summaryrefslogtreecommitdiff
path: root/src/mongo/db/auth/authorization_manager_test.cpp
diff options
context:
space:
mode:
Diffstat (limited to 'src/mongo/db/auth/authorization_manager_test.cpp')
-rw-r--r--src/mongo/db/auth/authorization_manager_test.cpp62
1 files changed, 31 insertions, 31 deletions
diff --git a/src/mongo/db/auth/authorization_manager_test.cpp b/src/mongo/db/auth/authorization_manager_test.cpp
index 144f43d2735..83edae4ddef 100644
--- a/src/mongo/db/auth/authorization_manager_test.cpp
+++ b/src/mongo/db/auth/authorization_manager_test.cpp
@@ -182,9 +182,9 @@ public:
};
TEST_F(AuthorizationManagerTest, testAcquireV2User) {
- OperationContextNoop txn;
+ OperationContextNoop opCtx;
- ASSERT_OK(externalState->insertPrivilegeDocument(&txn,
+ ASSERT_OK(externalState->insertPrivilegeDocument(&opCtx,
BSON("_id"
<< "admin.v2read"
<< "user"
@@ -200,7 +200,7 @@ TEST_F(AuthorizationManagerTest, testAcquireV2User) {
<< "db"
<< "test"))),
BSONObj()));
- ASSERT_OK(externalState->insertPrivilegeDocument(&txn,
+ ASSERT_OK(externalState->insertPrivilegeDocument(&opCtx,
BSON("_id"
<< "admin.v2cluster"
<< "user"
@@ -218,7 +218,7 @@ TEST_F(AuthorizationManagerTest, testAcquireV2User) {
BSONObj()));
User* v2read;
- ASSERT_OK(authzManager->acquireUser(&txn, UserName("v2read", "test"), &v2read));
+ ASSERT_OK(authzManager->acquireUser(&opCtx, UserName("v2read", "test"), &v2read));
ASSERT_EQUALS(UserName("v2read", "test"), v2read->getName());
ASSERT(v2read->isValid());
ASSERT_EQUALS(1U, v2read->getRefCount());
@@ -232,7 +232,7 @@ TEST_F(AuthorizationManagerTest, testAcquireV2User) {
authzManager->releaseUser(v2read);
User* v2cluster;
- ASSERT_OK(authzManager->acquireUser(&txn, UserName("v2cluster", "admin"), &v2cluster));
+ ASSERT_OK(authzManager->acquireUser(&opCtx, UserName("v2cluster", "admin"), &v2cluster));
ASSERT_EQUALS(UserName("v2cluster", "admin"), v2cluster->getName());
ASSERT(v2cluster->isValid());
ASSERT_EQUALS(1U, v2cluster->getRefCount());
@@ -254,11 +254,11 @@ TEST_F(AuthorizationManagerTest, testLocalX509Authorization) {
session,
SSLPeerInfo("CN=mongodb.com", {RoleName("read", "test"), RoleName("readWrite", "test")}));
ServiceContext::UniqueClient client = serviceContext.makeClient("testClient", session);
- ServiceContext::UniqueOperationContext txn = client->makeOperationContext();
+ ServiceContext::UniqueOperationContext opCtx = client->makeOperationContext();
User* x509User;
ASSERT_OK(
- authzManager->acquireUser(txn.get(), UserName("CN=mongodb.com", "$external"), &x509User));
+ authzManager->acquireUser(opCtx.get(), UserName("CN=mongodb.com", "$external"), &x509User));
ASSERT(x509User->isValid());
stdx::unordered_set<RoleName> expectedRoles{RoleName("read", "test"),
@@ -288,11 +288,11 @@ TEST_F(AuthorizationManagerTest, testLocalX509AuthorizationInvalidUser) {
session,
SSLPeerInfo("CN=mongodb.com", {RoleName("read", "test"), RoleName("write", "test")}));
ServiceContext::UniqueClient client = serviceContext.makeClient("testClient", session);
- ServiceContext::UniqueOperationContext txn = client->makeOperationContext();
+ ServiceContext::UniqueOperationContext opCtx = client->makeOperationContext();
User* x509User;
ASSERT_NOT_OK(
- authzManager->acquireUser(txn.get(), UserName("CN=10gen.com", "$external"), &x509User));
+ authzManager->acquireUser(opCtx.get(), UserName("CN=10gen.com", "$external"), &x509User));
}
TEST_F(AuthorizationManagerTest, testLocalX509AuthenticationNoAuthorization) {
@@ -301,11 +301,11 @@ TEST_F(AuthorizationManagerTest, testLocalX509AuthenticationNoAuthorization) {
transport::SessionHandle session = transportLayer.createSession();
setX509PeerInfo(session, {});
ServiceContext::UniqueClient client = serviceContext.makeClient("testClient", session);
- ServiceContext::UniqueOperationContext txn = client->makeOperationContext();
+ ServiceContext::UniqueOperationContext opCtx = client->makeOperationContext();
User* x509User;
ASSERT_NOT_OK(
- authzManager->acquireUser(txn.get(), UserName("CN=mongodb.com", "$external"), &x509User));
+ authzManager->acquireUser(opCtx.get(), UserName("CN=mongodb.com", "$external"), &x509User));
}
/**
@@ -325,15 +325,15 @@ public:
* the mock's user document catalog, without performing any role resolution. This way the tests
* can control exactly what privileges are returned for the user.
*/
- Status getUserDescription(OperationContext* txn,
+ Status getUserDescription(OperationContext* opCtx,
const UserName& userName,
BSONObj* result) override {
- return _getUserDocument(txn, userName, result);
+ return _getUserDocument(opCtx, userName, result);
}
private:
- Status _getUserDocument(OperationContext* txn, const UserName& userName, BSONObj* userDoc) {
- Status status = findOne(txn,
+ Status _getUserDocument(OperationContext* opCtx, const UserName& userName, BSONObj* userDoc) {
+ Status status = findOne(opCtx,
AuthorizationManager::usersCollectionNamespace,
BSON(AuthorizationManager::USER_NAME_FIELD_NAME
<< userName.getUser()
@@ -372,10 +372,10 @@ public:
// Tests SERVER-21535, unrecognized actions should be ignored rather than causing errors.
TEST_F(AuthorizationManagerTest, testAcquireV2UserWithUnrecognizedActions) {
- OperationContextNoop txn;
+ OperationContextNoop opCtx;
ASSERT_OK(
- externalState->insertPrivilegeDocument(&txn,
+ externalState->insertPrivilegeDocument(&opCtx,
BSON("_id"
<< "admin.myUser"
<< "user"
@@ -403,7 +403,7 @@ TEST_F(AuthorizationManagerTest, testAcquireV2UserWithUnrecognizedActions) {
BSONObj()));
User* myUser;
- ASSERT_OK(authzManager->acquireUser(&txn, UserName("myUser", "test"), &myUser));
+ ASSERT_OK(authzManager->acquireUser(&opCtx, UserName("myUser", "test"), &myUser));
ASSERT_EQUALS(UserName("myUser", "test"), myUser->getName());
ASSERT(myUser->isValid());
ASSERT_EQUALS(1U, myUser->getRefCount());
@@ -444,17 +444,17 @@ public:
};
virtual void setUp() override {
- txn.setRecoveryUnit(recoveryUnit, OperationContext::kNotInUnitOfWork);
+ opCtx.setRecoveryUnit(recoveryUnit, OperationContext::kNotInUnitOfWork);
AuthorizationManagerTest::setUp();
}
- OperationContextNoop txn;
+ OperationContextNoop opCtx;
size_t registeredChanges = 0;
MockRecoveryUnit* recoveryUnit = new MockRecoveryUnit(&registeredChanges);
};
TEST_F(AuthorizationManagerLogOpTest, testDropDatabaseAddsRecoveryUnits) {
- authzManager->logOp(&txn,
+ authzManager->logOp(&opCtx,
"c",
"admin.$cmd",
BSON("dropDatabase"
@@ -464,7 +464,7 @@ TEST_F(AuthorizationManagerLogOpTest, testDropDatabaseAddsRecoveryUnits) {
}
TEST_F(AuthorizationManagerLogOpTest, testDropAuthCollectionAddsRecoveryUnits) {
- authzManager->logOp(&txn,
+ authzManager->logOp(&opCtx,
"c",
"admin.$cmd",
BSON("drop"
@@ -472,7 +472,7 @@ TEST_F(AuthorizationManagerLogOpTest, testDropAuthCollectionAddsRecoveryUnits) {
nullptr);
ASSERT_EQ(size_t(1), registeredChanges);
- authzManager->logOp(&txn,
+ authzManager->logOp(&opCtx,
"c",
"admin.$cmd",
BSON("drop"
@@ -480,7 +480,7 @@ TEST_F(AuthorizationManagerLogOpTest, testDropAuthCollectionAddsRecoveryUnits) {
nullptr);
ASSERT_EQ(size_t(2), registeredChanges);
- authzManager->logOp(&txn,
+ authzManager->logOp(&opCtx,
"c",
"admin.$cmd",
BSON("drop"
@@ -488,7 +488,7 @@ TEST_F(AuthorizationManagerLogOpTest, testDropAuthCollectionAddsRecoveryUnits) {
nullptr);
ASSERT_EQ(size_t(3), registeredChanges);
- authzManager->logOp(&txn,
+ authzManager->logOp(&opCtx,
"c",
"admin.$cmd",
BSON("drop"
@@ -498,21 +498,21 @@ TEST_F(AuthorizationManagerLogOpTest, testDropAuthCollectionAddsRecoveryUnits) {
}
TEST_F(AuthorizationManagerLogOpTest, testCreateAnyCollectionAddsNoRecoveryUnits) {
- authzManager->logOp(&txn,
+ authzManager->logOp(&opCtx,
"c",
"admin.$cmd",
BSON("create"
<< "system.users"),
nullptr);
- authzManager->logOp(&txn,
+ authzManager->logOp(&opCtx,
"c",
"admin.$cmd",
BSON("create"
<< "system.profile"),
nullptr);
- authzManager->logOp(&txn,
+ authzManager->logOp(&opCtx,
"c",
"admin.$cmd",
BSON("create"
@@ -523,7 +523,7 @@ TEST_F(AuthorizationManagerLogOpTest, testCreateAnyCollectionAddsNoRecoveryUnits
}
TEST_F(AuthorizationManagerLogOpTest, testRawInsertToRolesCollectionAddsRecoveryUnits) {
- authzManager->logOp(&txn,
+ authzManager->logOp(&opCtx,
"i",
"admin.system.profile",
BSON("_id"
@@ -531,7 +531,7 @@ TEST_F(AuthorizationManagerLogOpTest, testRawInsertToRolesCollectionAddsRecovery
nullptr);
ASSERT_EQ(size_t(0), registeredChanges);
- authzManager->logOp(&txn,
+ authzManager->logOp(&opCtx,
"i",
"admin.system.users",
BSON("_id"
@@ -539,7 +539,7 @@ TEST_F(AuthorizationManagerLogOpTest, testRawInsertToRolesCollectionAddsRecovery
nullptr);
ASSERT_EQ(size_t(0), registeredChanges);
- authzManager->logOp(&txn,
+ authzManager->logOp(&opCtx,
"i",
"admin.system.roles",
BSON("_id"