Automatically validate DAPR configuration files (dapr.yaml, component YAML files) when they are created or modified. Checks for schema compliance, missing required fields, invalid values, and common misconfigurations. Use when validating DAPR configs, reviewing component setup, or before deployment.
This skill is limited to using the following tools:
This skill automatically validates DAPR configuration files to catch errors before runtime.
Claude automatically uses this skill when:
components/ directory is created or modifieddapr.yaml file is created or modified# Required structure
version: 1
common:
resourcesPath: ./components
apps:
- appId: my-service # Required: unique identifier
appDirPath: ./src # Required: path to app
appPort: 8000 # Required: application port
command: ["python", "main.py"]
Checks performed:
version field present and validapps array is not emptyappId, appDirPath, appPortappPort values don't conflict# Required structure
apiVersion: dapr.io/v1alpha1 # Must be exact
kind: Component # Must be exact
metadata:
name: component-name # Required: valid name
spec:
type: state.redis # Required: valid type
version: v1 # Required: valid version
metadata: # Component-specific fields
- name: redisHost
value: localhost:6379
Checks performed:
apiVersion is dapr.io/v1alpha1kind is Componentmetadata.name is valid (lowercase, alphanumeric, hyphens)spec.type is a valid DAPR component typespec.version is specifiedState Stores:
state.redisstate.azure.cosmosdbstate.postgresqlstate.mongodbstate.azure.tablestoragePub/Sub:
pubsub.redispubsub.azure.servicebus.topicspubsub.kafkapubsub.rabbitmqSecret Stores:
secretstores.azure.keyvaultsecretstores.local.filesecretstores.kubernetesBindings:
bindings.azure.blobstoragebindings.azure.eventgridbindings.cronbindings.httpFind Configuration Files
Scan for:
- dapr.yaml in project root
- components/*.yaml
- components/**/*.yaml
Parse YAML
Schema Validation
Cross-Reference Checks
Security Checks
DAPR Configuration Validation Report
=====================================
✓ dapr.yaml - Valid
- 2 applications defined
- Resources path: ./components
✓ components/statestore.yaml - Valid
- Type: state.redis
- Name: statestore
⚠ components/pubsub.yaml - Warnings
- Type: pubsub.azure.servicebus.topics
- Warning: connectionString appears to contain a secret value
- Recommendation: Use secretKeyRef instead
✗ components/secrets.yaml - Invalid
- Error: Missing required field 'spec.type'
- Error: 'metadata.name' contains invalid characters
Summary: 2 valid, 1 warning, 1 error
# Bad
spec:
metadata:
- name: host
value: localhost
# Good
spec:
type: state.redis
version: v1
metadata:
- name: redisHost
value: localhost:6379
# Bad (security risk)
- name: password
value: mysecretpassword
# Good (use secret reference)
- name: password
secretKeyRef:
name: redis-secrets
key: password
# Bad
metadata:
name: My State Store # No spaces, uppercase
# Good
metadata:
name: my-state-store # Lowercase, hyphens only
# Bad
apiVersion: v1
# Good
apiVersion: dapr.io/v1alpha1
This skill integrates with:
config-specialist agent for deeper configuration helpdapr-debugger agent when validation errors cause runtime issues/dapr:component command to generate valid configs