID, name, type, global scope, time to live (TTL), policies, and roles.
|
|
---
|
|
|
|
# `nomad acl token self` command reference
|
|
|
|
The `acl token self` command is used to fetch information about the currently
|
|
set ACL token.
|
|
|
|
## Usage
|
|
|
|
```plaintext
|
|
nomad acl token self
|
|
```
|
|
|
|
## General options
|
|
|
|
@include 'general_options_no_namespace.mdx'
|
|
|
|
## Examples
|
|
|
|
Fetch information about an existing ACL token:
|
|
|
|
```shell-session
|
|
$ export NOMAD_TOKEN=85310d07-9afa-ef53-0933-0c043cd673c7
|
|
|
|
$ nomad acl token self
|
|
Accessor ID = 9c2d1b3a-cbc3-d9a0-3df9-5a382545a819
|
|
Secret ID = 85310d07-9afa-ef53-0933-0c043cd673c7
|
|
Name = Bootstrap Token
|
|
Type = management
|
|
Global = true
|
|
Create Time = 2022-08-23 10:35:32.371025521 +0000 UTC
|
|
Expiry Time = <none>
|
|
Create Index = 8
|
|
Modify Index = 8
|
|
Policies = n/a
|
|
Roles = n/a
|
|
```
|
|
|
|
The command also detects if the current Nomad token is a workload identity
|
|
JWT and respond with a hint if that's the case.
|
|
|
|
```shell-session
|
|
$ echo $NOMAD_TOKEN
|
|
eyJhbGciOiJSUzI1NiIsImtpZCI6ImJiMmUwYjI5LTIyZTYtYjk0My0yN2M1LThkYmNmMjc5ODM0MCIsInR5cCI6IkpXVCJ9.eyJhdWQiOiJub21hZHByb2plY3QuaW8iLCJpYXQiOjE3NDM2OTI5NzksImp0aSI6IjJmOWI3ZGRmLWU1M2ItZGMxNS1kMzU4LTAyMDk5NjE1NThlMyIsIm5iZiI6MTc0MzY5Mjk3OSwibm9tYWRfYWxsb2NhdGlvbl9pZCI6IjhjMGJjMWFjLWRlMzMtYTNlYi03YWUwLTZiZjM3OGY5YzcxYiIsIm5vbWFkX2pvYl9pZCI6Im5vbWFkIiwibm9tYWRfbmFtZXNwYWNlIjoiZGVmYXVsdCIsIm5vbWFkX3Rhc2siOiJzZXJ2ZXIiLCJzdWIiOiJnbG9iYWw6ZGVmYXVsdDpub21hZDpub21hZDpzZXJ2ZXI6ZGVmYXVsdCJ9.IDZWTqGWRURDwI5OvO3LLjCsU1qzg6LEG4q5S7CfZawUXzMqAOoYajI_nynOGJp2aU77MqUyJmdFtrIBMoQnIxclEwNl9DkhfOrgjBsWefn9JqKEpORGD-0OLzaoYUgbu0k6aXCNktfpvHZN5uUsfL6nLOG-osQvHn9ZdboT31tjp1v6d-MfP96ZLG0NrXgLWMfwan2AAzuqMabIS9iO6OrZDNp2-TeeY_sqM-7sNEgfDo33GAeyhqTi8CAZhsDOv4wtJuFfMhrsbb33wHdAiltjXlafBtncMMaLHr07gbLvOMfty2_193i4Yi3H2PgPr7c4BYHoXyQJhFchDyYmFA
|
|
$ nomad acl token self
|
|
No ACL token found but there are ACL policies attached to this workload identity. You can query them with acl policy self command.
|
|
``` |