Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore: validate config to node-utils package #17720

Merged
merged 2 commits into from
Mar 19, 2025

Conversation

karliatto
Copy link
Member

@karliatto karliatto commented Mar 17, 2025

Description

In preparation for creating releases json schema this would be useful in order to avoid duplicated code since we will have to validate the new schema for releases messages.

@karliatto karliatto requested a review from mroz22 March 17, 2025 17:54
Copy link

coderabbitai bot commented Mar 17, 2025

Walkthrough

The changes introduce a new JSON schema validation utility and update its usage across two packages. In the @trezor/node-utils package, a new dependency, ajv, is added to support JSON schema validation. A new function, validateJsonSchema, is implemented to validate configuration against a schema using the Ajv library. This function is exported and is accompanied by a new Jest-based test suite that verifies its functionality through two test cases. In parallel, the suite-common/message-system package removes its direct dependency on Ajv and refactors its configuration validation logic. Instead of handling validation internally, it now utilizes the shared validateJsonSchema function from the @trezor/node-utils package, simplifying the validation process.

Tip

⚡🧪 Multi-step agentic review comment chat (experimental)
  • We're introducing multi-step agentic chat in review comments. This experimental feature enhances review discussions with the CodeRabbit agentic chat by enabling advanced interactions, including the ability to create pull requests directly from comments.
    - To enable this feature, set early_access to true under in the settings.
✨ Finishing Touches
  • 📝 Generate Docstrings

🪧 Tips

Chat

There are 3 ways to chat with CodeRabbit:

  • Review comments: Directly reply to a review comment made by CodeRabbit. Example:
    • I pushed a fix in commit <commit_id>, please review it.
    • Generate unit testing code for this file.
    • Open a follow-up GitHub issue for this discussion.
  • Files and specific lines of code (under the "Files changed" tab): Tag @coderabbitai in a new review comment at the desired location with your query. Examples:
    • @coderabbitai generate unit testing code for this file.
    • @coderabbitai modularize this function.
  • PR comments: Tag @coderabbitai in a new PR comment to ask questions about the PR branch. For the best results, please provide a very specific query, as very limited context is provided in this mode. Examples:
    • @coderabbitai gather interesting stats about this repository and render them as a table. Additionally, render a pie chart showing the language distribution in the codebase.
    • @coderabbitai read src/utils.ts and generate unit testing code.
    • @coderabbitai read the files in the src/scheduler package and generate a class diagram using mermaid and a README in the markdown format.
    • @coderabbitai help me debug CodeRabbit configuration file.

Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments.

CodeRabbit Commands (Invoked using PR comments)

  • @coderabbitai pause to pause the reviews on a PR.
  • @coderabbitai resume to resume the paused reviews.
  • @coderabbitai review to trigger an incremental review. This is useful when automatic reviews are disabled for the repository.
  • @coderabbitai full review to do a full review from scratch and review all the files again.
  • @coderabbitai summary to regenerate the summary of the PR.
  • @coderabbitai generate docstrings to generate docstrings for this PR.
  • @coderabbitai resolve resolve all the CodeRabbit review comments.
  • @coderabbitai configuration to show the current CodeRabbit configuration for the repository.
  • @coderabbitai help to get help.

Other keywords and placeholders

  • Add @coderabbitai ignore anywhere in the PR description to prevent this PR from being reviewed.
  • Add @coderabbitai summary to generate the high-level summary at a specific location in the PR description.
  • Add @coderabbitai anywhere in the PR title to generate the title automatically.

CodeRabbit Configuration File (.coderabbit.yaml)

  • You can programmatically configure CodeRabbit by adding a .coderabbit.yaml file to the root of your repository.
  • Please see the configuration documentation for more information.
  • If your editor has YAML language server enabled, you can add the path at the top of this file to enable auto-completion and validation: # yaml-language-server: $schema=https://coderabbit.ai/integrations/schema.v2.json

Documentation and Community

  • Visit our Documentation for detailed information on how to use CodeRabbit.
  • Join our Discord Community to get help, request features, and share feedback.
  • Follow us on X/Twitter for updates and announcements.

Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 0

🧹 Nitpick comments (3)
packages/node-utils/src/tests/validateJsonSchema.test.ts (2)

16-26: Consider more robust path matching in mock implementation.

The current implementation checks if paths end with specific filenames, which could be fragile if paths contain these strings elsewhere.

-            if (path.endsWith('config.json')) {
+            if (path === 'path/to/config.json') {
                 return config;
             }
-            if (path.endsWith('schema.json')) {
+            if (path === 'path/to/schema.json') {
                 return schema;
             }

32-48: Expand test coverage for error conditions.

The current tests cover valid and invalid config scenarios, but consider adding tests for:

  1. File reading errors
  2. JSON parsing errors
  3. Schema compilation errors

These would ensure full coverage of the validation function's behavior.

Example additional test:

it('should throw an error when file cannot be read', () => {
    (fs.readFileSync as jest.Mock).mockImplementation(() => {
        throw new Error('ENOENT: no such file or directory');
    });

    expect(() => 
        validateJsonSchema('nonexistent/config.json', 'nonexistent/schema.json')
    ).toThrow('ENOENT: no such file or directory');
});

it('should throw an error when config contains invalid JSON', () => {
    setupMockFileRead('{invalid-json}', mockSchema);

    expect(() => 
        validateJsonSchema('path/to/config.json', 'path/to/schema.json')
    ).toThrow(/Invalid JSON/);
});
packages/node-utils/src/validateJsonSchema.ts (1)

1-17: Consider enhancing error handling and performance.

The implementation is functional but could be improved in a few ways:

  1. The synchronous file reading operations (readFileSync) could block the event loop. Consider using async/await with fs.promises for better performance in high-concurrency scenarios.

  2. There's no specific error handling for file operations or JSON parsing failures, which might make debugging difficult.

  3. Consider adding Ajv options like allErrors: true to get more comprehensive validation results.

  4. Include file paths in the error message to help with debugging.

 import Ajv from 'ajv';
-import * as fs from 'fs';
+import * as fs from 'fs/promises';

 // checks that a config meets the criteria specified by the schema
-export const validateJsonSchema = (configPath: string, schemaPath: string) => {
-    const ajv = new Ajv();
+export const validateJsonSchema = async (configPath: string, schemaPath: string) => {
+    const ajv = new Ajv({ allErrors: true });

-    const config = fs.readFileSync(configPath, 'utf-8');
-    const schema = fs.readFileSync(schemaPath, 'utf-8');
+    try {
+        const [configContent, schemaContent] = await Promise.all([
+            fs.readFile(configPath, 'utf-8'),
+            fs.readFile(schemaPath, 'utf-8'),
+        ]);
+        
+        let parsedConfig, parsedSchema;
+        try {
+            parsedConfig = JSON.parse(configContent);
+            parsedSchema = JSON.parse(schemaContent);
+        } catch (e) {
+            throw new Error(`Invalid JSON: ${(e as Error).message}`);
+        }

-    const validate = ajv.compile(JSON.parse(schema));
-    const isValid = validate(JSON.parse(config));
+        const validate = ajv.compile(parsedSchema);
+        const isValid = validate(parsedConfig);

-    if (!isValid) {
-        throw Error(`Config is invalid: ${JSON.stringify(validate.errors)}`);
-    }
+        if (!isValid) {
+            throw new Error(`Config at "${configPath}" is invalid: ${JSON.stringify(validate.errors)}`);
+        }
+    } catch (error) {
+        if (error instanceof Error) {
+            throw new Error(`Validation failed: ${error.message}`);
+        }
+        throw error;
+    }
};

If you need to maintain synchronous API compatibility, consider offering both sync and async versions:

// Synchronous version (for backward compatibility)
export const validateJsonSchema = (configPath: string, schemaPath: string) => {
    // Current implementation
};

// Async version (recommended for new code)
export const validateJsonSchemaAsync = async (configPath: string, schemaPath: string) => {
    // Async implementation
};
📜 Review details

Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between f02c591 and bd73718.

⛔ Files ignored due to path filters (1)
  • yarn.lock is excluded by !**/yarn.lock, !**/*.lock
📒 Files selected for processing (6)
  • packages/node-utils/package.json (1 hunks)
  • packages/node-utils/src/index.ts (1 hunks)
  • packages/node-utils/src/tests/validateJsonSchema.test.ts (1 hunks)
  • packages/node-utils/src/validateJsonSchema.ts (1 hunks)
  • suite-common/message-system/package.json (0 hunks)
  • suite-common/message-system/scripts/validate-config.ts (1 hunks)
💤 Files with no reviewable changes (1)
  • suite-common/message-system/package.json
⏰ Context from checks skipped due to timeout of 90000ms (10)
  • GitHub Check: PR-check / node-authorizeCoinjoin cancelCoinjoinAuthorization passphrase unlockPath setBusy checkFirmwareAuthenticity keepSession cancel.test info.test resetDevice-api
  • GitHub Check: PR-check / web-override init-api-flaky
  • GitHub Check: PR-check / node-override init-api-flaky
  • GitHub Check: PR-check / web-authorizeCoinjoin cancelCoinjoinAuthorization passphrase unlockPath setBusy checkFirmwareAuthenticity keepSession cancel.test info.test resetDevice-api
  • GitHub Check: build-deploy
  • GitHub Check: EAS Update
  • GitHub Check: transport-e2e-test
  • GitHub Check: Socket Security: Pull Request Alerts
  • GitHub Check: Analyze with CodeQL (javascript)
  • GitHub Check: build-web
🔇 Additional comments (4)
packages/node-utils/src/tests/validateJsonSchema.test.ts (1)

6-14: Well-structured test setup with clear mock data.

The test provides good mock data and structure for validating the core functionality.

suite-common/message-system/scripts/validate-config.ts (1)

2-12: Clean refactoring that reduces code duplication.

The code has been effectively refactored to use the shared validateJsonSchema utility from the @trezor/node-utils package, which aligns perfectly with the PR objectives. This change centralizes the validation logic, making it easier to maintain and update in the future.

One small suggestion: Consider adding a process.exit(1) in the catch block to ensure the script exits with a non-zero status code when validation fails. This would be helpful for CI/CD pipelines that need to detect validation failures.

} catch (error) {
    console.error(error.message);
+   process.exit(1);
}
packages/node-utils/src/index.ts (1)

15-15: Export looks good.

The export of validateJsonSchema follows the established pattern in this file and makes the utility function available to other modules.

packages/node-utils/package.json (1)

15-16: Ajv dependency added correctly.

Adding Ajv as a dependency is appropriate for implementing JSON schema validation functionality. The version specification uses proper semver notation.

Copy link

github-actions bot commented Mar 17, 2025

🚀 Expo preview is ready!

  • Project → trezor-suite-preview
  • Platforms → android, ios
  • Scheme → trezorsuitelite
  • Runtime Version → 26
  • More info

Learn more about 𝝠 Expo Github Action

@karliatto karliatto added the no-project This label is used to specify that PR doesn't need to be added to a project label Mar 18, 2025
@karliatto karliatto force-pushed the feat/validate-config-to-utils branch from bd73718 to eec8fb9 Compare March 18, 2025 08:22
@karliatto karliatto changed the title Feat/validate config to utils chore: validate config to node-utils package Mar 18, 2025
Copy link
Contributor

@mroz22 mroz22 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't like very much that validateJsonSchema util does 2 things at once - reading from fs + validation. So I would suggest refactoring it

@karliatto karliatto force-pushed the feat/validate-config-to-utils branch from eec8fb9 to 27a68e4 Compare March 18, 2025 13:17
@karliatto
Copy link
Member Author

I don't like very much that validateJsonSchema util does 2 things at once - reading from fs + validation. So I would suggest refactoring it

I agree 💯 % with you so I updated it to do only one thing 0ae0797#diff-6973949d0de6a51e54a8442d9b8014f177c4af917978bac4bfd497d8d4cff1b3

Thanks 🙏

Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

🧹 Nitpick comments (4)
packages/node-utils/src/validateJsonSchema.ts (4)

4-8: Consider reusing the Ajv instance for better performance.

Creating a new Ajv instance for each validation call could impact performance if this function is called frequently.

You could create a singleton Ajv instance or accept an optional Ajv instance parameter:

+const defaultAjv = new Ajv();
+
-export const validateJsonSchema = (config: string, schema: string) => {
-    const ajv = new Ajv();
+export const validateJsonSchema = (config: string, schema: string, ajv = defaultAjv) => {

    const validate = ajv.compile(JSON.parse(schema));
    const isValid = validate(JSON.parse(config));

5-5: Consider configuring Ajv with appropriate options.

The current implementation uses Ajv with default settings, but you might want to enable specific features based on your validation requirements.

-    const ajv = new Ajv();
+    const ajv = new Ajv({
+        allErrors: true,      // Return all errors, not just the first one
+        strict: true,         // Enable strict mode
+        // Add any other options relevant to your use case
+    });

3-4: Improve function documentation with JSDoc.

While there is a comment explaining the function, a more detailed JSDoc would provide better documentation, especially for IDE users.

-// checks that a config meets the criteria specified by the schema
+/**
+ * Validates a JSON configuration string against a JSON schema string
+ * @param {string} config - JSON string containing the configuration to validate
+ * @param {string} schema - JSON string containing the schema definition
+ * @throws {Error} Throws an error if the config doesn't conform to the schema
+ * or if either input is not valid JSON
+ */
export const validateJsonSchema = (config: string, schema: string) => {

10-12: Consider providing more structured error reporting.

The current implementation includes the validation errors as a JSON string in the error message, which is informative but might be difficult to parse programmatically.

Consider creating a custom error class to provide more structured error information:

+class ValidationError extends Error {
+    constructor(public errors: any[]) {
+        super(`Config is invalid: ${JSON.stringify(errors)}`);
+        this.name = 'ValidationError';
+    }
+}

export const validateJsonSchema = (config: string, schema: string) => {
    // ...
    if (!isValid) {
-        throw Error(`Config is invalid: ${JSON.stringify(validate.errors)}`);
+        throw new ValidationError(validate.errors);
    }
};
📜 Review details

Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between eec8fb9 and 27a68e4.

⛔ Files ignored due to path filters (1)
  • yarn.lock is excluded by !**/yarn.lock, !**/*.lock
📒 Files selected for processing (6)
  • packages/node-utils/package.json (1 hunks)
  • packages/node-utils/src/index.ts (1 hunks)
  • packages/node-utils/src/tests/validateJsonSchema.test.ts (1 hunks)
  • packages/node-utils/src/validateJsonSchema.ts (1 hunks)
  • suite-common/message-system/package.json (0 hunks)
  • suite-common/message-system/scripts/validate-config.ts (1 hunks)
💤 Files with no reviewable changes (1)
  • suite-common/message-system/package.json
🚧 Files skipped from review as they are similar to previous changes (4)
  • packages/node-utils/src/index.ts
  • packages/node-utils/package.json
  • packages/node-utils/src/tests/validateJsonSchema.test.ts
  • suite-common/message-system/scripts/validate-config.ts
🧰 Additional context used
🧬 Code Definitions (1)
packages/node-utils/src/validateJsonSchema.ts (1)
packages/node-utils/src/index.ts (1) (1)
  • validateJsonSchema (15:15)
⏰ Context from checks skipped due to timeout of 90000ms (14)
  • GitHub Check: PR-check / node-authorizeCoinjoin cancelCoinjoinAuthorization passphrase unlockPath setBusy checkFirmwareAuthenticity keepSession cancel.test info.test resetDevice-api
  • GitHub Check: PR-check / web-override init-api-flaky
  • GitHub Check: PR-check / node-override init-api-flaky
  • GitHub Check: PR-check / web-authorizeCoinjoin cancelCoinjoinAuthorization passphrase unlockPath setBusy checkFirmwareAuthenticity keepSession cancel.test info.test resetDevice-api
  • GitHub Check: build-deploy
  • GitHub Check: build-deploy
  • GitHub Check: EAS Update
  • GitHub Check: transport-e2e-test
  • GitHub Check: prepare_android_test_app
  • GitHub Check: Setup and Cache Dependencies
  • GitHub Check: build-web
  • GitHub Check: test
  • GitHub Check: Analyze with CodeQL (javascript)
  • GitHub Check: Socket Security: Pull Request Alerts


validateConfigStructure();
} catch (error) {
console.error(error.message);
Copy link
Contributor

@mroz22 mroz22 Mar 18, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

btw wasnt it supposed to throw before?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes, you are right. I add it to rethrow here below.

@karliatto karliatto force-pushed the feat/validate-config-to-utils branch from 27a68e4 to 540aaa8 Compare March 18, 2025 14:22
@karliatto karliatto force-pushed the feat/validate-config-to-utils branch from 540aaa8 to 260a329 Compare March 18, 2025 14:41
Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 0

🧹 Nitpick comments (4)
packages/node-utils/src/validateJsonSchema.ts (4)

1-5: Consider passing options to Ajv for more flexible validation.

The current implementation creates an Ajv instance with default settings. For more robust validation, consider passing the { allErrors: true } option to collect all validation errors rather than stopping at the first one.

export const validateJsonSchema = (config: string, schema: string) => {
-    const ajv = new Ajv();
+    const ajv = new Ajv({ allErrors: true });

4-28: Consider accepting parsed objects as an alternative input format.

Currently, the function only accepts strings that must be parsed. For improved flexibility and performance, consider modifying the function to accept either strings or pre-parsed objects.

- export const validateJsonSchema = (config: string, schema: string) => {
+ export const validateJsonSchema = (
+    config: string | Record<string, unknown>,
+    schema: string | Record<string, unknown>
+ ) => {
    const ajv = new Ajv({ allErrors: true });

    let parsedConfig;
    let parsedSchema;

-    try {
-        parsedConfig = JSON.parse(config);
-    } catch (err) {
-        throw Error(`Invalid config JSON format: ${err.message}`);
-    }
+    if (typeof config === 'string') {
+        try {
+            parsedConfig = JSON.parse(config);
+        } catch (err) {
+            throw Error(`Invalid config JSON format: ${err.message}`);
+        }
+    } else {
+        parsedConfig = config;
+    }

-    try {
-        parsedSchema = JSON.parse(schema);
-    } catch (err) {
-        throw Error(`Invalid schema JSON format: ${err.message}`);
-    }
+    if (typeof schema === 'string') {
+        try {
+            parsedSchema = JSON.parse(schema);
+        } catch (err) {
+            throw Error(`Invalid schema JSON format: ${err.message}`);
+        }
+    } else {
+        parsedSchema = schema;
+    }

    const validate = ajv.compile(parsedSchema);
    const isValid = validate(parsedConfig);

    if (!isValid) {
        throw Error(`Config is invalid: ${JSON.stringify(validate.errors)}`);
    }
};

7-20: Swap the order of parsing operations for more logical error handling.

The current implementation parses the config before parsing the schema. Since the schema is a prerequisite for validation, it would be more logical to validate the schema first, so that any issues with the schema are reported before attempting to parse the config.

let parsedConfig;
let parsedSchema;

try {
-    parsedConfig = JSON.parse(config);
+    parsedSchema = JSON.parse(schema);
} catch (err) {
-    throw Error(`Invalid config JSON format: ${err.message}`);
+    throw Error(`Invalid schema JSON format: ${err.message}`);
}

try {
-    parsedSchema = JSON.parse(schema);
+    parsedConfig = JSON.parse(config);
} catch (err) {
-    throw Error(`Invalid schema JSON format: ${err.message}`);
+    throw Error(`Invalid config JSON format: ${err.message}`);
}

25-27: Add more user-friendly error reporting.

The current error message includes the raw validation errors in JSON format, which might be hard to read. Consider formatting the errors in a more user-friendly way, especially for complex validation failures.

if (!isValid) {
-    throw Error(`Config is invalid: ${JSON.stringify(validate.errors)}`);
+    const errorMessages = validate.errors?.map(err => 
+        `${err.instancePath} ${err.message}`
+    ).join('\n  - ');
+    throw Error(`Config validation failed:\n  - ${errorMessages}`);
}
📜 Review details

Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between 540aaa8 and 260a329.

⛔ Files ignored due to path filters (1)
  • yarn.lock is excluded by !**/yarn.lock, !**/*.lock
📒 Files selected for processing (6)
  • packages/node-utils/package.json (1 hunks)
  • packages/node-utils/src/index.ts (1 hunks)
  • packages/node-utils/src/tests/validateJsonSchema.test.ts (1 hunks)
  • packages/node-utils/src/validateJsonSchema.ts (1 hunks)
  • suite-common/message-system/package.json (0 hunks)
  • suite-common/message-system/scripts/validate-config.ts (1 hunks)
💤 Files with no reviewable changes (1)
  • suite-common/message-system/package.json
🚧 Files skipped from review as they are similar to previous changes (4)
  • packages/node-utils/src/index.ts
  • packages/node-utils/package.json
  • packages/node-utils/src/tests/validateJsonSchema.test.ts
  • suite-common/message-system/scripts/validate-config.ts
⏰ Context from checks skipped due to timeout of 90000ms (13)
  • GitHub Check: PR-check / node-authorizeCoinjoin cancelCoinjoinAuthorization passphrase unlockPath setBusy checkFirmwareAuthenticity keepSession cancel.test info.test resetDevice-api
  • GitHub Check: PR-check / node-override init-api-flaky
  • GitHub Check: PR-check / web-authorizeCoinjoin cancelCoinjoinAuthorization passphrase unlockPath setBusy checkFirmwareAuthenticity keepSession cancel.test info.test resetDevice-api
  • GitHub Check: PR-check / web-override init-api-flaky
  • GitHub Check: build-deploy
  • GitHub Check: build-deploy
  • GitHub Check: prepare_android_test_app
  • GitHub Check: EAS Update
  • GitHub Check: transport-e2e-test
  • GitHub Check: Analyze with CodeQL (javascript)
  • GitHub Check: build-web
  • GitHub Check: test
  • GitHub Check: Socket Security: Pull Request Alerts

@karliatto karliatto merged commit 796044f into develop Mar 19, 2025
74 checks passed
@karliatto karliatto deleted the feat/validate-config-to-utils branch March 19, 2025 09:21
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
no-project This label is used to specify that PR doesn't need to be added to a project
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants