[Snyk] Upgrade mongodb from 6.8.1 to 6.9.0 #10
Closed
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Snyk has created this PR to upgrade mongodb from 6.8.1 to 6.9.0.
ℹ️ Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.
The recommended version is 11 versions ahead of your current version.
The recommended version was released on 21 days ago.
Release notes
Package name: mongodb
6.9.0 (2024-09-06)
The MongoDB Node.js team is pleased to announce version 6.9.0 of the
mongodb
package!Release Notes
Driver support of upcoming MongoDB server release
Increased the driver's max supported Wire Protocol version and server version in preparation for the upcoming release of MongoDB 8.0.
MongoDB 3.6 server support deprecated
Warning
Support for 3.6 servers is deprecated and will be removed in a future version.
Support for explicit resource management
The driver now natively supports explicit resource management for
MongoClient
,ClientSession
,ChangeStreams
and cursors. Additionally, on compatible Node.js versions, explicit resource management can be used withcursor.stream()
and theGridFSDownloadStream
, since these classes inherit resource management from Node.js' readable streams.This feature is experimental and subject to changes at any time. This feature will remain experimental until the proposal has reached stage 4 and Node.js declares its implementation of async disposable resources as stable.
To use explicit resource management with the Node driver, you must:
tslib
polyfills for your applicationSymbol.asyncDispose
(see the TS 5.2 release announcement for more information).Explicit resource management is a feature that ensures that resources' disposal methods are always called when the resources' scope is exited. For driver resources, explicit resource management guarantees that the resources' corresponding
close
method is called when the resource goes out of scope.{
try {
const client = MongoClient.connect('<uri>');
try {
const session = client.startSession();
const cursor = client.db('my-db').collection("my-collection").find({}, { session });
try {
const doc = await cursor.next();
} finally {
await cursor.close();
}
} finally {
await session.endSession();
}
} finally {
await client.close();
}
}
// with explicit resource management:
{
await using client = MongoClient.connect('<uri>');
await using session = client.startSession();
await using cursor = client.db('my-db').collection('my-collection').find({}, { session });
const doc = await cursor.next();
}
// outside of scope, the cursor, session and mongo client will be cleaned up automatically.
The full explicit resource management proposal can be found here.
Driver now supports auto selecting between IPv4 and IPv6 connections
For users on Node versions that support the
autoSelectFamily
andautoSelectFamilyAttemptTimeout
options (Node 18.13+), they can now be provided to theMongoClient
and will be passed through to socket creation.autoSelectFamily
will default totrue
withautoSelectFamilyAttemptTimeout
by default not defined. Example:Allow passing through
allowPartialTrustChain
Node.js TLS optionThis option is now exposed through the MongoClient constructor's options parameter and controls the
X509_V_FLAG_PARTIAL_CHAIN
OpenSSL flag.Fixed
enableUtf8Validation
optionStarting in v6.8.0 we inadvertently removed the ability to disable UTF-8 validation when deserializing BSON. Validation is normally a good thing, but it was always meant to be configurable and the recent Node.js runtime issues (v22.7.0) make this option indispensable for avoiding errors from mistakenly generated invalid UTF-8 bytes.
Add duration indicating time elapsed between connection creation and when the connection is ready
ConnectionReadyEvent
now has adurationMS
property that represents the time between the connection creation event and when the connection ready event is fired.Add duration indicating time elapsed between the beginning and end of a connection checkout operation
ConnectionCheckedOutEvent
/ConnectionCheckFailedEvent
now have adurationMS
property that represents the time between checkout start and success/failure.Create native cryptoCallbacks 🔐
Node.js bundles OpenSSL, which means we can access the crypto APIs from C++ directly, avoiding the need to define them in JavaScript and call back into the JS engine to perform encryption. Now, when running the bindings in a version of Node.js that bundles OpenSSL 3 (should correspond to Node.js 18+), the
cryptoCallbacks
option will be ignored and C++ defined callbacks will be used instead. This improves the performance of encryption dramatically, as much as 5x faster. 🚀This improvement was made to mongodb-client-encryption@6.1.0 which is available now!
Only permit mongocryptd spawn path and arguments to be own properties
We have added some defensive programming to the options that specify spawn path and spawn arguments for
mongocryptd
due to the sensitivity of the system resource they control, namely, launching a process. Now,mongocryptdSpawnPath
andmongocryptdSpawnArgs
must be own properties ofautoEncryption.extraOptions
. This makes it more difficult for a global prototype pollution bug related to these options to occur.Support for range v2: Queryable Encryption supports range queries
Queryable encryption range queries are now officially supported. To use this feature, you must:
Important
Collections and documents encrypted with range queryable fields with a 7.0 server are not compatible with range queries on 8.0 servers.
Documentation for queryable encryption can be found in the MongoDB server manual.
insertMany
andbulkWrite
acceptReadonlyArray
inputsThis improves the typescript developer experience, developers tend to use
ReadonlyArray
because it can help understand where mutations are made and when enablingnoUncheckedIndexedAccess
leads to a better type narrowing experience.Please note, that the array is read only but not the documents, the driver adds
_id
fields to your documents unless you request that the server generate the_id
withforceServerObjectId
Fix retryability criteria for write concern errors on pre-4.4 sharded clusters
Previously, the driver would erroneously retry writes on pre-4.4 sharded clusters based on a nested code in the server response (error.result.writeConcernError.code). Per the common drivers specification, retryability should be based on the top-level code (error.code). With this fix, the driver avoids unnecessary retries.
The
LocalKMSProviderConfiguration
'skey
property acceptsBinary
for auto encryptionIn #4160 we fixed a type issue where a
local
KMS provider at runtime accepted aBSON
Binary
instance but the Typescript inaccurately only permittedBuffer
andstring
. The same change has now been applied toAutoEncryptionOptions
.BulkOperationBase
(superclass ofUnorderedBulkOperation
andOrderedBulkOperation
) now reportslength
property in TypescriptThe
length
getter for these classes was defined manually usingObject.defineProperty
which hid it from typescript. Thanks to @ sis0k0 we now have the getter defined on the class, which is functionally the same, but a greatly improved DX when working with types. 🎉MongoWriteConcernError.code
is overwritten by nested code withinMongoWriteConcernError.result.writeConcernError.code
MongoWriteConcernError
is now correctly formed such that the original top-level code is preservedMongoWriteConcernError.code
should be set toMongoWriteConcernError.result.writeConcernError.code
writeConcernError.code
Optimized
cursor.toArray()
Prior to this change,
toArray()
simply used the cursor's async iterator API, which parses BSON documents lazily (see more here).toArray()
, however, eagerly fetches the entire set of results, pushing each document into the returned array. As such,toArray
does not have the same benefits from lazy parsing as other parts of the cursor API.With this change, when
toArray()
accumulates documents, it empties the current batch of documents into the array before calling the async iterator again, which means each iteration will fetch the next batch rather than wrap each document in a promise. This allows thecursor.toArray()
to avoid the required delays associated with async/await execution, and allows for a performance improvement of up to 5% on average! 🎉Note: This performance optimization does not apply if a transform has been provided to
cursor.map()
beforetoArray
is called.Fixed mixed use of
cursor.next()
andcursor[Symbol.asyncIterator]
In 6.8.0, we inadvertently prevented the use of
cursor.next()
along with usingfor await
syntax to iterate cursors. If your code made use of the following pattern and the call tocursor.next
retrieved all your documents in the first batch, then the for-await loop would never be entered. This issue is now fixed.for await (const doc of cursor) {
// process doc
// ...
}
Features
mongocryptdSpawnPath
andmongocryptdSpawnArgs
(#4151) (f48f8d3)allowPartialTrustChain
TLS flag (#4228) (d6c147d)Bug Fixes
error.writeConcern.code
to determine retryability (#4155) (b26c328)Performance Improvements
Documentation
We invite you to try the
mongodb
library immediately, and report any issues to the NODE project.6.8.2 (2024-09-12)
The MongoDB Node.js team is pleased to announce version 6.8.2 of the
mongodb
package!Release Notes
Fixed mixed use of cursor.next() and cursor[Symbol.asyncIterator]
In 6.8.0, we inadvertently prevented the use of cursor.next() along with using for await syntax to iterate cursors. If your code made use of the following pattern and the call to cursor.next retrieved all your documents in the first batch, then the for-await loop would never be entered. This issue is now fixed.
for await (const doc of cursor) {
// process doc
// ...
}
Bug Fixes
Documentation
We invite you to try the
mongodb
library immediately, and report any issues to the NODE project.6.8.1 (2024-09-06)
The MongoDB Node.js team is pleased to announce version 6.8.1 of the
mongodb
package!Release Notes
Fixed
enableUtf8Validation
optionStarting in v6.8.0 we inadvertently removed the ability to disable UTF-8 validation when deserializing BSON. Validation is normally a good thing, but it was always meant to be configurable and the recent Node.js runtime issues (v22.7.0) make this option indispensable for avoiding errors from mistakenly generated invalid UTF-8 bytes.
Bug Fixes
Documentation
We invite you to try the
mongodb
library immediately, and report any issues to the NODE project.Important
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.
For more information: