mirror of https://github.com/mongodb/mongo
SERVER-82311 rename test tag
GitOrigin-RevId: 598fb15a21c0c4e53ef47a4b5c5dc6f5ae5fd5ed
This commit is contained in:
parent
6164329e42
commit
d04dc10cac
|
|
@ -73,7 +73,7 @@ selector:
|
|||
- jstests/core/**/exhaust.js
|
||||
exclude_with_any_tags:
|
||||
- simulate_atlas_proxy_incompatible
|
||||
- not_allowed_with_security_token
|
||||
- not_allowed_with_signed_security_token
|
||||
- command_not_supported_in_serverless
|
||||
- assumes_standalone_mongod
|
||||
- requires_capped
|
||||
|
|
|
|||
|
|
@ -139,7 +139,7 @@ selector:
|
|||
- jstests/aggregation/**/*.js
|
||||
exclude_with_any_tags:
|
||||
- simulate_atlas_proxy_incompatible
|
||||
- not_allowed_with_security_token
|
||||
- not_allowed_with_signed_security_token
|
||||
- command_not_supported_in_serverless
|
||||
- assumes_standalone_mongod
|
||||
- requires_capped
|
||||
|
|
|
|||
|
|
@ -52,7 +52,7 @@ selector:
|
|||
# This passthrough uses the `simulate_atlas_proxy` override, which some tests are incompatible with.
|
||||
- simulate_atlas_proxy_incompatible
|
||||
# Exclude tests which we know use commands that don't support a security token.
|
||||
- not_allowed_with_security_token
|
||||
- not_allowed_with_signed_security_token
|
||||
# Exclude tests which use commands that aren't supported in Serverless.
|
||||
- command_not_supported_in_serverless
|
||||
# Server side javascript (such as $where, $function, $accumulator and map-reduce) is not allowed in Serverless.
|
||||
|
|
|
|||
|
|
@ -262,7 +262,7 @@ selector:
|
|||
# This passthrough uses the `simulate_atlas_proxy` override, which some tests are incompatible with.
|
||||
- simulate_atlas_proxy_incompatible
|
||||
# Exclude tests which we know use commands that don't support a security token.
|
||||
- not_allowed_with_security_token
|
||||
- not_allowed_with_signed_security_token
|
||||
# Exclude tests which use commands that aren't supported in Serverless.
|
||||
- command_not_supported_in_serverless
|
||||
# Server side javascript (such as $where, $function, $accumulator and map-reduce) is not allowed in Serverless.
|
||||
|
|
|
|||
|
|
@ -24,7 +24,7 @@ selector:
|
|||
# This passthrough uses the `simulate_atlas_proxy` override, which some tests are incompatible with.
|
||||
- simulate_atlas_proxy_incompatible
|
||||
# Exclude tests which we know use commands that don't support a security token.
|
||||
- not_allowed_with_security_token
|
||||
- not_allowed_with_signed_security_token
|
||||
# Exclude tests which use commands that aren't supported in Serverless.
|
||||
- command_not_supported_in_serverless
|
||||
# Theses tests expect replication is not enabled.
|
||||
|
|
|
|||
|
|
@ -13,7 +13,7 @@ selector:
|
|||
# Exclude tests which use commands that aren't supported in Serverless.
|
||||
- command_not_supported_in_serverless
|
||||
# Exclude tests which we know use commands that don't support a security token.
|
||||
- not_allowed_with_security_token
|
||||
- not_allowed_with_signed_security_token
|
||||
# Theses tests expect replication is not enabled.
|
||||
- assumes_standalone_mongod
|
||||
# capped collections are banned in Serverless.
|
||||
|
|
|
|||
|
|
@ -1,7 +1,7 @@
|
|||
// Regression test to check that different document sizes work correctly with $lookup.
|
||||
// @tags: [
|
||||
// requires_fcv_71,
|
||||
// not_allowed_with_security_token,
|
||||
// not_allowed_with_signed_security_token,
|
||||
// ]
|
||||
import {FixtureHelpers} from "jstests/libs/fixture_helpers.js";
|
||||
|
||||
|
|
@ -68,4 +68,4 @@ try {
|
|||
runHashLookupSpill();
|
||||
} finally {
|
||||
setHashLookupMemoryLimit(oldMemoryLimit);
|
||||
}
|
||||
}
|
||||
|
|
|
|||
|
|
@ -7,7 +7,7 @@
|
|||
// do_not_wrap_aggregations_in_facets,
|
||||
// does_not_support_stepdowns,
|
||||
// requires_profiling,
|
||||
// not_allowed_with_security_token,
|
||||
// not_allowed_with_signed_security_token,
|
||||
// ]
|
||||
|
||||
import {getLatestProfilerEntry} from "jstests/libs/profiler.js";
|
||||
|
|
|
|||
|
|
@ -2,7 +2,7 @@
|
|||
// run against a sharded collection is wrapped in a "shards" object with keys for each shard.
|
||||
// @tags: [
|
||||
// assumes_unsharded_collection,
|
||||
// not_allowed_with_security_token,
|
||||
// not_allowed_with_signed_security_token,
|
||||
// ]
|
||||
//
|
||||
// This test is designed to stress $sample, and any optimizations a storage engine might provide.
|
||||
|
|
@ -91,4 +91,4 @@ for (var i = 0; i < nDocs / sampleSize; i++) {
|
|||
assert.gte(Object.keys(cumulativeSeenIds).length, nDocs / 4);
|
||||
|
||||
// Make sure we can return all documents in the collection.
|
||||
assert.eq(coll.aggregate([{$sample: {size: nDocs}}]).toArray().length, nDocs);
|
||||
assert.eq(coll.aggregate([{$sample: {size: nDocs}}]).toArray().length, nDocs);
|
||||
|
|
|
|||
|
|
@ -15,7 +15,7 @@
|
|||
* # Index filter commands do not support causal consistency.
|
||||
* does_not_support_causal_consistency,
|
||||
* requires_fcv_63,
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* ]
|
||||
*/
|
||||
|
||||
|
|
@ -1066,4 +1066,4 @@ assertPipelineResultsAndExplain({
|
|||
],
|
||||
expectedOutput: expectedResult,
|
||||
validateExplain: (explain) => assertPlanUsesDistinctScan(explain, {_id: 1})
|
||||
});
|
||||
});
|
||||
|
|
|
|||
|
|
@ -10,7 +10,7 @@
|
|||
* assumes_unsharded_collection,
|
||||
* # Plan cache state is node-local and will not get migrated alongside tenant data.
|
||||
* tenant_migration_incompatible,
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* ]
|
||||
*/
|
||||
const collName = "is_count_like";
|
||||
|
|
|
|||
|
|
@ -3,7 +3,7 @@
|
|||
* pipeline are evaluated correctly.
|
||||
* @tags: [
|
||||
* requires_pipeline_optimization,
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* ]
|
||||
*/
|
||||
|
||||
|
|
|
|||
|
|
@ -15,7 +15,7 @@
|
|||
// do_not_wrap_aggregations_in_facets,
|
||||
// requires_pipeline_optimization,
|
||||
// requires_profiling,
|
||||
// not_allowed_with_security_token,
|
||||
// not_allowed_with_signed_security_token,
|
||||
// ]
|
||||
import {isWiredTiger} from "jstests/concurrency/fsm_workload_helpers/server_types.js";
|
||||
import {
|
||||
|
|
|
|||
|
|
@ -6,7 +6,7 @@
|
|||
* @tags: [
|
||||
* # Can't wrap queries in facets without going past max BSON depth.
|
||||
* do_not_wrap_aggregations_in_facets,
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* ]
|
||||
*/
|
||||
|
||||
|
|
|
|||
|
|
@ -4,7 +4,7 @@
|
|||
* requires_fcv_53,
|
||||
* requires_pipeline_optimization,
|
||||
* do_not_wrap_aggregations_in_facets,
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* ]
|
||||
*/
|
||||
|
||||
|
|
|
|||
|
|
@ -3,7 +3,7 @@
|
|||
* @tags: [
|
||||
* # Needed as $densify is a 51 feature.
|
||||
* requires_fcv_51,
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* ]
|
||||
*/
|
||||
|
||||
|
|
@ -67,4 +67,4 @@ assert.commandWorked(coll.insert({val: 5, part: 1}));
|
|||
runAggregate({$densify: {field: "val", range: {step: 1, bounds: "full"}}});
|
||||
|
||||
// Reset parameter.
|
||||
setMaxDocs(origParamValue);
|
||||
setMaxDocs(origParamValue);
|
||||
|
|
|
|||
|
|
@ -3,7 +3,7 @@
|
|||
* @tags: [
|
||||
* # Needed as $densify is a 51 feature.
|
||||
* requires_fcv_51,
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* ]
|
||||
*/
|
||||
|
||||
|
|
@ -50,4 +50,4 @@ assert.commandWorked(db.runCommand({aggregate: coll.getName(), pipeline: [pipeli
|
|||
// Reset limit for other tests.
|
||||
setParameterOnAllHosts(DiscoverTopology.findNonConfigNodes(db.getMongo()),
|
||||
"internalDocumentSourceDensifyMaxMemoryBytes",
|
||||
origParamValue);
|
||||
origParamValue);
|
||||
|
|
|
|||
|
|
@ -6,7 +6,7 @@
|
|||
// assumes_read_concern_unchanged,
|
||||
// assumes_read_preference_unchanged,
|
||||
// tenant_migration_incompatible,
|
||||
// not_allowed_with_security_token,
|
||||
// not_allowed_with_signed_security_token,
|
||||
// ]
|
||||
const outer = db.outer;
|
||||
const inner = db.inner;
|
||||
|
|
@ -61,4 +61,4 @@ inner.getPlanCache().clear();
|
|||
assert(innerPlan.isActive);
|
||||
assert.eq(innerPlan.cachedPlan.inputStage.stage, "COLLSCAN");
|
||||
assert.eq(Object.keys(innerPlan.cachedPlan.inputStage.filter["$and"][0]), ["$expr"]);
|
||||
}
|
||||
}
|
||||
|
|
|
|||
|
|
@ -2,7 +2,7 @@
|
|||
// @tags: [
|
||||
// does_not_support_stepdowns,
|
||||
// requires_profiling,
|
||||
// not_allowed_with_security_token,
|
||||
// not_allowed_with_signed_security_token,
|
||||
// ]
|
||||
|
||||
import {getAggPlanStages} from "jstests/libs/analyze_plan.js";
|
||||
|
|
|
|||
|
|
@ -5,7 +5,7 @@
|
|||
* do_not_wrap_aggregations_in_facets,
|
||||
* # $search/$searchMeta do not support any read concern other than "local"
|
||||
* assumes_read_concern_unchanged,
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* ]
|
||||
*/
|
||||
const coll = db.searchCollector;
|
||||
|
|
|
|||
|
|
@ -3,7 +3,7 @@
|
|||
* data. Memory checks are per node, so only test when the data is all in one place.
|
||||
*
|
||||
* @tags: [
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* ]
|
||||
*/
|
||||
|
||||
|
|
|
|||
|
|
@ -5,7 +5,7 @@
|
|||
* requires_profiling,
|
||||
* assumes_read_concern_unchanged,
|
||||
* do_not_wrap_aggregations_in_facets,
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* ]
|
||||
*/
|
||||
import "jstests/libs/sbe_assert_error_override.js";
|
||||
|
|
|
|||
|
|
@ -2,7 +2,7 @@
|
|||
* Tests $unionWith with various levels of nesting and stages.
|
||||
*
|
||||
* @tags: [
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* ]
|
||||
*/
|
||||
|
||||
|
|
@ -328,4 +328,4 @@ checkResults(testDB.runCommand({
|
|||
checkResults(
|
||||
testDB.runCommand(
|
||||
{aggregate: "emptyCollection", pipeline: [{$unionWith: collA.getName()}], cursor: {}}),
|
||||
resSet);
|
||||
resSet);
|
||||
|
|
|
|||
|
|
@ -11,7 +11,7 @@
|
|||
// requires_collstats,
|
||||
// requires_pipeline_optimization,
|
||||
// requires_persistence,
|
||||
// not_allowed_with_security_token,
|
||||
// not_allowed_with_signed_security_token,
|
||||
// ]
|
||||
import "jstests/libs/sbe_assert_error_override.js";
|
||||
|
||||
|
|
|
|||
|
|
@ -1,7 +1,7 @@
|
|||
/*
|
||||
* @tags: [
|
||||
* # The test runs commands that are not allowed with security token: applyOps.
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* assumes_superuser_permissions,
|
||||
* requires_fastcount,
|
||||
* requires_non_retryable_commands,
|
||||
|
|
|
|||
|
|
@ -3,7 +3,7 @@
|
|||
*
|
||||
* @tags: [
|
||||
* # The test runs commands that are not allowed with security token: applyOps.
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* requires_non_retryable_commands,
|
||||
* requires_fastcount,
|
||||
* # 6.2 removes support for atomic applyOps
|
||||
|
|
|
|||
|
|
@ -1,7 +1,7 @@
|
|||
/*
|
||||
* @tags: [
|
||||
* # The test runs commands that are not allowed with security token: applyOps.
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* requires_non_retryable_commands,
|
||||
* requires_fastcount,
|
||||
* # 6.2 removes support for atomic applyOps
|
||||
|
|
|
|||
|
|
@ -5,7 +5,7 @@
|
|||
*
|
||||
* @tags: [
|
||||
* # The test runs commands that are not allowed with security token: applyOps.
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* # Cannot implicitly shard accessed collections because of
|
||||
* # collection existing when none expected.
|
||||
* assumes_no_implicit_collection_creation_after_drop,
|
||||
|
|
|
|||
|
|
@ -11,7 +11,7 @@
|
|||
*
|
||||
* @tags: [
|
||||
* # The test runs commands that are not allowed with security token: applyOps.
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* requires_non_retryable_commands,
|
||||
* # applyOps is not supported on mongos
|
||||
* assumes_against_mongod_not_mongos,
|
||||
|
|
|
|||
|
|
@ -3,7 +3,7 @@
|
|||
*
|
||||
* @tags: [
|
||||
* # The test runs commands that are not allowed with security token: applyOps.
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* # applyOps is not supported on mongos
|
||||
* assumes_against_mongod_not_mongos,
|
||||
* assumes_superuser_permissions,
|
||||
|
|
|
|||
|
|
@ -1,7 +1,7 @@
|
|||
/*
|
||||
* @tags: [
|
||||
* # The test runs commands that are not allowed with security token: applyOps.
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* requires_non_retryable_commands,
|
||||
* # applyOps is not supported on mongos
|
||||
* assumes_against_mongod_not_mongos,
|
||||
|
|
|
|||
|
|
@ -1,7 +1,7 @@
|
|||
// @tags: [
|
||||
// # The test runs commands that are not allowed with security token: authenticate, createUser,
|
||||
// # dropUser, logout.
|
||||
// not_allowed_with_security_token,
|
||||
// not_allowed_with_signed_security_token,
|
||||
// assumes_superuser_permissions,
|
||||
// assumes_write_concern_unchanged,
|
||||
// creates_and_authenticates_user,
|
||||
|
|
|
|||
|
|
@ -2,7 +2,7 @@
|
|||
//
|
||||
// @tags: [
|
||||
// # The test runs commands that are not allowed with security token: logout.
|
||||
// not_allowed_with_security_token,
|
||||
// not_allowed_with_signed_security_token,
|
||||
// requires_auth,
|
||||
// requires_non_retryable_commands
|
||||
// ]
|
||||
|
|
|
|||
|
|
@ -1,6 +1,6 @@
|
|||
// @tags: [
|
||||
// # The test runs commands that are not allowed with security token: setParameter.
|
||||
// not_allowed_with_security_token,
|
||||
// not_allowed_with_signed_security_token,
|
||||
// assumes_superuser_permissions,
|
||||
// does_not_support_stepdowns,
|
||||
// ]
|
||||
|
|
|
|||
|
|
@ -1,6 +1,6 @@
|
|||
// @tags: [
|
||||
// # The test runs commands that are not allowed with security token: checkShardingIndex.
|
||||
// not_allowed_with_security_token,
|
||||
// not_allowed_with_signed_security_token,
|
||||
// requires_fastcount,
|
||||
// requires_non_retryable_writes,
|
||||
// requires_sharding,
|
||||
|
|
|
|||
|
|
@ -1,6 +1,6 @@
|
|||
// @tags: [
|
||||
// # The test runs commands that are not allowed with security token: cleanupOrphaned.
|
||||
// not_allowed_with_security_token,
|
||||
// not_allowed_with_signed_security_token,
|
||||
// requires_non_retryable_commands,
|
||||
// # This test expects to be run against a non-shardsvr.
|
||||
// directly_against_shardsvrs_incompatible,
|
||||
|
|
|
|||
|
|
@ -4,7 +4,7 @@
|
|||
//
|
||||
// @tags: [
|
||||
// # The test runs commands that are not allowed with security token: compact.
|
||||
// not_allowed_with_security_token,
|
||||
// not_allowed_with_signed_security_token,
|
||||
// uses_multiple_connections,
|
||||
// uses_parallel_shell,
|
||||
// uses_compact,
|
||||
|
|
|
|||
|
|
@ -3,7 +3,7 @@
|
|||
*
|
||||
* @tags: [
|
||||
* # The test runs commands that are not allowed with security token: fsyncUnlock.
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* assumes_superuser_permissions,
|
||||
* uses_parallel_shell,
|
||||
* ]
|
||||
|
|
|
|||
|
|
@ -3,7 +3,7 @@
|
|||
* @tags: [
|
||||
* assumes_read_preference_unchanged,
|
||||
* assumes_read_concern_unchanged,
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* assumes_unsharded_collection
|
||||
* ]
|
||||
*/
|
||||
|
|
|
|||
|
|
@ -4,7 +4,7 @@
|
|||
*
|
||||
* @tags: [
|
||||
* # The test runs commands that are not allowed with security token: getLog.
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* uses_parallel_shell,
|
||||
* # This test uses currentOp to check whether an aggregate command is running. In replica set
|
||||
* # environments, because currentOp is run against the admin database it is routed to the
|
||||
|
|
|
|||
|
|
@ -4,7 +4,7 @@
|
|||
*
|
||||
* @tags: [
|
||||
* # The test runs commands that are not allowed with security token: whatsmyuri.
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* assumes_read_concern_unchanged,
|
||||
* assumes_read_preference_unchanged,
|
||||
* no_selinux,
|
||||
|
|
|
|||
|
|
@ -1,6 +1,6 @@
|
|||
// @tags: [
|
||||
// # The test runs commands that are not allowed with security token: getLog.
|
||||
// not_allowed_with_security_token,
|
||||
// not_allowed_with_signed_security_token,
|
||||
// does_not_support_stepdowns
|
||||
// ]
|
||||
|
||||
|
|
|
|||
|
|
@ -2,7 +2,7 @@
|
|||
//
|
||||
// @tags: [
|
||||
// # The test runs commands that are not allowed with security token: getLog.
|
||||
// not_allowed_with_security_token,
|
||||
// not_allowed_with_signed_security_token,
|
||||
// # This test attempts to perform a find command and see that it ran using the getLog command.
|
||||
// # The former operation may be routed to a secondary in the replica set, whereas the latter must
|
||||
// # be routed to the primary.
|
||||
|
|
|
|||
|
|
@ -3,7 +3,7 @@
|
|||
//
|
||||
// @tags: [
|
||||
// # The test runs commands that are not allowed with security token: connectionStatus.
|
||||
// not_allowed_with_security_token,
|
||||
// not_allowed_with_signed_security_token,
|
||||
// does_not_support_stepdowns,
|
||||
// uses_testing_only_commands,
|
||||
// no_selinux,
|
||||
|
|
|
|||
|
|
@ -1,7 +1,7 @@
|
|||
// @tags: [
|
||||
// # The test runs commands that are not allowed with security token: createUser, dropUser,
|
||||
// # logout, profile, setProfilingLevel.
|
||||
// not_allowed_with_security_token,
|
||||
// not_allowed_with_signed_security_token,
|
||||
// assumes_superuser_permissions,
|
||||
// creates_and_authenticates_user,
|
||||
// does_not_support_stepdowns,
|
||||
|
|
|
|||
|
|
@ -2,7 +2,7 @@
|
|||
//
|
||||
// @tags: [
|
||||
// # The test runs commands that are not allowed with security token: profile.
|
||||
// not_allowed_with_security_token,
|
||||
// not_allowed_with_signed_security_token,
|
||||
// requires_profiling,
|
||||
// ]
|
||||
|
||||
|
|
|
|||
|
|
@ -1,7 +1,7 @@
|
|||
// @tags: [
|
||||
// # The test runs commands that are not allowed with security token: createUser, logout,
|
||||
// # setProfilingLevel.
|
||||
// not_allowed_with_security_token,
|
||||
// not_allowed_with_signed_security_token,
|
||||
// assumes_superuser_permissions,
|
||||
// creates_and_authenticates_user,
|
||||
// requires_profiling,
|
||||
|
|
|
|||
|
|
@ -2,7 +2,7 @@
|
|||
//
|
||||
// @tags: [
|
||||
// # The test runs commands that are not allowed with security token: setProfilingLevel.
|
||||
// not_allowed_with_security_token,
|
||||
// not_allowed_with_signed_security_token,
|
||||
// does_not_support_stepdowns,
|
||||
// requires_fcv_70,
|
||||
// requires_profiling,
|
||||
|
|
|
|||
|
|
@ -2,7 +2,7 @@
|
|||
//
|
||||
// @tags: [
|
||||
// # The test runs commands that are not allowed with security token: setProfilingLevel.
|
||||
// not_allowed_with_security_token,
|
||||
// not_allowed_with_signed_security_token,
|
||||
// does_not_support_stepdowns,
|
||||
// requires_fastcount,
|
||||
// requires_fcv_70,
|
||||
|
|
|
|||
|
|
@ -2,7 +2,7 @@
|
|||
//
|
||||
// @tags: [
|
||||
// # The test runs commands that are not allowed with security token: setProfilingLevel.
|
||||
// not_allowed_with_security_token,
|
||||
// not_allowed_with_signed_security_token,
|
||||
// # Asserts on the number of index keys deleted.
|
||||
// assumes_no_implicit_index_creation,
|
||||
// does_not_support_stepdowns,
|
||||
|
|
|
|||
|
|
@ -2,7 +2,7 @@
|
|||
//
|
||||
// @tags: [
|
||||
// # The test runs commands that are not allowed with security token: setProfilingLevel.
|
||||
// not_allowed_with_security_token,
|
||||
// not_allowed_with_signed_security_token,
|
||||
// does_not_support_stepdowns,
|
||||
// requires_fcv_70,
|
||||
// requires_profiling,
|
||||
|
|
|
|||
|
|
@ -2,7 +2,7 @@
|
|||
//
|
||||
// @tags: [
|
||||
// # The test runs commands that are not allowed with security token: setProfilingLevel.
|
||||
// not_allowed_with_security_token,
|
||||
// not_allowed_with_signed_security_token,
|
||||
// does_not_support_stepdowns,
|
||||
// requires_fcv_70,
|
||||
// requires_profiling,
|
||||
|
|
|
|||
|
|
@ -2,7 +2,7 @@
|
|||
//
|
||||
// @tags: [
|
||||
// # The test runs commands that are not allowed with security token: setProfilingLevel.
|
||||
// not_allowed_with_security_token,
|
||||
// not_allowed_with_signed_security_token,
|
||||
// # Asserts on the number of index keys modified.
|
||||
// assumes_no_implicit_index_creation,
|
||||
// requires_fcv_70,
|
||||
|
|
|
|||
|
|
@ -2,7 +2,7 @@
|
|||
//
|
||||
// @tags: [
|
||||
// # The test runs commands that are not allowed with security token: setProfilingLevel.
|
||||
// not_allowed_with_security_token,
|
||||
// not_allowed_with_signed_security_token,
|
||||
// does_not_support_stepdowns,
|
||||
// requires_getmore,
|
||||
// requires_fcv_70,
|
||||
|
|
|
|||
|
|
@ -3,7 +3,7 @@
|
|||
*
|
||||
* @tags: [
|
||||
* # The test runs commands that are not allowed with security token: setProfilingLevel.
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* assumes_read_concern_unchanged,
|
||||
* assumes_read_preference_unchanged,
|
||||
* requires_non_retryable_writes,
|
||||
|
|
|
|||
|
|
@ -2,7 +2,7 @@
|
|||
//
|
||||
// @tags: [
|
||||
// # The test runs commands that are not allowed with security token: setProfilingLevel.
|
||||
// not_allowed_with_security_token,
|
||||
// not_allowed_with_signed_security_token,
|
||||
// # Asserts on the number of index keys inserted.
|
||||
// assumes_no_implicit_index_creation,
|
||||
// assumes_write_concern_unchanged,
|
||||
|
|
|
|||
|
|
@ -2,7 +2,7 @@
|
|||
//
|
||||
// @tags: [
|
||||
// # The test runs commands that are not allowed with security token: setProfilingLevel.
|
||||
// not_allowed_with_security_token,
|
||||
// not_allowed_with_signed_security_token,
|
||||
// does_not_support_stepdowns,
|
||||
// requires_getmore,
|
||||
// requires_profiling,
|
||||
|
|
|
|||
|
|
@ -2,7 +2,7 @@
|
|||
//
|
||||
// @tags: [
|
||||
// # The test runs commands that are not allowed with security token: setProfilingLevel.
|
||||
// not_allowed_with_security_token,
|
||||
// not_allowed_with_signed_security_token,
|
||||
// does_not_support_stepdowns,
|
||||
// requires_getmore,
|
||||
// requires_profiling,
|
||||
|
|
|
|||
|
|
@ -3,7 +3,7 @@
|
|||
// @tags: [
|
||||
// # The test runs commands that are not allowed with security token: mapReduce,
|
||||
// # setProfilingLevel.
|
||||
// not_allowed_with_security_token,
|
||||
// not_allowed_with_signed_security_token,
|
||||
// # mapReduce does not support afterClusterTime.
|
||||
// does_not_support_causal_consistency,
|
||||
// does_not_support_stepdowns,
|
||||
|
|
|
|||
|
|
@ -2,7 +2,7 @@
|
|||
//
|
||||
// @tags: [
|
||||
// # The test runs commands that are not allowed with security token: setProfilingLevel.
|
||||
// not_allowed_with_security_token,
|
||||
// not_allowed_with_signed_security_token,
|
||||
// does_not_support_stepdowns,
|
||||
// requires_profiling
|
||||
// ]
|
||||
|
|
|
|||
|
|
@ -2,7 +2,7 @@
|
|||
//
|
||||
// @tags: [
|
||||
// # The test runs commands that are not allowed with security token: setProfilingLevel.
|
||||
// not_allowed_with_security_token,
|
||||
// not_allowed_with_signed_security_token,
|
||||
// assumes_against_mongod_not_mongos,
|
||||
// assumes_read_concern_unchanged,
|
||||
// does_not_support_stepdowns,
|
||||
|
|
|
|||
|
|
@ -2,7 +2,7 @@
|
|||
//
|
||||
// @tags: [
|
||||
// # The test runs commands that are not allowed with security token: setProfilingLevel.
|
||||
// not_allowed_with_security_token,
|
||||
// not_allowed_with_signed_security_token,
|
||||
// does_not_support_stepdowns,
|
||||
// requires_fastcount,
|
||||
// requires_profiling,
|
||||
|
|
|
|||
|
|
@ -2,7 +2,7 @@
|
|||
//
|
||||
// @tags: [
|
||||
// # The test runs commands that are not allowed with security token: setProfilingLevel.
|
||||
// not_allowed_with_security_token,
|
||||
// not_allowed_with_signed_security_token,
|
||||
// # Asserts on the number of index keys modified.
|
||||
// assumes_no_implicit_index_creation,
|
||||
// does_not_support_stepdowns,
|
||||
|
|
|
|||
|
|
@ -3,7 +3,7 @@
|
|||
// @tags: [
|
||||
// # The test runs commands that are not allowed with security token: convertToCapped, mapReduce,
|
||||
// # profile.
|
||||
// not_allowed_with_security_token,
|
||||
// not_allowed_with_signed_security_token,
|
||||
// does_not_support_stepdowns,
|
||||
// requires_capped,
|
||||
// requires_collstats,
|
||||
|
|
|
|||
|
|
@ -1,6 +1,6 @@
|
|||
// @tags: [
|
||||
// # The test runs commands that are not allowed with security token: setParameter.
|
||||
// not_allowed_with_security_token,
|
||||
// not_allowed_with_signed_security_token,
|
||||
// assumes_superuser_permissions,
|
||||
// does_not_support_stepdowns,
|
||||
// requires_fcv_62,
|
||||
|
|
|
|||
|
|
@ -3,7 +3,7 @@
|
|||
*
|
||||
* @tags: [
|
||||
* # The test runs commands that are not allowed with security token: validateDBMetadata.
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* no_selinux,
|
||||
* requires_timeseries,
|
||||
* # TODO SERVER-82166 remove "balancer off" tag once PM-2077 is over: migration can cause an index
|
||||
|
|
|
|||
|
|
@ -3,7 +3,7 @@
|
|||
*
|
||||
* @tags: [
|
||||
* # The test runs commands that are not allowed with security token: top.
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* requires_fcv_60,
|
||||
* uses_api_parameters,
|
||||
* ]
|
||||
|
|
|
|||
|
|
@ -3,7 +3,7 @@
|
|||
*
|
||||
* @tags: [
|
||||
* # The test runs commands that are not allowed with security token: testDeprecation.
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* uses_api_parameters,
|
||||
* no_selinux,
|
||||
* ]
|
||||
|
|
|
|||
|
|
@ -10,7 +10,7 @@
|
|||
* requires_fcv_63,
|
||||
* tenant_migration_incompatible,
|
||||
* does_not_support_stepdowns,
|
||||
* not_allowed_with_security_token
|
||||
* not_allowed_with_signed_security_token
|
||||
* ]
|
||||
*/
|
||||
|
||||
|
|
|
|||
|
|
@ -3,7 +3,7 @@
|
|||
*
|
||||
* @tags: [
|
||||
* # The test runs commands that are not allowed with security token: getLog, setProfilingLevel.
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* does_not_support_stepdowns,
|
||||
* requires_profiling,
|
||||
* requires_fcv_62,
|
||||
|
|
|
|||
|
|
@ -1,7 +1,7 @@
|
|||
/**
|
||||
* @tags: [
|
||||
* # The test runs commands that are not allowed with security token: emptycapped.
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* requires_capped,
|
||||
* requires_fastcount,
|
||||
* requires_non_retryable_commands,
|
||||
|
|
|
|||
|
|
@ -5,7 +5,7 @@
|
|||
*
|
||||
* @tags: [
|
||||
* # The test runs commands that are not allowed with security token: godinsert.
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* requires_capped,
|
||||
* uses_testing_only_commands,
|
||||
* # godinsert and can't run under replication
|
||||
|
|
|
|||
|
|
@ -3,7 +3,7 @@
|
|||
*
|
||||
* @tags: [
|
||||
* # The test runs commands that are not allowed with security token: applyOps.
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* # Cannot implicitly shard accessed collections because of collection existing when none
|
||||
* # expected.
|
||||
* assumes_no_implicit_collection_creation_after_drop,
|
||||
|
|
|
|||
|
|
@ -3,7 +3,7 @@
|
|||
*
|
||||
* @tags: [
|
||||
* # The test runs commands that are not allowed with security token: applyOps.
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* requires_replication,
|
||||
* # applyOps is not supported on mongos
|
||||
* assumes_against_mongod_not_mongos,
|
||||
|
|
|
|||
|
|
@ -3,7 +3,7 @@
|
|||
*
|
||||
* @tags: [
|
||||
* # The test runs commands that are not allowed with security token: applyOps.
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* assumes_against_mongod_not_mongos,
|
||||
* assumes_superuser_permissions,
|
||||
* # applyOps is not retryable.
|
||||
|
|
|
|||
|
|
@ -4,7 +4,7 @@
|
|||
// @tags: [
|
||||
// # The test runs commands that are not allowed with security token: applyOps,
|
||||
// # cloneCollectionAsCapped, mapReduce, reIndex.
|
||||
// not_allowed_with_security_token,
|
||||
// not_allowed_with_signed_security_token,
|
||||
// assumes_no_implicit_collection_creation_after_drop,
|
||||
// # Asserts that some queries use a collection scan.
|
||||
// assumes_no_implicit_index_creation,
|
||||
|
|
|
|||
|
|
@ -18,7 +18,7 @@
|
|||
* # return different values after a failover
|
||||
* tenant_migration_incompatible,
|
||||
* does_not_support_stepdowns,
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* ]
|
||||
*/
|
||||
import {assertArrayEq} from "jstests/aggregation/extras/utils.js";
|
||||
|
|
|
|||
|
|
@ -12,7 +12,7 @@
|
|||
* # return different values after a failover
|
||||
* tenant_migration_incompatible,
|
||||
* does_not_support_stepdowns,
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* ]
|
||||
*/
|
||||
import {planHasStage} from "jstests/libs/analyze_plan.js";
|
||||
|
|
@ -204,4 +204,4 @@ runTestWithDocsAndIndexes("sibling_paths_5",
|
|||
{keys: {"a.$**": "columnstore"}});
|
||||
|
||||
// Note that this test does not drop any of its test collections or indexes, so that they will be
|
||||
// available to follow-on index validation tests.
|
||||
// available to follow-on index validation tests.
|
||||
|
|
|
|||
|
|
@ -11,7 +11,7 @@
|
|||
* # Columnstore tests set server parameters to disable columnstore query planning heuristics -
|
||||
* # server parameters are stored in-memory only so are not transferred onto the recipient.
|
||||
* tenant_migration_incompatible,
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* # Logic for when a COLUMN_SCAN plan is generated changed slightly as part of enabling more
|
||||
* # queries in SBE in the 7.0 release.
|
||||
* requires_fcv_70,
|
||||
|
|
|
|||
|
|
@ -20,7 +20,7 @@
|
|||
* # return different values after a failover
|
||||
* tenant_migration_incompatible,
|
||||
* does_not_support_stepdowns,
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* uses_full_validation,
|
||||
* ]
|
||||
*/
|
||||
|
|
|
|||
|
|
@ -11,7 +11,7 @@
|
|||
* # return different values after a failover
|
||||
* tenant_migration_incompatible,
|
||||
* does_not_support_stepdowns,
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* uses_full_validation,
|
||||
* ]
|
||||
*/
|
||||
|
|
|
|||
|
|
@ -13,7 +13,7 @@
|
|||
* # return different values after a failover
|
||||
* tenant_migration_incompatible,
|
||||
* does_not_support_stepdowns,
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* ]
|
||||
*/
|
||||
import {assertArrayEq, resultsEq} from "jstests/aggregation/extras/utils.js";
|
||||
|
|
@ -1056,4 +1056,4 @@ function testInExpr(test) {
|
|||
assert.lt(x.numSeeks + y.numSeeks,
|
||||
2 * expectedToMatchCount,
|
||||
"Number of seeks in filtered columns should be small");
|
||||
})();
|
||||
})();
|
||||
|
|
|
|||
|
|
@ -9,7 +9,7 @@
|
|||
* # return different values after a failover
|
||||
* tenant_migration_incompatible,
|
||||
* does_not_support_stepdowns,
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* ]
|
||||
*/
|
||||
import {planHasStage} from "jstests/libs/analyze_plan.js";
|
||||
|
|
|
|||
|
|
@ -11,7 +11,7 @@
|
|||
* # return different values after a failover
|
||||
* tenant_migration_incompatible,
|
||||
* does_not_support_stepdowns,
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* ]
|
||||
*/
|
||||
import {assertDropCollection} from "jstests/libs/collection_drop_recreate.js";
|
||||
|
|
@ -190,4 +190,4 @@ assert.commandFailedWithCode(
|
|||
ErrorCodes.InvalidIndexSpecificationOption);
|
||||
assert.commandFailedWithCode(
|
||||
db.runCommand({create: clusteredCollName, clusteredIndex: {key: kKeyPattern, unique: false}}),
|
||||
5979700);
|
||||
5979700);
|
||||
|
|
|
|||
|
|
@ -7,7 +7,7 @@
|
|||
// # mergeChunks, moveChunk, movePrimary, planCacheClear, planCacheClearFilters,
|
||||
// # planCacheListFilters, planCacheSetFilter, reIndex, shardCollection, split,
|
||||
// # updateZoneKeyRange.
|
||||
// not_allowed_with_security_token,
|
||||
// not_allowed_with_signed_security_token,
|
||||
// assumes_unsharded_collection,
|
||||
// does_not_support_stepdowns,
|
||||
// requires_fastcount,
|
||||
|
|
|
|||
|
|
@ -5,7 +5,7 @@
|
|||
*
|
||||
* @tags: [
|
||||
* # The test runs commands that are not allowed with security token: mapReduce.
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* assumes_write_concern_unchanged,
|
||||
* does_not_support_stepdowns,
|
||||
* ]
|
||||
|
|
|
|||
|
|
@ -4,7 +4,7 @@
|
|||
*
|
||||
* @tags: [
|
||||
* # The test runs commands that are not allowed with security token: setProfilingLevel.
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* assumes_against_mongod_not_mongos,
|
||||
* assumes_read_concern_unchanged,
|
||||
* assumes_unsharded_collection,
|
||||
|
|
|
|||
|
|
@ -3,7 +3,7 @@
|
|||
// @tags: [
|
||||
// # The test runs commands that are not allowed with security token: ConnectionStatus,
|
||||
// # connectionStatus, createUser, logout.
|
||||
// not_allowed_with_security_token,
|
||||
// not_allowed_with_signed_security_token,
|
||||
// assumes_superuser_permissions,
|
||||
// assumes_write_concern_unchanged,
|
||||
// creates_and_authenticates_user,
|
||||
|
|
|
|||
|
|
@ -2,7 +2,7 @@
|
|||
//
|
||||
// @tags: [
|
||||
// # The test runs commands that are not allowed with security token: mapReduce.
|
||||
// not_allowed_with_security_token,
|
||||
// not_allowed_with_signed_security_token,
|
||||
// does_not_support_stepdowns,
|
||||
// requires_non_retryable_commands,
|
||||
// uses_map_reduce_with_temp_collections,
|
||||
|
|
|
|||
|
|
@ -3,7 +3,7 @@
|
|||
//
|
||||
// @tags: [
|
||||
// # The test runs commands that are not allowed with security token: dataSize.
|
||||
// not_allowed_with_security_token,
|
||||
// not_allowed_with_signed_security_token,
|
||||
// # Cannot implicitly shard accessed collections because the "dataSize" command returns an
|
||||
// # "keyPattern must equal shard key" error response.
|
||||
// assumes_unsharded_collection,
|
||||
|
|
|
|||
|
|
@ -2,7 +2,7 @@
|
|||
//
|
||||
// @tags: [
|
||||
// # The test runs commands that are not allowed with security token: dataSize.
|
||||
// not_allowed_with_security_token,
|
||||
// not_allowed_with_signed_security_token,
|
||||
// # Cannot implicitly shard accessed collections because the "dataSize" command returns an
|
||||
// # "keyPattern must equal shard key" error response.
|
||||
// assumes_unsharded_collection,
|
||||
|
|
|
|||
|
|
@ -1,6 +1,6 @@
|
|||
// @tags: [
|
||||
// # The test runs commands that are not allowed with security token: dbhash.
|
||||
// not_allowed_with_security_token,
|
||||
// not_allowed_with_signed_security_token,
|
||||
// ]
|
||||
|
||||
let a = db.dbhasha;
|
||||
|
|
|
|||
|
|
@ -1,6 +1,6 @@
|
|||
// @tags: [
|
||||
// # The test runs commands that are not allowed with security token: dbhash.
|
||||
// not_allowed_with_security_token,
|
||||
// not_allowed_with_signed_security_token,
|
||||
// assumes_superuser_permissions,
|
||||
// ]
|
||||
|
||||
|
|
|
|||
|
|
@ -4,7 +4,7 @@
|
|||
* @tags: [
|
||||
* # The test runs commands that are not allowed with security token: cloneCollectionAsCapped,
|
||||
* # convertToCapped.
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* requires_non_retryable_commands,
|
||||
* requires_fastcount,
|
||||
* requires_capped,
|
||||
|
|
|
|||
|
|
@ -2,7 +2,7 @@
|
|||
* @tags: [
|
||||
* # The test runs commands that are not allowed with security token: CloneCollectionAsCapped,
|
||||
* # cloneCollectionAsCapped.
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* requires_non_retryable_commands,
|
||||
* ]
|
||||
*/
|
||||
|
|
|
|||
|
|
@ -4,7 +4,7 @@
|
|||
*
|
||||
* @tags: [
|
||||
* # The test runs commands that are not allowed with security token: convertToCapped.
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* requires_non_retryable_commands,
|
||||
* requires_capped,
|
||||
* ]
|
||||
|
|
|
|||
|
|
@ -3,7 +3,7 @@
|
|||
*
|
||||
* @tags: [
|
||||
* # The test runs commands that are not allowed with security token: applyOps.
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* # applyOps is not supported on mongos
|
||||
* assumes_against_mongod_not_mongos,
|
||||
* # Cannot implicitly shard accessed collections because of collection existing when none
|
||||
|
|
|
|||
|
|
@ -3,7 +3,7 @@
|
|||
*
|
||||
* @tags: [
|
||||
* # The test runs commands that are not allowed with security token: applyOps.
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* requires_non_retryable_commands,
|
||||
* # applyOps is not supported on mongos
|
||||
* assumes_against_mongod_not_mongos,
|
||||
|
|
|
|||
|
|
@ -3,7 +3,7 @@
|
|||
*
|
||||
* @tags: [
|
||||
* # The test runs commands that are not allowed with security token: convertToCapped.
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* requires_non_retryable_commands,
|
||||
* requires_capped,
|
||||
* ]
|
||||
|
|
|
|||
|
|
@ -5,7 +5,7 @@
|
|||
* @tags: [
|
||||
* # The test runs commands that are not allowed with security token: ConvertToCapped,
|
||||
* # convertToCapped.
|
||||
* not_allowed_with_security_token,
|
||||
* not_allowed_with_signed_security_token,
|
||||
* requires_non_retryable_commands,
|
||||
* ]
|
||||
*/
|
||||
|
|
|
|||
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue