fix: phishing detector validation to drop invalid configs from detector #4820
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Explanation
We need to ensure that only valid configurations are processed by the phishing detector. Currently, if one configuration fails validation, it causes all configurations to fail, preventing the detector from receiving updates.
The validation process needs to be updated so that invalid configurations are filtered out, while valid configurations are still passed to the detector.
Solution:
The
processConfigs
function has been introduced to:validateConfig
function.This ensures that any configuration passed to the phishing detector is both valid and properly formatted. Invalid configurations are logged and discarded.
References
Changelog
@metamask/phishing-controller
processConfigs
function to filter and validate phishing detector configurations, discarding invalid ones.detector
when validation failed on any one config, invalid configurations are now logged via console.error and skipped.Checklist