stardog icv report Manual Page


stardog icv report —Integrity Constraint Validation command that validates SHACL constraints and generates a SHACL validation report as defined in the SHACL specification. Note that if there are other constraints in the database they will not be validated by this command.


stardog [ --krb5 ] [ --krb5-disable-rdns ]icv report [ {-f | --format} <format> ] [ {-g | --named-graph} <named graph>... ] [ {-l | --limit} <limit> ] [ --nodes <nodes>... ] [ --output-format <Output Format> ] [ {-p | --passwd} <password> ] [ {-P | --ask-password} ] [ {-r | --reasoning} ] [ --shapes <shapes>... ] [ {-u | --username} <username> ] [ {-v | --verbose} ] [--] <dbname> <constraint_files>...


-f <format>, --format <format>
RDF Format [N-TRIPLES, RDF/XML, TURTLE, TRIG] for the constraints or [SPARQL] for constraints specified as SPARQL queries.
-g <named graph>, --named-graph <named graph>
The list of contexts which should be validated, if none are specified, the entire database is validated wrt to the provided constraint(s).
Use the Kerberos environment.
Disable reverse DNS lookup for Kerberos clients.
-l <limit>, --limit <limit>
Limits the number of validation results returned. The default limit is 100. Note that, each validation result wil lbe serialized using multiple triples so the number of triples in the report might be higher than this limit.
--nodes <nodes>
The list of node IRIs that should be validated, if none are specified, all the nodes in the database are validated.
--output-format <Output Format>
Output RDF Format for the validation report. One of [NTRIPLES, RDF/XML, TURTLE, PRETTY_TURTLE, TRIG, TRIX, N3, NQUADS]
-p <password>, --passwd <password>
-P, --ask-password
Prompt for password.
-r, --reasoning
Turn reasoning on.
--shapes <shapes>
The list of shape IRIs that should be validated, if none are specified, all the SHACL shapes will are validated.
-u <username>, --username <username>
User name.
-v, --verbose
Verbose flag that causes more detailed information to be printed
This option can be used to separate command-line options from the list of argument, (useful when arguments might be mistaken for command-line options
<dbname> <constraint_files>
The name of the database or the full connection string of the database to connect to. If only the name is provided, the default server URL will be pre-pended to the name of the database in order to construct the connection string. Connection parameters such as ';reasoning=true' can be included in the provided database name. Connection parameters specified like this can be overridden by specific options on the command. The default server URL will be read from the JVM argument 'stardog.default.cli.server'. If the JVM argument is not set, the default value 'http://localhost:5820' is used. If the server URL has no explicit port value, the default port value '5820' is used. To use a secure connection, you should specify the full connection string and postfix 's' to the protocol, e.g. https. Then optionally the list of files which contain SHACL Constraints.


Validate the SHACL constraints already loaded to the database:

    $ stardog icv report myDb

Validate only the specified named graphs:

    $ stardog icv report -g -- myDb