Always enforce basefield and entity-level constraints

Created on 27 January 2017, about 8 years ago
Updated 7 February 2023, about 2 years ago

We have a fantastic entity validation system in D8 and are only leveraging it in content entity form submissions. This ensures that entities created through the UI are valid, but leaves programmatically created entities out in the cold.

I therefore suggest we always validate the base fields and entity level constraints, but not the manually added fields (Field UI). The reasoning behind this is twofold:

  1. The constraints are there for a reason. A module is allowed to make assumptions based on them. For instance, the user module has the right to assume no user shares their e-mail address with another user. This is currently possible because we do not enforce constraints, see πŸ“Œ Change the database schema for the User entity and add a unique key for the email Closed: won't fix .
  2. ContentEntityForm does not validate hidden fields because there is no way the user could fix those to begin with. Following that logic we could choose not to care about site-specific fields that have been added to the entity, as your code may not know about those. There is always the choice of manually invoking the validation for those fields in your glue code.

I suggest we always throw an exception when base field or entity validation fails, passing in the violation's human readable message. This way, you are sure your site won't break because of some poorly written code adding malformed entities to the database.

πŸ“Œ Task
Status

Active

Version

10.1 ✨

Component
EntityΒ  β†’

Last updated 3 days ago

Created by

πŸ‡§πŸ‡ͺBelgium kristiaanvandeneynde Antwerp, Belgium

Live updates comments and jobs are added and updated live.
Sign in to follow issues

Comments & Activities

Not all content is available!

It's likely this issue predates Contrib.social: some issue and comment data are missing.

  • First commit to issue fork.
  • @jonathanshaw opened merge request.
  • πŸ‡¬πŸ‡§United Kingdom jonathanshaw Stroud, UK

    This came up for consideration as a BugSmash Initiative issue of the day, but I suggest it's better to consider it a major task. It's an architectural design decision, not a bug, and changing it would have the potential for significant disruption.

    That said, it also seems perfectly achievable to do this. We already have the FieldableEntityInterface::setValidationRequired() method, and we can begin by throwing a deprecation if an invalid entity is saved without explicit opt-in.

    Let's see how many tests that breaks.

  • πŸ‡¬πŸ‡§United Kingdom jonathanshaw Stroud, UK

    The user module creates an anonymous user when it is installed, but that user has no username and so is invalid; fixed with ->setValidationRequired(FALSE).

  • πŸ‡¬πŸ‡§United Kingdom jonathanshaw Stroud, UK

    OK, so doing this is moderately disruptive.

    1. A lot of tests would need updating because test code often creates entities programatically in a fairly sloppy way. The entities are invalid not because they need to be to serve thes test logic, but because no one has really noticed and it doesn;t matter for the test. For example, test users created without an email address. We can use ->setValidationRequired(FALSE) to fix this for existing tests, but future tests will benefit from the encouragement to create properly valid entities, as valid entities are a more typical representation of production situations.

    2. Some core validators are access sensitive! ValidPath consraint is one clear example I've looked into, but the test failures here suggest others. If a validator is access sensitive it is likely to cause a validation failure unexpectedly when saving an entity outside of a form submission. I think we need to clarify that validators should not consider the current user, they need to validate the entity in its own terms independent of any context. Otherwise if the context changes, the entity becomes invalid and no longer saveable.

    Do we want to proceed in this direction?

  • πŸ‡ΊπŸ‡ΈUnited States bradjones1 Digital Nomad Life
  • πŸ‡§πŸ‡ͺBelgium kristiaanvandeneynde Antwerp, Belgium

    Just chiming in to say thanks for working on this

  • πŸ‡¬πŸ‡§United Kingdom jonathanshaw Stroud, UK

    Some core validators are access sensitive! ReferenceAccessConstraint, ValidPathConstraint and ModerationStateConstraint are clear examples

    I think the correct solution is to support Symfony's validation groups. This would actually be remarkably easy because we have most of the code to support it anyway in the TypedData system, and Symfony expects validation groups to be provided when defining constraints as a possible value in the options array that we already support.

    What we would simply need to is:

    1. Change the internals of RecursiveContextualValidator to pass the $groups parameter from RecursiveContextualValidator::validate(..., $groups) through to TypedDataMetadata::findConstraints($group).

    2. Change the internal of TypedDataMetadata::findConstraints($group) to filter constraints by group.

    3. Either add to EntityInterface and EntityBase a new method addValidationRequired($group), or change the parameters of EntityInterface::setValidationRequired() to receive an array instead of or in addition to a boolean.

    4. Change the internals of EntityBase::validationRequired and EntityBase::validate() to store the groups that require validation in EntityBase::validationRequired and pass that along to TypedData::validate() so that it can pass it to RecursiveContextualValidator::validate().

    5. In ContentEntityForm::buildEntity() invoke our new $entity->addValidationRequired('form');

    To ensure that the valid path constraint which is sensitive to the current user's access permissions only runs when a form is submitted, the developer would do this:

        $fields['path'] = BaseFieldDefinition::create('string')
          ->addPropertyConstraints('value', [
            'ValidPath' => [
              'groups' => ['form']
            ]]);
    
Production build 0.71.5 2024