OCSF Schema Validation
Project description
OCSF Schema Validator
A utility to validate contributions to the OCSF schema, intended to prevent human error when contributing to the schema in order to keep the schema machine-readable.
OCSF provides several include mechanisms to facilitate reuse, but this means individual schema files may be incomplete. This complicates using off-the-shelf schema definition tools for validation.
Query is a federated search solution that normalizes disparate security data to OCSF. This validator is adapted from active code and documentation generation tools written by the Query team.
Getting Started
Prerequisites
- python >3.11
- pip
- A copy of the OCSF schema
Installation
You can install the validator with pip:
$ pip install ocsf-validator
Usage
You can run the validator against your working copy of the schema to identify problems before submitting a PR. Invoke the validator using python and provide it with the path to the root of your working copy.
Examples:
$ python -m ocsf_validator .
$ python -m ocsf_validator ../ocsf-schema
Tests
The validator performs the following tests on a copy of the schema:
- The schema is readable and all JSON is valid. [FATAL]
- The directory structure meets expectations. [WARNING]
- The targets in
$include,profiles, andextendsdirectives can be found. [ERROR] - All required attributes in schema definition files are present. [WARNING]
- There are no unrecognized attributes in schema definition files. [WARNING]
- All attributes in the attribute dictionary are used. [WARNING]
- There are no name collisions within a record type. [WARNING]
- All attributes are defined in the attribute dictionary. [WARNING]
If any ERROR or FATAL tests fail, the validator exits with a non-zero exit code.
Technical Overview
The OCSF metaschema is represented as record types by filepath, achieved as follows:
- Record types are represented using Python's type system by defining them as Python
TypedDicts intypes.py. This allows the validator to take advantage of Python's reflection capabilities. - Files and record types are associated by pattern matching the file paths. These patterns are named in
matchers.pyto allow mistakes to be caught by a type checker. - Types are mapped to filepath patterns in
type_mapping.py.
The contents of the OCSF schema to be validated are primarily represented as a Reader defined in reader.py. Readers load the schema definitions to be validated from a source (usually from a filesystem) and contain them without judgement. The process_includes function and other contents of processor.py mutate the contents of a Reader by applying OCSF's various include mechanisms.
Validators are defined in validators.py and test the schema contents for various problematic conditions. Validators should pass Exceptions to a special error Collector defined in errors.py. This module also defines a number of custom exception types that represent problematic schema states. The Collector raises errors by default, but can also hold them until they're aggregated by a larger validation process (e.g., the ValidationRunner).
The ValidationRunner combines all of the building blocks above to read a proposed schema from a filesystem, validate the schema, and provide useful output and a non-zero exit code if any errors were encountered.
Contributing
After checking out, you'll want to install dependencies:
poetry install
Before committing, run the formatters and tests:
poetry run isort .
poetry run black .
poetry run pyright
poetry run pytest
If you're adding a validator, do the following:
- Write your
validate_function invalidate.pyto apply a function to the relevant keys in a reader that will run your desired validation. Seevalidators.pyfor examples. - Add any custom errors in
errors.py. - Create an option to change its severity level in
ValidatorOptionsand map it in the constructor ofValidationRunnerinrunner.py. - Invoke the new validator in
ValidationRunner.validate.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file ocsf_validator-0.2.3.tar.gz.
File metadata
- Download URL: ocsf_validator-0.2.3.tar.gz
- Upload date:
- Size: 24.3 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: poetry/1.6.1 CPython/3.11.10 Darwin/24.1.0
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
3e3ed375987dc590e1fa8724de9250f8a790af4d746a0c4542c9e1043d14297a
|
|
| MD5 |
acdbdb34a2ffa3f9e2625e8ce4ef719c
|
|
| BLAKE2b-256 |
ff67839bf4c14794165e17c745987e4ce619a7a152772825b1fa601077ee261c
|
File details
Details for the file ocsf_validator-0.2.3-py3-none-any.whl.
File metadata
- Download URL: ocsf_validator-0.2.3-py3-none-any.whl
- Upload date:
- Size: 26.7 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: poetry/1.6.1 CPython/3.11.10 Darwin/24.1.0
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
8005dc3c2e0be082c3db6e469833b8a5cfb52d449748e9e211851ea0208a5bca
|
|
| MD5 |
671fd218983839c772199f0255051995
|
|
| BLAKE2b-256 |
ea12ce2a0a0197d09aa60782654d3c8b5bc0e7f8ad790571ddc6ea3f49c33ec1
|