SERVER-82311 rename test tag

GitOrigin-RevId: 598fb15a21c0c4e53ef47a4b5c5dc6f5ae5fd5ed
This commit is contained in:
Joseph Prince 2023-12-11 22:44:46 +00:00 committed by MongoDB Bot
parent 6164329e42
commit d04dc10cac
290 changed files with 303 additions and 303 deletions

View File

@ -73,7 +73,7 @@ selector:
- jstests/core/**/exhaust.js
exclude_with_any_tags:
- simulate_atlas_proxy_incompatible
- not_allowed_with_security_token
- not_allowed_with_signed_security_token
- command_not_supported_in_serverless
- assumes_standalone_mongod
- requires_capped

View File

@ -139,7 +139,7 @@ selector:
- jstests/aggregation/**/*.js
exclude_with_any_tags:
- simulate_atlas_proxy_incompatible
- not_allowed_with_security_token
- not_allowed_with_signed_security_token
- command_not_supported_in_serverless
- assumes_standalone_mongod
- requires_capped

View File

@ -52,7 +52,7 @@ selector:
# This passthrough uses the `simulate_atlas_proxy` override, which some tests are incompatible with.
- simulate_atlas_proxy_incompatible
# Exclude tests which we know use commands that don't support a security token.
- not_allowed_with_security_token
- not_allowed_with_signed_security_token
# Exclude tests which use commands that aren't supported in Serverless.
- command_not_supported_in_serverless
# Server side javascript (such as $where, $function, $accumulator and map-reduce) is not allowed in Serverless.

View File

@ -262,7 +262,7 @@ selector:
# This passthrough uses the `simulate_atlas_proxy` override, which some tests are incompatible with.
- simulate_atlas_proxy_incompatible
# Exclude tests which we know use commands that don't support a security token.
- not_allowed_with_security_token
- not_allowed_with_signed_security_token
# Exclude tests which use commands that aren't supported in Serverless.
- command_not_supported_in_serverless
# Server side javascript (such as $where, $function, $accumulator and map-reduce) is not allowed in Serverless.

View File

@ -24,7 +24,7 @@ selector:
# This passthrough uses the `simulate_atlas_proxy` override, which some tests are incompatible with.
- simulate_atlas_proxy_incompatible
# Exclude tests which we know use commands that don't support a security token.
- not_allowed_with_security_token
- not_allowed_with_signed_security_token
# Exclude tests which use commands that aren't supported in Serverless.
- command_not_supported_in_serverless
# Theses tests expect replication is not enabled.

View File

@ -13,7 +13,7 @@ selector:
# Exclude tests which use commands that aren't supported in Serverless.
- command_not_supported_in_serverless
# Exclude tests which we know use commands that don't support a security token.
- not_allowed_with_security_token
- not_allowed_with_signed_security_token
# Theses tests expect replication is not enabled.
- assumes_standalone_mongod
# capped collections are banned in Serverless.

View File

@ -1,7 +1,7 @@
// Regression test to check that different document sizes work correctly with $lookup.
// @tags: [
// requires_fcv_71,
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// ]
import {FixtureHelpers} from "jstests/libs/fixture_helpers.js";
@ -68,4 +68,4 @@ try {
runHashLookupSpill();
} finally {
setHashLookupMemoryLimit(oldMemoryLimit);
}
}

View File

@ -7,7 +7,7 @@
// do_not_wrap_aggregations_in_facets,
// does_not_support_stepdowns,
// requires_profiling,
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// ]
import {getLatestProfilerEntry} from "jstests/libs/profiler.js";

View File

@ -2,7 +2,7 @@
// run against a sharded collection is wrapped in a "shards" object with keys for each shard.
// @tags: [
// assumes_unsharded_collection,
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// ]
//
// This test is designed to stress $sample, and any optimizations a storage engine might provide.
@ -91,4 +91,4 @@ for (var i = 0; i < nDocs / sampleSize; i++) {
assert.gte(Object.keys(cumulativeSeenIds).length, nDocs / 4);
// Make sure we can return all documents in the collection.
assert.eq(coll.aggregate([{$sample: {size: nDocs}}]).toArray().length, nDocs);
assert.eq(coll.aggregate([{$sample: {size: nDocs}}]).toArray().length, nDocs);

View File

@ -15,7 +15,7 @@
* # Index filter commands do not support causal consistency.
* does_not_support_causal_consistency,
* requires_fcv_63,
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* ]
*/
@ -1066,4 +1066,4 @@ assertPipelineResultsAndExplain({
],
expectedOutput: expectedResult,
validateExplain: (explain) => assertPlanUsesDistinctScan(explain, {_id: 1})
});
});

View File

@ -10,7 +10,7 @@
* assumes_unsharded_collection,
* # Plan cache state is node-local and will not get migrated alongside tenant data.
* tenant_migration_incompatible,
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* ]
*/
const collName = "is_count_like";

View File

@ -3,7 +3,7 @@
* pipeline are evaluated correctly.
* @tags: [
* requires_pipeline_optimization,
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* ]
*/

View File

@ -15,7 +15,7 @@
// do_not_wrap_aggregations_in_facets,
// requires_pipeline_optimization,
// requires_profiling,
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// ]
import {isWiredTiger} from "jstests/concurrency/fsm_workload_helpers/server_types.js";
import {

View File

@ -6,7 +6,7 @@
* @tags: [
* # Can't wrap queries in facets without going past max BSON depth.
* do_not_wrap_aggregations_in_facets,
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* ]
*/

View File

@ -4,7 +4,7 @@
* requires_fcv_53,
* requires_pipeline_optimization,
* do_not_wrap_aggregations_in_facets,
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* ]
*/

View File

@ -3,7 +3,7 @@
* @tags: [
* # Needed as $densify is a 51 feature.
* requires_fcv_51,
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* ]
*/
@ -67,4 +67,4 @@ assert.commandWorked(coll.insert({val: 5, part: 1}));
runAggregate({$densify: {field: "val", range: {step: 1, bounds: "full"}}});
// Reset parameter.
setMaxDocs(origParamValue);
setMaxDocs(origParamValue);

View File

@ -3,7 +3,7 @@
* @tags: [
* # Needed as $densify is a 51 feature.
* requires_fcv_51,
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* ]
*/
@ -50,4 +50,4 @@ assert.commandWorked(db.runCommand({aggregate: coll.getName(), pipeline: [pipeli
// Reset limit for other tests.
setParameterOnAllHosts(DiscoverTopology.findNonConfigNodes(db.getMongo()),
"internalDocumentSourceDensifyMaxMemoryBytes",
origParamValue);
origParamValue);

View File

@ -6,7 +6,7 @@
// assumes_read_concern_unchanged,
// assumes_read_preference_unchanged,
// tenant_migration_incompatible,
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// ]
const outer = db.outer;
const inner = db.inner;
@ -61,4 +61,4 @@ inner.getPlanCache().clear();
assert(innerPlan.isActive);
assert.eq(innerPlan.cachedPlan.inputStage.stage, "COLLSCAN");
assert.eq(Object.keys(innerPlan.cachedPlan.inputStage.filter["$and"][0]), ["$expr"]);
}
}

View File

@ -2,7 +2,7 @@
// @tags: [
// does_not_support_stepdowns,
// requires_profiling,
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// ]
import {getAggPlanStages} from "jstests/libs/analyze_plan.js";

View File

@ -5,7 +5,7 @@
* do_not_wrap_aggregations_in_facets,
* # $search/$searchMeta do not support any read concern other than "local"
* assumes_read_concern_unchanged,
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* ]
*/
const coll = db.searchCollector;

View File

@ -3,7 +3,7 @@
* data. Memory checks are per node, so only test when the data is all in one place.
*
* @tags: [
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* ]
*/

View File

@ -5,7 +5,7 @@
* requires_profiling,
* assumes_read_concern_unchanged,
* do_not_wrap_aggregations_in_facets,
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* ]
*/
import "jstests/libs/sbe_assert_error_override.js";

View File

@ -2,7 +2,7 @@
* Tests $unionWith with various levels of nesting and stages.
*
* @tags: [
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* ]
*/
@ -328,4 +328,4 @@ checkResults(testDB.runCommand({
checkResults(
testDB.runCommand(
{aggregate: "emptyCollection", pipeline: [{$unionWith: collA.getName()}], cursor: {}}),
resSet);
resSet);

View File

@ -11,7 +11,7 @@
// requires_collstats,
// requires_pipeline_optimization,
// requires_persistence,
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// ]
import "jstests/libs/sbe_assert_error_override.js";

View File

@ -1,7 +1,7 @@
/*
* @tags: [
* # The test runs commands that are not allowed with security token: applyOps.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* assumes_superuser_permissions,
* requires_fastcount,
* requires_non_retryable_commands,

View File

@ -3,7 +3,7 @@
*
* @tags: [
* # The test runs commands that are not allowed with security token: applyOps.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* requires_non_retryable_commands,
* requires_fastcount,
* # 6.2 removes support for atomic applyOps

View File

@ -1,7 +1,7 @@
/*
* @tags: [
* # The test runs commands that are not allowed with security token: applyOps.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* requires_non_retryable_commands,
* requires_fastcount,
* # 6.2 removes support for atomic applyOps

View File

@ -5,7 +5,7 @@
*
* @tags: [
* # The test runs commands that are not allowed with security token: applyOps.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* # Cannot implicitly shard accessed collections because of
* # collection existing when none expected.
* assumes_no_implicit_collection_creation_after_drop,

View File

@ -11,7 +11,7 @@
*
* @tags: [
* # The test runs commands that are not allowed with security token: applyOps.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* requires_non_retryable_commands,
* # applyOps is not supported on mongos
* assumes_against_mongod_not_mongos,

View File

@ -3,7 +3,7 @@
*
* @tags: [
* # The test runs commands that are not allowed with security token: applyOps.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* # applyOps is not supported on mongos
* assumes_against_mongod_not_mongos,
* assumes_superuser_permissions,

View File

@ -1,7 +1,7 @@
/*
* @tags: [
* # The test runs commands that are not allowed with security token: applyOps.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* requires_non_retryable_commands,
* # applyOps is not supported on mongos
* assumes_against_mongod_not_mongos,

View File

@ -1,7 +1,7 @@
// @tags: [
// # The test runs commands that are not allowed with security token: authenticate, createUser,
// # dropUser, logout.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// assumes_superuser_permissions,
// assumes_write_concern_unchanged,
// creates_and_authenticates_user,

View File

@ -2,7 +2,7 @@
//
// @tags: [
// # The test runs commands that are not allowed with security token: logout.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// requires_auth,
// requires_non_retryable_commands
// ]

View File

@ -1,6 +1,6 @@
// @tags: [
// # The test runs commands that are not allowed with security token: setParameter.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// assumes_superuser_permissions,
// does_not_support_stepdowns,
// ]

View File

@ -1,6 +1,6 @@
// @tags: [
// # The test runs commands that are not allowed with security token: checkShardingIndex.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// requires_fastcount,
// requires_non_retryable_writes,
// requires_sharding,

View File

@ -1,6 +1,6 @@
// @tags: [
// # The test runs commands that are not allowed with security token: cleanupOrphaned.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// requires_non_retryable_commands,
// # This test expects to be run against a non-shardsvr.
// directly_against_shardsvrs_incompatible,

View File

@ -4,7 +4,7 @@
//
// @tags: [
// # The test runs commands that are not allowed with security token: compact.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// uses_multiple_connections,
// uses_parallel_shell,
// uses_compact,

View File

@ -3,7 +3,7 @@
*
* @tags: [
* # The test runs commands that are not allowed with security token: fsyncUnlock.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* assumes_superuser_permissions,
* uses_parallel_shell,
* ]

View File

@ -3,7 +3,7 @@
* @tags: [
* assumes_read_preference_unchanged,
* assumes_read_concern_unchanged,
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* assumes_unsharded_collection
* ]
*/

View File

@ -4,7 +4,7 @@
*
* @tags: [
* # The test runs commands that are not allowed with security token: getLog.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* uses_parallel_shell,
* # This test uses currentOp to check whether an aggregate command is running. In replica set
* # environments, because currentOp is run against the admin database it is routed to the

View File

@ -4,7 +4,7 @@
*
* @tags: [
* # The test runs commands that are not allowed with security token: whatsmyuri.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* assumes_read_concern_unchanged,
* assumes_read_preference_unchanged,
* no_selinux,

View File

@ -1,6 +1,6 @@
// @tags: [
// # The test runs commands that are not allowed with security token: getLog.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// does_not_support_stepdowns
// ]

View File

@ -2,7 +2,7 @@
//
// @tags: [
// # The test runs commands that are not allowed with security token: getLog.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// # This test attempts to perform a find command and see that it ran using the getLog command.
// # The former operation may be routed to a secondary in the replica set, whereas the latter must
// # be routed to the primary.

View File

@ -3,7 +3,7 @@
//
// @tags: [
// # The test runs commands that are not allowed with security token: connectionStatus.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// does_not_support_stepdowns,
// uses_testing_only_commands,
// no_selinux,

View File

@ -1,7 +1,7 @@
// @tags: [
// # The test runs commands that are not allowed with security token: createUser, dropUser,
// # logout, profile, setProfilingLevel.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// assumes_superuser_permissions,
// creates_and_authenticates_user,
// does_not_support_stepdowns,

View File

@ -2,7 +2,7 @@
//
// @tags: [
// # The test runs commands that are not allowed with security token: profile.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// requires_profiling,
// ]

View File

@ -1,7 +1,7 @@
// @tags: [
// # The test runs commands that are not allowed with security token: createUser, logout,
// # setProfilingLevel.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// assumes_superuser_permissions,
// creates_and_authenticates_user,
// requires_profiling,

View File

@ -2,7 +2,7 @@
//
// @tags: [
// # The test runs commands that are not allowed with security token: setProfilingLevel.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// does_not_support_stepdowns,
// requires_fcv_70,
// requires_profiling,

View File

@ -2,7 +2,7 @@
//
// @tags: [
// # The test runs commands that are not allowed with security token: setProfilingLevel.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// does_not_support_stepdowns,
// requires_fastcount,
// requires_fcv_70,

View File

@ -2,7 +2,7 @@
//
// @tags: [
// # The test runs commands that are not allowed with security token: setProfilingLevel.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// # Asserts on the number of index keys deleted.
// assumes_no_implicit_index_creation,
// does_not_support_stepdowns,

View File

@ -2,7 +2,7 @@
//
// @tags: [
// # The test runs commands that are not allowed with security token: setProfilingLevel.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// does_not_support_stepdowns,
// requires_fcv_70,
// requires_profiling,

View File

@ -2,7 +2,7 @@
//
// @tags: [
// # The test runs commands that are not allowed with security token: setProfilingLevel.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// does_not_support_stepdowns,
// requires_fcv_70,
// requires_profiling,

View File

@ -2,7 +2,7 @@
//
// @tags: [
// # The test runs commands that are not allowed with security token: setProfilingLevel.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// # Asserts on the number of index keys modified.
// assumes_no_implicit_index_creation,
// requires_fcv_70,

View File

@ -2,7 +2,7 @@
//
// @tags: [
// # The test runs commands that are not allowed with security token: setProfilingLevel.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// does_not_support_stepdowns,
// requires_getmore,
// requires_fcv_70,

View File

@ -3,7 +3,7 @@
*
* @tags: [
* # The test runs commands that are not allowed with security token: setProfilingLevel.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* assumes_read_concern_unchanged,
* assumes_read_preference_unchanged,
* requires_non_retryable_writes,

View File

@ -2,7 +2,7 @@
//
// @tags: [
// # The test runs commands that are not allowed with security token: setProfilingLevel.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// # Asserts on the number of index keys inserted.
// assumes_no_implicit_index_creation,
// assumes_write_concern_unchanged,

View File

@ -2,7 +2,7 @@
//
// @tags: [
// # The test runs commands that are not allowed with security token: setProfilingLevel.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// does_not_support_stepdowns,
// requires_getmore,
// requires_profiling,

View File

@ -2,7 +2,7 @@
//
// @tags: [
// # The test runs commands that are not allowed with security token: setProfilingLevel.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// does_not_support_stepdowns,
// requires_getmore,
// requires_profiling,

View File

@ -3,7 +3,7 @@
// @tags: [
// # The test runs commands that are not allowed with security token: mapReduce,
// # setProfilingLevel.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// # mapReduce does not support afterClusterTime.
// does_not_support_causal_consistency,
// does_not_support_stepdowns,

View File

@ -2,7 +2,7 @@
//
// @tags: [
// # The test runs commands that are not allowed with security token: setProfilingLevel.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// does_not_support_stepdowns,
// requires_profiling
// ]

View File

@ -2,7 +2,7 @@
//
// @tags: [
// # The test runs commands that are not allowed with security token: setProfilingLevel.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// assumes_against_mongod_not_mongos,
// assumes_read_concern_unchanged,
// does_not_support_stepdowns,

View File

@ -2,7 +2,7 @@
//
// @tags: [
// # The test runs commands that are not allowed with security token: setProfilingLevel.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// does_not_support_stepdowns,
// requires_fastcount,
// requires_profiling,

View File

@ -2,7 +2,7 @@
//
// @tags: [
// # The test runs commands that are not allowed with security token: setProfilingLevel.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// # Asserts on the number of index keys modified.
// assumes_no_implicit_index_creation,
// does_not_support_stepdowns,

View File

@ -3,7 +3,7 @@
// @tags: [
// # The test runs commands that are not allowed with security token: convertToCapped, mapReduce,
// # profile.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// does_not_support_stepdowns,
// requires_capped,
// requires_collstats,

View File

@ -1,6 +1,6 @@
// @tags: [
// # The test runs commands that are not allowed with security token: setParameter.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// assumes_superuser_permissions,
// does_not_support_stepdowns,
// requires_fcv_62,

View File

@ -3,7 +3,7 @@
*
* @tags: [
* # The test runs commands that are not allowed with security token: validateDBMetadata.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* no_selinux,
* requires_timeseries,
* # TODO SERVER-82166 remove "balancer off" tag once PM-2077 is over: migration can cause an index

View File

@ -3,7 +3,7 @@
*
* @tags: [
* # The test runs commands that are not allowed with security token: top.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* requires_fcv_60,
* uses_api_parameters,
* ]

View File

@ -3,7 +3,7 @@
*
* @tags: [
* # The test runs commands that are not allowed with security token: testDeprecation.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* uses_api_parameters,
* no_selinux,
* ]

View File

@ -10,7 +10,7 @@
* requires_fcv_63,
* tenant_migration_incompatible,
* does_not_support_stepdowns,
* not_allowed_with_security_token
* not_allowed_with_signed_security_token
* ]
*/

View File

@ -3,7 +3,7 @@
*
* @tags: [
* # The test runs commands that are not allowed with security token: getLog, setProfilingLevel.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* does_not_support_stepdowns,
* requires_profiling,
* requires_fcv_62,

View File

@ -1,7 +1,7 @@
/**
* @tags: [
* # The test runs commands that are not allowed with security token: emptycapped.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* requires_capped,
* requires_fastcount,
* requires_non_retryable_commands,

View File

@ -5,7 +5,7 @@
*
* @tags: [
* # The test runs commands that are not allowed with security token: godinsert.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* requires_capped,
* uses_testing_only_commands,
* # godinsert and can't run under replication

View File

@ -3,7 +3,7 @@
*
* @tags: [
* # The test runs commands that are not allowed with security token: applyOps.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* # Cannot implicitly shard accessed collections because of collection existing when none
* # expected.
* assumes_no_implicit_collection_creation_after_drop,

View File

@ -3,7 +3,7 @@
*
* @tags: [
* # The test runs commands that are not allowed with security token: applyOps.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* requires_replication,
* # applyOps is not supported on mongos
* assumes_against_mongod_not_mongos,

View File

@ -3,7 +3,7 @@
*
* @tags: [
* # The test runs commands that are not allowed with security token: applyOps.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* assumes_against_mongod_not_mongos,
* assumes_superuser_permissions,
* # applyOps is not retryable.

View File

@ -4,7 +4,7 @@
// @tags: [
// # The test runs commands that are not allowed with security token: applyOps,
// # cloneCollectionAsCapped, mapReduce, reIndex.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// assumes_no_implicit_collection_creation_after_drop,
// # Asserts that some queries use a collection scan.
// assumes_no_implicit_index_creation,

View File

@ -18,7 +18,7 @@
* # return different values after a failover
* tenant_migration_incompatible,
* does_not_support_stepdowns,
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* ]
*/
import {assertArrayEq} from "jstests/aggregation/extras/utils.js";

View File

@ -12,7 +12,7 @@
* # return different values after a failover
* tenant_migration_incompatible,
* does_not_support_stepdowns,
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* ]
*/
import {planHasStage} from "jstests/libs/analyze_plan.js";
@ -204,4 +204,4 @@ runTestWithDocsAndIndexes("sibling_paths_5",
{keys: {"a.$**": "columnstore"}});
// Note that this test does not drop any of its test collections or indexes, so that they will be
// available to follow-on index validation tests.
// available to follow-on index validation tests.

View File

@ -11,7 +11,7 @@
* # Columnstore tests set server parameters to disable columnstore query planning heuristics -
* # server parameters are stored in-memory only so are not transferred onto the recipient.
* tenant_migration_incompatible,
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* # Logic for when a COLUMN_SCAN plan is generated changed slightly as part of enabling more
* # queries in SBE in the 7.0 release.
* requires_fcv_70,

View File

@ -20,7 +20,7 @@
* # return different values after a failover
* tenant_migration_incompatible,
* does_not_support_stepdowns,
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* uses_full_validation,
* ]
*/

View File

@ -11,7 +11,7 @@
* # return different values after a failover
* tenant_migration_incompatible,
* does_not_support_stepdowns,
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* uses_full_validation,
* ]
*/

View File

@ -13,7 +13,7 @@
* # return different values after a failover
* tenant_migration_incompatible,
* does_not_support_stepdowns,
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* ]
*/
import {assertArrayEq, resultsEq} from "jstests/aggregation/extras/utils.js";
@ -1056,4 +1056,4 @@ function testInExpr(test) {
assert.lt(x.numSeeks + y.numSeeks,
2 * expectedToMatchCount,
"Number of seeks in filtered columns should be small");
})();
})();

View File

@ -9,7 +9,7 @@
* # return different values after a failover
* tenant_migration_incompatible,
* does_not_support_stepdowns,
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* ]
*/
import {planHasStage} from "jstests/libs/analyze_plan.js";

View File

@ -11,7 +11,7 @@
* # return different values after a failover
* tenant_migration_incompatible,
* does_not_support_stepdowns,
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* ]
*/
import {assertDropCollection} from "jstests/libs/collection_drop_recreate.js";
@ -190,4 +190,4 @@ assert.commandFailedWithCode(
ErrorCodes.InvalidIndexSpecificationOption);
assert.commandFailedWithCode(
db.runCommand({create: clusteredCollName, clusteredIndex: {key: kKeyPattern, unique: false}}),
5979700);
5979700);

View File

@ -7,7 +7,7 @@
// # mergeChunks, moveChunk, movePrimary, planCacheClear, planCacheClearFilters,
// # planCacheListFilters, planCacheSetFilter, reIndex, shardCollection, split,
// # updateZoneKeyRange.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// assumes_unsharded_collection,
// does_not_support_stepdowns,
// requires_fastcount,

View File

@ -5,7 +5,7 @@
*
* @tags: [
* # The test runs commands that are not allowed with security token: mapReduce.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* assumes_write_concern_unchanged,
* does_not_support_stepdowns,
* ]

View File

@ -4,7 +4,7 @@
*
* @tags: [
* # The test runs commands that are not allowed with security token: setProfilingLevel.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* assumes_against_mongod_not_mongos,
* assumes_read_concern_unchanged,
* assumes_unsharded_collection,

View File

@ -3,7 +3,7 @@
// @tags: [
// # The test runs commands that are not allowed with security token: ConnectionStatus,
// # connectionStatus, createUser, logout.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// assumes_superuser_permissions,
// assumes_write_concern_unchanged,
// creates_and_authenticates_user,

View File

@ -2,7 +2,7 @@
//
// @tags: [
// # The test runs commands that are not allowed with security token: mapReduce.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// does_not_support_stepdowns,
// requires_non_retryable_commands,
// uses_map_reduce_with_temp_collections,

View File

@ -3,7 +3,7 @@
//
// @tags: [
// # The test runs commands that are not allowed with security token: dataSize.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// # Cannot implicitly shard accessed collections because the "dataSize" command returns an
// # "keyPattern must equal shard key" error response.
// assumes_unsharded_collection,

View File

@ -2,7 +2,7 @@
//
// @tags: [
// # The test runs commands that are not allowed with security token: dataSize.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// # Cannot implicitly shard accessed collections because the "dataSize" command returns an
// # "keyPattern must equal shard key" error response.
// assumes_unsharded_collection,

View File

@ -1,6 +1,6 @@
// @tags: [
// # The test runs commands that are not allowed with security token: dbhash.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// ]
let a = db.dbhasha;

View File

@ -1,6 +1,6 @@
// @tags: [
// # The test runs commands that are not allowed with security token: dbhash.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// assumes_superuser_permissions,
// ]

View File

@ -4,7 +4,7 @@
* @tags: [
* # The test runs commands that are not allowed with security token: cloneCollectionAsCapped,
* # convertToCapped.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* requires_non_retryable_commands,
* requires_fastcount,
* requires_capped,

View File

@ -2,7 +2,7 @@
* @tags: [
* # The test runs commands that are not allowed with security token: CloneCollectionAsCapped,
* # cloneCollectionAsCapped.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* requires_non_retryable_commands,
* ]
*/

View File

@ -4,7 +4,7 @@
*
* @tags: [
* # The test runs commands that are not allowed with security token: convertToCapped.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* requires_non_retryable_commands,
* requires_capped,
* ]

View File

@ -3,7 +3,7 @@
*
* @tags: [
* # The test runs commands that are not allowed with security token: applyOps.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* # applyOps is not supported on mongos
* assumes_against_mongod_not_mongos,
* # Cannot implicitly shard accessed collections because of collection existing when none

View File

@ -3,7 +3,7 @@
*
* @tags: [
* # The test runs commands that are not allowed with security token: applyOps.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* requires_non_retryable_commands,
* # applyOps is not supported on mongos
* assumes_against_mongod_not_mongos,

View File

@ -3,7 +3,7 @@
*
* @tags: [
* # The test runs commands that are not allowed with security token: convertToCapped.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* requires_non_retryable_commands,
* requires_capped,
* ]

View File

@ -5,7 +5,7 @@
* @tags: [
* # The test runs commands that are not allowed with security token: ConvertToCapped,
* # convertToCapped.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* requires_non_retryable_commands,
* ]
*/

Some files were not shown because too many files have changed in this diff Show More