Lead Maintainer: Trevor Livingston
swaggerize-routes
is a component used by swaggerize-express and swaggerize-hapi for parsing and building route definitions based on a Swagger 2.0 document.
swaggerize-routes
provides the following features:
- Schema validation.
- Building route definitions from a Swagger 2.0 document.
- Validation helpers for input parameters.
var builder = require('swaggerize-routes');
var routes = builder({
api: require('./api.json'),
handlers: './handlers'
}));
Options:
api
- a valid Swagger 2.0 object.handlers
- either a directory structure for route handlers or a premade object (see Handlers Object below).basedir
- base directory to search forhandlers
path (defaults todirname
of caller).schemas
- an array of{name: string, schema: string|object}
representing additional schemas to add to validation.
Returns: An array of the processed routes.
The options.handlers
option specifies a directory to scan for handlers. These handlers are bound to the api paths
defined in the swagger document.
handlers
|--foo
| |--bar.js
|--foo.js
|--baz.js
Will route as:
foo.js => /foo
foo/bar.js => /foo/bar
baz.js => /baz
The file and directory names in the handlers directory can also represent path parameters.
For example, to represent the path /users/{id}
:
handlers
|--users
| |--{id}.js
This works with directory names as well:
handlers
|--users
| |--{id}.js
| |--{id}
| |--foo.js
To represent /users/{id}/foo
.
An alternative to automatically determining handlers based on a directory structure, handlers can be specified for both paths and/or operations.
Example:
{
"/pets": {
"x-handler": "handlers/pets.js"
}
}
Or at the operation level:
{
"/pets": {
"GET": {
"x-handler": "handlers/pets.js"
}
}
}
These paths are relative to the options.basedir
and are used as fallbacks for missing handlers from directory scan.
If the options.handlers
is empty, then they will be used exclusively.
Each provided javascript file should export an object containing functions with HTTP verbs as keys.
Example:
module.exports = {
get: function (...) { ... },
put: function (...) { ... },
...
}
Where the function signature is a handler for the target framework (e.g. express
or hapi
).
Handlers specified by x-handler
can also be of the form:
module.exports = function (...) {
...
};
In the case where a different x-handler
file is specified for each operation.
The directory generation will yield this object, but it can be provided directly as options.handlers
.
Note that if you are programatically constructing a handlers obj this way, you must namespace HTTP verbs with $
to
avoid conflicts with path names. These keys should also be lowercase.
Example:
{
'foo': {
'$get': function (...) { ... },
'bar': {
'$get': function (...) { ... },
'$post': function (...) { ... }
}
}
...
}
Handler keys in files do not have to be namespaced in this way.
The routes
array returned from the call to the builder will contain route
objects. Each route
has the following properties:
path
- same aspath
fromapi
definition.name
- same asoperationId
inapi
definition.description
- same asdescription
inpath
forapi
definition.method
- same asmethod
fromapi
operation
definition.security
- the security defintion for this route, either pulled from the operation level or path level.validators
- an array of validation objects created from eachparameter
on theoperation
.handler
- a handler function appropriate to the target framework (e.g express).consumes
- same asconsumes
inapi
definition.produces
- same asproduces
inapi
definition.
The validator object in the validators
array will have the following properties:
parameter
- same as theparameter
from the operation onpath
.validate(value, callback)
- a function for validating the input data against theparameter
definition.schema
- thejoi
schema being validated against.
The security object in the route
is an object containing keys corresponding to names found under the Swagger Security Definitions.
Under each key will be an object containing the following properties:
scopes
- an array of scopes accepted for this route.authorize
- a function that may be provided by defining ax-authorize
attribute to the security definition.