mirror of
https://github.com/meteor/meteor.git
synced 2026-05-02 03:01:46 -04:00
Merge pull request #10726 from osminushkin/sparse_index_1_to_true
change sparse and unique index options values from 1 to true
This commit is contained in:
@@ -1555,18 +1555,18 @@ const setupUsersCollection = users => {
|
||||
});
|
||||
|
||||
/// DEFAULT INDEXES ON USERS
|
||||
users._ensureIndex('username', {unique: 1, sparse: 1});
|
||||
users._ensureIndex('emails.address', {unique: 1, sparse: 1});
|
||||
users._ensureIndex('username', { unique: true, sparse: true });
|
||||
users._ensureIndex('emails.address', { unique: true, sparse: true });
|
||||
users._ensureIndex('services.resume.loginTokens.hashedToken',
|
||||
{unique: 1, sparse: 1});
|
||||
{ unique: true, sparse: true });
|
||||
users._ensureIndex('services.resume.loginTokens.token',
|
||||
{unique: 1, sparse: 1});
|
||||
{ unique: true, sparse: true });
|
||||
// For taking care of logoutOtherClients calls that crashed before the
|
||||
// tokens were deleted.
|
||||
users._ensureIndex('services.resume.haveLoginTokensToDelete',
|
||||
{ sparse: 1 });
|
||||
{ sparse: true });
|
||||
// For expiring login tokens
|
||||
users._ensureIndex("services.resume.loginTokens.when", { sparse: 1 });
|
||||
users._ensureIndex("services.resume.loginTokens.when", { sparse: true });
|
||||
// For expiring password tokens
|
||||
users._ensureIndex('services.password.reset.when', { sparse: 1 });
|
||||
users._ensureIndex('services.password.reset.when', { sparse: true });
|
||||
};
|
||||
|
||||
@@ -15,7 +15,7 @@ Accounts.oauth.registerService = name => {
|
||||
// so this should be a unique index. You might want to add indexes for other
|
||||
// fields returned by your service (eg services.github.login) but you can do
|
||||
// that in your app.
|
||||
Meteor.users._ensureIndex(`services.${name}.id`, {unique: 1, sparse: 1});
|
||||
Meteor.users._ensureIndex(`services.${name}.id`, {unique: true, sparse: true});
|
||||
}
|
||||
};
|
||||
|
||||
|
||||
@@ -164,7 +164,7 @@ Accounts._findUserByQuery = query => {
|
||||
* @returns {Object} A user if found, else null
|
||||
* @importFromPackage accounts-base
|
||||
*/
|
||||
Accounts.findUserByUsername =
|
||||
Accounts.findUserByUsername =
|
||||
username => Accounts._findUserByQuery({ username });
|
||||
|
||||
/**
|
||||
@@ -592,7 +592,7 @@ Accounts.generateResetToken = (userId, email, reason, extraTokenData) => {
|
||||
}
|
||||
|
||||
// make sure we have a valid email
|
||||
if (!email ||
|
||||
if (!email ||
|
||||
!(pluckAddresses(user.emails).includes(email))) {
|
||||
handleError("No such email for user.");
|
||||
}
|
||||
@@ -654,7 +654,7 @@ Accounts.generateVerificationToken = (userId, email, extraTokenData) => {
|
||||
}
|
||||
|
||||
// make sure we have a valid email
|
||||
if (!email ||
|
||||
if (!email ||
|
||||
!(pluckAddresses(user.emails).includes(email))) {
|
||||
handleError("No such email for user.");
|
||||
}
|
||||
@@ -977,7 +977,7 @@ Accounts.addEmail = (userId, newEmail, verified) => {
|
||||
} else {
|
||||
return prev;
|
||||
}
|
||||
},
|
||||
},
|
||||
false
|
||||
);
|
||||
|
||||
@@ -1151,6 +1151,6 @@ Accounts.createUser = (options, callback) => {
|
||||
/// PASSWORD-SPECIFIC INDEXES ON USERS
|
||||
///
|
||||
Meteor.users._ensureIndex('services.email.verificationTokens.token',
|
||||
{unique: 1, sparse: 1});
|
||||
{ unique: true, sparse: true });
|
||||
Meteor.users._ensureIndex('services.password.reset.token',
|
||||
{unique: 1, sparse: 1});
|
||||
{ unique: true, sparse: true });
|
||||
|
||||
@@ -16,7 +16,7 @@ OAuth._pendingCredentials = new Mongo.Collection(
|
||||
_preventAutopublish: true
|
||||
});
|
||||
|
||||
OAuth._pendingCredentials._ensureIndex('key', {unique: 1});
|
||||
OAuth._pendingCredentials._ensureIndex('key', { unique: true });
|
||||
OAuth._pendingCredentials._ensureIndex('credentialSecret');
|
||||
OAuth._pendingCredentials._ensureIndex('createdAt');
|
||||
|
||||
|
||||
@@ -25,7 +25,7 @@ OAuth._pendingRequestTokens = new Mongo.Collection(
|
||||
_preventAutopublish: true
|
||||
});
|
||||
|
||||
OAuth._pendingRequestTokens._ensureIndex('key', {unique: 1});
|
||||
OAuth._pendingRequestTokens._ensureIndex('key', { unique: true });
|
||||
OAuth._pendingRequestTokens._ensureIndex('createdAt');
|
||||
|
||||
|
||||
|
||||
Reference in New Issue
Block a user