Make RolesInfoCommandArg::parseFromBSON tenant aware

XMLWordPrintableJSON

    • Type: Bug
    • Resolution: Fixed
    • Priority: Major - P3
    • 6.3.0-rc0
    • Affects Version/s: None
    • Component/s: None
    • None
    • Serverless
    • Fully Compatible
    • ALL
    • Server Serverless 2023-01-23
    • None
    • None
    • None
    • None
    • None
    • None
    • None

      jstests/core/roles_info.js is failed with injected dollar tenant when send the following request:

       { "rolesInfo" : { "role" : "testRoleJSCoreRolesInfo", "db" : "test" } }
      

      To reproduce it, use the command line "buildscripts/resmoke.py run --suite native_tenant_data_isolation_with_dollar_tenant_jscore_passthrough jstests/core/roles_info.js ".

      Root cause: The tenant information is dropped off when parsing command parameter with auth::RolesInfoCommandArg::parseFromBSON(commandElement).

      To fix it, we should change the auth::RolesInfoCommandArg::parseFromBSON(commandElement) to take in tenant information. Perhaps, the IDL compiler should also be changed to generate the correct call site code for this function.

            Assignee:
            Hugh Tong (Inactive)
            Reporter:
            Sophia Tan (Inactive)
            Votes:
            0 Vote for this issue
            Watchers:
            3 Start watching this issue

              Created:
              Updated:
              Resolved: