SecretsMountMongodbatla

data class SecretsMountMongodbatla(val allowedRoles: List<String>? = null, val data: Map<String, String>? = null, val disableAutomatedRotation: Boolean? = null, val name: String, val pluginName: String? = null, val privateKey: String, val projectId: String, val publicKey: String, val rootRotationStatements: List<String>? = null, val rotationPeriod: Int? = null, val rotationSchedule: String? = null, val rotationWindow: Int? = null, val verifyConnection: Boolean? = null)

Constructors

Link copied to clipboard
constructor(allowedRoles: List<String>? = null, data: Map<String, String>? = null, disableAutomatedRotation: Boolean? = null, name: String, pluginName: String? = null, privateKey: String, projectId: String, publicKey: String, rootRotationStatements: List<String>? = null, rotationPeriod: Int? = null, rotationSchedule: String? = null, rotationWindow: Int? = null, verifyConnection: Boolean? = null)

Types

Link copied to clipboard
object Companion

Properties

Link copied to clipboard
val allowedRoles: List<String>? = null

A list of roles that are allowed to use this connection.

Link copied to clipboard
val data: Map<String, String>? = null

A map of sensitive data to pass to the endpoint. Useful for templated connection strings.

Link copied to clipboard

Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+. Supported list of database secrets engines that can be configured:

Link copied to clipboard

Name of the database connection.

Link copied to clipboard
val pluginName: String? = null

Specifies the name of the plugin to use.

Link copied to clipboard

The Private Programmatic API Key used to connect with MongoDB Atlas API.

Link copied to clipboard

The Project ID the Database User should be created within.

Link copied to clipboard

The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.

Link copied to clipboard

A list of database statements to be executed to rotate the root user's credentials.

Link copied to clipboard
val rotationPeriod: Int? = null

The amount of time in seconds Vault should wait before rotating the root credential. A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.

Link copied to clipboard

The schedule, in cron-style time format, defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.

Link copied to clipboard
val rotationWindow: Int? = null

The maximum amount of time in seconds allowed to complete a rotation when a scheduled token rotation occurs. The default rotation window is unbound and the minimum allowable window is 3600. Requires Vault Enterprise 1.19+.

Link copied to clipboard

Whether the connection should be verified on initial configuration or not.