Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix management API validation path casing #18771

Open
wants to merge 2 commits into
base: v15/dev
Choose a base branch
from

Conversation

Migaroez
Copy link
Contributor

@Migaroez Migaroez commented Mar 24, 2025

Prerequisites

Fixes #16926

Description

This PR aims to align the custom complex (nested) validation messages with the default MVC attribute ones. It does it by adding a ValidationMetaDataProvider that only updates ValidationModelName if it believes the context is inside the management api.
This way, other uses of MVC (rendering, implementor controllers, ...) should not be affected

Because these validation path segments that we modify are cached by the MVC framework and we can't guarantee that a certain class will not be used as both a top level and sub level model, I don't see a way to add the leading $. It was agreed with the front-end that they will add this on their end.

Testing

See the linked issue for the happy flow, but please do try to break this.

@Migaroez Migaroez requested review from AndyButland and kjac March 24, 2025 09:35
Copy link
Contributor

@AndyButland AndyButland left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This looks good to me. I've tested it out locally verifying that it's updating the casing of these properties, and, as you've implemented it, it seems to be sufficiently tightly constrained to the management API models.

=> typeof(ManagementApiControllerBase).IsAssignableFrom(type);

public static bool IsManagementApiViewModel(this Type type)
=> type.Namespace?.StartsWith("Umbraco.Cms.Api.Management.ViewModels") is true;
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I haven't tested this, but if I'm reading the code correctly, this effectively means any custom APIs would not yield the same error casing as core ones?

We've made some efforts to enable parity between custom APIs and core APIs - for example offering to apply the same schema and operation IDs. I wonder if we really want to exclude custom APIs from this casing fix?

Copy link
Contributor Author

@Migaroez Migaroez Mar 25, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

That is correct, but I do not see a way of gracefully handling this within our logic besides relying on an attribute on the (custom) models or using some kind of inheritance.

Or do you want to including something similar to

public class SampleSchemaIdHandler : SchemaIdHandler
{
    public override bool CanHandle(Type type)
        => type.Namespace == "UmbracoDocs.Samples";
}

and then in ManagementApiSystemTextJsonValidationMetadataProvider.CreateValidationMetadata() loop over all Handlers (not what I would call it) to see if any specify that type should be process as if it were a management api model?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Having mulled this over a little bit more, I would actually expect the validation casing to be (forcefully) applied to my API if I've explicitly built on top of the ManagementApiControllerBase - this would ensure consistency in error handling for any Management API consumers?

Copy link
Contributor Author

@Migaroez Migaroez Mar 25, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I agree. Sadly you can not reliably get this information from every class/property/context that flows trough that method, at least not according to my experimentation and understanding of the docs.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants