Skip to main content

OCSF Schema Validation

Project description

OCSF Schema Validator

A utility to validate contributions to the OCSF schema, intended to prevent human error when contributing to the schema in order to keep the schema machine-readable.

OCSF provides several include mechanisms to facilitate reuse, but this means individual schema files may be incomplete. This complicates using off-the-shelf schema definition tools for validation.

Query is a federated search solution that normalizes disparate security data to OCSF. This validator is adapted from active code and documentation generation tools written by the Query team.

Getting Started

Prerequisites

Installation

You can install the validator with pip:

$ pip install ocsf-validator

Usage

You can run the validator against your working copy of the schema to identify problems before submitting a PR. Invoke the validator using python and provide it with the path to the root of your working copy.

Examples:

$ python -m ocsf_validator .
$ python -m ocsf_validator ../ocsf-schema

Tests

The validator performs the following tests on a copy of the schema:

  • The schema is readable and all JSON is valid. [FATAL]
  • The directory structure meets expectations. [WARNING]
  • The targets in $include, profiles, and extends directives can be found. [ERROR]
  • All required attributes in schema definition files are present. [WARNING]
  • There are no unrecognized attributes in schema definition files. [WARNING]
  • All attributes in the attribute dictionary are used. [WARNING]
  • There are no name collisions within a record type. [WARNING]
  • All attributes are defined in the attribute dictionary. [WARNING]

If any ERROR or FATAL tests fail, the validator exits with a non-zero exit code.

Technical Overview

The OCSF metaschema is represented as record types by filepath, achieved as follows:

  1. Record types are represented using Python's type system by defining them as Python TypedDicts in types.py. This allows the validator to take advantage of Python's reflection capabilities.
  2. Files and record types are associated by pattern matching the file paths. These patterns are named in matchers.py to allow mistakes to be caught by a type checker.
  3. Types are mapped to filepath patterns in type_mapping.py.

The contents of the OCSF schema to be validated are primarily represented as a Reader defined in reader.py. Readers load the schema definitions to be validated from a source (usually from a filesystem) and contain them without judgement. The process_includes function and other contents of processor.py mutate the contents of a Reader by applying OCSF's various include mechanisms.

Validators are defined in validators.py and test the schema contents for various problematic conditions. Validators should pass Exceptions to a special error Collector defined in errors.py. This module also defines a number of custom exception types that represent problematic schema states. The Collector raises errors by default, but can also hold them until they're aggregated by a larger validation process (e.g., the ValidationRunner).

The ValidationRunner combines all of the building blocks above to read a proposed schema from a filesystem, validate the schema, and provide useful output and a non-zero exit code if any errors were encountered.

Contributing

After checking out, you'll want to install dependencies:

poetry install

Before committing, run the formatters and tests:

poetry run isort .
poetry run black .
poetry run pyright
poetry run pytest

If you're adding a validator, do the following:

  • Write your validate_ function in validate.py to apply a function to the relevant keys in a reader that will run your desired validation. See validators.py for examples.
  • Add any custom errors in errors.py.
  • Create an option to change its severity level in ValidatorOptions and map it in the constructor of ValidationRunner in runner.py.
  • Invoke the new validator in ValidationRunner.validate.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

ocsf_validator-0.2.3.tar.gz (24.3 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

ocsf_validator-0.2.3-py3-none-any.whl (26.7 kB view details)

Uploaded Python 3

File details

Details for the file ocsf_validator-0.2.3.tar.gz.

File metadata

  • Download URL: ocsf_validator-0.2.3.tar.gz
  • Upload date:
  • Size: 24.3 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: poetry/1.6.1 CPython/3.11.10 Darwin/24.1.0

File hashes

Hashes for ocsf_validator-0.2.3.tar.gz
Algorithm Hash digest
SHA256 3e3ed375987dc590e1fa8724de9250f8a790af4d746a0c4542c9e1043d14297a
MD5 acdbdb34a2ffa3f9e2625e8ce4ef719c
BLAKE2b-256 ff67839bf4c14794165e17c745987e4ce619a7a152772825b1fa601077ee261c

See more details on using hashes here.

File details

Details for the file ocsf_validator-0.2.3-py3-none-any.whl.

File metadata

  • Download URL: ocsf_validator-0.2.3-py3-none-any.whl
  • Upload date:
  • Size: 26.7 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: poetry/1.6.1 CPython/3.11.10 Darwin/24.1.0

File hashes

Hashes for ocsf_validator-0.2.3-py3-none-any.whl
Algorithm Hash digest
SHA256 8005dc3c2e0be082c3db6e469833b8a5cfb52d449748e9e211851ea0208a5bca
MD5 671fd218983839c772199f0255051995
BLAKE2b-256 ea12ce2a0a0197d09aa60782654d3c8b5bc0e7f8ad790571ddc6ea3f49c33ec1

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page