Security News
Input Validation Vulnerabilities Dominate MITRE's 2024 CWE Top 25 List
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Ingests a smart contract's ABI and autogenerates an OpenAPI JSON, ready for Swagger codegen.
Ingests a smart contract's ABI and autogenerates a JSON conforming to the OpenAPI Spec, ready for Swagger Codegen.
Install globally via npm
, yarn
, or your preferred Javascript package manager:
npm install -g abi2oas
yarn global add abi2oas
Use in your terminal of choice by running:
abi2oas <path_to_config.json> <path_to_output.json>
If you are on Windows, you might need to refresh your path by restarting the terminal.
You can also use abi2oas
directly within node. Install directly to your project:
npm install --save abi2oas
// OR
yarn add abi2oas
Import like any other package, then use the convert
method to build the OpenAPI object:
const abi2oas = require('abi2oas');
const contractApiSpec = abi2oas.convert(<path_to_contract.json>, <output_path.json>, [config]);
.convert()
runs synchronously and returns the serialized object corresponding to the OpenAPI JSON. config
in this method may either be an object or a string pointing to a config JSON. Read below for config spec.
The smart contract is mapped to the OpenAPI spec on a per-function basis:
whitelistAddress
function yields /whitelistAddress
path). If the function is constant
, then its path accepts GET requests. Otherwise, it accepts POST requests.whitelistAddressScope
tag). All methods for each function automatically have its tag, along with any other custom tags specified in the config.whitelistAddress_post_params
& whitelistAddress_post_params_response
), as well as definitions for receipts and basic types.The config JSON includes the path to the contract, ethereum options, and swagger options.
{
"version": "1.0.0", // optional, "1.0.0" is default
"schemes": ["https"], // optional, ["https"] is default
"host": "localhost:8080", // optional, "localhost:8080" is default
"basePath": "/", // optional, '/' is default
"tags": [ // Optional custom tags...],
"api": { // Optional, add tags to methods; see below }
}
Config must be valid JSON, comments only included for illustrative purposes.
You can specify additional tags using the tags
key.
{ ...,
"tags" : [
{
"name": "admin",
"description": "Only admin access"
},
...]
}
Custom tags can be attached per-endpoint and per-method using the api
key. For instance, if you wanted to tag the POST method for contract function "whitelistAddress"
with "admin"
, for instance, your config file would include:
{ ...,
"tags" : { // above }
"api" : {
"whitelistAddress" : {
"post" : {
"tags" : ["admin"]
}
}
}
}
You can find our roadmap on GitHub.
abi2oas is developed & maintained by Eximchain, released for public use under the Apache-2.0 License.
Output from abi2oas is configured by default to use the same license.
FAQs
Ingests a smart contract's ABI and autogenerates an OpenAPI JSON, ready for Swagger codegen.
The npm package abi2oas receives a total of 2 weekly downloads. As such, abi2oas popularity was classified as not popular.
We found that abi2oas demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.