@@ -14,7 +14,6 @@ handling and credential revocation upon signout.
1414
1515<!-- Source File: `packages/atlas-service/src/main.spec.ts` -->
1616
17-
1817## Connection Import / Export Testing
1918
2019Compass allows users to export and import connections. Our tests verify that
@@ -23,7 +22,6 @@ that encryption for credentials is correctly applied.
2322
2423<!-- Source File: `packages/compass-e2e-tests/tests/import-export-connections.test.ts` -->
2524
26-
2725## In-Use Encryption Testing
2826
2927MongoDB supports a set of features referred to as "In-Use Encryption".
@@ -38,7 +36,6 @@ and never sent in plaintext.
3836
3937<!-- Source File: `packages/compass-e2e-tests/tests/in-use-encryption.test.ts` -->
4038
41-
4239## Enhanced Network Isolation Tests
4340
4441Compass allows users to specify that the application should not perform any
@@ -49,7 +46,6 @@ We ensure that no such network calls happen when this setting is enabled.
4946
5047<!-- Source File: `packages/compass-e2e-tests/tests/no-network-traffic.test.ts` -->
5148
52-
5349## OIDC Authentication End-to-End Tests
5450
5551In addition to our regular tests for the different authentication mechanisms supported
@@ -62,7 +58,6 @@ what the user has previously specified.
6258
6359<!-- Source File: `packages/compass-e2e-tests/tests/oidc.test.ts` -->
6460
65-
6661## Connection String Credential Protection Tests
6762
6863Compass provides a user- or administrator-configurable setting that prevents the application
@@ -71,7 +66,6 @@ which expose connection information honor this setting.
7166
7267<!-- Source File: `packages/compass-e2e-tests/tests/protect-connection-strings.test.ts` -->
7368
74-
7569## Automatic Connection Establishment Tests
7670
7771Since this application accepts remote host connection information on the command line,
@@ -82,27 +76,23 @@ behavior.
8276
8377<!-- Source File: `packages/compass/src/main/auto-connect.spec.ts` -->
8478
85-
8679## Connection Form Password Protection
8780
8881We verify that database credentials are not displayed to users, unless they
8982are actively in the process of editing them.
9083
9184<!-- Source File: `packages/connection-form/src/components/connection-string-input.spec.tsx` -->
9285
93-
9486## Connection Option Validation Rules
9587
9688We explicitly verify that the application warns users about connection settings
9789that may result in security issues, for example potentially insecure TLS or Proxy settings.
9890
9991<!-- Source File: `packages/connection-form/src/utils/validation.spec.ts` -->
10092
101-
10293## Secure Credential Storage
10394
10495We ensure that when sensitive information is persisted, in particular database access credentials,
10596it is cryptographically protected through an OS keychain encryption integration.
10697
10798<!-- Source File: `packages/connection-info/src/connection-secrets.spec.ts` -->
108-
0 commit comments