SERVER-82311 rename test tag

GitOrigin-RevId: 598fb15a21c0c4e53ef47a4b5c5dc6f5ae5fd5ed
This commit is contained in:
Joseph Prince 2023-12-11 22:44:46 +00:00 committed by MongoDB Bot
parent 6164329e42
commit d04dc10cac
290 changed files with 303 additions and 303 deletions

View File

@ -73,7 +73,7 @@ selector:
- jstests/core/**/exhaust.js
exclude_with_any_tags:
- simulate_atlas_proxy_incompatible
- not_allowed_with_security_token
- not_allowed_with_signed_security_token
- command_not_supported_in_serverless
- assumes_standalone_mongod
- requires_capped

View File

@ -139,7 +139,7 @@ selector:
- jstests/aggregation/**/*.js
exclude_with_any_tags:
- simulate_atlas_proxy_incompatible
- not_allowed_with_security_token
- not_allowed_with_signed_security_token
- command_not_supported_in_serverless
- assumes_standalone_mongod
- requires_capped

View File

@ -52,7 +52,7 @@ selector:
# This passthrough uses the `simulate_atlas_proxy` override, which some tests are incompatible with.
- simulate_atlas_proxy_incompatible
# Exclude tests which we know use commands that don't support a security token.
- not_allowed_with_security_token
- not_allowed_with_signed_security_token
# Exclude tests which use commands that aren't supported in Serverless.
- command_not_supported_in_serverless
# Server side javascript (such as $where, $function, $accumulator and map-reduce) is not allowed in Serverless.

View File

@ -262,7 +262,7 @@ selector:
# This passthrough uses the `simulate_atlas_proxy` override, which some tests are incompatible with.
- simulate_atlas_proxy_incompatible
# Exclude tests which we know use commands that don't support a security token.
- not_allowed_with_security_token
- not_allowed_with_signed_security_token
# Exclude tests which use commands that aren't supported in Serverless.
- command_not_supported_in_serverless
# Server side javascript (such as $where, $function, $accumulator and map-reduce) is not allowed in Serverless.

View File

@ -24,7 +24,7 @@ selector:
# This passthrough uses the `simulate_atlas_proxy` override, which some tests are incompatible with.
- simulate_atlas_proxy_incompatible
# Exclude tests which we know use commands that don't support a security token.
- not_allowed_with_security_token
- not_allowed_with_signed_security_token
# Exclude tests which use commands that aren't supported in Serverless.
- command_not_supported_in_serverless
# Theses tests expect replication is not enabled.

View File

@ -13,7 +13,7 @@ selector:
# Exclude tests which use commands that aren't supported in Serverless.
- command_not_supported_in_serverless
# Exclude tests which we know use commands that don't support a security token.
- not_allowed_with_security_token
- not_allowed_with_signed_security_token
# Theses tests expect replication is not enabled.
- assumes_standalone_mongod
# capped collections are banned in Serverless.

View File

@ -1,7 +1,7 @@
// Regression test to check that different document sizes work correctly with $lookup.
// @tags: [
// requires_fcv_71,
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// ]
import {FixtureHelpers} from "jstests/libs/fixture_helpers.js";

View File

@ -7,7 +7,7 @@
// do_not_wrap_aggregations_in_facets,
// does_not_support_stepdowns,
// requires_profiling,
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// ]
import {getLatestProfilerEntry} from "jstests/libs/profiler.js";

View File

@ -2,7 +2,7 @@
// run against a sharded collection is wrapped in a "shards" object with keys for each shard.
// @tags: [
// assumes_unsharded_collection,
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// ]
//
// This test is designed to stress $sample, and any optimizations a storage engine might provide.

View File

@ -15,7 +15,7 @@
* # Index filter commands do not support causal consistency.
* does_not_support_causal_consistency,
* requires_fcv_63,
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* ]
*/

View File

@ -10,7 +10,7 @@
* assumes_unsharded_collection,
* # Plan cache state is node-local and will not get migrated alongside tenant data.
* tenant_migration_incompatible,
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* ]
*/
const collName = "is_count_like";

View File

@ -3,7 +3,7 @@
* pipeline are evaluated correctly.
* @tags: [
* requires_pipeline_optimization,
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* ]
*/

View File

@ -15,7 +15,7 @@
// do_not_wrap_aggregations_in_facets,
// requires_pipeline_optimization,
// requires_profiling,
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// ]
import {isWiredTiger} from "jstests/concurrency/fsm_workload_helpers/server_types.js";
import {

View File

@ -6,7 +6,7 @@
* @tags: [
* # Can't wrap queries in facets without going past max BSON depth.
* do_not_wrap_aggregations_in_facets,
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* ]
*/

View File

@ -4,7 +4,7 @@
* requires_fcv_53,
* requires_pipeline_optimization,
* do_not_wrap_aggregations_in_facets,
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* ]
*/

View File

@ -3,7 +3,7 @@
* @tags: [
* # Needed as $densify is a 51 feature.
* requires_fcv_51,
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* ]
*/

View File

@ -3,7 +3,7 @@
* @tags: [
* # Needed as $densify is a 51 feature.
* requires_fcv_51,
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* ]
*/

View File

@ -6,7 +6,7 @@
// assumes_read_concern_unchanged,
// assumes_read_preference_unchanged,
// tenant_migration_incompatible,
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// ]
const outer = db.outer;
const inner = db.inner;

View File

@ -2,7 +2,7 @@
// @tags: [
// does_not_support_stepdowns,
// requires_profiling,
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// ]
import {getAggPlanStages} from "jstests/libs/analyze_plan.js";

View File

@ -5,7 +5,7 @@
* do_not_wrap_aggregations_in_facets,
* # $search/$searchMeta do not support any read concern other than "local"
* assumes_read_concern_unchanged,
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* ]
*/
const coll = db.searchCollector;

View File

@ -3,7 +3,7 @@
* data. Memory checks are per node, so only test when the data is all in one place.
*
* @tags: [
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* ]
*/

View File

@ -5,7 +5,7 @@
* requires_profiling,
* assumes_read_concern_unchanged,
* do_not_wrap_aggregations_in_facets,
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* ]
*/
import "jstests/libs/sbe_assert_error_override.js";

View File

@ -2,7 +2,7 @@
* Tests $unionWith with various levels of nesting and stages.
*
* @tags: [
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* ]
*/

View File

@ -11,7 +11,7 @@
// requires_collstats,
// requires_pipeline_optimization,
// requires_persistence,
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// ]
import "jstests/libs/sbe_assert_error_override.js";

View File

@ -1,7 +1,7 @@
/*
* @tags: [
* # The test runs commands that are not allowed with security token: applyOps.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* assumes_superuser_permissions,
* requires_fastcount,
* requires_non_retryable_commands,

View File

@ -3,7 +3,7 @@
*
* @tags: [
* # The test runs commands that are not allowed with security token: applyOps.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* requires_non_retryable_commands,
* requires_fastcount,
* # 6.2 removes support for atomic applyOps

View File

@ -1,7 +1,7 @@
/*
* @tags: [
* # The test runs commands that are not allowed with security token: applyOps.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* requires_non_retryable_commands,
* requires_fastcount,
* # 6.2 removes support for atomic applyOps

View File

@ -5,7 +5,7 @@
*
* @tags: [
* # The test runs commands that are not allowed with security token: applyOps.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* # Cannot implicitly shard accessed collections because of
* # collection existing when none expected.
* assumes_no_implicit_collection_creation_after_drop,

View File

@ -11,7 +11,7 @@
*
* @tags: [
* # The test runs commands that are not allowed with security token: applyOps.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* requires_non_retryable_commands,
* # applyOps is not supported on mongos
* assumes_against_mongod_not_mongos,

View File

@ -3,7 +3,7 @@
*
* @tags: [
* # The test runs commands that are not allowed with security token: applyOps.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* # applyOps is not supported on mongos
* assumes_against_mongod_not_mongos,
* assumes_superuser_permissions,

View File

@ -1,7 +1,7 @@
/*
* @tags: [
* # The test runs commands that are not allowed with security token: applyOps.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* requires_non_retryable_commands,
* # applyOps is not supported on mongos
* assumes_against_mongod_not_mongos,

View File

@ -1,7 +1,7 @@
// @tags: [
// # The test runs commands that are not allowed with security token: authenticate, createUser,
// # dropUser, logout.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// assumes_superuser_permissions,
// assumes_write_concern_unchanged,
// creates_and_authenticates_user,

View File

@ -2,7 +2,7 @@
//
// @tags: [
// # The test runs commands that are not allowed with security token: logout.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// requires_auth,
// requires_non_retryable_commands
// ]

View File

@ -1,6 +1,6 @@
// @tags: [
// # The test runs commands that are not allowed with security token: setParameter.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// assumes_superuser_permissions,
// does_not_support_stepdowns,
// ]

View File

@ -1,6 +1,6 @@
// @tags: [
// # The test runs commands that are not allowed with security token: checkShardingIndex.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// requires_fastcount,
// requires_non_retryable_writes,
// requires_sharding,

View File

@ -1,6 +1,6 @@
// @tags: [
// # The test runs commands that are not allowed with security token: cleanupOrphaned.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// requires_non_retryable_commands,
// # This test expects to be run against a non-shardsvr.
// directly_against_shardsvrs_incompatible,

View File

@ -4,7 +4,7 @@
//
// @tags: [
// # The test runs commands that are not allowed with security token: compact.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// uses_multiple_connections,
// uses_parallel_shell,
// uses_compact,

View File

@ -3,7 +3,7 @@
*
* @tags: [
* # The test runs commands that are not allowed with security token: fsyncUnlock.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* assumes_superuser_permissions,
* uses_parallel_shell,
* ]

View File

@ -3,7 +3,7 @@
* @tags: [
* assumes_read_preference_unchanged,
* assumes_read_concern_unchanged,
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* assumes_unsharded_collection
* ]
*/

View File

@ -4,7 +4,7 @@
*
* @tags: [
* # The test runs commands that are not allowed with security token: getLog.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* uses_parallel_shell,
* # This test uses currentOp to check whether an aggregate command is running. In replica set
* # environments, because currentOp is run against the admin database it is routed to the

View File

@ -4,7 +4,7 @@
*
* @tags: [
* # The test runs commands that are not allowed with security token: whatsmyuri.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* assumes_read_concern_unchanged,
* assumes_read_preference_unchanged,
* no_selinux,

View File

@ -1,6 +1,6 @@
// @tags: [
// # The test runs commands that are not allowed with security token: getLog.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// does_not_support_stepdowns
// ]

View File

@ -2,7 +2,7 @@
//
// @tags: [
// # The test runs commands that are not allowed with security token: getLog.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// # This test attempts to perform a find command and see that it ran using the getLog command.
// # The former operation may be routed to a secondary in the replica set, whereas the latter must
// # be routed to the primary.

View File

@ -3,7 +3,7 @@
//
// @tags: [
// # The test runs commands that are not allowed with security token: connectionStatus.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// does_not_support_stepdowns,
// uses_testing_only_commands,
// no_selinux,

View File

@ -1,7 +1,7 @@
// @tags: [
// # The test runs commands that are not allowed with security token: createUser, dropUser,
// # logout, profile, setProfilingLevel.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// assumes_superuser_permissions,
// creates_and_authenticates_user,
// does_not_support_stepdowns,

View File

@ -2,7 +2,7 @@
//
// @tags: [
// # The test runs commands that are not allowed with security token: profile.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// requires_profiling,
// ]

View File

@ -1,7 +1,7 @@
// @tags: [
// # The test runs commands that are not allowed with security token: createUser, logout,
// # setProfilingLevel.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// assumes_superuser_permissions,
// creates_and_authenticates_user,
// requires_profiling,

View File

@ -2,7 +2,7 @@
//
// @tags: [
// # The test runs commands that are not allowed with security token: setProfilingLevel.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// does_not_support_stepdowns,
// requires_fcv_70,
// requires_profiling,

View File

@ -2,7 +2,7 @@
//
// @tags: [
// # The test runs commands that are not allowed with security token: setProfilingLevel.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// does_not_support_stepdowns,
// requires_fastcount,
// requires_fcv_70,

View File

@ -2,7 +2,7 @@
//
// @tags: [
// # The test runs commands that are not allowed with security token: setProfilingLevel.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// # Asserts on the number of index keys deleted.
// assumes_no_implicit_index_creation,
// does_not_support_stepdowns,

View File

@ -2,7 +2,7 @@
//
// @tags: [
// # The test runs commands that are not allowed with security token: setProfilingLevel.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// does_not_support_stepdowns,
// requires_fcv_70,
// requires_profiling,

View File

@ -2,7 +2,7 @@
//
// @tags: [
// # The test runs commands that are not allowed with security token: setProfilingLevel.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// does_not_support_stepdowns,
// requires_fcv_70,
// requires_profiling,

View File

@ -2,7 +2,7 @@
//
// @tags: [
// # The test runs commands that are not allowed with security token: setProfilingLevel.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// # Asserts on the number of index keys modified.
// assumes_no_implicit_index_creation,
// requires_fcv_70,

View File

@ -2,7 +2,7 @@
//
// @tags: [
// # The test runs commands that are not allowed with security token: setProfilingLevel.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// does_not_support_stepdowns,
// requires_getmore,
// requires_fcv_70,

View File

@ -3,7 +3,7 @@
*
* @tags: [
* # The test runs commands that are not allowed with security token: setProfilingLevel.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* assumes_read_concern_unchanged,
* assumes_read_preference_unchanged,
* requires_non_retryable_writes,

View File

@ -2,7 +2,7 @@
//
// @tags: [
// # The test runs commands that are not allowed with security token: setProfilingLevel.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// # Asserts on the number of index keys inserted.
// assumes_no_implicit_index_creation,
// assumes_write_concern_unchanged,

View File

@ -2,7 +2,7 @@
//
// @tags: [
// # The test runs commands that are not allowed with security token: setProfilingLevel.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// does_not_support_stepdowns,
// requires_getmore,
// requires_profiling,

View File

@ -2,7 +2,7 @@
//
// @tags: [
// # The test runs commands that are not allowed with security token: setProfilingLevel.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// does_not_support_stepdowns,
// requires_getmore,
// requires_profiling,

View File

@ -3,7 +3,7 @@
// @tags: [
// # The test runs commands that are not allowed with security token: mapReduce,
// # setProfilingLevel.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// # mapReduce does not support afterClusterTime.
// does_not_support_causal_consistency,
// does_not_support_stepdowns,

View File

@ -2,7 +2,7 @@
//
// @tags: [
// # The test runs commands that are not allowed with security token: setProfilingLevel.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// does_not_support_stepdowns,
// requires_profiling
// ]

View File

@ -2,7 +2,7 @@
//
// @tags: [
// # The test runs commands that are not allowed with security token: setProfilingLevel.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// assumes_against_mongod_not_mongos,
// assumes_read_concern_unchanged,
// does_not_support_stepdowns,

View File

@ -2,7 +2,7 @@
//
// @tags: [
// # The test runs commands that are not allowed with security token: setProfilingLevel.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// does_not_support_stepdowns,
// requires_fastcount,
// requires_profiling,

View File

@ -2,7 +2,7 @@
//
// @tags: [
// # The test runs commands that are not allowed with security token: setProfilingLevel.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// # Asserts on the number of index keys modified.
// assumes_no_implicit_index_creation,
// does_not_support_stepdowns,

View File

@ -3,7 +3,7 @@
// @tags: [
// # The test runs commands that are not allowed with security token: convertToCapped, mapReduce,
// # profile.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// does_not_support_stepdowns,
// requires_capped,
// requires_collstats,

View File

@ -1,6 +1,6 @@
// @tags: [
// # The test runs commands that are not allowed with security token: setParameter.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// assumes_superuser_permissions,
// does_not_support_stepdowns,
// requires_fcv_62,

View File

@ -3,7 +3,7 @@
*
* @tags: [
* # The test runs commands that are not allowed with security token: validateDBMetadata.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* no_selinux,
* requires_timeseries,
* # TODO SERVER-82166 remove "balancer off" tag once PM-2077 is over: migration can cause an index

View File

@ -3,7 +3,7 @@
*
* @tags: [
* # The test runs commands that are not allowed with security token: top.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* requires_fcv_60,
* uses_api_parameters,
* ]

View File

@ -3,7 +3,7 @@
*
* @tags: [
* # The test runs commands that are not allowed with security token: testDeprecation.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* uses_api_parameters,
* no_selinux,
* ]

View File

@ -10,7 +10,7 @@
* requires_fcv_63,
* tenant_migration_incompatible,
* does_not_support_stepdowns,
* not_allowed_with_security_token
* not_allowed_with_signed_security_token
* ]
*/

View File

@ -3,7 +3,7 @@
*
* @tags: [
* # The test runs commands that are not allowed with security token: getLog, setProfilingLevel.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* does_not_support_stepdowns,
* requires_profiling,
* requires_fcv_62,

View File

@ -1,7 +1,7 @@
/**
* @tags: [
* # The test runs commands that are not allowed with security token: emptycapped.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* requires_capped,
* requires_fastcount,
* requires_non_retryable_commands,

View File

@ -5,7 +5,7 @@
*
* @tags: [
* # The test runs commands that are not allowed with security token: godinsert.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* requires_capped,
* uses_testing_only_commands,
* # godinsert and can't run under replication

View File

@ -3,7 +3,7 @@
*
* @tags: [
* # The test runs commands that are not allowed with security token: applyOps.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* # Cannot implicitly shard accessed collections because of collection existing when none
* # expected.
* assumes_no_implicit_collection_creation_after_drop,

View File

@ -3,7 +3,7 @@
*
* @tags: [
* # The test runs commands that are not allowed with security token: applyOps.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* requires_replication,
* # applyOps is not supported on mongos
* assumes_against_mongod_not_mongos,

View File

@ -3,7 +3,7 @@
*
* @tags: [
* # The test runs commands that are not allowed with security token: applyOps.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* assumes_against_mongod_not_mongos,
* assumes_superuser_permissions,
* # applyOps is not retryable.

View File

@ -4,7 +4,7 @@
// @tags: [
// # The test runs commands that are not allowed with security token: applyOps,
// # cloneCollectionAsCapped, mapReduce, reIndex.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// assumes_no_implicit_collection_creation_after_drop,
// # Asserts that some queries use a collection scan.
// assumes_no_implicit_index_creation,

View File

@ -18,7 +18,7 @@
* # return different values after a failover
* tenant_migration_incompatible,
* does_not_support_stepdowns,
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* ]
*/
import {assertArrayEq} from "jstests/aggregation/extras/utils.js";

View File

@ -12,7 +12,7 @@
* # return different values after a failover
* tenant_migration_incompatible,
* does_not_support_stepdowns,
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* ]
*/
import {planHasStage} from "jstests/libs/analyze_plan.js";

View File

@ -11,7 +11,7 @@
* # Columnstore tests set server parameters to disable columnstore query planning heuristics -
* # server parameters are stored in-memory only so are not transferred onto the recipient.
* tenant_migration_incompatible,
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* # Logic for when a COLUMN_SCAN plan is generated changed slightly as part of enabling more
* # queries in SBE in the 7.0 release.
* requires_fcv_70,

View File

@ -20,7 +20,7 @@
* # return different values after a failover
* tenant_migration_incompatible,
* does_not_support_stepdowns,
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* uses_full_validation,
* ]
*/

View File

@ -11,7 +11,7 @@
* # return different values after a failover
* tenant_migration_incompatible,
* does_not_support_stepdowns,
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* uses_full_validation,
* ]
*/

View File

@ -13,7 +13,7 @@
* # return different values after a failover
* tenant_migration_incompatible,
* does_not_support_stepdowns,
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* ]
*/
import {assertArrayEq, resultsEq} from "jstests/aggregation/extras/utils.js";

View File

@ -9,7 +9,7 @@
* # return different values after a failover
* tenant_migration_incompatible,
* does_not_support_stepdowns,
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* ]
*/
import {planHasStage} from "jstests/libs/analyze_plan.js";

View File

@ -11,7 +11,7 @@
* # return different values after a failover
* tenant_migration_incompatible,
* does_not_support_stepdowns,
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* ]
*/
import {assertDropCollection} from "jstests/libs/collection_drop_recreate.js";

View File

@ -7,7 +7,7 @@
// # mergeChunks, moveChunk, movePrimary, planCacheClear, planCacheClearFilters,
// # planCacheListFilters, planCacheSetFilter, reIndex, shardCollection, split,
// # updateZoneKeyRange.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// assumes_unsharded_collection,
// does_not_support_stepdowns,
// requires_fastcount,

View File

@ -5,7 +5,7 @@
*
* @tags: [
* # The test runs commands that are not allowed with security token: mapReduce.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* assumes_write_concern_unchanged,
* does_not_support_stepdowns,
* ]

View File

@ -4,7 +4,7 @@
*
* @tags: [
* # The test runs commands that are not allowed with security token: setProfilingLevel.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* assumes_against_mongod_not_mongos,
* assumes_read_concern_unchanged,
* assumes_unsharded_collection,

View File

@ -3,7 +3,7 @@
// @tags: [
// # The test runs commands that are not allowed with security token: ConnectionStatus,
// # connectionStatus, createUser, logout.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// assumes_superuser_permissions,
// assumes_write_concern_unchanged,
// creates_and_authenticates_user,

View File

@ -2,7 +2,7 @@
//
// @tags: [
// # The test runs commands that are not allowed with security token: mapReduce.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// does_not_support_stepdowns,
// requires_non_retryable_commands,
// uses_map_reduce_with_temp_collections,

View File

@ -3,7 +3,7 @@
//
// @tags: [
// # The test runs commands that are not allowed with security token: dataSize.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// # Cannot implicitly shard accessed collections because the "dataSize" command returns an
// # "keyPattern must equal shard key" error response.
// assumes_unsharded_collection,

View File

@ -2,7 +2,7 @@
//
// @tags: [
// # The test runs commands that are not allowed with security token: dataSize.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// # Cannot implicitly shard accessed collections because the "dataSize" command returns an
// # "keyPattern must equal shard key" error response.
// assumes_unsharded_collection,

View File

@ -1,6 +1,6 @@
// @tags: [
// # The test runs commands that are not allowed with security token: dbhash.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// ]
let a = db.dbhasha;

View File

@ -1,6 +1,6 @@
// @tags: [
// # The test runs commands that are not allowed with security token: dbhash.
// not_allowed_with_security_token,
// not_allowed_with_signed_security_token,
// assumes_superuser_permissions,
// ]

View File

@ -4,7 +4,7 @@
* @tags: [
* # The test runs commands that are not allowed with security token: cloneCollectionAsCapped,
* # convertToCapped.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* requires_non_retryable_commands,
* requires_fastcount,
* requires_capped,

View File

@ -2,7 +2,7 @@
* @tags: [
* # The test runs commands that are not allowed with security token: CloneCollectionAsCapped,
* # cloneCollectionAsCapped.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* requires_non_retryable_commands,
* ]
*/

View File

@ -4,7 +4,7 @@
*
* @tags: [
* # The test runs commands that are not allowed with security token: convertToCapped.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* requires_non_retryable_commands,
* requires_capped,
* ]

View File

@ -3,7 +3,7 @@
*
* @tags: [
* # The test runs commands that are not allowed with security token: applyOps.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* # applyOps is not supported on mongos
* assumes_against_mongod_not_mongos,
* # Cannot implicitly shard accessed collections because of collection existing when none

View File

@ -3,7 +3,7 @@
*
* @tags: [
* # The test runs commands that are not allowed with security token: applyOps.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* requires_non_retryable_commands,
* # applyOps is not supported on mongos
* assumes_against_mongod_not_mongos,

View File

@ -3,7 +3,7 @@
*
* @tags: [
* # The test runs commands that are not allowed with security token: convertToCapped.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* requires_non_retryable_commands,
* requires_capped,
* ]

View File

@ -5,7 +5,7 @@
* @tags: [
* # The test runs commands that are not allowed with security token: ConvertToCapped,
* # convertToCapped.
* not_allowed_with_security_token,
* not_allowed_with_signed_security_token,
* requires_non_retryable_commands,
* ]
*/

Some files were not shown because too many files have changed in this diff Show More