jtd: JSON Validation for JavaScript
Deno port of the Node.js package of the same name.
JSON Type Definition, aka RFC 8927, is an easy-to-learn, standardized way to define a schema for JSON data. You can use JSON Typedef to portably validate data across programming languages, create dummy data, generate code, and more.
This jtd
package is a TypeScript implementation of JSON Type Definition. It
lets you validate input data against JSON Type Definition schemas. This ported
version of jtd
works in Deno, but the original works in Node.js and
web browsers.
If you're looking to generate code from schemas, check out "Generating TypeScript from JSON Typedef schemas" in the JSON Typedef docs.
Importing
import * from "https://deno.land/x/jtd@v0.1.0/mod.ts";
Documentation
Detailed API documentation is available online at:
https://doc.deno.land/https/deno.land/x/jtd@v0.1.0/mod.ts
For more high-level documentation about JSON Typedef in general, or JSON Typedef in combination with JavaScript in particular, see:
Basic Usage
Here's an example of how you can use this package to validate JSON data against a JSON Typedef schema:
import { Schema, validate } from "https://deno.land/x/jtd@v0.1.0/mod.ts";
const schema = {
properties: {
name: { type: "string" },
age: { type: "uint32" },
phones: {
elements: { type: "string" },
},
},
} as Schema;
// jtd.validate returns an array of validation errors. If there were no problems
// with the input, it returns an empty array.
// Outputs: []
console.log(validate(schema, {
name: "John Doe",
age: 43,
phones: ["+44 1234567", "+44 2345678"],
}));
// This next input has three problems with it:
//
// 1. It's missing "name", which is a required property.
// 2. "age" is a string, but it should be an integer.
// 3. "phones[1]" is a number, but it should be a string.
//
// Each of those errors corresponds to one of the errors returned by validate.
// Outputs:
//
// [
// { instancePath: [], schemaPath: [ 'properties', 'name' ] },
// {
// instancePath: [ 'age' ],
// schemaPath: [ 'properties', 'age', 'type' ]
// },
// {
// instancePath: [ 'phones', '1' ],
// schemaPath: [ 'properties', 'phones', 'elements', 'type' ]
// }
// ]
console.log(validate(schema, {
age: "43",
phones: ["+44 1234567", 442345678],
}));
Advanced Usage: Limiting Errors Returned
By default, jtd.validate
returns every error it finds. If you just care about
whether there are any errors at all, or if you can't show more than some number
of errors, then you can get better performance out of jtd.validate
using the
maxErrors
option.
For example, taking the same example from before, but limiting it to 1 error, we get:
// Outputs:
//
// [ { instancePath: [], schemaPath: [ 'properties', 'name' ] } ]
console.log(validate(schema, {
age: "43",
phones: ["+44 1234567", 442345678],
}, { maxErrors: 1 }));
Advanced Usage: Handling Untrusted Schemas
If you want to run jtd
against a schema that you don't trust, then you should:
Ensure the schema is well-formed, using
jtd.isSchema
andjtd.isValidSchema
.isSchema
does basic "type" checking (and in TypeScript, it acts as a type guard for theSchema
type), whileisValidSchema
validates things like making sure allref
s have corresponding definitions.Call
jtd.validate
with themaxDepth
option. JSON Typedef lets you write recursive schemas -- if you're evaluating against untrusted schemas, you might go into an infinite loop when evaluating against a malicious input, such as this one:{ "ref": "loop", "definitions": { "loop": { "ref": "loop" } } }
The
maxDepth
option tellsjtd.validate
how manyref
s to follow recursively before giving up and throwingjtd.MaxDepthExceededError
.
Here's an example of how you can use jtd
to evaluate data against an untrusted
schema:
import { isSchema, isValidSchema, Schema, validate } from "jtd";
// validateUntrusted returns true if `data` satisfies `schema`, and false if it
// does not. Throws an error if `schema` is invalid, or if validation goes in an
// infinite loop.
function validateUntrusted(schema: unknown, data: unknown): boolean {
if (!isSchema(schema) || !isValidSchema(schema)) {
throw new Error("invalid schema");
}
// You should tune maxDepth to be high enough that most legitimate schemas
// evaluate without errors, but low enough that an attacker cannot cause a
// denial of service attack.
return validate(schema, data, { maxDepth: 32 }).length === 0;
}
// Returns true
validateUntrusted({ type: "string" }, "foo");
// Returns false
validateUntrusted({ type: "string" }, null);
// Throws "invalid schema"
validateUntrusted({ type: "nonsense" }, null);
// Throws an instance of jtd.MaxDepthExceededError
validateUntrusted({
"ref": "loop",
"definitions": {
"loop": {
"ref": "loop",
},
},
}, null);