Merge pull request #10726 from osminushkin/sparse_index_1_to_true

change sparse and unique index options values from 1 to true
This commit is contained in:
Filipe Névola
2020-02-12 11:20:49 -04:00
committed by GitHub
5 changed files with 16 additions and 16 deletions

View File

@@ -1555,18 +1555,18 @@ const setupUsersCollection = users => {
});
/// DEFAULT INDEXES ON USERS
users._ensureIndex('username', {unique: 1, sparse: 1});
users._ensureIndex('emails.address', {unique: 1, sparse: 1});
users._ensureIndex('username', { unique: true, sparse: true });
users._ensureIndex('emails.address', { unique: true, sparse: true });
users._ensureIndex('services.resume.loginTokens.hashedToken',
{unique: 1, sparse: 1});
{ unique: true, sparse: true });
users._ensureIndex('services.resume.loginTokens.token',
{unique: 1, sparse: 1});
{ unique: true, sparse: true });
// For taking care of logoutOtherClients calls that crashed before the
// tokens were deleted.
users._ensureIndex('services.resume.haveLoginTokensToDelete',
{ sparse: 1 });
{ sparse: true });
// For expiring login tokens
users._ensureIndex("services.resume.loginTokens.when", { sparse: 1 });
users._ensureIndex("services.resume.loginTokens.when", { sparse: true });
// For expiring password tokens
users._ensureIndex('services.password.reset.when', { sparse: 1 });
users._ensureIndex('services.password.reset.when', { sparse: true });
};

View File

@@ -15,7 +15,7 @@ Accounts.oauth.registerService = name => {
// so this should be a unique index. You might want to add indexes for other
// fields returned by your service (eg services.github.login) but you can do
// that in your app.
Meteor.users._ensureIndex(`services.${name}.id`, {unique: 1, sparse: 1});
Meteor.users._ensureIndex(`services.${name}.id`, {unique: true, sparse: true});
}
};

View File

@@ -164,7 +164,7 @@ Accounts._findUserByQuery = query => {
* @returns {Object} A user if found, else null
* @importFromPackage accounts-base
*/
Accounts.findUserByUsername =
Accounts.findUserByUsername =
username => Accounts._findUserByQuery({ username });
/**
@@ -592,7 +592,7 @@ Accounts.generateResetToken = (userId, email, reason, extraTokenData) => {
}
// make sure we have a valid email
if (!email ||
if (!email ||
!(pluckAddresses(user.emails).includes(email))) {
handleError("No such email for user.");
}
@@ -654,7 +654,7 @@ Accounts.generateVerificationToken = (userId, email, extraTokenData) => {
}
// make sure we have a valid email
if (!email ||
if (!email ||
!(pluckAddresses(user.emails).includes(email))) {
handleError("No such email for user.");
}
@@ -977,7 +977,7 @@ Accounts.addEmail = (userId, newEmail, verified) => {
} else {
return prev;
}
},
},
false
);
@@ -1151,6 +1151,6 @@ Accounts.createUser = (options, callback) => {
/// PASSWORD-SPECIFIC INDEXES ON USERS
///
Meteor.users._ensureIndex('services.email.verificationTokens.token',
{unique: 1, sparse: 1});
{ unique: true, sparse: true });
Meteor.users._ensureIndex('services.password.reset.token',
{unique: 1, sparse: 1});
{ unique: true, sparse: true });

View File

@@ -16,7 +16,7 @@ OAuth._pendingCredentials = new Mongo.Collection(
_preventAutopublish: true
});
OAuth._pendingCredentials._ensureIndex('key', {unique: 1});
OAuth._pendingCredentials._ensureIndex('key', { unique: true });
OAuth._pendingCredentials._ensureIndex('credentialSecret');
OAuth._pendingCredentials._ensureIndex('createdAt');

View File

@@ -25,7 +25,7 @@ OAuth._pendingRequestTokens = new Mongo.Collection(
_preventAutopublish: true
});
OAuth._pendingRequestTokens._ensureIndex('key', {unique: 1});
OAuth._pendingRequestTokens._ensureIndex('key', { unique: true });
OAuth._pendingRequestTokens._ensureIndex('createdAt');