open-vault/vendor/github.com/hashicorp/vault-plugin-database-mongodbatlas
ncabatoff 8870b2e51c
Add mongodbatlas static roles support (#8987)
* Refactor PG container creation.
* Rework rotation tests to use shorter sleeps.
* Refactor rotation tests.
* Add a static role rotation test for MongoDB Atlas.
2020-05-29 14:21:23 -04:00
..
.gitignore Bundle MongoDB Atlas (#8309) 2020-02-07 14:09:39 -08:00
connection_producer.go Bundle MongoDB Atlas (#8309) 2020-02-07 14:09:39 -08:00
docker-test.sh Bundle MongoDB Atlas (#8309) 2020-02-07 14:09:39 -08:00
go.mod Add mongodbatlas static roles support (#8987) 2020-05-29 14:21:23 -04:00
go.sum Add mongodbatlas static roles support (#8987) 2020-05-29 14:21:23 -04:00
LICENSE Bundle MongoDB Atlas (#8309) 2020-02-07 14:09:39 -08:00
Makefile Bundle MongoDB Atlas (#8309) 2020-02-07 14:09:39 -08:00
mongodbatlas.go Add mongodbatlas static roles support (#8987) 2020-05-29 14:21:23 -04:00
README.md Add mongodbatlas static roles support (#8987) 2020-05-29 14:21:23 -04:00

HashiCorp Vault Database Secrets Engine - MongoDB Atlas plugin

MongoDB Atlas is one of the supported plugins for the HashiCorp Vault Database Secrets Engine and allows for the programmatic generation of unique, ephemeral MongoDB Database User credentials in MongoDB Atlas Projects.

The plugin is included in version 1.4 of Vault.

Support, Bugs and Feature Requests

Support for the HashiCorp Vault Database Secrets Engine - MongoDB Atlas is provided under MongoDB Atlas support plans. Please submit support questions within the Atlas UI. Vault support is via HashiCorp.

Bugs should be filed under the Issues section of this repo.

Feature requests can be submitted in the Issues section or directly to MongoDB at https://feedback.mongodb.com/forums/924145-atlas - just select the Vault plugin as the category or vote for an already suggested feature.

Please note: Hashicorp takes Vault's security and their users' trust very seriously, as does MongoDB.

If you believe you have found a security issue in Vault or with this plugin, please responsibly disclose by contacting HashiCorp at security@hashicorp.com and contact MongoDB directly via security@mongodb.com or open a ticket (link is external).