@@ -14,7 +14,6 @@ handling and credential revocation upon signout.
14
14
15
15
<!-- Source File: `packages/atlas-service/src/main.spec.ts` -->
16
16
17
-
18
17
## Connection Import / Export Testing
19
18
20
19
Compass allows users to export and import connections. Our tests verify that
@@ -23,7 +22,6 @@ that encryption for credentials is correctly applied.
23
22
24
23
<!-- Source File: `packages/compass-e2e-tests/tests/import-export-connections.test.ts` -->
25
24
26
-
27
25
## In-Use Encryption Testing
28
26
29
27
MongoDB supports a set of features referred to as "In-Use Encryption".
@@ -38,7 +36,6 @@ and never sent in plaintext.
38
36
39
37
<!-- Source File: `packages/compass-e2e-tests/tests/in-use-encryption.test.ts` -->
40
38
41
-
42
39
## Enhanced Network Isolation Tests
43
40
44
41
Compass allows users to specify that the application should not perform any
@@ -49,7 +46,6 @@ We ensure that no such network calls happen when this setting is enabled.
49
46
50
47
<!-- Source File: `packages/compass-e2e-tests/tests/no-network-traffic.test.ts` -->
51
48
52
-
53
49
## OIDC Authentication End-to-End Tests
54
50
55
51
In addition to our regular tests for the different authentication mechanisms supported
@@ -62,7 +58,6 @@ what the user has previously specified.
62
58
63
59
<!-- Source File: `packages/compass-e2e-tests/tests/oidc.test.ts` -->
64
60
65
-
66
61
## Connection String Credential Protection Tests
67
62
68
63
Compass provides a user- or administrator-configurable setting that prevents the application
@@ -71,7 +66,6 @@ which expose connection information honor this setting.
71
66
72
67
<!-- Source File: `packages/compass-e2e-tests/tests/protect-connection-strings.test.ts` -->
73
68
74
-
75
69
## Automatic Connection Establishment Tests
76
70
77
71
Since this application accepts remote host connection information on the command line,
@@ -82,27 +76,23 @@ behavior.
82
76
83
77
<!-- Source File: `packages/compass/src/main/auto-connect.spec.ts` -->
84
78
85
-
86
79
## Connection Form Password Protection
87
80
88
81
We verify that database credentials are not displayed to users, unless they
89
82
are actively in the process of editing them.
90
83
91
84
<!-- Source File: `packages/connection-form/src/components/connection-string-input.spec.tsx` -->
92
85
93
-
94
86
## Connection Option Validation Rules
95
87
96
88
We explicitly verify that the application warns users about connection settings
97
89
that may result in security issues, for example potentially insecure TLS or Proxy settings.
98
90
99
91
<!-- Source File: `packages/connection-form/src/utils/validation.spec.ts` -->
100
92
101
-
102
93
## Secure Credential Storage
103
94
104
95
We ensure that when sensitive information is persisted, in particular database access credentials,
105
96
it is cryptographically protected through an OS keychain encryption integration.
106
97
107
98
<!-- Source File: `packages/connection-info/src/connection-secrets.spec.ts` -->
108
-
0 commit comments