title | description |
---|---|
Validation |
Utility |
This utility provides JSON Schema validation for events and responses, including JMESPath support to unwrap events before validation.
- Validate incoming event and response
- JMESPath support to unwrap events before validation applies
- Built-in envelopes to unwrap popular event sources payloads
!!! tip "Using JSON Schemas for the first time?" Check this step-by-step tour in the official JSON Schema website{target="_blank"}.
You can validate inbound and outbound events using validator
decorator.
You can also use the standalone validate
function, if you want more control over the validation process such as handling a validation error.
We support any JSONSchema draft supported by fastjsonschema{target="_blank"} library.
!!! warning
Both validator
decorator and validate
standalone function expects your JSON Schema to be a dictionary, not a filename.
Validator decorator is typically used to validate either inbound or functions' response.
It will fail fast with SchemaValidationError
exception if event or response doesn't conform with given JSON Schema.
=== "validator_decorator.py"
```python hl_lines="3 5"
from aws_lambda_powertools.utilities.validation import validator
import schemas
@validator(inbound_schema=schemas.INPUT, outbound_schema=schemas.OUTPUT)
def handler(event, context):
return event
```
=== "event.json"
```json
{
"message": "hello world",
"username": "lessa"
}
```
=== "schemas.py"
```python hl_lines="7 14 16 23 39 45 47 52"
--8<-- "docs/shared/validation_basic_jsonschema.py"
```
!!! note It's not a requirement to validate both inbound and outbound schemas - You can either use one, or both.
Validate standalone function is typically used within the Lambda handler, or any other methods that perform data validation.
You can also gracefully handle schema validation errors by catching SchemaValidationError
exception.
=== "validator_decorator.py"
```python hl_lines="8"
from aws_lambda_powertools.utilities.validation import validate
from aws_lambda_powertools.utilities.validation.exceptions import SchemaValidationError
import schemas
def handler(event, context):
try:
validate(event=event, schema=schemas.INPUT)
except SchemaValidationError as e:
# do something before re-raising
raise
return event
```
=== "event.json"
```json
{
"data": "hello world",
"username": "lessa"
}
```
=== "schemas.py"
```python hl_lines="7 14 16 23 39 45 47 52"
--8<-- "docs/shared/validation_basic_jsonschema.py"
```
You might want to validate only a portion of your event - This is where the envelope
parameter is for.
Envelopes are JMESPath expressions to extract a portion of JSON you want before applying JSON Schema validation.
Here is a sample custom EventBridge event, where we only validate what's inside the detail
key:
=== "unwrapping_events.py"
We use the `envelope` parameter to extract the payload inside the `detail` key before validating.
```python hl_lines="5"
from aws_lambda_powertools.utilities.validation import validator
import schemas
@validator(inbound_schema=schemas.INPUT, envelope="detail")
def handler(event, context):
return event
```
=== "sample_wrapped_event.json"
```python hl_lines="11-14"
--8<-- "docs/shared/validation_basic_eventbridge_event.json"
```
=== "schemas.py"
```python hl_lines="7 14 16 23 39 45 47 52"
--8<-- "docs/shared/validation_basic_jsonschema.py"
```
This is quite powerful because you can use JMESPath Query language to extract records from arrays, slice and dice, to pipe expressions and function expressions, where you'd extract what you need before validating the actual payload.
This utility comes with built-in envelopes to easily extract the payload from popular event sources.
=== "unwrapping_popular_event_sources.py"
```python hl_lines="5 7"
from aws_lambda_powertools.utilities.validation import envelopes, validator
import schemas
@validator(inbound_schema=schemas.INPUT, envelope=envelopes.EVENTBRIDGE)
def handler(event, context):
return event
```
=== "sample_wrapped_event.json"
```python hl_lines="11-14"
--8<-- "docs/shared/validation_basic_eventbridge_event.json"
```
=== "schemas.py"
```python hl_lines="7 14 16 23 39 45 47 52"
--8<-- "docs/shared/validation_basic_jsonschema.py"
```
Here is a handy table with built-in envelopes along with their JMESPath expressions in case you want to build your own.
Envelope name | JMESPath expression |
---|---|
API_GATEWAY_REST | "powertools_json(body)" |
API_GATEWAY_HTTP | "powertools_json(body)" |
SQS | "Records[*].powertools_json(body)" |
SNS | "Records[0].Sns.Message |
EVENTBRIDGE | "detail" |
CLOUDWATCH_EVENTS_SCHEDULED | "detail" |
KINESIS_DATA_STREAM | "Records[*].kinesis.powertools_json(powertools_base64(data))" |
CLOUDWATCH_LOGS | "awslogs.powertools_base64_gzip(data) |
!!! note "New in 1.10.0" JSON Schema DRAFT 7 has many new built-in formats{target="_blank"} such as date, time, and specifically a regex format which might be a better replacement for a custom format, if you do have control over the schema.
JSON Schemas with custom formats like int64
will fail validation. If you have these, you can pass them using formats
parameter:
=== "custom_json_schema_type_format.json"
```json
{
"lastModifiedTime": {
"format": "int64",
"type": "integer"
}
}
```
For each format defined in a dictionary key, you must use a regex, or a function that returns a boolean to instruct the validator on how to proceed when encountering that type.
=== "validate_custom_format.py"
```python hl_lines="5-8 10"
from aws_lambda_powertools.utilities.validation import validate
import schema
custom_format = {
"int64": True, # simply ignore it,
"positive": lambda x: False if x < 0 else True
}
validate(event=event, schema=schemas.INPUT, formats=custom_format)
```
=== "schemas.py"
```python hl_lines="68" 91 93"
INPUT = {
"$schema": "http://json-schema.org/draft-04/schema#",
"definitions": {
"AWSAPICallViaCloudTrail": {
"properties": {
"additionalEventData": {"$ref": "#/definitions/AdditionalEventData"},
"awsRegion": {"type": "string"},
"errorCode": {"type": "string"},
"errorMessage": {"type": "string"},
"eventID": {"type": "string"},
"eventName": {"type": "string"},
"eventSource": {"type": "string"},
"eventTime": {"format": "date-time", "type": "string"},
"eventType": {"type": "string"},
"eventVersion": {"type": "string"},
"recipientAccountId": {"type": "string"},
"requestID": {"type": "string"},
"requestParameters": {"$ref": "#/definitions/RequestParameters"},
"resources": {"items": {"type": "object"}, "type": "array"},
"responseElements": {"type": ["object", "null"]},
"sourceIPAddress": {"type": "string"},
"userAgent": {"type": "string"},
"userIdentity": {"$ref": "#/definitions/UserIdentity"},
"vpcEndpointId": {"type": "string"},
"x-amazon-open-api-schema-readOnly": {"type": "boolean"},
},
"required": [
"eventID",
"awsRegion",
"eventVersion",
"responseElements",
"sourceIPAddress",
"eventSource",
"requestParameters",
"resources",
"userAgent",
"readOnly",
"userIdentity",
"eventType",
"additionalEventData",
"vpcEndpointId",
"requestID",
"eventTime",
"eventName",
"recipientAccountId",
],
"type": "object",
},
"AdditionalEventData": {
"properties": {
"objectRetentionInfo": {"$ref": "#/definitions/ObjectRetentionInfo"},
"x-amz-id-2": {"type": "string"},
},
"required": ["x-amz-id-2"],
"type": "object",
},
"Attributes": {
"properties": {
"creationDate": {"format": "date-time", "type": "string"},
"mfaAuthenticated": {"type": "string"},
},
"required": ["mfaAuthenticated", "creationDate"],
"type": "object",
},
"LegalHoldInfo": {
"properties": {
"isUnderLegalHold": {"type": "boolean"},
"lastModifiedTime": {"format": "int64", "type": "integer"},
},
"type": "object",
},
"ObjectRetentionInfo": {
"properties": {
"legalHoldInfo": {"$ref": "#/definitions/LegalHoldInfo"},
"retentionInfo": {"$ref": "#/definitions/RetentionInfo"},
},
"type": "object",
},
"RequestParameters": {
"properties": {
"bucketName": {"type": "string"},
"key": {"type": "string"},
"legal-hold": {"type": "string"},
"retention": {"type": "string"},
},
"required": ["bucketName", "key"],
"type": "object",
},
"RetentionInfo": {
"properties": {
"lastModifiedTime": {"format": "int64", "type": "integer"},
"retainUntilMode": {"type": "string"},
"retainUntilTime": {"format": "int64", "type": "integer"},
},
"type": "object",
},
"SessionContext": {
"properties": {"attributes": {"$ref": "#/definitions/Attributes"}},
"required": ["attributes"],
"type": "object",
},
"UserIdentity": {
"properties": {
"accessKeyId": {"type": "string"},
"accountId": {"type": "string"},
"arn": {"type": "string"},
"principalId": {"type": "string"},
"sessionContext": {"$ref": "#/definitions/SessionContext"},
"type": {"type": "string"},
},
"required": ["accessKeyId", "sessionContext", "accountId", "principalId", "type", "arn"],
"type": "object",
},
},
"properties": {
"account": {"type": "string"},
"detail": {"$ref": "#/definitions/AWSAPICallViaCloudTrail"},
"detail-type": {"type": "string"},
"id": {"type": "string"},
"region": {"type": "string"},
"resources": {"items": {"type": "string"}, "type": "array"},
"source": {"type": "string"},
"time": {"format": "date-time", "type": "string"},
"version": {"type": "string"},
},
"required": ["detail-type", "resources", "id", "source", "time", "detail", "region", "version", "account"],
"title": "AWSAPICallViaCloudTrail",
"type": "object",
"x-amazon-events-detail-type": "AWS API Call via CloudTrail",
"x-amazon-events-source": "aws.s3",
}
```
=== "event.json"
```json
{
"account": "123456789012",
"detail": {
"additionalEventData": {
"AuthenticationMethod": "AuthHeader",
"CipherSuite": "ECDHE-RSA-AES128-GCM-SHA256",
"SignatureVersion": "SigV4",
"bytesTransferredIn": 0,
"bytesTransferredOut": 0,
"x-amz-id-2": "ejUr9Nd/4IO1juF/a6GOcu+PKrVX6dOH6jDjQOeCJvtARUqzxrhHGrhEt04cqYtAZVqcSEXYqo0=",
},
"awsRegion": "us-west-1",
"eventCategory": "Data",
"eventID": "be4fdb30-9508-4984-b071-7692221899ae",
"eventName": "HeadObject",
"eventSource": "s3.amazonaws.com",
"eventTime": "2020-12-22T10:05:29Z",
"eventType": "AwsApiCall",
"eventVersion": "1.07",
"managementEvent": False,
"readOnly": True,
"recipientAccountId": "123456789012",
"requestID": "A123B1C123D1E123",
"requestParameters": {
"Host": "lambda-artifacts-deafc19498e3f2df.s3.us-west-1.amazonaws.com",
"bucketName": "lambda-artifacts-deafc19498e3f2df",
"key": "path1/path2/path3/file.zip",
},
"resources": [
{
"ARN": "arn:aws:s3:::lambda-artifacts-deafc19498e3f2df/path1/path2/path3/file.zip",
"type": "AWS::S3::Object",
},
{
"ARN": "arn:aws:s3:::lambda-artifacts-deafc19498e3f2df",
"accountId": "123456789012",
"type": "AWS::S3::Bucket",
},
],
"responseElements": None,
"sourceIPAddress": "AWS Internal",
"userAgent": "AWS Internal",
"userIdentity": {
"accessKeyId": "ABCDEFGHIJKLMNOPQR12",
"accountId": "123456789012",
"arn": "arn:aws:sts::123456789012:assumed-role/role-name1/1234567890123",
"invokedBy": "AWS Internal",
"principalId": "ABCDEFGHIJKLMN1OPQRST:1234567890123",
"sessionContext": {
"attributes": {"creationDate": "2020-12-09T09:58:24Z", "mfaAuthenticated": "false"},
"sessionIssuer": {
"accountId": "123456789012",
"arn": "arn:aws:iam::123456789012:role/role-name1",
"principalId": "ABCDEFGHIJKLMN1OPQRST",
"type": "Role",
"userName": "role-name1",
},
},
"type": "AssumedRole",
},
"vpcEndpointId": "vpce-a123cdef",
},
"detail-type": "AWS API Call via CloudTrail",
"id": "e0bad426-0a70-4424-b53a-eb902ebf5786",
"region": "us-west-1",
"resources": [],
"source": "aws.s3",
"time": "2020-12-22T10:05:29Z",
"version": "0",
}
```
You might have events or responses that contain non-encoded JSON, where you need to decode before validating them.
You can use our built-in JMESPath functions within your expressions to do exactly that to decode JSON Strings, base64, and uncompress gzip data.
!!! info We use these for built-in envelopes to easily to decode and unwrap events from sources like Kinesis, CloudWatch Logs, etc.