Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(server): request approval should publish the exact version #1291

Merged
merged 3 commits into from
Oct 30, 2024

Conversation

yk-eukarya
Copy link
Contributor

@yk-eukarya yk-eukarya commented Oct 29, 2024

Summary by CodeRabbit

  • New Features

    • Enhanced item management with the inclusion of the version field in item creation, retrieval, updating, and deletion functionalities.
    • Introduced a new function to update project details, including publication settings.
    • Added a comprehensive test function to validate the request flow for item management within projects.
  • Bug Fixes

    • Improved item update and deletion processes to ensure data integrity and prevent orphaned references.
  • Tests

    • Enhanced test suite with additional cases and improved error handling for item management operations.
    • Updated assertions to accurately reflect expected outcomes and added new test scenarios for edge cases.
    • Improved test coverage for request handling, including scenarios for finding requests by ID and project.
  • Documentation

    • Updated comments for clarity on changes related to backward compatibility in request handling.

@yk-eukarya yk-eukarya self-assigned this Oct 29, 2024
Copy link

coderabbitai bot commented Oct 29, 2024

Walkthrough

The changes in this pull request enhance the GraphQL API for item-related operations by modifying existing mutations and queries to include a version field. The updateItem, getItem, and SearchItem functions have been updated to return this field, improving data retrieval. Additionally, a new updateProject function has been introduced, allowing updates to project details with a focus on visibility settings. A new test function, TestRequestFlow, validates the overall request flow involving item versions. Modifications in the internal item and request handling ensure data integrity during updates and deletions.

Changes

File Path Change Summary
server/e2e/gql_item_test.go Updated updateItem, getItem, and SearchItem functions to include version in responses and queries. Added assertions in tests for the version field.
server/e2e/gql_model_test.go Updated updateModel function to include a new public parameter. Adjusted test function TestUpdateModel accordingly.
server/e2e/gql_porject_test.go Introduced updateProject function for updating project details with parameters for visibility. Added TestCreateProject for validating project creation.
server/e2e/gql_request_test.go Added TestRequestFlow to validate the request flow for creating, updating, and approving items within a public project and model.
server/internal/usecase/interactor/item.go Enhanced Update method to re-fetch the item after updates and modified Delete method to clear reference fields before deletion.
server/internal/usecase/interactor/request.go Modified Approve method to handle dist variable for backward compatibility, ensuring correct item reference updates.
server/internal/usecase/interactor/item_test.go Enhanced test suite with new cases and improved error handling, context management, and assertions for item operations.
server/internal/usecase/interactor/request_test.go Updated test cases for request handling with new scenarios and refined logic for clarity and correctness.

Possibly related PRs

  • refactor(server): geojson and csv export #1214: The changes in this PR involve modifications to item processing and error handling, which may relate to the overall item management improvements in the main PR, particularly in how items are created and updated.
  • fix(server): importing items when it contains id #1284: This PR focuses on fixing issues related to importing items, which aligns with the main PR's enhancements to item creation and retrieval functionalities, especially regarding the handling of item IDs.

Poem

🐇 In the realm of code where bunnies play,
New fields and functions hop into the fray.
With versions and projects, we dance and we sing,
Enhancing our API, oh what joy it brings!
So let’s celebrate with a joyful cheer,
For every new change brings us closer, my dear! 🐇


Thank you for using CodeRabbit. We offer it for free to the OSS community and would appreciate your support in helping us grow. If you find it useful, would you consider giving us a shout-out on your favorite social media?

❤️ Share
🪧 Tips

Chat

There are 3 ways to chat with CodeRabbit:

  • Review comments: Directly reply to a review comment made by CodeRabbit. Example:
    • I pushed a fix in commit <commit_id>, please review it.
    • Generate unit testing code for this file.
    • Open a follow-up GitHub issue for this discussion.
  • Files and specific lines of code (under the "Files changed" tab): Tag @coderabbitai in a new review comment at the desired location with your query. Examples:
    • @coderabbitai generate unit testing code for this file.
    • @coderabbitai modularize this function.
  • PR comments: Tag @coderabbitai in a new PR comment to ask questions about the PR branch. For the best results, please provide a very specific query, as very limited context is provided in this mode. Examples:
    • @coderabbitai gather interesting stats about this repository and render them as a table. Additionally, render a pie chart showing the language distribution in the codebase.
    • @coderabbitai read src/utils.ts and generate unit testing code.
    • @coderabbitai read the files in the src/scheduler package and generate a class diagram using mermaid and a README in the markdown format.
    • @coderabbitai help me debug CodeRabbit configuration file.

Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments.

CodeRabbit Commands (Invoked using PR comments)

  • @coderabbitai pause to pause the reviews on a PR.
  • @coderabbitai resume to resume the paused reviews.
  • @coderabbitai review to trigger an incremental review. This is useful when automatic reviews are disabled for the repository.
  • @coderabbitai full review to do a full review from scratch and review all the files again.
  • @coderabbitai summary to regenerate the summary of the PR.
  • @coderabbitai resolve resolve all the CodeRabbit review comments.
  • @coderabbitai configuration to show the current CodeRabbit configuration for the repository.
  • @coderabbitai help to get help.

Other keywords and placeholders

  • Add @coderabbitai ignore anywhere in the PR description to prevent this PR from being reviewed.
  • Add @coderabbitai summary to generate the high-level summary at a specific location in the PR description.
  • Add @coderabbitai anywhere in the PR title to generate the title automatically.

CodeRabbit Configuration File (.coderabbit.yaml)

  • You can programmatically configure CodeRabbit by adding a .coderabbit.yaml file to the root of your repository.
  • Please see the configuration documentation for more information.
  • If your editor has YAML language server enabled, you can add the path at the top of this file to enable auto-completion and validation: # yaml-language-server: $schema=https://coderabbit.ai/integrations/schema.v2.json

Documentation and Community

  • Visit our Documentation for detailed information on how to use CodeRabbit.
  • Join our Discord Community to get help, request features, and share feedback.
  • Follow us on X/Twitter for updates and announcements.

Copy link

netlify bot commented Oct 29, 2024

Deploy Preview for reearth-cms canceled.

Name Link
🔨 Latest commit c6b1600
🔍 Latest deploy log https://app.netlify.com/sites/reearth-cms/deploys/6721381a1c411400088bf35e

Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 2

🧹 Outside diff range and nitpick comments (7)
server/e2e/gql_porject_test.go (2)

Line range hint 1-1: Fix typo in filename: "porject" should be "project"

The filename contains a typo: gql_porject_test.go should be gql_project_test.go. This should be corrected to maintain code quality and searchability.


50-89: Implementation looks good, but consider adding input validation

The GraphQL mutation and HTTP request handling are well-structured and consistent with the existing patterns. However, consider adding input validation for the parameters before constructing the request.

Add parameter validation:

 func updateProject(e *httpexpect.Expect, pID, name, desc, alias, publicationScope string, publicAssets bool) (string, *httpexpect.Value) {
+    if e == nil {
+        panic("httpexpect instance is required")
+    }
+    if pID == "" {
+        panic("project ID is required")
+    }
+    if name == "" {
+        panic("name is required")
+    }
     requestBody := GraphQLRequest{
server/e2e/gql_model_test.go (1)

Line range hint 339-345: Consider enhancing test coverage for the public visibility feature.

The test only validates the basic update flow with public=false. Consider adding test cases to:

  1. Verify the behavior with public=true
  2. Assert the public field value in the response
  3. Test any specific business rules or constraints related to public visibility changes

Example enhancement:

 func TestUpdateModel(t *testing.T) {
     e := StartServer(t, &app.Config{}, true, baseSeederUser)
     pId, _ := createProject(e, wId.String(), "test", "test", "test-2")
     mId, _ := createModel(e, pId, "test", "test", "test-2")
 
-    res := updateModel(e, mId, lo.ToPtr("updated name"), lo.ToPtr("updated desc"), lo.ToPtr("updated_key"), false)
+    // Test private model update
+    res := updateModel(e, mId, lo.ToPtr("updated name"), lo.ToPtr("updated desc"), lo.ToPtr("updated_key"), false)
     res.Object().
         Value("data").Object().
         Value("updateModel").Object().
         Value("model").Object().
         HasValue("name", "updated name").
         HasValue("description", "updated desc").
-        HasValue("key", "updated_key")
+        HasValue("key", "updated_key").
+        HasValue("public", false)
+
+    // Test public model update
+    res = updateModel(e, mId, lo.ToPtr("public name"), lo.ToPtr("public desc"), lo.ToPtr("public_key"), true)
+    res.Object().
+        Value("data").Object().
+        Value("updateModel").Object().
+        Value("model").Object().
+        HasValue("name", "public name").
+        HasValue("description", "public desc").
+        HasValue("key", "public_key").
+        HasValue("public", true)
 }
server/e2e/gql_request_test.go (2)

319-355: Consider adding version number validation.

While the version management flow is well tested, consider adding explicit assertions to verify that version numbers are incremented correctly:

 ver1 := i1.Path("$.data.createItem.item.version").Raw().(string)
+// Verify version format and sequence
+if len(ver1) == 0 {
+    t.Errorf("Expected non-empty version for initial creation")
+}

 ver2 := i1.Path("$.data.updateItem.item.version").Raw().(string)
+if ver2 == ver1 {
+    t.Errorf("Expected version to change after update")
+}

301-425: Overall well-structured test with room for enhancement.

The TestRequestFlow function provides excellent coverage of the request approval workflow. To make it even more robust, consider:

  1. Extracting common setup code into helper functions
  2. Adding systematic status transition testing
  3. Including error case coverage
  4. Adding version number validation

The current implementation is approved, but these enhancements would improve test maintainability and coverage.

server/internal/usecase/interactor/item.go (1)

Line range hint 687-726: Fix event generation to use the latest item version.

The event is being generated with the old item version (itv) instead of the newly fetched version (itm). This could lead to inconsistencies in event data. Consider updating the WebhookObject to use the latest version:

 			WebhookObject: item.ItemModelSchema{
-				Item:            itv,
+				Item:            itm.Value(),
 				Model:           m,
 				Schema:          s,
 				GroupSchemas:    groupSchemas,
 				ReferencedItems: refItems,
-				Changes:         item.CompareFields(itv.Fields(), oldFields),
+				Changes:         item.CompareFields(itm.Value().Fields(), oldFields),
 			},
server/e2e/gql_item_test.go (1)

Line range hint 1-1000: Consider adding explicit version handling tests.

While the test suite is comprehensive for CRUD operations and search functionality, consider adding explicit test cases for version handling during request approval flow, which is the main objective of this PR.

Example scenarios to test:

  1. Version changes during item updates
  2. Version validation during request approval
  3. Error cases for version mismatch

Would you like me to help generate these additional test cases?

📜 Review details

Configuration used: CodeRabbit UI
Review profile: CHILL

📥 Commits

Files that changed from the base of the PR and between af0bd0d and 83c86ac.

📒 Files selected for processing (6)
  • server/e2e/gql_item_test.go (1 hunks)
  • server/e2e/gql_model_test.go (3 hunks)
  • server/e2e/gql_porject_test.go (1 hunks)
  • server/e2e/gql_request_test.go (1 hunks)
  • server/internal/usecase/interactor/item.go (1 hunks)
  • server/internal/usecase/interactor/request.go (1 hunks)
🔇 Additional comments (10)
server/e2e/gql_porject_test.go (1)

50-89: Clarify relationship to PR objective

The PR's objective is to fix request approval for publishing exact versions, but this function focuses on project updates and publication settings. Could you clarify how this change relates to the version publishing functionality?

Let's check for related version handling code:

✅ Verification successful

Let me gather more context about the relationship between project publication and version publishing.


Let me gather more specific information about the request approval and project publication relationship.


Based on the gathered information, I can now generate the final response:

Project publication settings are part of request approval flow

The project publication settings are indeed related to the version publishing functionality. When a request is approved, it publishes the version with respect to the project's publication scope (PUBLIC/LIMITED/PRIVATE). The test files show this relationship where project publication settings are configured before testing request approvals, and the version status changes to "PUBLIC" after approval.

🏁 Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Search for version-related mutations and approval logic
rg -A 5 'mutation.*[Vv]ersion|approve.*version|publish.*version' --type go

Length of output: 1015


Script:

#!/bin/bash
# Search for project publication and version publishing relationship
rg -A 10 'publication.*scope|publish.*version' --type go

# Also check for request approval related code
rg -A 10 'approve.*request|handle.*request' --type go

Length of output: 68187


Script:

#!/bin/bash
# Search for request approval and project publication related code in test files
rg -A 10 'TestRequest.*|test.*request.*approve' --type go server/e2e/

# Also check for project publication scope in implementation files
rg -A 10 'ProjectPublicationScope|publication.*scope' --type go server/internal/

Length of output: 18629

server/e2e/gql_model_test.go (2)

Line range hint 47-67: LGTM! Clean implementation of the public visibility parameter.

The function signature and GraphQL mutation are properly updated to handle the new public parameter, maintaining consistency with the existing test patterns.


Line range hint 47-67: Verify alignment with PR objectives.

The PR title mentions "request approval should publish the exact version", but the changes focus on adding public visibility control. Could you clarify how these changes relate to version publishing during request approval?

Let's check for related version handling code:

Also applies to: 339-345

server/internal/usecase/interactor/request.go (1)

282-287: Ensure version fallback doesn't mask underlying issues.

The changes correctly implement exact version publishing with a fallback mechanism. However, a few considerations:

  1. The fallback to Latest version, while maintaining backward compatibility, might mask underlying issues where dist is unexpectedly nil.
  2. There's a potential race condition if the Latest version changes between the nil check and the UpdateRef call.

Let's verify the impact and usage patterns:

Consider these improvements:

  1. Add logging when falling back to Latest version to track occurrences
  2. Consider deprecating the fallback behavior in future versions
  3. Add version comparison checks to prevent accidental downgrades

Would you like me to propose a more detailed implementation addressing these points?

✅ Verification successful

The search results show that UpdateRef is consistently used across the codebase with similar patterns, particularly in the item interactor and tests. The fallback to Latest version is also used in other parts of the codebase, notably in item.go. This indicates the fallback behavior is an established pattern, not an anomaly.

Let me verify one more aspect about version handling:


Based on the comprehensive search results, I can now provide a final response:

The fallback to Latest version is a well-established pattern and is safe to use

The code changes are correct and align with the existing patterns in the codebase:

  1. The fallback to version.Latest is consistently used across the codebase, particularly in item management and version control.
  2. The potential race condition concern is mitigated by the atomic nature of UpdateRef operations, as evidenced by the MongoDB implementation.
  3. The nil check for dist is a valid backward compatibility measure, as similar patterns are used in other parts of the codebase (e.g., in item.go and test files).
🏁 Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Search for patterns where item pointers are set to understand potential nil cases
ast-grep --pattern 'SetPointer($version)'

# Look for other version reference updates to ensure consistency
rg 'UpdateRef.*version\.' -A 3

Length of output: 3642


Script:

#!/bin/bash
# Check version pointer and reference handling patterns
ast-grep --pattern 'Pointer().Ref()'

# Look for version comparison logic
rg 'version\.Compare|version\.Latest' -A 2

Length of output: 19983

server/e2e/gql_request_test.go (1)

301-318: LGTM! Well-structured test setup with clear documentation.

The test setup is comprehensive and properly configures a public project and model with appropriate visibility settings.

server/internal/usecase/interactor/item.go (2)

681-686: LGTM! Important fix to ensure version consistency.

The added re-fetch operation is crucial as it ensures that the exact version of the item after the save operation is returned to the caller. This prevents potential version inconsistencies and aligns with the PR's objective of publishing exact versions.


681-685: Consider transaction rollback on re-fetch failure.

While the re-fetch operation is crucial, its failure could leave the system in an inconsistent state. Consider whether a transaction rollback would be appropriate if the re-fetch fails, as the caller would otherwise have no way to get the correct version of the saved item.

server/e2e/gql_item_test.go (3)

303-303: LGTM: Version field addition aligns with PR objective.

The addition of the version field to the GraphQL mutation response is consistent with the requirement to handle exact versions for request approvals.


Line range hint 1-1000: LGTM: Well-structured and comprehensive test suite.

The test suite demonstrates good practices:

  • Modular helper functions
  • Clear test scenarios
  • Comprehensive assertions
  • Good error case coverage

Line range hint 1-1000: Verify request approval implementation.

Let's verify the complete implementation of request approval with version handling.

✅ Verification successful

Let me gather more information about the version handling in request approval by checking the implementation details.


Let me check the GraphQL schema in a different location and look for version handling in request approval flow.


Let me check the request GraphQL schema and the complete request approval implementation.


Based on the gathered information, I can now provide a final response regarding the version handling in request approval.

Version handling is properly implemented in request approval flow

The implementation correctly handles versions through:

  • RequestItem type in GraphQL schema includes version: String field
  • Version information is preserved in request items during approval
  • Request state transitions are properly managed (DRAFT -> WAITING -> APPROVED)
🏁 Scripts executed

The following scripts were executed for the analysis:

Script:

#!/bin/bash
# Description: Check for request approval implementation with version handling

# Test: Search for request approval related files and functions
echo "Searching for request approval related files..."
rg -l "request.*approval|approve.*request" --type go

# Test: Search for version handling in request approval
echo "Searching for version handling in request approval..."
rg -A 5 "func.*[Aa]pprove.*Request" --type go

Length of output: 7302


Script:

#!/bin/bash
# Check request approval implementation details

# Look for version handling in request implementation
echo "Checking request implementation..."
rg -A 10 "type Request struct" server/internal/usecase/interactor/request.go

# Look for version field in request model
echo "Checking request model..."
rg -A 10 "type Request struct" server/pkg/request/request.go

# Look for version in GraphQL schema
echo "Checking GraphQL schema..."
rg "type Request" server/internal/adapter/gql/schema/*.graphql

Length of output: 967


Script:

#!/bin/bash
# Check request approval and version handling

# Look for GraphQL schema files
echo "Finding GraphQL schema files..."
fd "\.graphql$"

# Check request approval implementation details
echo "Checking request approval implementation..."
rg -A 15 "func \(r Request\) Approve" server/internal/usecase/interactor/request.go

# Check request state handling
echo "Checking request state handling..."
rg -A 5 "type State" server/pkg/request/request.go

Length of output: 1680


Script:

#!/bin/bash
# Check request schema and approval implementation

# Check request GraphQL schema
echo "Checking request GraphQL schema..."
cat server/schemas/request.graphql

# Check complete request approval implementation
echo "Checking complete request approval implementation..."
rg -A 30 "func \(r Request\) Approve" server/internal/usecase/interactor/request.go

# Check request state transitions
echo "Checking request state transitions..."
rg "Approve|state" server/pkg/request/request.go

Length of output: 3528

server/e2e/gql_request_test.go Show resolved Hide resolved
server/e2e/gql_request_test.go Show resolved Hide resolved
Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

📜 Review details

Configuration used: CodeRabbit UI
Review profile: CHILL

📥 Commits

Files that changed from the base of the PR and between 83c86ac and f5e18af.

📒 Files selected for processing (1)
  • server/internal/usecase/interactor/item_test.go (1 hunks)
🔇 Additional comments (1)
server/internal/usecase/interactor/item_test.go (1)

995-1006: LGTM! Proper test setup with error handling.

The test setup is thorough and follows a logical order with proper error handling for each database operation.

Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 0

🧹 Outside diff range and nitpick comments (3)
server/internal/usecase/interactor/request_test.go (3)

365-367: Remove or implement the commented error handling code.

The commented-out error handling code should either be implemented or removed to maintain code clarity.


368-375: Standardize error handling pattern.

Consider standardizing the error handling pattern. Currently, some errors are handled directly with assert.NoError while others are stored in a variable first. For consistency, prefer direct assertion:

-err := db.Project.Save(ctx, prj)
-assert.NoError(t, err)
+assert.NoError(t, db.Project.Save(ctx, prj))

355-355: Address TODO: Add error test cases.

The test currently only covers the success path. Consider adding test cases for:

  1. Invalid request ID
  2. Unauthorized user (non-reviewer)
  3. Invalid item version
  4. Database errors during approval

Would you like me to help generate these additional test cases?

📜 Review details

Configuration used: CodeRabbit UI
Review profile: CHILL

📥 Commits

Files that changed from the base of the PR and between f5e18af and c6b1600.

📒 Files selected for processing (1)
  • server/internal/usecase/interactor/request_test.go (1 hunks)
🔇 Additional comments (2)
server/internal/usecase/interactor/request_test.go (2)

356-362: LGTM: Well-structured test data initialization.

The test data setup follows a clear dependency chain and properly establishes the necessary entities for testing request approval.


377-387: LGTM: Explicit version handling ensures correct version publication.

The test now properly verifies that the exact version is published during request approval by:

  1. Explicitly retrieving the item version from the database
  2. Creating the request item with the specific version
  3. Verifying the published version after approval

This change aligns with the PR objective of ensuring exact versions are published during request approval.

@yk-eukarya yk-eukarya merged commit cae24f8 into main Oct 30, 2024
17 checks passed
@yk-eukarya yk-eukarya deleted the fix/request-versioning branch October 30, 2024 07:25
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant