"use strict"; Object.defineProperty(exports, "__esModule", { value: true }); exports.CreateCollectionOperation = void 0; const collection_1 = require("../collection"); const command_1 = require("./command"); const indexes_1 = require("./indexes"); const operation_1 = require("./operation"); const ILLEGAL_COMMAND_FIELDS = new Set([ 'w', 'wtimeout', 'j', 'fsync', 'autoIndexId', 'pkFactory', 'raw', 'readPreference', 'session', 'readConcern', 'writeConcern', 'raw', 'fieldsAsRaw', 'promoteLongs', 'promoteValues', 'promoteBuffers', 'bsonRegExp', 'serializeFunctions', 'ignoreUndefined', 'enableUtf8Validation' ]); /** @internal */ class CreateCollectionOperation extends command_1.CommandOperation { constructor(db, name, options = {}) { super(db, options); this.options = options; this.db = db; this.name = name; } execute(server, session, callback) { (async () => { var _a, _b, _c, _d, _e, _f; const db = this.db; const name = this.name; const options = this.options; const encryptedFields = (_a = options.encryptedFields) !== null && _a !== void 0 ? _a : (_c = (_b = db.s.client.options.autoEncryption) === null || _b === void 0 ? void 0 : _b.encryptedFieldsMap) === null || _c === void 0 ? void 0 : _c[`${db.databaseName}.${name}`]; if (encryptedFields) { // Create auxilliary collections for queryable encryption support. const escCollection = (_d = encryptedFields.escCollection) !== null && _d !== void 0 ? _d : `enxcol_.${name}.esc`; const eccCollection = (_e = encryptedFields.eccCollection) !== null && _e !== void 0 ? _e : `enxcol_.${name}.ecc`; const ecocCollection = (_f = encryptedFields.ecocCollection) !== null && _f !== void 0 ? _f : `enxcol_.${name}.ecoc`; for (const collectionName of [escCollection, eccCollection, ecocCollection]) { const createOp = new CreateCollectionOperation(db, collectionName, { clusteredIndex: { key: { _id: 1 }, unique: true } }); await createOp.executeWithoutEncryptedFieldsCheck(server, session); } if (!options.encryptedFields) { this.options = { ...this.options, encryptedFields }; } } const coll = await this.executeWithoutEncryptedFieldsCheck(server, session); if (encryptedFields) { // Create the required index for queryable encryption support. const createIndexOp = new indexes_1.CreateIndexOperation(db, name, { __safeContent__: 1 }, {}); await new Promise((resolve, reject) => { createIndexOp.execute(server, session, err => (err ? reject(err) : resolve())); }); } return coll; })().then(coll => callback(undefined, coll), err => callback(err)); } executeWithoutEncryptedFieldsCheck(server, session) { return new Promise((resolve, reject) => { const db = this.db; const name = this.name; const options = this.options; const done = err => { if (err) { return reject(err); } resolve(new collection_1.Collection(db, name, options)); }; const cmd = { create: name }; for (const n in options) { if (options[n] != null && typeof options[n] !== 'function' && !ILLEGAL_COMMAND_FIELDS.has(n)) { cmd[n] = options[n]; } } // otherwise just execute the command super.executeCommand(server, session, cmd, done); }); } } exports.CreateCollectionOperation = CreateCollectionOperation; (0, operation_1.defineAspects)(CreateCollectionOperation, [operation_1.Aspect.WRITE_OPERATION]); //# sourceMappingURL=create_collection.js.map