summaryrefslogtreecommitdiff
path: root/src/mongo/s/commands/cluster_user_management_commands.cpp
diff options
context:
space:
mode:
Diffstat (limited to 'src/mongo/s/commands/cluster_user_management_commands.cpp')
-rw-r--r--src/mongo/s/commands/cluster_user_management_commands.cpp122
1 files changed, 61 insertions, 61 deletions
diff --git a/src/mongo/s/commands/cluster_user_management_commands.cpp b/src/mongo/s/commands/cluster_user_management_commands.cpp
index 69aee76c4d3..18aa7736fe7 100644
--- a/src/mongo/s/commands/cluster_user_management_commands.cpp
+++ b/src/mongo/s/commands/cluster_user_management_commands.cpp
@@ -86,14 +86,14 @@ public:
return auth::checkAuthForCreateUserCommand(client, dbname, cmdObj);
}
- bool run(OperationContext* txn,
+ bool run(OperationContext* opCtx,
const string& dbname,
BSONObj& cmdObj,
int options,
string& errmsg,
BSONObjBuilder& result) {
- return Grid::get(txn)->catalogClient(txn)->runUserManagementWriteCommand(
- txn, getName(), dbname, cmdObj, &result);
+ return Grid::get(opCtx)->catalogClient(opCtx)->runUserManagementWriteCommand(
+ opCtx, getName(), dbname, cmdObj, &result);
}
virtual void redactForLogging(mutablebson::Document* cmdObj) {
@@ -125,7 +125,7 @@ public:
return auth::checkAuthForUpdateUserCommand(client, dbname, cmdObj);
}
- bool run(OperationContext* txn,
+ bool run(OperationContext* opCtx,
const string& dbname,
BSONObj& cmdObj,
int options,
@@ -136,8 +136,8 @@ public:
if (!status.isOK()) {
return appendCommandStatus(result, status);
}
- const bool ok = Grid::get(txn)->catalogClient(txn)->runUserManagementWriteCommand(
- txn, getName(), dbname, cmdObj, &result);
+ const bool ok = Grid::get(opCtx)->catalogClient(opCtx)->runUserManagementWriteCommand(
+ opCtx, getName(), dbname, cmdObj, &result);
AuthorizationManager* authzManager = getGlobalAuthorizationManager();
invariant(authzManager);
@@ -175,7 +175,7 @@ public:
return auth::checkAuthForDropUserCommand(client, dbname, cmdObj);
}
- bool run(OperationContext* txn,
+ bool run(OperationContext* opCtx,
const string& dbname,
BSONObj& cmdObj,
int options,
@@ -186,8 +186,8 @@ public:
if (!status.isOK()) {
return appendCommandStatus(result, status);
}
- const bool ok = Grid::get(txn)->catalogClient(txn)->runUserManagementWriteCommand(
- txn, getName(), dbname, cmdObj, &result);
+ const bool ok = Grid::get(opCtx)->catalogClient(opCtx)->runUserManagementWriteCommand(
+ opCtx, getName(), dbname, cmdObj, &result);
AuthorizationManager* authzManager = getGlobalAuthorizationManager();
invariant(authzManager);
@@ -221,14 +221,14 @@ public:
return auth::checkAuthForDropAllUsersFromDatabaseCommand(client, dbname);
}
- bool run(OperationContext* txn,
+ bool run(OperationContext* opCtx,
const string& dbname,
BSONObj& cmdObj,
int options,
string& errmsg,
BSONObjBuilder& result) {
- const bool ok = Grid::get(txn)->catalogClient(txn)->runUserManagementWriteCommand(
- txn, getName(), dbname, cmdObj, &result);
+ const bool ok = Grid::get(opCtx)->catalogClient(opCtx)->runUserManagementWriteCommand(
+ opCtx, getName(), dbname, cmdObj, &result);
AuthorizationManager* authzManager = getGlobalAuthorizationManager();
invariant(authzManager);
@@ -262,7 +262,7 @@ public:
return auth::checkAuthForGrantRolesToUserCommand(client, dbname, cmdObj);
}
- bool run(OperationContext* txn,
+ bool run(OperationContext* opCtx,
const string& dbname,
BSONObj& cmdObj,
int options,
@@ -275,8 +275,8 @@ public:
if (!status.isOK()) {
return appendCommandStatus(result, status);
}
- const bool ok = Grid::get(txn)->catalogClient(txn)->runUserManagementWriteCommand(
- txn, getName(), dbname, cmdObj, &result);
+ const bool ok = Grid::get(opCtx)->catalogClient(opCtx)->runUserManagementWriteCommand(
+ opCtx, getName(), dbname, cmdObj, &result);
AuthorizationManager* authzManager = getGlobalAuthorizationManager();
invariant(authzManager);
@@ -310,7 +310,7 @@ public:
return auth::checkAuthForRevokeRolesFromUserCommand(client, dbname, cmdObj);
}
- bool run(OperationContext* txn,
+ bool run(OperationContext* opCtx,
const string& dbname,
BSONObj& cmdObj,
int options,
@@ -323,8 +323,8 @@ public:
if (!status.isOK()) {
return appendCommandStatus(result, status);
}
- const bool ok = Grid::get(txn)->catalogClient(txn)->runUserManagementWriteCommand(
- txn, getName(), dbname, cmdObj, &result);
+ const bool ok = Grid::get(opCtx)->catalogClient(opCtx)->runUserManagementWriteCommand(
+ opCtx, getName(), dbname, cmdObj, &result);
AuthorizationManager* authzManager = getGlobalAuthorizationManager();
invariant(authzManager);
@@ -362,14 +362,14 @@ public:
return auth::checkAuthForUsersInfoCommand(client, dbname, cmdObj);
}
- bool run(OperationContext* txn,
+ bool run(OperationContext* opCtx,
const string& dbname,
BSONObj& cmdObj,
int options,
string& errmsg,
BSONObjBuilder& result) {
- return Grid::get(txn)->catalogClient(txn)->runUserManagementReadCommand(
- txn, dbname, cmdObj, &result);
+ return Grid::get(opCtx)->catalogClient(opCtx)->runUserManagementReadCommand(
+ opCtx, dbname, cmdObj, &result);
}
} cmdUsersInfo;
@@ -397,14 +397,14 @@ public:
return auth::checkAuthForCreateRoleCommand(client, dbname, cmdObj);
}
- bool run(OperationContext* txn,
+ bool run(OperationContext* opCtx,
const string& dbname,
BSONObj& cmdObj,
int options,
string& errmsg,
BSONObjBuilder& result) {
- return Grid::get(txn)->catalogClient(txn)->runUserManagementWriteCommand(
- txn, getName(), dbname, cmdObj, &result);
+ return Grid::get(opCtx)->catalogClient(opCtx)->runUserManagementWriteCommand(
+ opCtx, getName(), dbname, cmdObj, &result);
}
} cmdCreateRole;
@@ -432,14 +432,14 @@ public:
return auth::checkAuthForUpdateRoleCommand(client, dbname, cmdObj);
}
- bool run(OperationContext* txn,
+ bool run(OperationContext* opCtx,
const string& dbname,
BSONObj& cmdObj,
int options,
string& errmsg,
BSONObjBuilder& result) {
- const bool ok = Grid::get(txn)->catalogClient(txn)->runUserManagementWriteCommand(
- txn, getName(), dbname, cmdObj, &result);
+ const bool ok = Grid::get(opCtx)->catalogClient(opCtx)->runUserManagementWriteCommand(
+ opCtx, getName(), dbname, cmdObj, &result);
AuthorizationManager* authzManager = getGlobalAuthorizationManager();
invariant(authzManager);
@@ -473,14 +473,14 @@ public:
return auth::checkAuthForGrantPrivilegesToRoleCommand(client, dbname, cmdObj);
}
- bool run(OperationContext* txn,
+ bool run(OperationContext* opCtx,
const string& dbname,
BSONObj& cmdObj,
int options,
string& errmsg,
BSONObjBuilder& result) {
- const bool ok = Grid::get(txn)->catalogClient(txn)->runUserManagementWriteCommand(
- txn, getName(), dbname, cmdObj, &result);
+ const bool ok = Grid::get(opCtx)->catalogClient(opCtx)->runUserManagementWriteCommand(
+ opCtx, getName(), dbname, cmdObj, &result);
AuthorizationManager* authzManager = getGlobalAuthorizationManager();
invariant(authzManager);
@@ -514,14 +514,14 @@ public:
return auth::checkAuthForRevokePrivilegesFromRoleCommand(client, dbname, cmdObj);
}
- bool run(OperationContext* txn,
+ bool run(OperationContext* opCtx,
const string& dbname,
BSONObj& cmdObj,
int options,
string& errmsg,
BSONObjBuilder& result) {
- const bool ok = Grid::get(txn)->catalogClient(txn)->runUserManagementWriteCommand(
- txn, getName(), dbname, cmdObj, &result);
+ const bool ok = Grid::get(opCtx)->catalogClient(opCtx)->runUserManagementWriteCommand(
+ opCtx, getName(), dbname, cmdObj, &result);
AuthorizationManager* authzManager = getGlobalAuthorizationManager();
invariant(authzManager);
@@ -555,14 +555,14 @@ public:
return auth::checkAuthForGrantRolesToRoleCommand(client, dbname, cmdObj);
}
- bool run(OperationContext* txn,
+ bool run(OperationContext* opCtx,
const string& dbname,
BSONObj& cmdObj,
int options,
string& errmsg,
BSONObjBuilder& result) {
- const bool ok = Grid::get(txn)->catalogClient(txn)->runUserManagementWriteCommand(
- txn, getName(), dbname, cmdObj, &result);
+ const bool ok = Grid::get(opCtx)->catalogClient(opCtx)->runUserManagementWriteCommand(
+ opCtx, getName(), dbname, cmdObj, &result);
AuthorizationManager* authzManager = getGlobalAuthorizationManager();
invariant(authzManager);
@@ -596,14 +596,14 @@ public:
return auth::checkAuthForRevokeRolesFromRoleCommand(client, dbname, cmdObj);
}
- bool run(OperationContext* txn,
+ bool run(OperationContext* opCtx,
const string& dbname,
BSONObj& cmdObj,
int options,
string& errmsg,
BSONObjBuilder& result) {
- const bool ok = Grid::get(txn)->catalogClient(txn)->runUserManagementWriteCommand(
- txn, getName(), dbname, cmdObj, &result);
+ const bool ok = Grid::get(opCtx)->catalogClient(opCtx)->runUserManagementWriteCommand(
+ opCtx, getName(), dbname, cmdObj, &result);
AuthorizationManager* authzManager = getGlobalAuthorizationManager();
invariant(authzManager);
@@ -640,14 +640,14 @@ public:
return auth::checkAuthForDropRoleCommand(client, dbname, cmdObj);
}
- bool run(OperationContext* txn,
+ bool run(OperationContext* opCtx,
const string& dbname,
BSONObj& cmdObj,
int options,
string& errmsg,
BSONObjBuilder& result) {
- const bool ok = Grid::get(txn)->catalogClient(txn)->runUserManagementWriteCommand(
- txn, getName(), dbname, cmdObj, &result);
+ const bool ok = Grid::get(opCtx)->catalogClient(opCtx)->runUserManagementWriteCommand(
+ opCtx, getName(), dbname, cmdObj, &result);
AuthorizationManager* authzManager = getGlobalAuthorizationManager();
invariant(authzManager);
@@ -685,14 +685,14 @@ public:
return auth::checkAuthForDropAllRolesFromDatabaseCommand(client, dbname);
}
- bool run(OperationContext* txn,
+ bool run(OperationContext* opCtx,
const string& dbname,
BSONObj& cmdObj,
int options,
string& errmsg,
BSONObjBuilder& result) {
- const bool ok = Grid::get(txn)->catalogClient(txn)->runUserManagementWriteCommand(
- txn, getName(), dbname, cmdObj, &result);
+ const bool ok = Grid::get(opCtx)->catalogClient(opCtx)->runUserManagementWriteCommand(
+ opCtx, getName(), dbname, cmdObj, &result);
AuthorizationManager* authzManager = getGlobalAuthorizationManager();
invariant(authzManager);
@@ -730,14 +730,14 @@ public:
return auth::checkAuthForRolesInfoCommand(client, dbname, cmdObj);
}
- bool run(OperationContext* txn,
+ bool run(OperationContext* opCtx,
const string& dbname,
BSONObj& cmdObj,
int options,
string& errmsg,
BSONObjBuilder& result) {
- return Grid::get(txn)->catalogClient(txn)->runUserManagementReadCommand(
- txn, dbname, cmdObj, &result);
+ return Grid::get(opCtx)->catalogClient(opCtx)->runUserManagementReadCommand(
+ opCtx, dbname, cmdObj, &result);
}
} cmdRolesInfo;
@@ -769,7 +769,7 @@ public:
return auth::checkAuthForInvalidateUserCacheCommand(client);
}
- bool run(OperationContext* txn,
+ bool run(OperationContext* opCtx,
const string& dbname,
BSONObj& cmdObj,
int options,
@@ -820,14 +820,14 @@ public:
return auth::checkAuthForMergeAuthzCollectionsCommand(client, cmdObj);
}
- bool run(OperationContext* txn,
+ bool run(OperationContext* opCtx,
const string& dbname,
BSONObj& cmdObj,
int options,
string& errmsg,
BSONObjBuilder& result) {
- return Grid::get(txn)->catalogClient(txn)->runUserManagementWriteCommand(
- txn, getName(), dbname, cmdObj, &result);
+ return Grid::get(opCtx)->catalogClient(opCtx)->runUserManagementWriteCommand(
+ opCtx, getName(), dbname, cmdObj, &result);
}
} cmdMergeAuthzCollections;
@@ -838,7 +838,7 @@ public:
*
* Returned error indicates a failure.
*/
-Status runUpgradeOnAllShards(OperationContext* txn, int maxSteps, BSONObjBuilder& result) {
+Status runUpgradeOnAllShards(OperationContext* opCtx, int maxSteps, BSONObjBuilder& result) {
BSONObjBuilder cmdObjBuilder;
cmdObjBuilder.append("authSchemaUpgrade", 1);
cmdObjBuilder.append("maxSteps", maxSteps);
@@ -847,19 +847,19 @@ Status runUpgradeOnAllShards(OperationContext* txn, int maxSteps, BSONObjBuilder
const BSONObj cmdObj = cmdObjBuilder.done();
// Upgrade each shard in turn, stopping on first failure.
- auto shardRegistry = Grid::get(txn)->shardRegistry();
- shardRegistry->reload(txn);
+ auto shardRegistry = Grid::get(opCtx)->shardRegistry();
+ shardRegistry->reload(opCtx);
vector<ShardId> shardIds;
shardRegistry->getAllShardIds(&shardIds);
bool hasWCError = false;
for (const auto& shardId : shardIds) {
- auto shardStatus = shardRegistry->getShard(txn, shardId);
+ auto shardStatus = shardRegistry->getShard(opCtx, shardId);
if (!shardStatus.isOK()) {
return shardStatus.getStatus();
}
auto cmdResult = shardStatus.getValue()->runCommandWithFixedRetryAttempts(
- txn,
+ opCtx,
ReadPreferenceSetting{ReadPreference::PrimaryOnly},
"admin",
cmdObj,
@@ -910,15 +910,15 @@ public:
return auth::checkAuthForAuthSchemaUpgradeCommand(client);
}
- bool run(OperationContext* txn,
+ bool run(OperationContext* opCtx,
const string& dbname,
BSONObj& cmdObj,
int options,
string& errmsg,
BSONObjBuilder& result) {
// Run the authSchemaUpgrade command on the config servers
- if (!Grid::get(txn)->catalogClient(txn)->runUserManagementWriteCommand(
- txn, getName(), dbname, cmdObj, &result)) {
+ if (!Grid::get(opCtx)->catalogClient(opCtx)->runUserManagementWriteCommand(
+ opCtx, getName(), dbname, cmdObj, &result)) {
return false;
}
@@ -930,7 +930,7 @@ public:
// Optionally run the authSchemaUpgrade command on the individual shards
if (parsedArgs.shouldUpgradeShards) {
- status = runUpgradeOnAllShards(txn, parsedArgs.maxSteps, result);
+ status = runUpgradeOnAllShards(opCtx, parsedArgs.maxSteps, result);
if (!status.isOK()) {
// If the status is a write concern error, append a writeConcernError instead of
// and error message.