summaryrefslogtreecommitdiff
path: root/src/mongo/db/commands/user_management_commands_common.cpp
diff options
context:
space:
mode:
authorjannaerin <golden.janna@gmail.com>2021-12-22 23:45:59 +0000
committerEvergreen Agent <no-reply@evergreen.mongodb.com>2022-01-14 22:40:54 +0000
commitda6685f2648051ce806ad700d31787a1f365cfdc (patch)
tree7e950c0b134ba10254d69b0b1ddb730ab927aecc /src/mongo/db/commands/user_management_commands_common.cpp
parent2fb4480e741f46d89b1245295414ed36501c57ae (diff)
downloadmongo-da6685f2648051ce806ad700d31787a1f365cfdc.tar.gz
SERVER-62239 Put tenantId on opCtx if passed as $tenant
Diffstat (limited to 'src/mongo/db/commands/user_management_commands_common.cpp')
-rw-r--r--src/mongo/db/commands/user_management_commands_common.cpp10
1 files changed, 0 insertions, 10 deletions
diff --git a/src/mongo/db/commands/user_management_commands_common.cpp b/src/mongo/db/commands/user_management_commands_common.cpp
index e6c4539a724..4645c22d506 100644
--- a/src/mongo/db/commands/user_management_commands_common.cpp
+++ b/src/mongo/db/commands/user_management_commands_common.cpp
@@ -191,16 +191,6 @@ void checkAuthForTypedCommand(OperationContext* opCtx, const CreateUserCommand&
as->isAuthorizedForActionsOnResource(ResourcePattern::forDatabaseName(dbname),
ActionType::createUser));
- if (request.getTenantOverride() != boost::none) {
- const bool isNotTokenAuth = (as->getAuthenticationMode() !=
- AuthorizationSession::AuthenticationMode::kSecurityToken);
-
- uassert(ErrorCodes::Unauthorized,
- "$tenant parameter to createUser command only accepted in "
- "test mode with security tokens enabled but not in use",
- getTestCommandsEnabled() && gMultitenancySupport && isNotTokenAuth);
- }
-
auto resolvedRoles = resolveRoleNames(request.getRoles(), dbname);
uassertStatusOK(checkAuthorizedToGrantRoles(as, resolvedRoles));