summaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authorSara Golemon <sara.golemon@mongodb.com>2019-01-23 20:41:32 +0000
committerSara Golemon <sara.golemon@mongodb.com>2019-01-24 00:14:03 +0000
commit869b3b64a898076ff98405fa70403084417cb164 (patch)
tree00f2a85940136c4b7bf3b1d086c60fdffb21e2c1 /src
parent3e402ffbff291c582c1e2eec80dfd809f18730e4 (diff)
downloadmongo-869b3b64a898076ff98405fa70403084417cb164.tar.gz
SERVER-39151 Remove legacy hardcoded redact for LDAP options
Diffstat (limited to 'src')
-rw-r--r--src/mongo/util/cmdline_utils/censor_cmdline.cpp3
-rw-r--r--src/mongo/util/cmdline_utils/censor_cmdline_test.cpp10
2 files changed, 1 insertions, 12 deletions
diff --git a/src/mongo/util/cmdline_utils/censor_cmdline.cpp b/src/mongo/util/cmdline_utils/censor_cmdline.cpp
index 05f1bdc8c0d..43dbf5efc84 100644
--- a/src/mongo/util/cmdline_utils/censor_cmdline.cpp
+++ b/src/mongo/util/cmdline_utils/censor_cmdline.cpp
@@ -53,10 +53,9 @@ std::set<std::string, InsensitiveCompare> gRedactedDottedNames = {
// Legacy redacted names pending conversion.
"processManagement.windowsService.servicePassword",
"security.kmip.clientCertificatePassword",
- "security.ldap.bind.queryPassword",
};
std::set<std::string, InsensitiveCompare> gRedactedSingleNames = {
- "servicePassword", "kmipClientCertificatePassword", "ldapQueryPassword",
+ "servicePassword", "kmipClientCertificatePassword",
};
std::set<char> gRedactedCharacterNames;
diff --git a/src/mongo/util/cmdline_utils/censor_cmdline_test.cpp b/src/mongo/util/cmdline_utils/censor_cmdline_test.cpp
index 1836b9ad416..93804d2e727 100644
--- a/src/mongo/util/cmdline_utils/censor_cmdline_test.cpp
+++ b/src/mongo/util/cmdline_utils/censor_cmdline_test.cpp
@@ -142,8 +142,6 @@ TEST(BSONObjCensorTests, Strings) {
<< "not a password"
<< "security.kmip.clientCertificatePassword"
<< "this password should be censored"
- << "security.ldap.bind.queryPassword"
- << "this password should be censored"
<< "middlearg"
<< "also not a password"
<< "processManagement.windowsService.servicePassword"
@@ -155,8 +153,6 @@ TEST(BSONObjCensorTests, Strings) {
<< "not a password"
<< "security.kmip.clientCertificatePassword"
<< "<password>"
- << "security.ldap.bind.queryPassword"
- << "<password>"
<< "middlearg"
<< "also not a password"
<< "processManagement.windowsService.servicePassword"
@@ -174,9 +170,6 @@ TEST(BSONObjCensorTests, Arrays) {
<< "security.kmip.clientCertificatePassword"
<< BSON_ARRAY("first censored password"
<< "next censored password")
- << "security.ldap.bind.queryPassword"
- << BSON_ARRAY("first censored password"
- << "next censored password")
<< "middlearg"
<< "also not a password"
<< "processManagement.windowsService.servicePassword"
@@ -190,9 +183,6 @@ TEST(BSONObjCensorTests, Arrays) {
<< "security.kmip.clientCertificatePassword"
<< BSON_ARRAY("<password>"
<< "<password>")
- << "security.ldap.bind.queryPassword"
- << BSON_ARRAY("<password>"
- << "<password>")
<< "middlearg"
<< "also not a password"
<< "processManagement.windowsService.servicePassword"