799 lines
35 KiB
JavaScript
799 lines
35 KiB
JavaScript
"use strict";
|
|
var _a;
|
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
exports.ServerSessionPool = exports.ServerSession = exports.ClientSession = void 0;
|
|
exports.maybeClearPinnedConnection = maybeClearPinnedConnection;
|
|
exports.applySession = applySession;
|
|
exports.updateSessionFromResponse = updateSessionFromResponse;
|
|
const bson_1 = require("./bson");
|
|
const metrics_1 = require("./cmap/metrics");
|
|
const shared_1 = require("./cmap/wire_protocol/shared");
|
|
const constants_1 = require("./constants");
|
|
const error_1 = require("./error");
|
|
const mongo_types_1 = require("./mongo_types");
|
|
const execute_operation_1 = require("./operations/execute_operation");
|
|
const run_command_1 = require("./operations/run_command");
|
|
const read_concern_1 = require("./read_concern");
|
|
const read_preference_1 = require("./read_preference");
|
|
const resource_management_1 = require("./resource_management");
|
|
const common_1 = require("./sdam/common");
|
|
const transactions_1 = require("./transactions");
|
|
const utils_1 = require("./utils");
|
|
const write_concern_1 = require("./write_concern");
|
|
const minWireVersionForShardedTransactions = 8;
|
|
/** @internal */
|
|
const kServerSession = Symbol('serverSession');
|
|
/** @internal */
|
|
const kSnapshotTime = Symbol('snapshotTime');
|
|
/** @internal */
|
|
const kSnapshotEnabled = Symbol('snapshotEnabled');
|
|
/** @internal */
|
|
const kPinnedConnection = Symbol('pinnedConnection');
|
|
/** @internal Accumulates total number of increments to add to txnNumber when applying session to command */
|
|
const kTxnNumberIncrement = Symbol('txnNumberIncrement');
|
|
/**
|
|
* A class representing a client session on the server
|
|
*
|
|
* NOTE: not meant to be instantiated directly.
|
|
* @public
|
|
*/
|
|
class ClientSession extends mongo_types_1.TypedEventEmitter {
|
|
/**
|
|
* Create a client session.
|
|
* @internal
|
|
* @param client - The current client
|
|
* @param sessionPool - The server session pool (Internal Class)
|
|
* @param options - Optional settings
|
|
* @param clientOptions - Optional settings provided when creating a MongoClient
|
|
*/
|
|
constructor(client, sessionPool, options, clientOptions) {
|
|
super();
|
|
/** @internal */
|
|
this[_a] = false;
|
|
if (client == null) {
|
|
// TODO(NODE-3483)
|
|
throw new error_1.MongoRuntimeError('ClientSession requires a MongoClient');
|
|
}
|
|
if (sessionPool == null || !(sessionPool instanceof ServerSessionPool)) {
|
|
// TODO(NODE-3483)
|
|
throw new error_1.MongoRuntimeError('ClientSession requires a ServerSessionPool');
|
|
}
|
|
options = options ?? {};
|
|
if (options.snapshot === true) {
|
|
this[kSnapshotEnabled] = true;
|
|
if (options.causalConsistency === true) {
|
|
throw new error_1.MongoInvalidArgumentError('Properties "causalConsistency" and "snapshot" are mutually exclusive');
|
|
}
|
|
}
|
|
this.client = client;
|
|
this.sessionPool = sessionPool;
|
|
this.hasEnded = false;
|
|
this.clientOptions = clientOptions;
|
|
this.timeoutMS = options.defaultTimeoutMS ?? client.s.options?.timeoutMS;
|
|
this.explicit = !!options.explicit;
|
|
this[kServerSession] = this.explicit ? this.sessionPool.acquire() : null;
|
|
this[kTxnNumberIncrement] = 0;
|
|
const defaultCausalConsistencyValue = this.explicit && options.snapshot !== true;
|
|
this.supports = {
|
|
// if we can enable causal consistency, do so by default
|
|
causalConsistency: options.causalConsistency ?? defaultCausalConsistencyValue
|
|
};
|
|
this.clusterTime = options.initialClusterTime;
|
|
this.operationTime = undefined;
|
|
this.owner = options.owner;
|
|
this.defaultTransactionOptions = { ...options.defaultTransactionOptions };
|
|
this.transaction = new transactions_1.Transaction();
|
|
}
|
|
/** The server id associated with this session */
|
|
get id() {
|
|
return this[kServerSession]?.id;
|
|
}
|
|
get serverSession() {
|
|
let serverSession = this[kServerSession];
|
|
if (serverSession == null) {
|
|
if (this.explicit) {
|
|
throw new error_1.MongoRuntimeError('Unexpected null serverSession for an explicit session');
|
|
}
|
|
if (this.hasEnded) {
|
|
throw new error_1.MongoRuntimeError('Unexpected null serverSession for an ended implicit session');
|
|
}
|
|
serverSession = this.sessionPool.acquire();
|
|
this[kServerSession] = serverSession;
|
|
}
|
|
return serverSession;
|
|
}
|
|
/** Whether or not this session is configured for snapshot reads */
|
|
get snapshotEnabled() {
|
|
return this[kSnapshotEnabled];
|
|
}
|
|
get loadBalanced() {
|
|
return this.client.topology?.description.type === common_1.TopologyType.LoadBalanced;
|
|
}
|
|
/** @internal */
|
|
get pinnedConnection() {
|
|
return this[kPinnedConnection];
|
|
}
|
|
/** @internal */
|
|
pin(conn) {
|
|
if (this[kPinnedConnection]) {
|
|
throw TypeError('Cannot pin multiple connections to the same session');
|
|
}
|
|
this[kPinnedConnection] = conn;
|
|
conn.emit(constants_1.PINNED, this.inTransaction() ? metrics_1.ConnectionPoolMetrics.TXN : metrics_1.ConnectionPoolMetrics.CURSOR);
|
|
}
|
|
/** @internal */
|
|
unpin(options) {
|
|
if (this.loadBalanced) {
|
|
return maybeClearPinnedConnection(this, options);
|
|
}
|
|
this.transaction.unpinServer();
|
|
}
|
|
get isPinned() {
|
|
return this.loadBalanced ? !!this[kPinnedConnection] : this.transaction.isPinned;
|
|
}
|
|
/**
|
|
* Frees any client-side resources held by the current session. If a session is in a transaction,
|
|
* the transaction is aborted.
|
|
*
|
|
* Does not end the session on the server.
|
|
*
|
|
* @param options - Optional settings. Currently reserved for future use
|
|
*/
|
|
async endSession(options) {
|
|
try {
|
|
if (this.inTransaction()) {
|
|
await this.abortTransaction();
|
|
}
|
|
if (!this.hasEnded) {
|
|
const serverSession = this[kServerSession];
|
|
if (serverSession != null) {
|
|
// release the server session back to the pool
|
|
this.sessionPool.release(serverSession);
|
|
// Make sure a new serverSession never makes it onto this ClientSession
|
|
Object.defineProperty(this, kServerSession, {
|
|
value: ServerSession.clone(serverSession),
|
|
writable: false
|
|
});
|
|
}
|
|
// mark the session as ended, and emit a signal
|
|
this.hasEnded = true;
|
|
this.emit('ended', this);
|
|
}
|
|
}
|
|
catch (error) {
|
|
// spec indicates that we should ignore all errors for `endSessions`
|
|
(0, utils_1.squashError)(error);
|
|
}
|
|
finally {
|
|
maybeClearPinnedConnection(this, { force: true, ...options });
|
|
}
|
|
}
|
|
/** @internal */
|
|
async asyncDispose() {
|
|
await this.endSession({ force: true });
|
|
}
|
|
/**
|
|
* Advances the operationTime for a ClientSession.
|
|
*
|
|
* @param operationTime - the `BSON.Timestamp` of the operation type it is desired to advance to
|
|
*/
|
|
advanceOperationTime(operationTime) {
|
|
if (this.operationTime == null) {
|
|
this.operationTime = operationTime;
|
|
return;
|
|
}
|
|
if (operationTime.greaterThan(this.operationTime)) {
|
|
this.operationTime = operationTime;
|
|
}
|
|
}
|
|
/**
|
|
* Advances the clusterTime for a ClientSession to the provided clusterTime of another ClientSession
|
|
*
|
|
* @param clusterTime - the $clusterTime returned by the server from another session in the form of a document containing the `BSON.Timestamp` clusterTime and signature
|
|
*/
|
|
advanceClusterTime(clusterTime) {
|
|
if (!clusterTime || typeof clusterTime !== 'object') {
|
|
throw new error_1.MongoInvalidArgumentError('input cluster time must be an object');
|
|
}
|
|
if (!clusterTime.clusterTime || clusterTime.clusterTime._bsontype !== 'Timestamp') {
|
|
throw new error_1.MongoInvalidArgumentError('input cluster time "clusterTime" property must be a valid BSON Timestamp');
|
|
}
|
|
if (!clusterTime.signature ||
|
|
clusterTime.signature.hash?._bsontype !== 'Binary' ||
|
|
(typeof clusterTime.signature.keyId !== 'bigint' &&
|
|
typeof clusterTime.signature.keyId !== 'number' &&
|
|
clusterTime.signature.keyId?._bsontype !== 'Long') // apparently we decode the key to number?
|
|
) {
|
|
throw new error_1.MongoInvalidArgumentError('input cluster time must have a valid "signature" property with BSON Binary hash and BSON Long keyId');
|
|
}
|
|
(0, common_1._advanceClusterTime)(this, clusterTime);
|
|
}
|
|
/**
|
|
* Used to determine if this session equals another
|
|
*
|
|
* @param session - The session to compare to
|
|
*/
|
|
equals(session) {
|
|
if (!(session instanceof ClientSession)) {
|
|
return false;
|
|
}
|
|
if (this.id == null || session.id == null) {
|
|
return false;
|
|
}
|
|
return utils_1.ByteUtils.equals(this.id.id.buffer, session.id.id.buffer);
|
|
}
|
|
/**
|
|
* Increment the transaction number on the internal ServerSession
|
|
*
|
|
* @privateRemarks
|
|
* This helper increments a value stored on the client session that will be
|
|
* added to the serverSession's txnNumber upon applying it to a command.
|
|
* This is because the serverSession is lazily acquired after a connection is obtained
|
|
*/
|
|
incrementTransactionNumber() {
|
|
this[kTxnNumberIncrement] += 1;
|
|
}
|
|
/** @returns whether this session is currently in a transaction or not */
|
|
inTransaction() {
|
|
return this.transaction.isActive;
|
|
}
|
|
/**
|
|
* Starts a new transaction with the given options.
|
|
*
|
|
* @remarks
|
|
* **IMPORTANT**: Running operations in parallel is not supported during a transaction. The use of `Promise.all`,
|
|
* `Promise.allSettled`, `Promise.race`, etc to parallelize operations inside a transaction is
|
|
* undefined behaviour.
|
|
*
|
|
* @param options - Options for the transaction
|
|
*/
|
|
startTransaction(options) {
|
|
if (this[kSnapshotEnabled]) {
|
|
throw new error_1.MongoCompatibilityError('Transactions are not supported in snapshot sessions');
|
|
}
|
|
if (this.inTransaction()) {
|
|
throw new error_1.MongoTransactionError('Transaction already in progress');
|
|
}
|
|
if (this.isPinned && this.transaction.isCommitted) {
|
|
this.unpin();
|
|
}
|
|
const topologyMaxWireVersion = (0, utils_1.maxWireVersion)(this.client.topology);
|
|
if ((0, shared_1.isSharded)(this.client.topology) &&
|
|
topologyMaxWireVersion != null &&
|
|
topologyMaxWireVersion < minWireVersionForShardedTransactions) {
|
|
throw new error_1.MongoCompatibilityError('Transactions are not supported on sharded clusters in MongoDB < 4.2.');
|
|
}
|
|
this.commitAttempted = false;
|
|
// increment txnNumber
|
|
this.incrementTransactionNumber();
|
|
// create transaction state
|
|
this.transaction = new transactions_1.Transaction({
|
|
readConcern: options?.readConcern ??
|
|
this.defaultTransactionOptions.readConcern ??
|
|
this.clientOptions?.readConcern,
|
|
writeConcern: options?.writeConcern ??
|
|
this.defaultTransactionOptions.writeConcern ??
|
|
this.clientOptions?.writeConcern,
|
|
readPreference: options?.readPreference ??
|
|
this.defaultTransactionOptions.readPreference ??
|
|
this.clientOptions?.readPreference,
|
|
maxCommitTimeMS: options?.maxCommitTimeMS ?? this.defaultTransactionOptions.maxCommitTimeMS
|
|
});
|
|
this.transaction.transition(transactions_1.TxnState.STARTING_TRANSACTION);
|
|
}
|
|
/**
|
|
* Commits the currently active transaction in this session.
|
|
*/
|
|
async commitTransaction() {
|
|
if (this.transaction.state === transactions_1.TxnState.NO_TRANSACTION) {
|
|
throw new error_1.MongoTransactionError('No transaction started');
|
|
}
|
|
if (this.transaction.state === transactions_1.TxnState.STARTING_TRANSACTION ||
|
|
this.transaction.state === transactions_1.TxnState.TRANSACTION_COMMITTED_EMPTY) {
|
|
// the transaction was never started, we can safely exit here
|
|
this.transaction.transition(transactions_1.TxnState.TRANSACTION_COMMITTED_EMPTY);
|
|
return;
|
|
}
|
|
if (this.transaction.state === transactions_1.TxnState.TRANSACTION_ABORTED) {
|
|
throw new error_1.MongoTransactionError('Cannot call commitTransaction after calling abortTransaction');
|
|
}
|
|
const command = { commitTransaction: 1 };
|
|
const wc = this.transaction.options.writeConcern ?? this.clientOptions?.writeConcern;
|
|
if (wc != null) {
|
|
write_concern_1.WriteConcern.apply(command, { wtimeoutMS: 10000, w: 'majority', ...wc });
|
|
}
|
|
if (this.transaction.state === transactions_1.TxnState.TRANSACTION_COMMITTED || this.commitAttempted) {
|
|
write_concern_1.WriteConcern.apply(command, { wtimeoutMS: 10000, ...wc, w: 'majority' });
|
|
}
|
|
if (typeof this.transaction.options.maxTimeMS === 'number') {
|
|
command.maxTimeMS = this.transaction.options.maxTimeMS;
|
|
}
|
|
if (this.transaction.recoveryToken) {
|
|
command.recoveryToken = this.transaction.recoveryToken;
|
|
}
|
|
const operation = new run_command_1.RunAdminCommandOperation(command, {
|
|
session: this,
|
|
readPreference: read_preference_1.ReadPreference.primary,
|
|
bypassPinningCheck: true
|
|
});
|
|
try {
|
|
await (0, execute_operation_1.executeOperation)(this.client, operation);
|
|
this.commitAttempted = undefined;
|
|
return;
|
|
}
|
|
catch (firstCommitError) {
|
|
this.commitAttempted = true;
|
|
if (firstCommitError instanceof error_1.MongoError && (0, error_1.isRetryableWriteError)(firstCommitError)) {
|
|
// SPEC-1185: apply majority write concern when retrying commitTransaction
|
|
write_concern_1.WriteConcern.apply(command, { wtimeoutMS: 10000, ...wc, w: 'majority' });
|
|
// per txns spec, must unpin session in this case
|
|
this.unpin({ force: true });
|
|
try {
|
|
await (0, execute_operation_1.executeOperation)(this.client, new run_command_1.RunAdminCommandOperation(command, {
|
|
session: this,
|
|
readPreference: read_preference_1.ReadPreference.primary,
|
|
bypassPinningCheck: true
|
|
}));
|
|
return;
|
|
}
|
|
catch (retryCommitError) {
|
|
// If the retry failed, we process that error instead of the original
|
|
if (shouldAddUnknownTransactionCommitResultLabel(retryCommitError)) {
|
|
retryCommitError.addErrorLabel(error_1.MongoErrorLabel.UnknownTransactionCommitResult);
|
|
}
|
|
if (shouldUnpinAfterCommitError(retryCommitError)) {
|
|
this.unpin({ error: retryCommitError });
|
|
}
|
|
throw retryCommitError;
|
|
}
|
|
}
|
|
if (shouldAddUnknownTransactionCommitResultLabel(firstCommitError)) {
|
|
firstCommitError.addErrorLabel(error_1.MongoErrorLabel.UnknownTransactionCommitResult);
|
|
}
|
|
if (shouldUnpinAfterCommitError(firstCommitError)) {
|
|
this.unpin({ error: firstCommitError });
|
|
}
|
|
throw firstCommitError;
|
|
}
|
|
finally {
|
|
this.transaction.transition(transactions_1.TxnState.TRANSACTION_COMMITTED);
|
|
}
|
|
}
|
|
/**
|
|
* Aborts the currently active transaction in this session.
|
|
*/
|
|
async abortTransaction() {
|
|
if (this.transaction.state === transactions_1.TxnState.NO_TRANSACTION) {
|
|
throw new error_1.MongoTransactionError('No transaction started');
|
|
}
|
|
if (this.transaction.state === transactions_1.TxnState.STARTING_TRANSACTION) {
|
|
// the transaction was never started, we can safely exit here
|
|
this.transaction.transition(transactions_1.TxnState.TRANSACTION_ABORTED);
|
|
return;
|
|
}
|
|
if (this.transaction.state === transactions_1.TxnState.TRANSACTION_ABORTED) {
|
|
throw new error_1.MongoTransactionError('Cannot call abortTransaction twice');
|
|
}
|
|
if (this.transaction.state === transactions_1.TxnState.TRANSACTION_COMMITTED ||
|
|
this.transaction.state === transactions_1.TxnState.TRANSACTION_COMMITTED_EMPTY) {
|
|
throw new error_1.MongoTransactionError('Cannot call abortTransaction after calling commitTransaction');
|
|
}
|
|
const command = { abortTransaction: 1 };
|
|
const wc = this.transaction.options.writeConcern ?? this.clientOptions?.writeConcern;
|
|
if (wc != null) {
|
|
write_concern_1.WriteConcern.apply(command, { wtimeoutMS: 10000, w: 'majority', ...wc });
|
|
}
|
|
if (this.transaction.recoveryToken) {
|
|
command.recoveryToken = this.transaction.recoveryToken;
|
|
}
|
|
const operation = new run_command_1.RunAdminCommandOperation(command, {
|
|
session: this,
|
|
readPreference: read_preference_1.ReadPreference.primary,
|
|
bypassPinningCheck: true
|
|
});
|
|
try {
|
|
await (0, execute_operation_1.executeOperation)(this.client, operation);
|
|
this.unpin();
|
|
return;
|
|
}
|
|
catch (firstAbortError) {
|
|
this.unpin();
|
|
if (firstAbortError instanceof error_1.MongoError && (0, error_1.isRetryableWriteError)(firstAbortError)) {
|
|
try {
|
|
await (0, execute_operation_1.executeOperation)(this.client, operation);
|
|
return;
|
|
}
|
|
catch {
|
|
// we do not retry the retry
|
|
}
|
|
}
|
|
// The spec indicates that if the operation times out or fails with a non-retryable error, we should ignore all errors on `abortTransaction`
|
|
}
|
|
finally {
|
|
this.transaction.transition(transactions_1.TxnState.TRANSACTION_ABORTED);
|
|
if (this.loadBalanced) {
|
|
maybeClearPinnedConnection(this, { force: false });
|
|
}
|
|
}
|
|
}
|
|
/**
|
|
* This is here to ensure that ClientSession is never serialized to BSON.
|
|
*/
|
|
toBSON() {
|
|
throw new error_1.MongoRuntimeError('ClientSession cannot be serialized to BSON.');
|
|
}
|
|
/**
|
|
* Starts a transaction and runs a provided function, ensuring the commitTransaction is always attempted when all operations run in the function have completed.
|
|
*
|
|
* **IMPORTANT:** This method requires the function passed in to return a Promise. That promise must be made by `await`-ing all operations in such a way that rejections are propagated to the returned promise.
|
|
*
|
|
* **IMPORTANT:** Running operations in parallel is not supported during a transaction. The use of `Promise.all`,
|
|
* `Promise.allSettled`, `Promise.race`, etc to parallelize operations inside a transaction is
|
|
* undefined behaviour.
|
|
*
|
|
*
|
|
* @remarks
|
|
* - If all operations successfully complete and the `commitTransaction` operation is successful, then the provided function will return the result of the provided function.
|
|
* - If the transaction is unable to complete or an error is thrown from within the provided function, then the provided function will throw an error.
|
|
* - If the transaction is manually aborted within the provided function it will not throw.
|
|
* - If the driver needs to attempt to retry the operations, the provided function may be called multiple times.
|
|
*
|
|
* Checkout a descriptive example here:
|
|
* @see https://www.mongodb.com/blog/post/quick-start-nodejs--mongodb--how-to-implement-transactions
|
|
*
|
|
* If a command inside withTransaction fails:
|
|
* - It may cause the transaction on the server to be aborted.
|
|
* - This situation is normally handled transparently by the driver.
|
|
* - However, if the application catches such an error and does not rethrow it, the driver will not be able to determine whether the transaction was aborted or not.
|
|
* - The driver will then retry the transaction indefinitely.
|
|
*
|
|
* To avoid this situation, the application must not silently handle errors within the provided function.
|
|
* If the application needs to handle errors within, it must await all operations such that if an operation is rejected it becomes the rejection of the callback function passed into withTransaction.
|
|
*
|
|
* @param fn - callback to run within a transaction
|
|
* @param options - optional settings for the transaction
|
|
* @returns A raw command response or undefined
|
|
*/
|
|
async withTransaction(fn, options) {
|
|
const MAX_TIMEOUT = 120000;
|
|
const startTime = (0, utils_1.now)();
|
|
let committed = false;
|
|
let result;
|
|
while (!committed) {
|
|
this.startTransaction(options); // may throw on error
|
|
try {
|
|
const promise = fn(this);
|
|
if (!(0, utils_1.isPromiseLike)(promise)) {
|
|
throw new error_1.MongoInvalidArgumentError('Function provided to `withTransaction` must return a Promise');
|
|
}
|
|
result = await promise;
|
|
if (this.transaction.state === transactions_1.TxnState.NO_TRANSACTION ||
|
|
this.transaction.state === transactions_1.TxnState.TRANSACTION_COMMITTED ||
|
|
this.transaction.state === transactions_1.TxnState.TRANSACTION_ABORTED) {
|
|
// Assume callback intentionally ended the transaction
|
|
return result;
|
|
}
|
|
}
|
|
catch (fnError) {
|
|
if (!(fnError instanceof error_1.MongoError) || fnError instanceof error_1.MongoInvalidArgumentError) {
|
|
await this.abortTransaction();
|
|
throw fnError;
|
|
}
|
|
if (this.transaction.state === transactions_1.TxnState.STARTING_TRANSACTION ||
|
|
this.transaction.state === transactions_1.TxnState.TRANSACTION_IN_PROGRESS) {
|
|
await this.abortTransaction();
|
|
}
|
|
if (fnError.hasErrorLabel(error_1.MongoErrorLabel.TransientTransactionError) &&
|
|
(0, utils_1.now)() - startTime < MAX_TIMEOUT) {
|
|
continue;
|
|
}
|
|
throw fnError;
|
|
}
|
|
while (!committed) {
|
|
try {
|
|
/*
|
|
* We will rely on ClientSession.commitTransaction() to
|
|
* apply a majority write concern if commitTransaction is
|
|
* being retried (see: DRIVERS-601)
|
|
*/
|
|
await this.commitTransaction();
|
|
committed = true;
|
|
}
|
|
catch (commitError) {
|
|
/*
|
|
* Note: a maxTimeMS error will have the MaxTimeMSExpired
|
|
* code (50) and can be reported as a top-level error or
|
|
* inside writeConcernError, ex.
|
|
* { ok:0, code: 50, codeName: 'MaxTimeMSExpired' }
|
|
* { ok:1, writeConcernError: { code: 50, codeName: 'MaxTimeMSExpired' } }
|
|
*/
|
|
if (!isMaxTimeMSExpiredError(commitError) &&
|
|
commitError.hasErrorLabel(error_1.MongoErrorLabel.UnknownTransactionCommitResult) &&
|
|
(0, utils_1.now)() - startTime < MAX_TIMEOUT) {
|
|
continue;
|
|
}
|
|
if (commitError.hasErrorLabel(error_1.MongoErrorLabel.TransientTransactionError) &&
|
|
(0, utils_1.now)() - startTime < MAX_TIMEOUT) {
|
|
break;
|
|
}
|
|
throw commitError;
|
|
}
|
|
}
|
|
}
|
|
return result;
|
|
}
|
|
}
|
|
exports.ClientSession = ClientSession;
|
|
_a = kSnapshotEnabled;
|
|
(0, resource_management_1.configureResourceManagement)(ClientSession.prototype);
|
|
const NON_DETERMINISTIC_WRITE_CONCERN_ERRORS = new Set([
|
|
'CannotSatisfyWriteConcern',
|
|
'UnknownReplWriteConcern',
|
|
'UnsatisfiableWriteConcern'
|
|
]);
|
|
function shouldUnpinAfterCommitError(commitError) {
|
|
if (commitError instanceof error_1.MongoError) {
|
|
if ((0, error_1.isRetryableWriteError)(commitError) ||
|
|
commitError instanceof error_1.MongoWriteConcernError ||
|
|
isMaxTimeMSExpiredError(commitError)) {
|
|
if (isUnknownTransactionCommitResult(commitError)) {
|
|
// per txns spec, must unpin session in this case
|
|
return true;
|
|
}
|
|
}
|
|
else if (commitError.hasErrorLabel(error_1.MongoErrorLabel.TransientTransactionError)) {
|
|
return true;
|
|
}
|
|
}
|
|
return false;
|
|
}
|
|
function shouldAddUnknownTransactionCommitResultLabel(commitError) {
|
|
let ok = (0, error_1.isRetryableWriteError)(commitError);
|
|
ok ||= commitError instanceof error_1.MongoWriteConcernError;
|
|
ok ||= isMaxTimeMSExpiredError(commitError);
|
|
ok &&= isUnknownTransactionCommitResult(commitError);
|
|
return ok;
|
|
}
|
|
function isUnknownTransactionCommitResult(err) {
|
|
const isNonDeterministicWriteConcernError = err instanceof error_1.MongoServerError &&
|
|
err.codeName &&
|
|
NON_DETERMINISTIC_WRITE_CONCERN_ERRORS.has(err.codeName);
|
|
return (isMaxTimeMSExpiredError(err) ||
|
|
(!isNonDeterministicWriteConcernError &&
|
|
err.code !== error_1.MONGODB_ERROR_CODES.UnsatisfiableWriteConcern &&
|
|
err.code !== error_1.MONGODB_ERROR_CODES.UnknownReplWriteConcern));
|
|
}
|
|
function maybeClearPinnedConnection(session, options) {
|
|
// unpin a connection if it has been pinned
|
|
const conn = session[kPinnedConnection];
|
|
const error = options?.error;
|
|
if (session.inTransaction() &&
|
|
error &&
|
|
error instanceof error_1.MongoError &&
|
|
error.hasErrorLabel(error_1.MongoErrorLabel.TransientTransactionError)) {
|
|
return;
|
|
}
|
|
const topology = session.client.topology;
|
|
// NOTE: the spec talks about what to do on a network error only, but the tests seem to
|
|
// to validate that we don't unpin on _all_ errors?
|
|
if (conn && topology != null) {
|
|
const servers = Array.from(topology.s.servers.values());
|
|
const loadBalancer = servers[0];
|
|
if (options?.error == null || options?.force) {
|
|
loadBalancer.pool.checkIn(conn);
|
|
session[kPinnedConnection] = undefined;
|
|
conn.emit(constants_1.UNPINNED, session.transaction.state !== transactions_1.TxnState.NO_TRANSACTION
|
|
? metrics_1.ConnectionPoolMetrics.TXN
|
|
: metrics_1.ConnectionPoolMetrics.CURSOR);
|
|
if (options?.forceClear) {
|
|
loadBalancer.pool.clear({ serviceId: conn.serviceId });
|
|
}
|
|
}
|
|
}
|
|
}
|
|
function isMaxTimeMSExpiredError(err) {
|
|
if (err == null || !(err instanceof error_1.MongoServerError)) {
|
|
return false;
|
|
}
|
|
return (err.code === error_1.MONGODB_ERROR_CODES.MaxTimeMSExpired ||
|
|
err.writeConcernError?.code === error_1.MONGODB_ERROR_CODES.MaxTimeMSExpired);
|
|
}
|
|
/**
|
|
* Reflects the existence of a session on the server. Can be reused by the session pool.
|
|
* WARNING: not meant to be instantiated directly. For internal use only.
|
|
* @public
|
|
*/
|
|
class ServerSession {
|
|
/** @internal */
|
|
constructor() {
|
|
this.id = { id: new bson_1.Binary((0, utils_1.uuidV4)(), bson_1.Binary.SUBTYPE_UUID) };
|
|
this.lastUse = (0, utils_1.now)();
|
|
this.txnNumber = 0;
|
|
this.isDirty = false;
|
|
}
|
|
/**
|
|
* Determines if the server session has timed out.
|
|
*
|
|
* @param sessionTimeoutMinutes - The server's "logicalSessionTimeoutMinutes"
|
|
*/
|
|
hasTimedOut(sessionTimeoutMinutes) {
|
|
// Take the difference of the lastUse timestamp and now, which will result in a value in
|
|
// milliseconds, and then convert milliseconds to minutes to compare to `sessionTimeoutMinutes`
|
|
const idleTimeMinutes = Math.round((((0, utils_1.calculateDurationInMs)(this.lastUse) % 86400000) % 3600000) / 60000);
|
|
return idleTimeMinutes > sessionTimeoutMinutes - 1;
|
|
}
|
|
/**
|
|
* @internal
|
|
* Cloning meant to keep a readable reference to the server session data
|
|
* after ClientSession has ended
|
|
*/
|
|
static clone(serverSession) {
|
|
const arrayBuffer = new ArrayBuffer(16);
|
|
const idBytes = Buffer.from(arrayBuffer);
|
|
idBytes.set(serverSession.id.id.buffer);
|
|
const id = new bson_1.Binary(idBytes, serverSession.id.id.sub_type);
|
|
// Manual prototype construction to avoid modifying the constructor of this class
|
|
return Object.setPrototypeOf({
|
|
id: { id },
|
|
lastUse: serverSession.lastUse,
|
|
txnNumber: serverSession.txnNumber,
|
|
isDirty: serverSession.isDirty
|
|
}, ServerSession.prototype);
|
|
}
|
|
}
|
|
exports.ServerSession = ServerSession;
|
|
/**
|
|
* Maintains a pool of Server Sessions.
|
|
* For internal use only
|
|
* @internal
|
|
*/
|
|
class ServerSessionPool {
|
|
constructor(client) {
|
|
if (client == null) {
|
|
throw new error_1.MongoRuntimeError('ServerSessionPool requires a MongoClient');
|
|
}
|
|
this.client = client;
|
|
this.sessions = new utils_1.List();
|
|
}
|
|
/**
|
|
* Acquire a Server Session from the pool.
|
|
* Iterates through each session in the pool, removing any stale sessions
|
|
* along the way. The first non-stale session found is removed from the
|
|
* pool and returned. If no non-stale session is found, a new ServerSession is created.
|
|
*/
|
|
acquire() {
|
|
const sessionTimeoutMinutes = this.client.topology?.logicalSessionTimeoutMinutes ?? 10;
|
|
let session = null;
|
|
// Try to obtain from session pool
|
|
while (this.sessions.length > 0) {
|
|
const potentialSession = this.sessions.shift();
|
|
if (potentialSession != null &&
|
|
(!!this.client.topology?.loadBalanced ||
|
|
!potentialSession.hasTimedOut(sessionTimeoutMinutes))) {
|
|
session = potentialSession;
|
|
break;
|
|
}
|
|
}
|
|
// If nothing valid came from the pool make a new one
|
|
if (session == null) {
|
|
session = new ServerSession();
|
|
}
|
|
return session;
|
|
}
|
|
/**
|
|
* Release a session to the session pool
|
|
* Adds the session back to the session pool if the session has not timed out yet.
|
|
* This method also removes any stale sessions from the pool.
|
|
*
|
|
* @param session - The session to release to the pool
|
|
*/
|
|
release(session) {
|
|
const sessionTimeoutMinutes = this.client.topology?.logicalSessionTimeoutMinutes ?? 10;
|
|
if (this.client.topology?.loadBalanced && !sessionTimeoutMinutes) {
|
|
this.sessions.unshift(session);
|
|
}
|
|
if (!sessionTimeoutMinutes) {
|
|
return;
|
|
}
|
|
this.sessions.prune(session => session.hasTimedOut(sessionTimeoutMinutes));
|
|
if (!session.hasTimedOut(sessionTimeoutMinutes)) {
|
|
if (session.isDirty) {
|
|
return;
|
|
}
|
|
// otherwise, readd this session to the session pool
|
|
this.sessions.unshift(session);
|
|
}
|
|
}
|
|
}
|
|
exports.ServerSessionPool = ServerSessionPool;
|
|
/**
|
|
* Optionally decorate a command with sessions specific keys
|
|
*
|
|
* @param session - the session tracking transaction state
|
|
* @param command - the command to decorate
|
|
* @param options - Optional settings passed to calling operation
|
|
*
|
|
* @internal
|
|
*/
|
|
function applySession(session, command, options) {
|
|
if (session.hasEnded) {
|
|
return new error_1.MongoExpiredSessionError();
|
|
}
|
|
// May acquire serverSession here
|
|
const serverSession = session.serverSession;
|
|
if (serverSession == null) {
|
|
return new error_1.MongoRuntimeError('Unable to acquire server session');
|
|
}
|
|
if (options.writeConcern?.w === 0) {
|
|
if (session && session.explicit) {
|
|
// Error if user provided an explicit session to an unacknowledged write (SPEC-1019)
|
|
return new error_1.MongoAPIError('Cannot have explicit session with unacknowledged writes');
|
|
}
|
|
return;
|
|
}
|
|
// mark the last use of this session, and apply the `lsid`
|
|
serverSession.lastUse = (0, utils_1.now)();
|
|
command.lsid = serverSession.id;
|
|
const inTxnOrTxnCommand = session.inTransaction() || (0, transactions_1.isTransactionCommand)(command);
|
|
const isRetryableWrite = !!options.willRetryWrite;
|
|
if (isRetryableWrite || inTxnOrTxnCommand) {
|
|
serverSession.txnNumber += session[kTxnNumberIncrement];
|
|
session[kTxnNumberIncrement] = 0;
|
|
// TODO(NODE-2674): Preserve int64 sent from MongoDB
|
|
command.txnNumber = bson_1.Long.fromNumber(serverSession.txnNumber);
|
|
}
|
|
if (!inTxnOrTxnCommand) {
|
|
if (session.transaction.state !== transactions_1.TxnState.NO_TRANSACTION) {
|
|
session.transaction.transition(transactions_1.TxnState.NO_TRANSACTION);
|
|
}
|
|
if (session.supports.causalConsistency &&
|
|
session.operationTime &&
|
|
(0, utils_1.commandSupportsReadConcern)(command)) {
|
|
command.readConcern = command.readConcern || {};
|
|
Object.assign(command.readConcern, { afterClusterTime: session.operationTime });
|
|
}
|
|
else if (session[kSnapshotEnabled]) {
|
|
command.readConcern = command.readConcern || { level: read_concern_1.ReadConcernLevel.snapshot };
|
|
if (session[kSnapshotTime] != null) {
|
|
Object.assign(command.readConcern, { atClusterTime: session[kSnapshotTime] });
|
|
}
|
|
}
|
|
return;
|
|
}
|
|
// now attempt to apply transaction-specific sessions data
|
|
// `autocommit` must always be false to differentiate from retryable writes
|
|
command.autocommit = false;
|
|
if (session.transaction.state === transactions_1.TxnState.STARTING_TRANSACTION) {
|
|
session.transaction.transition(transactions_1.TxnState.TRANSACTION_IN_PROGRESS);
|
|
command.startTransaction = true;
|
|
const readConcern = session.transaction.options.readConcern || session?.clientOptions?.readConcern;
|
|
if (readConcern) {
|
|
command.readConcern = readConcern;
|
|
}
|
|
if (session.supports.causalConsistency && session.operationTime) {
|
|
command.readConcern = command.readConcern || {};
|
|
Object.assign(command.readConcern, { afterClusterTime: session.operationTime });
|
|
}
|
|
}
|
|
return;
|
|
}
|
|
function updateSessionFromResponse(session, document) {
|
|
if (document.$clusterTime) {
|
|
(0, common_1._advanceClusterTime)(session, document.$clusterTime);
|
|
}
|
|
if (document.operationTime && session && session.supports.causalConsistency) {
|
|
session.advanceOperationTime(document.operationTime);
|
|
}
|
|
if (document.recoveryToken && session && session.inTransaction()) {
|
|
session.transaction._recoveryToken = document.recoveryToken;
|
|
}
|
|
if (session?.[kSnapshotEnabled] && session[kSnapshotTime] == null) {
|
|
// find and aggregate commands return atClusterTime on the cursor
|
|
// distinct includes it in the response body
|
|
const atClusterTime = document.atClusterTime;
|
|
if (atClusterTime) {
|
|
session[kSnapshotTime] = atClusterTime;
|
|
}
|
|
}
|
|
}
|
|
//# sourceMappingURL=sessions.js.map
|