Validate authored agreement JSON withDocumentation Index
Fetch the complete documentation index at: https://docs.shodai.network/llms.txt
Use this file to discover all available pages before exploring further.
client.validateTemplate(...) before preparing deployment values, participant wallet mappings, signer data, or permits.
Structural validation checks authored agreement JSON only. Deployment preflight checks the authored agreement plus deployment values, participant mappings, observers, and normalized variables.
When to validate
Run structural validation after authoring and before deployment preflight when:- participant roles are modeled
- states and inputs reflect the intended workflow
execution.initializeis in place- you want feedback before assembling deployment context
Validate the authored agreement
- SDK
- HTTP
Read the response
A representative response looks like this:| Field | How to use it |
|---|---|
templateId | Confirms the agreement metadata identity when one is present. |
participantVariableKeys | Confirms which participant-role variables the agreement exposes. |
inputIds | Confirms which authored business events can be submitted later. |
stateIds | Confirms which lifecycle states the agreement defines. |
warnings | Flags unusual or incomplete authoring choices to review before deployment. |
What validation does not prove
PassingPOST /v0/agreements/validate-template does not prove that:
- deployment values are present
- participant wallet addresses have been supplied
- observers are valid for your deployment context
- signer or permit data is ready
- the agreement has been deployed
- every future input will be valid from every live state
POST /v0/agreements/validate during deployment to preflight the assembled deployment request. That deployment preflight does not deploy and does not validate permit signatures.
Use the result as authoring feedback
If participant keys are missing, inspect participant variables andsubtype: "participant". If input IDs are missing, inspect execution.inputs. If state IDs are unexpected, inspect execution.states and transitions. If warnings appear, resolve or consciously accept them before signing deployment data.