Skip to content

Conversation

@BobDickinson
Copy link
Contributor

Added schema validation and support for exhaustive and more detailed validation to existing validators. Added new mcp-publisher validate command. No change to any existing tests or behavior other than the new command.

Motivation and Context

Many currently published servers fail schema validation. Of those that pass, many have semantic/logical errors or other errors that make them impossible to configure, or their configuration when applied doesn't generate correct MCP server configuration (per their own documentation).

To address this, we need better tooling to validate servers and to inform server publishers of errors, issues, and best practices in a way that is clear and actionable, both during server development and at time of publishing.

I have started a discussion about the broader topic: #635

There is also a fairly detailed document describing the design, architecture, implementation, future plans, etc. See Enhanced Validation Design

This PR is the first step in the process of improving validation. It adds schema validation and updates all existing validators to use a new model that allows them to track context and return rich and exhaustive results. This has been done in a way that is backward compatible (ValidateServerJSON is unchanged as are all existing validation unit tests).

There is a new mcp-publisher command called validate that is currenty the only place that schema validation and enhanced (exhaustive/rich) validation results are exposed.

Changes

Internal Validation improvements

  • Schema validation has been implemented and is available as an option in validation methods (defaults to off)
  • Existing validators track the JSON path (context) of the attribute they're evaluating, passing it to any child validators
  • Existing validators are exhaustive (return all issues, not failing fast on the first error)
  • Existing validators return rich validation results, including:
    • type (schema, semantic, linter)
    • severity (error, warn, info)
    • path (JSON path to server.json element)
    • reference (to the schema element or rule that triggered the result)
    • message (currently the same as previous error message)

A new validate command has been added to mcp-publisher so publishers can evaluate their server.json before publishing

  • Includes new schema validation and previous semantic validation
  • Shows full details of all issues encountered during validation

Usage

Given a server.json that looks like this:

{
  "$schema": "https://static.modelcontextprotocol.io/schemas/2025-09-29/server.schema.json",
  "name": "io.github.BobDickinson/registry",
  "description": "An MCP server that provides [describe what your server does]",
  "repository": {
    "url": "",
    "source": ""
  },
  "version": "=1.0.0",
  "packages": [
    {
      "registryType": "oci",
      "registryBaseUrl": "https://docker.io",
      "identifier": "registry",
      "version": "1.0.0",
      "transport": {
        "type": "sse"
      },
      "packageArguments": [
        {
          "type": "named",
          "name": "--mode",
          "description": "Operation mode",
          "format": "foo"
        }
      ],
      "environmentVariables": [
        {
          "description": "Your API key for the service",
          "isRequired": true,
          "format": "string",
          "isSecret": true,
          "name": "YOUR_API_KEY"
        }
      ]
    }
  ]
}

Run the command:

mcp-publisher validate server.json

Which will produce the output:

❌ Validation failed with 5 issue(s):

1. [error] packages.0.packageArguments.0.format (schema)
   value must be one of "string", "number", "boolean", "filepath"
   Reference: #/definitions/Input/properties/format/enum from: [#/definitions/ServerDetail]/properties/packages/items/[#/definitions/Package]/properties/packageArguments/items/[#/definitions/Argument]/else/[#/definitions/NamedArgument]/allOf/0/[#/definitions/InputWithVariables]/allOf/0/[#/definitions/Input]/properties/format/enum

2. [error] packages.0.transport (schema)
   missing required fields: 'url'
   Reference: #/definitions/SseTransport/required from: [#/definitions/ServerDetail]/properties/packages/items/[#/definitions/Package]/properties/transport/else/else/[#/definitions/SseTransport]/required

3. [error] repository.url (schema)
   '' has invalid format 'uri'
   Reference: #/definitions/Repository/properties/url/format from: [#/definitions/ServerDetail]/properties/repository/[#/definitions/Repository]/properties/url/format

4. [error] version (semantic)
   version must be a specific version, not a range: "=1.0.0"
   Reference: version-looks-like-range

5. [error] packages[0].transport.url (semantic)
   url is required for sse transport type
   Reference: streamable-transport-url-required

Error: validation failed

Note in the results above:

  • All errors contain the JSON path of the triggering element from server.json.
  • The first three errors are schema errors detected during schema validation. The Reference provided contains an absolute path to the schema rule that was violated, followed by the full schema path that enforced that rule (with $ref redirect values substited and enclosed in square brackets).
  • The error messages provided by the existing semantic validators are exactly the same as the previous error messages those validators produced.

In the final solution we would remove semantic validators that are redundant to schema validation (as in number 5 above). We have the option to use the structured data produced by schema validation to replace the generic schema validation message with a more descriptive message if that is an issue (in particular, if the only argument for an ad-hoc validator is that is produces a better/cleaner message, we would just move that message creation code to the schema error result formatter and special case it as opposed to having a redundant validator).

What's Next

If this general direction is supported and this PR is accepted, a fast follow would include:

  • Add new validators (infliuenced by observed issues) for both semantic errors and best practices
  • Require passing schema validation (in addition to improved semantic validation) in order to publish
  • Remove existing validation code that is redundant to schema validation (ensuring error messages remain intelligible)
  • Update validation client code and tests to handle the new rich return types natively

Issues

Schema validation requires embedding the server.schema.json file into the validators package via go:embed, which is restricted from embedding files outside of the package. For this reason we copy the schema file into a schema subdir (via a prep target in the makefile) and we .gitignore it. I tried cleaning up the copy in the make clean target, but then the linter would complain about the embed target being missing if it wasn't there during development. I also considered just checking in the schema file and assuming a separate workflow for updating the embedded schema file, but it's not clear what that workflow would be or how it would be maintained. I'm open to a different approach, but the schema file does need to be embedded somehow for schema validation to work.

How Has This Been Tested?

All existing validation tests pass, new tests implemented and all pass.

Breaking Changes

No breaking changes, no behavior change except new validate command

Types of changes

  • Bug fix (non-breaking change which fixes an issue)
  • New feature (non-breaking change which adds functionality)
  • Breaking change (fix or feature that would cause existing functionality to change)
  • Documentation update

Checklist

  • I have read the MCP Documentation
  • My code follows the repository's style guidelines
  • New and existing tests pass locally
  • I have added appropriate error handling
  • I have added or updated documentation as needed

@BobDickinson
Copy link
Contributor Author

There is an issue to consider with this PR, which is that I am embedding schema.server.json and using it to determine the current version string. This is in conflict (potentially) with the hard coded model CurrentSchemaVersion and CurrentSchemaURL. If we go with the embedded schema approach and we have a workflow that assures the correct schema file is used, we should use that as the source of truth and remove the hardcoded values (IMO). Since they're used extremely widely throughout the codebase, I didn't feel comfortable making that change in this PR.

Copy link
Member

@tadasant tadasant left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think this all makes sense and I'm inclined to approve as-written + let you drive the validation roadmap here onward 🚀 Just want to hear from @rdimitrov and/or @domdomegg if they are aligned with the general approach

Edit: Thought on it some more and I think I do have one fundamental gripe here -- to align with the core MCP spec, we might want to have TypeScript as a source of truth rather than JSON schema. This actually might not really impact this PR (except the design doc), but it would introduce another step we should do soon - especially before trying to expand the JSON schema - of creating the TypeScript types source of truth.

@@ -0,0 +1,653 @@
# Enhanced Server Validation Design

NOTE: This document describes a proposed direction for improving validation of server.json data in the Official Registry. This work is in progress (including open PRs ands discussions)in a collaborative process and may change signficianty or be abandoned.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
NOTE: This document describes a proposed direction for improving validation of server.json data in the Official Registry. This work is in progress (including open PRs ands discussions)in a collaborative process and may change signficianty or be abandoned.
NOTE: This document describes a proposed direction for improving validation of server.json data in the Official Registry. This work is in progress (including open PRs and discussions) in a collaborative process and may change signficiantly or be abandoned.


This document outlines the design for implementing comprehensive server validation in the MCP Registry, due to the following concerns:

- Currently, the MPC Registry project publishes a server.json schema but does not validate servers against it, allowing non-compliant servers to be published.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
- Currently, the MPC Registry project publishes a server.json schema but does not validate servers against it, allowing non-compliant servers to be published.
- Currently, the MCP Registry project publishes a server.json schema but does not validate servers against it, allowing non-compliant servers to be published.

@tadasant
Copy link
Member

tadasant commented Dec 4, 2025

@claude review this PR

@claude
Copy link
Contributor

claude bot commented Dec 4, 2025

Claude encountered an error —— View job

Failed with exit code 128

I'll analyze this and get back to you.

Copy link
Member

@tadasant tadasant left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Had Claude review locally:

Claude's review

Now I have enough context to provide a comprehensive review. Here's the markdown review:


PR #636 Review: Enhanced server.json validation (phase 1)

Summary

This PR adds schema validation and improves the validation infrastructure for server.json files. The main changes include:

  • A new mcp-publisher validate command
  • JSON schema validation using embedded schema files
  • Exhaustive validation that collects all errors instead of failing fast
  • Rich validation results with JSON paths and references

Overall Assessment

Recommendation: Request Changes - The PR has solid architectural foundations but needs refinement before merging.


What's Good 👍

1. Well-designed validation types

The ValidationIssue and ValidationResult types are clean and well-structured:

type ValidationIssue struct {
    Type      ValidationIssueType
    Path      string
    Message   string
    Severity  ValidationIssueSeverity
    Reference string
}

2. Backward compatibility preserved

The approach of wrapping ValidateServerJSONExhaustive with the existing ValidateServerJSON signature is smart:

func ValidateServerJSON(serverJSON *apiv0.ServerJSON) error {
    result := ValidateServerJSONExhaustive(serverJSON, false)
    // Returns first error, maintaining existing behavior
}

3. Immutable context building

The ValidationContext pattern for tracking JSON paths is elegant:

ctx.Field("packages").Index(0).Field("transport")  // → "packages[0].transport"

4. Comprehensive test coverage

The tests cover multiple error scenarios, path verification, and schema resolution.

5. Thorough design documentation

The proposed-enhanced-validation.md doc is exceptionally detailed and shows careful thought about the problem space.


Issues to Address

🔴 Critical

1. Schema embedding approach is fragile

The current approach copies the schema file during build (make prep-schema), which creates several problems:

  • CI/CD complexity: Requires adding make prep-schema to CI workflow
  • Developer friction: Easy to forget, causing confusing go:embed errors
  • Gitignored generated files: The schema is in .gitignore but required for compilation

Suggestion: Consider one of these alternatives:

  1. Check in the copied schema file and update it via a dedicated script/workflow
  2. Use go generate with a clear directive at the top of schema.go
  3. Fetch the schema at runtime (with caching) rather than embedding

2. Panic in production code

In cmd/publisher/commands/init.go:

currentSchema, err := validators.GetCurrentSchemaVersion()
if err != nil {
    // Should never happen (schema is embedded)
    panic(fmt.Sprintf("failed to get embedded schema version: %v", err))
}

Never use panic in user-facing code. Even "impossible" errors should return gracefully:

if err != nil {
    return apiv0.ServerJSON{}, fmt.Errorf("internal error: failed to get schema version: %w", err)
}

3. Duplicate schema version checking logic

Schema version validation appears in three places with slightly different implementations:

  • cmd/publisher/commands/publish.go
  • cmd/publisher/commands/validate.go
  • internal/validators/validators.go (in ValidateServerJSONExhaustive)

This violates DRY and risks inconsistent behavior. The validate command and publish command should both delegate to a single source of truth.

🟡 Important

4. Inconsistent path format between schema and semantic validation

Schema validation produces paths like packages.0.transport while semantic validation uses packages[0].transport. This inconsistency will confuse users.

From the test:

assert.True(t, issuePaths["packages.0.packageArguments.0.format"])  // Schema style
assert.True(t, issuePaths["packages[0].version"])                   // Semantic style

Fix: Normalize all paths to use the bracket notation for array indices.

5. Missing --help flag handling in validate command

func ValidateCommand(args []string) error {
    for _, arg := range args {
        if !strings.HasPrefix(arg, "-") {
            serverFile = arg
        }
    }
    // No handling for --help
}

Other commands likely have --help support. This should too.

6. Error message still references model.CurrentSchemaVersion

The semantic validator still uses model.CurrentSchemaVersion:

case !strings.Contains(serverJSON.Schema, model.CurrentSchemaVersion):

But the CLI commands now use validators.GetCurrentSchemaVersion(). If these ever diverge, you'll have inconsistent validation.

7. Schema validation errors for discriminated unions are noisy

As noted in the PR description, anyOf transport validation produces confusing errors (one error per possible type). The PR acknowledges this but doesn't fix it. Consider:

  • Filing a follow-up issue to track this
  • Adding a comment in the code explaining the limitation

🟢 Minor/Suggestions

8. Consider structured logging for validation results

The validate command uses fmt.Fprintf with emojis. For programmatic use, consider adding a --json flag to output structured validation results.

9. Test file organization

validation_detailed_test.go is in validators_test package (external test), while existing tests appear to be internal. Consider consistency.

10. Reference format is verbose

Reference: #/definitions/Repository/properties/url/format from: [#/definitions/ServerDetail]/properties/repository/[#/definitions/Repository]/properties/url/format

This is very long. Consider:

  • Truncating for display, full in --verbose mode
  • Just showing the final constraint: #/definitions/Repository/properties/url/format

11. Missing newline at end of .gitignore

# Generated schema directory for embedding
internal/validators/schema/

No trailing newline - minor but can cause issues with some tools.


Questions for Discussion

  1. Schema versioning strategy: When the embedded schema is updated, how will you ensure model.CurrentSchemaVersion stays in sync? Should there be a single source of truth?

  2. Linter validation timing: The design doc mentions linter validation as "phase 2". Is there a tracking issue for this?

  3. Performance impact: Has exhaustive validation been benchmarked against the fail-fast approach? For large server.json files with many packages, this could be noticeably slower.

  4. Breaking change path: The PR mentions eventually removing redundant semantic validators. How will you handle the transition without breaking existing error message expectations in downstream code?


Files Changed Summary

File Assessment
internal/validators/schema.go Good implementation, but embedding strategy needs work
internal/validators/validation_types.go Clean, well-designed types
internal/validators/validators.go Good refactor, path inconsistency needs fixing
cmd/publisher/commands/validate.go Needs --help, remove panic potential
cmd/publisher/commands/init.go Remove panic
cmd/publisher/commands/publish.go DRY violation with validate.go
docs/explanations/proposed-enhanced-validation.md Excellent documentation
Makefile Works but fragile
.github/workflows/ci.yml Required workaround for embedding

Recommended Next Steps

  1. Fix the critical issues (panic, schema embedding strategy)
  2. Normalize path formats between schema and semantic validation
  3. Consolidate schema version checking to a single location
  4. Add --help to validate command
  5. Consider adding a follow-up issue for the anyOf error noise problem

From its feedback, I think:

  • 1. Schema embedding approach is fragile - I don't know enough about Go to have an informed opinion on this. Maybe @toby can help? Let's not let this block on merging but maybe there's a more elegant go:generate powered solution here for the long term we can do as a fast follow.
  • 2. Panic in production code - Reasonable feedback; let's fix
  • 3. Duplicate schema version checking logic - I assume this will be made DRY in phase 2+, right? Can ignore.
  • 5. Missing --help flag handling in validate command - worth adding?
  • 6. Error message still references model.CurrentSchemaVersion`` - worth fixing I think?

Besides that, my only feedback is a few inline comments (particularly on not using the draft version) -- otherwise basically looks good to merge! Thanks so much for all the work you've put into this.

# Preparation targets
prep-schema: ## Copy schema file for embedding
@mkdir -p internal/validators/schema
@cp docs/reference/server-json/server.schema.json internal/validators/schema/server.schema.json
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should we lock this into being a static, live version of the schema (instead of this linked one, which is a draft unreleased version)?

I think in general it would be smart to not make changes in the registry codebase that don't correspond to an already-published server.json schema, so I don't think that constraint would hold us back would it?

registry
registry

# Generated schema directory for embedding
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

"embedding" as a term is a little misdirecting at first glance (given the prominence of vector embeddings in AI); wherever you use this can we please make clear it's about "embedding the static file into the Go binary"

run: |
curl -sSfL https://raw.githubusercontent.com/golangci/golangci-lint/master/install.sh | sh -s -- -b $(go env GOPATH)/bin v2.4.0
- name: Prepare schema for embedding
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Same comment as below on "embedding"

}

// Check for deprecated schema and recommend migration
// Allow empty schema (will use default) but reject old schemas
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Allowing empty schema seems weird here - do you agree? Realize it's out of scope but if you agree I'll file an Issue

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants