refactor: Upgrade mongodb from 6.13.0 to 6.15.0 #9713
Closed
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Snyk has created this PR to upgrade mongodb from 6.13.0 to 6.15.0.
ℹ️ Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.
The recommended version is 35 versions ahead of your current version.
The recommended version was released a month ago.
Release notes
Package name: mongodb
6.15.0 (2025-03-18)
The MongoDB Node.js team is pleased to announce version 6.15.0 of the
mongodb
package!Release Notes
Support for custom AWS credential providers
The driver now supports a user supplied custom AWS credentials provider for both authentication and for KMS requests when using client side encryption. The signature for the custom provider must be of
() => Promise<AWSCredentials>
which matches that of the official AWS SDK provider API. Provider chains from the actual AWS SDK can also be provided, allowing users to customize any of those options.Example for authentication with a provider chain from the AWS SDK:
const client = new MongoClient(process.env.MONGODB_URI, {
authMechanismProperties: {
AWS_CREDENTIAL_PROVIDER: fromNodeProviderChain()
}
});
Example for using a custom provider for KMS requests only:
const client = new MongoClient(process.env.MONGODB_URI, {
autoEncryption: {
keyVaultNamespace: 'keyvault.datakeys',
kmsProviders: { aws: {} },
credentialProviders: {
aws: fromNodeProviderChain()
}
}
}
Custom providers do not need to come from the AWS SDK, they just need to be an async function that returns credentials:
Fix misc unhandled rejections under special conditions
We identified an issue with our test suite that suppressed catching unhandled rejections and surfacing them to us so we can ensure the driver handles any possible rejections. Luckily only 3 cases were identified and each was under a flagged or specialized code path that may not have been in use:
OIDC
and anAbortSignal
was aborted on cursor at the same time the client was reauthenticating, if the reauth process was rejected it would have been unhandled.timeoutMS
was used and the timeout expired before an operation reached the server selection step the operation would throw the expected timeout error but a promise representing the timeout would also raise an unhandled rejection.Features
Bug Fixes
Documentation
We invite you to try the
mongodb
library immediately, and report any issues to the NODE project.6.14.2 (2025-03-04)
The MongoDB Node.js team is pleased to announce version 6.14.2 of the
mongodb
package!Release Notes
KMS Requests can cause unhandled rejection
When using explicit encryption or automatic encryption, the driver makes requests to a Key Management System when to fetch key encryption keys. The driver supports connecting to a KMS provider through a Socks5 proxy. However, the socket used for the socks5 proxy was created in all circumstances, regardless of proxy configuration. This leads to unhandled rejection errors when closing the socket the driver attempts to clean up the unused socket.
With the changes in this release, the socket is only created if a proxy is configured and the any promises created for the proxy are properly handled.
Bug Fixes
Documentation
We invite you to try the
mongodb
library immediately, and report any issues to the NODE project.6.14.1 (2025-03-03)
The MongoDB Node.js team is pleased to announce version 6.14.1 of the
mongodb
package!Release Notes
Fixed occasional OIDC reauthentication failure
Error code 391 is intended to make the driver internally reauthenticate the connection to the server, however, occasionally this was being raised to the user. This was due to a bug in setting the cached access token on newly created connections.
Bug Fixes
Documentation
We invite you to try the
mongodb
library immediately, and report any issues to the NODE project.6.14.0 (2025-02-28)
The MongoDB Node.js team is pleased to announce version 6.14.0 of the
mongodb
package!Release Notes
Add support for $lookup on encrypted collections
Starting in the upcoming MongoDB server 8.1, the aggregation stage
$lookup
can now be used with clients configured for automatic encryption after upgrading tomongodb-client-encryption@>=6.3.0
! 🔒 🎉Use
isUint8Array
defined in the driver rather thanutil/types
Some users of bundlers for next.js and our very own mongosh noticed a new import from "util/types" that would need to be supported in environments that don't have that module. We already have an internal implementation of
isUint8Array
so we do not need to add an import for "util/types".Revert
@ aws-sdk/credential-providers
compatiblity changeIn v6.13.1 we inadvertantly raised the version compatibility of
@ aws-sdk/credential-providers
, that change has been reverted.Features
nsType
in change stream create events (#4431) (7800067)Bug Fixes
@ aws-sdk/credential-providers
peer compatibility change (#4437) (488c407)Documentation
We invite you to try the
mongodb
library immediately, and report any issues to the NODE project.6.13.1 (2025-02-20)
The MongoDB Node.js team is pleased to announce version 6.13.1 of the
mongodb
package!Release Notes
Remove extraneous
Promise<Document>
inCollection.replaceOne
return typeThe return type signature of the
replaceOne
method no longer includes the generalPromise<Document>
type. Thanks to @ arturmuller, thereplaceOne
type signature is now more accurate! 🎉Fix writeConcern omitted when timeoutMS is provided
When
timeoutMS
and a write concern were provided, thewriteConcern
was incorrectly omitted from the final command executed by the driver.Thanks @ stepanho for contributing the fix!
Update BSON version requirement to 6.10.3
This pulls in fixes made in
bson
versions 6.10.3 and 6.10.2 into the driver.BSON 6.10.2 fixed an issue in
calculateObjectSize
ignoring the size contributed byBigInt
values to a BSON document. This impacted batch splitting logic inbulkWrite
operations: if the actual BSON was over the size returned bycalculateObjectSize
the server would return an error.Warning
BSON 6.10.3 addresses a potential data corruption risk with the use of
useBigInt64
flag introduced in BSON 6.4.0, where negativeLong
values would be deserialized intoBigInt
as unsigned integers when theuseBigInt64
flag was enabled. (Thanks to @ rkistner for reporting this issue!)Bug Fixes
Documentation
We invite you to try the
mongodb
library immediately, and report any issues to the NODE project.6.13.0 (2025-01-30)
The MongoDB Node.js team is pleased to announce version 6.13.0 of the
mongodb
package!Release Notes
MongoDB Standardized Logging 📝
The driver's standardized logger is now available! The primary goal of our driver's logger is to enable insight into database operations without code changes so enabling and configuring the logger are primarily done through our environment variables.
TL;DR Show me the logs!
Tip
If you are a CLI app developer (or otherwise take great care of your std outputs): The client options constructor argument takes precedence over environment variables, permitting you to disable or otherwise customize the logger so your app does not automatically respond to the current environment.
Check out the in-depth logging docs here: https://www.mongodb.com/docs/drivers/node/current/fundamentals/logging/
🚀 Improved command monitoring performance
Previously, when command monitoring was enabled, the driver would make deep copies of command and reply objects, which have the potential to be very large documents. These copies have been eliminated, providing a speed and memory efficiency bump to command monitoring.
Warning
Since we no longer make deep copies of commands/replies in Command Monitoring Events, directly modifying the command/reply objects on
CommandStartedEvent
s andCommandSucceededEvent
s may lead to undefined behaviour.🧪 Experimental AbortSignal support added to Find and Aggregate! 🚥
A
signal
argument can now be passed to the following APIs:collection.find()
&collection.findOne()
collection.aggregate()
&collection.countDocuments()
In order to support field level encryption properly, also:
db.listCollections()
db.command()
When aborted, the signal will interrupt the execution of each of each of these APIs. For the cursor-based APIs, this will be observed when attempting to consume from the cursor via toArray(), next(), for-await, etc.
There is a known limitation: aborting a signal closes a perfectly healthy connection which can cause unnecessary connection reestablishment so we're releasing this as experimental for evaluation in use cases that can tolerate the shortcoming.
DNS SRV & TXT look up timeouts are retried
To mitigate the potentially transient DNS timeout error, the driver now catches and retries the DNS lookups upon resolving a
mongodb+srv://
style connection string.MongoClient.close now closes any outstanding cursors
Previously, cursors could somewhat live beyond the client they came from. What this meant was that depending on timing you would learn of the client's (and by proxy, the cursor's) demise via an assertion that the associated session had expired. This only occurred if your cursor needed to use the session, which only happens when it is attempting to run a
getMore
operation to obtain another batch of documents.Practically speaking a cursor that lives beyond a client is an exception waiting to happen, the connection pools are closed, the sessions are ended, last call has been served 🍻, it is only a matter of timing and event firing until the cursor learns of its fate and informs you by throwing an error via whatever API is being used (
.toArray()
,for-await
,.next()
).To make the expected state of cursors clearer in this scenario the
MongoClient
will now close any associated cursors upon itsclose()
-ing reducing the risk of leaving behind server-side resources.MongoClient.close() can be called concurrently
In the past, concurrent calls to
MongoClient.close()
had poorly defined behavior depending on the exact timing of the second (or more) calls to close(). In some cases, this could also throw errors.With these changes, MongoClient.close() can be called concurrently safely and always returns the same promise.
Note
This is intended as a correctness fix - we don't recommend calling MongoClient.close() concurrently if it can be avoided.
MONGODB-OIDC now properly reauthenticates in speculative auth scenarios
When using MONGODB-OIDC authentication, if the initial handshake contained speculative authentication, the driver would not properly reauthenticate when the server would raise 391 errors. This is now fixed.
Features
Bug Fixes
Performance Improvements
Documentation
We invite you to try the
mongodb
library immediately, and report any issues to the NODE project.Important
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.
For more information: