def _check_allowed(self): both_or_neither(self.ssl == 'winssl', self.sasl == 'sspi') if not self.sasl: require(self.ssl == 'openssl')
def _check_allowed(self): if self.valgrind: prohibit(self.cse) prohibit(self.asan) prohibit(self.sasl) require(self.ssl in ('openssl', False)) prohibit(self.coverage) # Valgrind only with auth+SSL or no auth + no SSL. if self.auth: require(self.ssl == 'openssl') else: prohibit(self.ssl) if self.auth: require(self.ssl) if self.sasl == 'sspi': # Only one self. require(self.topology == 'server') require(self.version == 'latest') require(self.ssl == 'winssl') require(self.auth) if not self.ssl: prohibit(self.sasl) if self.coverage: prohibit(self.sasl) if self.auth: require(self.ssl == 'openssl') else: prohibit(self.ssl) if self.asan: prohibit(self.sasl) prohibit(self.coverage) # Address sanitizer only with auth+SSL or no auth + no SSL. if self.auth: require(self.ssl == 'openssl') else: prohibit(self.ssl) if self.cse: require(self.version == 'latest' or parse_version(self.version) >= parse_version("4.2")) require(self.topology == 'server') if not self.asan: # limit to SASL=AUTO to reduce redundant tasks. require(self.sasl) require(self.sasl != 'sspi') prohibit(self.coverage) require(self.ssl)
def _check_allowed(self): if self.sanitizer == 'tsan': require(self.ssl == 'openssl') prohibit(self.sasl) prohibit(self.valgrind) prohibit(self.coverage) prohibit(self.cse) prohibit(self.version == "3.0") if self.valgrind: prohibit(self.cse) prohibit(self.sanitizer) prohibit(self.sasl) require(self.ssl in ('openssl', False)) prohibit(self.coverage) # Valgrind only with auth+SSL or no auth + no SSL. if self.auth: require(self.ssl == 'openssl') else: prohibit(self.ssl) if self.auth: require(self.ssl) if self.sasl == 'sspi': # Only one self. require(self.topology == 'server') require(self.version == 'latest') require(self.ssl == 'winssl') require(self.auth) if not self.ssl: prohibit(self.sasl) if self.coverage: prohibit(self.sasl) if self.auth: require(self.ssl == 'openssl') else: prohibit(self.ssl) if self.sanitizer == "asan": prohibit(self.sasl) prohibit(self.coverage) # Address sanitizer only with auth+SSL or no auth + no SSL. if self.auth: require(self.ssl == 'openssl') else: prohibit(self.ssl) if self.cse: require(self.version == 'latest' or parse_version(self.version) >= parse_version("4.2")) if self.version == 'latest' or parse_version( self.version) >= parse_version("6.0"): # FLE 2.0 Client-Side Encryption tasks on 6.0 require a non-standalone topology. require(self.topology in ('server', 'replica_set')) else: require(self.topology == 'server') if self.sanitizer != "asan": # limit to SASL=AUTO to reduce redundant tasks. require(self.sasl) require(self.sasl != 'sspi') prohibit(self.coverage) require(self.ssl)
def _check_allowed(self): if self.valgrind: prohibit(self.asan) prohibit(self.sasl) require(self.ssl in ('openssl', False)) prohibit(self.coverage) # Valgrind only with auth+SSL or no auth + no SSL. if self.auth: require(self.ssl == 'openssl') else: prohibit(self.ssl) if self.auth: require(self.ssl) if self.sasl == 'sspi': # Only one self. require(self.topology == 'server') require(self.version == 'latest') require(self.ssl == 'winssl') require(self.auth) if not self.ssl: prohibit(self.sasl) if self.coverage: prohibit(self.sasl) if self.auth: require(self.ssl == 'openssl') else: prohibit(self.ssl) if self.asan: prohibit(self.sasl) prohibit(self.coverage) # Address sanitizer only with auth+SSL or no auth + no SSL. if self.auth: require(self.ssl == 'openssl') else: prohibit(self.ssl)