Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(NODE-6507): generate encryption configuration on mongoose connect #15320
base: csfle
Are you sure you want to change the base?
feat(NODE-6507): generate encryption configuration on mongoose connect #15320
Changes from all commits
db8eef7
f1c986c
682fb11
cda0e26
edfbdfa
1a48b98
065bc99
a8f37eb
53d31a6
888c0a8
5d3b51f
2c02d45
ecb3f7c
b7016de
File filter
Filter by extension
Conversations
Jump to
There are no files selected for viewing
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Potential edge case here: discriminator base schema defines nested path, discriminator child schema defines subdocument with same path but different options.
schema.eachpath()
doesn't account for subdocuments because subdocuments have a distinct schema (it does account for nested paths though because nested paths do not have their own schema)There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Good catch - I wrote a test for this scenario and you were right.
I've been trying out some different approaches and I can't find a better solution than something like this:
This generates all possible paths in the schema (the above doesn't handle arrays, but encryption on fields in arrays isn't supported so that's out of scope here). Not my first choice, because this feels brittle. I'll keep looking at it but
allPaths
exist somewhere?There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I don't think recursively checking all paths is necessary here because you just want to find conflicts in the top-level paths. So if discriminator schema has a path
pathname
with an encrypted field, and root schema has a nested path withrootSchema.nested[pathname.split('.')[0]]
, you can already call that a conflict and throw an error. Similarly, if discriminator schema has a nested pathpathname
but in root schema you haverootSchema.paths[pathname]
then you can also throw an error.There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Not necessarily, right? That would throw an error in scenarios where the child schema provides a subdocument with the same root path but doesn't modify the encrypted path. ex:
I'd expect this to be fine, because there isn't a conflicting path for
name.first
.