diff options
Diffstat (limited to 'src/mongo/s/commands/cluster_user_management_commands.cpp')
-rw-r--r-- | src/mongo/s/commands/cluster_user_management_commands.cpp | 122 |
1 files changed, 61 insertions, 61 deletions
diff --git a/src/mongo/s/commands/cluster_user_management_commands.cpp b/src/mongo/s/commands/cluster_user_management_commands.cpp index 69aee76c4d3..18aa7736fe7 100644 --- a/src/mongo/s/commands/cluster_user_management_commands.cpp +++ b/src/mongo/s/commands/cluster_user_management_commands.cpp @@ -86,14 +86,14 @@ public: return auth::checkAuthForCreateUserCommand(client, dbname, cmdObj); } - bool run(OperationContext* txn, + bool run(OperationContext* opCtx, const string& dbname, BSONObj& cmdObj, int options, string& errmsg, BSONObjBuilder& result) { - return Grid::get(txn)->catalogClient(txn)->runUserManagementWriteCommand( - txn, getName(), dbname, cmdObj, &result); + return Grid::get(opCtx)->catalogClient(opCtx)->runUserManagementWriteCommand( + opCtx, getName(), dbname, cmdObj, &result); } virtual void redactForLogging(mutablebson::Document* cmdObj) { @@ -125,7 +125,7 @@ public: return auth::checkAuthForUpdateUserCommand(client, dbname, cmdObj); } - bool run(OperationContext* txn, + bool run(OperationContext* opCtx, const string& dbname, BSONObj& cmdObj, int options, @@ -136,8 +136,8 @@ public: if (!status.isOK()) { return appendCommandStatus(result, status); } - const bool ok = Grid::get(txn)->catalogClient(txn)->runUserManagementWriteCommand( - txn, getName(), dbname, cmdObj, &result); + const bool ok = Grid::get(opCtx)->catalogClient(opCtx)->runUserManagementWriteCommand( + opCtx, getName(), dbname, cmdObj, &result); AuthorizationManager* authzManager = getGlobalAuthorizationManager(); invariant(authzManager); @@ -175,7 +175,7 @@ public: return auth::checkAuthForDropUserCommand(client, dbname, cmdObj); } - bool run(OperationContext* txn, + bool run(OperationContext* opCtx, const string& dbname, BSONObj& cmdObj, int options, @@ -186,8 +186,8 @@ public: if (!status.isOK()) { return appendCommandStatus(result, status); } - const bool ok = Grid::get(txn)->catalogClient(txn)->runUserManagementWriteCommand( - txn, getName(), dbname, cmdObj, &result); + const bool ok = Grid::get(opCtx)->catalogClient(opCtx)->runUserManagementWriteCommand( + opCtx, getName(), dbname, cmdObj, &result); AuthorizationManager* authzManager = getGlobalAuthorizationManager(); invariant(authzManager); @@ -221,14 +221,14 @@ public: return auth::checkAuthForDropAllUsersFromDatabaseCommand(client, dbname); } - bool run(OperationContext* txn, + bool run(OperationContext* opCtx, const string& dbname, BSONObj& cmdObj, int options, string& errmsg, BSONObjBuilder& result) { - const bool ok = Grid::get(txn)->catalogClient(txn)->runUserManagementWriteCommand( - txn, getName(), dbname, cmdObj, &result); + const bool ok = Grid::get(opCtx)->catalogClient(opCtx)->runUserManagementWriteCommand( + opCtx, getName(), dbname, cmdObj, &result); AuthorizationManager* authzManager = getGlobalAuthorizationManager(); invariant(authzManager); @@ -262,7 +262,7 @@ public: return auth::checkAuthForGrantRolesToUserCommand(client, dbname, cmdObj); } - bool run(OperationContext* txn, + bool run(OperationContext* opCtx, const string& dbname, BSONObj& cmdObj, int options, @@ -275,8 +275,8 @@ public: if (!status.isOK()) { return appendCommandStatus(result, status); } - const bool ok = Grid::get(txn)->catalogClient(txn)->runUserManagementWriteCommand( - txn, getName(), dbname, cmdObj, &result); + const bool ok = Grid::get(opCtx)->catalogClient(opCtx)->runUserManagementWriteCommand( + opCtx, getName(), dbname, cmdObj, &result); AuthorizationManager* authzManager = getGlobalAuthorizationManager(); invariant(authzManager); @@ -310,7 +310,7 @@ public: return auth::checkAuthForRevokeRolesFromUserCommand(client, dbname, cmdObj); } - bool run(OperationContext* txn, + bool run(OperationContext* opCtx, const string& dbname, BSONObj& cmdObj, int options, @@ -323,8 +323,8 @@ public: if (!status.isOK()) { return appendCommandStatus(result, status); } - const bool ok = Grid::get(txn)->catalogClient(txn)->runUserManagementWriteCommand( - txn, getName(), dbname, cmdObj, &result); + const bool ok = Grid::get(opCtx)->catalogClient(opCtx)->runUserManagementWriteCommand( + opCtx, getName(), dbname, cmdObj, &result); AuthorizationManager* authzManager = getGlobalAuthorizationManager(); invariant(authzManager); @@ -362,14 +362,14 @@ public: return auth::checkAuthForUsersInfoCommand(client, dbname, cmdObj); } - bool run(OperationContext* txn, + bool run(OperationContext* opCtx, const string& dbname, BSONObj& cmdObj, int options, string& errmsg, BSONObjBuilder& result) { - return Grid::get(txn)->catalogClient(txn)->runUserManagementReadCommand( - txn, dbname, cmdObj, &result); + return Grid::get(opCtx)->catalogClient(opCtx)->runUserManagementReadCommand( + opCtx, dbname, cmdObj, &result); } } cmdUsersInfo; @@ -397,14 +397,14 @@ public: return auth::checkAuthForCreateRoleCommand(client, dbname, cmdObj); } - bool run(OperationContext* txn, + bool run(OperationContext* opCtx, const string& dbname, BSONObj& cmdObj, int options, string& errmsg, BSONObjBuilder& result) { - return Grid::get(txn)->catalogClient(txn)->runUserManagementWriteCommand( - txn, getName(), dbname, cmdObj, &result); + return Grid::get(opCtx)->catalogClient(opCtx)->runUserManagementWriteCommand( + opCtx, getName(), dbname, cmdObj, &result); } } cmdCreateRole; @@ -432,14 +432,14 @@ public: return auth::checkAuthForUpdateRoleCommand(client, dbname, cmdObj); } - bool run(OperationContext* txn, + bool run(OperationContext* opCtx, const string& dbname, BSONObj& cmdObj, int options, string& errmsg, BSONObjBuilder& result) { - const bool ok = Grid::get(txn)->catalogClient(txn)->runUserManagementWriteCommand( - txn, getName(), dbname, cmdObj, &result); + const bool ok = Grid::get(opCtx)->catalogClient(opCtx)->runUserManagementWriteCommand( + opCtx, getName(), dbname, cmdObj, &result); AuthorizationManager* authzManager = getGlobalAuthorizationManager(); invariant(authzManager); @@ -473,14 +473,14 @@ public: return auth::checkAuthForGrantPrivilegesToRoleCommand(client, dbname, cmdObj); } - bool run(OperationContext* txn, + bool run(OperationContext* opCtx, const string& dbname, BSONObj& cmdObj, int options, string& errmsg, BSONObjBuilder& result) { - const bool ok = Grid::get(txn)->catalogClient(txn)->runUserManagementWriteCommand( - txn, getName(), dbname, cmdObj, &result); + const bool ok = Grid::get(opCtx)->catalogClient(opCtx)->runUserManagementWriteCommand( + opCtx, getName(), dbname, cmdObj, &result); AuthorizationManager* authzManager = getGlobalAuthorizationManager(); invariant(authzManager); @@ -514,14 +514,14 @@ public: return auth::checkAuthForRevokePrivilegesFromRoleCommand(client, dbname, cmdObj); } - bool run(OperationContext* txn, + bool run(OperationContext* opCtx, const string& dbname, BSONObj& cmdObj, int options, string& errmsg, BSONObjBuilder& result) { - const bool ok = Grid::get(txn)->catalogClient(txn)->runUserManagementWriteCommand( - txn, getName(), dbname, cmdObj, &result); + const bool ok = Grid::get(opCtx)->catalogClient(opCtx)->runUserManagementWriteCommand( + opCtx, getName(), dbname, cmdObj, &result); AuthorizationManager* authzManager = getGlobalAuthorizationManager(); invariant(authzManager); @@ -555,14 +555,14 @@ public: return auth::checkAuthForGrantRolesToRoleCommand(client, dbname, cmdObj); } - bool run(OperationContext* txn, + bool run(OperationContext* opCtx, const string& dbname, BSONObj& cmdObj, int options, string& errmsg, BSONObjBuilder& result) { - const bool ok = Grid::get(txn)->catalogClient(txn)->runUserManagementWriteCommand( - txn, getName(), dbname, cmdObj, &result); + const bool ok = Grid::get(opCtx)->catalogClient(opCtx)->runUserManagementWriteCommand( + opCtx, getName(), dbname, cmdObj, &result); AuthorizationManager* authzManager = getGlobalAuthorizationManager(); invariant(authzManager); @@ -596,14 +596,14 @@ public: return auth::checkAuthForRevokeRolesFromRoleCommand(client, dbname, cmdObj); } - bool run(OperationContext* txn, + bool run(OperationContext* opCtx, const string& dbname, BSONObj& cmdObj, int options, string& errmsg, BSONObjBuilder& result) { - const bool ok = Grid::get(txn)->catalogClient(txn)->runUserManagementWriteCommand( - txn, getName(), dbname, cmdObj, &result); + const bool ok = Grid::get(opCtx)->catalogClient(opCtx)->runUserManagementWriteCommand( + opCtx, getName(), dbname, cmdObj, &result); AuthorizationManager* authzManager = getGlobalAuthorizationManager(); invariant(authzManager); @@ -640,14 +640,14 @@ public: return auth::checkAuthForDropRoleCommand(client, dbname, cmdObj); } - bool run(OperationContext* txn, + bool run(OperationContext* opCtx, const string& dbname, BSONObj& cmdObj, int options, string& errmsg, BSONObjBuilder& result) { - const bool ok = Grid::get(txn)->catalogClient(txn)->runUserManagementWriteCommand( - txn, getName(), dbname, cmdObj, &result); + const bool ok = Grid::get(opCtx)->catalogClient(opCtx)->runUserManagementWriteCommand( + opCtx, getName(), dbname, cmdObj, &result); AuthorizationManager* authzManager = getGlobalAuthorizationManager(); invariant(authzManager); @@ -685,14 +685,14 @@ public: return auth::checkAuthForDropAllRolesFromDatabaseCommand(client, dbname); } - bool run(OperationContext* txn, + bool run(OperationContext* opCtx, const string& dbname, BSONObj& cmdObj, int options, string& errmsg, BSONObjBuilder& result) { - const bool ok = Grid::get(txn)->catalogClient(txn)->runUserManagementWriteCommand( - txn, getName(), dbname, cmdObj, &result); + const bool ok = Grid::get(opCtx)->catalogClient(opCtx)->runUserManagementWriteCommand( + opCtx, getName(), dbname, cmdObj, &result); AuthorizationManager* authzManager = getGlobalAuthorizationManager(); invariant(authzManager); @@ -730,14 +730,14 @@ public: return auth::checkAuthForRolesInfoCommand(client, dbname, cmdObj); } - bool run(OperationContext* txn, + bool run(OperationContext* opCtx, const string& dbname, BSONObj& cmdObj, int options, string& errmsg, BSONObjBuilder& result) { - return Grid::get(txn)->catalogClient(txn)->runUserManagementReadCommand( - txn, dbname, cmdObj, &result); + return Grid::get(opCtx)->catalogClient(opCtx)->runUserManagementReadCommand( + opCtx, dbname, cmdObj, &result); } } cmdRolesInfo; @@ -769,7 +769,7 @@ public: return auth::checkAuthForInvalidateUserCacheCommand(client); } - bool run(OperationContext* txn, + bool run(OperationContext* opCtx, const string& dbname, BSONObj& cmdObj, int options, @@ -820,14 +820,14 @@ public: return auth::checkAuthForMergeAuthzCollectionsCommand(client, cmdObj); } - bool run(OperationContext* txn, + bool run(OperationContext* opCtx, const string& dbname, BSONObj& cmdObj, int options, string& errmsg, BSONObjBuilder& result) { - return Grid::get(txn)->catalogClient(txn)->runUserManagementWriteCommand( - txn, getName(), dbname, cmdObj, &result); + return Grid::get(opCtx)->catalogClient(opCtx)->runUserManagementWriteCommand( + opCtx, getName(), dbname, cmdObj, &result); } } cmdMergeAuthzCollections; @@ -838,7 +838,7 @@ public: * * Returned error indicates a failure. */ -Status runUpgradeOnAllShards(OperationContext* txn, int maxSteps, BSONObjBuilder& result) { +Status runUpgradeOnAllShards(OperationContext* opCtx, int maxSteps, BSONObjBuilder& result) { BSONObjBuilder cmdObjBuilder; cmdObjBuilder.append("authSchemaUpgrade", 1); cmdObjBuilder.append("maxSteps", maxSteps); @@ -847,19 +847,19 @@ Status runUpgradeOnAllShards(OperationContext* txn, int maxSteps, BSONObjBuilder const BSONObj cmdObj = cmdObjBuilder.done(); // Upgrade each shard in turn, stopping on first failure. - auto shardRegistry = Grid::get(txn)->shardRegistry(); - shardRegistry->reload(txn); + auto shardRegistry = Grid::get(opCtx)->shardRegistry(); + shardRegistry->reload(opCtx); vector<ShardId> shardIds; shardRegistry->getAllShardIds(&shardIds); bool hasWCError = false; for (const auto& shardId : shardIds) { - auto shardStatus = shardRegistry->getShard(txn, shardId); + auto shardStatus = shardRegistry->getShard(opCtx, shardId); if (!shardStatus.isOK()) { return shardStatus.getStatus(); } auto cmdResult = shardStatus.getValue()->runCommandWithFixedRetryAttempts( - txn, + opCtx, ReadPreferenceSetting{ReadPreference::PrimaryOnly}, "admin", cmdObj, @@ -910,15 +910,15 @@ public: return auth::checkAuthForAuthSchemaUpgradeCommand(client); } - bool run(OperationContext* txn, + bool run(OperationContext* opCtx, const string& dbname, BSONObj& cmdObj, int options, string& errmsg, BSONObjBuilder& result) { // Run the authSchemaUpgrade command on the config servers - if (!Grid::get(txn)->catalogClient(txn)->runUserManagementWriteCommand( - txn, getName(), dbname, cmdObj, &result)) { + if (!Grid::get(opCtx)->catalogClient(opCtx)->runUserManagementWriteCommand( + opCtx, getName(), dbname, cmdObj, &result)) { return false; } @@ -930,7 +930,7 @@ public: // Optionally run the authSchemaUpgrade command on the individual shards if (parsedArgs.shouldUpgradeShards) { - status = runUpgradeOnAllShards(txn, parsedArgs.maxSteps, result); + status = runUpgradeOnAllShards(opCtx, parsedArgs.maxSteps, result); if (!status.isOK()) { // If the status is a write concern error, append a writeConcernError instead of // and error message. |