This will generate an OpenAPI V3 (up to v3.0.3) file for you from your serverless file. It can optionally generate a Postman Collection V2 from the OpenAPI file for you too. This currently works for http
and httpApi
configurations.
Originally based off of: https://github.com/temando/serverless-openapi-documentation
This plugin works for Serverless (2.x, 3.x and 4.x) and only supports node.js 14 and up.
To add this plugin to your package.json:
Using npm:
npm install --save-dev serverless-openapi-documenter
Next you need to add the plugin to the plugins
section of your serverless.yml
file.
plugins:
- serverless-openapi-documenter
Note: Add this plugin after
serverless-offline
to prevent issues withString.replaceAll
being overridden incorrectly.
To Run: serverless openapi generate -o openapi.json -f json -a 3.0.3 -p postman.json
Options:
--output -o What filename the OpenAPI Description should output under. Default: openapi.json
--format -f Whether to output the OpenAPI Description as json or yaml. Default: json
--indent -i File indentation in spaces. Default: 2
--openApiVersion -a OpenAPI version to generate for. Default: 3.0.0
--postmanCollection -p Will generate a postman collection (from the generated OpenAPI Description), in json only, if passed in. Default: postman.json
--validationWarn -w Warn about validation errors only. Will write the OpenAPI file if generation is successful. Default: false
OpenAPI field | Serverless field |
---|---|
info.title | custom.documentation.title OR service |
info.description | custom.documentation.description OR blank string |
info.version | custom.documentation.version OR random v4 uuid if not provided |
info.termsOfService | custom.documentation.termsOfService |
info.contact | custom.documentation.contact |
info.contact.name | custom.documentation.contact.name OR blank string |
info.contact.url | custom.documentation.contact.url if provided |
info.contact.x- | custom.documentation.contact.x- extended specifications provided |
info.license | custom.documentation.license |
info.license.name | custom.documentation.license.name OR blank string |
info.license.url | custom.documentation.license.url if provided |
info.license.x- | custom.documentation.license.x- if extended specifications provided provided |
externalDocs.description | custom.documentation.externalDocumentation.description |
externalDocs.url | custom.documentation.externalDocumentation.url |
x-tagGroups | custom.documentation.x-tagGroups if provided |
security | custom.documentation.security |
servers[].description | custom.documentation.servers.description |
servers[].url | custom.documentation.servers.url |
servers[].variables | custom.documentation.servers.variables |
tags[].name | custom.documentation.tags.name |
tags[].description | custom.documentation.tags.description |
tags[].externalDocs.url | custom.documentation.tags.externalDocumentation.url |
tags[].externalDocs.description | custom.documentation.tags.externalDocumentation.description |
tags[].externalDocs.x- | custom.documentation.tags.externalDocumentation.x- if extended specifications provided |
path[path] | functions.functions.events.[http OR httpApi].path |
path[path].servers[].description | functions.functions.servers.description |
path[path].servers[].url | functions.functions.servers.url |
path[path].[operation] | functions.functions.[http OR httpApi].method |
path[path].[operation].summary | functions.functions.[http OR httpApi].documentation.summary |
path[path].[operation].description | functions.functions.[http OR httpApi].documentation.description |
path[path].[operation].operationId | functions.functions.[http OR httpApi].documentation.operationId OR functionName |
path[path].[operation].deprecated | functions.functions.[http OR httpApi].documentation.deprecated |
path[path].[operation].externalDocs.description | functions.functions.[http OR httpApi].documentation.externalDocumentation.description |
path[path].[operation].externalDocs.url | functions.functions.[http OR httpApi].documentation.externalDocumentation.url |
path[path].[operation].servers[].description | functions.functions.[http OR httpApi].documentation.servers.description |
path[path].[operation].servers[].url | functions.functions.[http OR httpApi].documentation.servers.url |
path[path].[operation].security | functions.functions.[http OR httpApi].documentation.security |
path[path].[operation].deprecated | functions.functions.[http OR httpApi].documentation.deprecated |
path[path].[operation].parameters | functions.functions.[http OR httpApi].documentation.[path/query/cookie/header]Params |
path[path].[operation].parameters.name | functions.functions.[http OR httpApi].documentation.[path/query/cookie/header]Params.name |
path[path].[operation].parameters.in | functions.functions.[http OR httpApi].documentation.[path/query/cookie/header]Params |
path[path].[operation].parameters.description | functions.functions.[http OR httpApi].documentation.[path/query/cookie/header]Params.description |
path[path].[operation].parameters.required | functions.functions.[http OR httpApi].documentation.[query/cookie/header]Params.required |
path[path].[operation].parameters.deprecated | functions.functions.[http OR httpApi].documentation.[path/query/cookie/header]Params.deprecated |
path[path].[operation].parameters.allowEmptyValue | functions.functions.[http OR httpApi].documentation.[path/query/cookie/header]Params.allowEmptyValue |
path[path].[operation].parameters.style | functions.functions.[http OR httpApi].documentation.[path/query/cookie/header]Params.style |
path[path].[operation].parameters.explode | functions.functions.[http OR httpApi].documentation.[path/query/cookie/header]Params.explode |
path[path].[operation].parameters.allowReserved | functions.functions.[http OR httpApi].documentation.[path/query/cookie/header]Params.allowReserved |
path[path].[operation].parameters.schema | functions.functions.[http OR httpApi].documentation.[path/query/cookie/header]Params.schema |
path[path].[operation].parameters.example | functions.functions.[http OR httpApi].documentation.[path/query/cookie/header]Params.example |
path[path].[operation].parameters.examples | functions.functions.[http OR httpApi].documentation.[path/query/cookie/header]Params.examples |
path[path].[operation].requestBody | functions.functions.[http OR httpApi].documentation.requestBody |
path[path].[operation].requestBody.description | functions.functions.[http OR httpApi].documentation.requestBody.description |
path[path].[operation].requestBody.required | functions.functions.[http OR httpApi].documentation.requestBody.required |
path[path].[operation].requestBody.content | functions.functions.[http OR httpApi].documentation.requestModels[contentType].name Links to custom.documentation.models.name |
path[path].[operation].responses | functions.functions.[http OR httpApi].documentation.methodResponses |
path[path].[operation].responses.[statusCode] | functions.functions.[http OR httpApi].documentation.methodResponses[statusCode] |
path[path].[operation].responses.[statusCode].description | functions.functions.[http OR httpApi].documentation.methodResponses[statusCode].responseBody.description |
path[path].[operation].responses.[statusCode].content | functions.functions.[http OR httpApi].documentation.methodResponses[statusCode].responseModels[contentType] Links to custom.documentation.models.name |
To configure this plugin to generate a valid OpenAPI Description, there are two places you'll need to modify in your serverless.yml
file, the custom
variables section and the http/httpApi
event section for each given function in your service.
The custom
section of your serverless.yml
can be configured as below:
custom:
documentation:
version: "1"
title: "My API"
description: "This is my API"
termsOfService: https://google.com
externalDocumentation:
url: https://google.com
description: A link to google
servers:
url: https://example.com:{port}/
description: The server
variables:
port:
enum:
- 4000
- 3000
default: 3000
description: The port the server operates on
tags:
- name: tag1
description: this is a tag
externalDocumentation:
url: https://npmjs.com
description: A link to npm
models: {}
Mostly everything here is optional. A version from a UUID will be generated for you if you don't specify one, title will be the name of your service if you don't specify one. You will need to specify the documentation
top object.
Must be in the format of a url if included.
You can provide an optional contact object such as:
custom:
documentation:
contact:
name: John
url: https://example.com
email: John@example.com
These fields are optional, though url
needs to in the form of a URL and email
needs to be in the format of an email address (ed: what that might be, I'm not 100% sure... go read the email RFC(s)).
This can be extended using the ^x-
specification extension.
You can provide an optional license object such as:
custom:
documentation:
license:
name: Apache 2.0
url: https://www.apache.org/licenses/LICENSE-2.0.html
Name is required but url
is optional and must be in the format of a url.
This can be extended using the ^x-
specification extension.
You can also add extended fields to the documentation object:
custom:
documentation:
x-other-field: This is an extended field
These fields must have x-
before them, otherwise they will be ignored:
custom:
documentation:
other-field: This is an extended field
other-field
here will not make it to the generated OpenAPI schema.
Currently extended specification fields defined under the documentation
tag will sit under the OpenAPI info
object e.g.
custom:
documentation:
title: myService
x-other-field: This is an extended field
converts to:
{
"info": {
"title": "myService",
"x-other-field": "This is an extended field"
}
}
An exception to this is Redocly x-tagGroups
. If defined, they will sit at the root level of the OpenAPI specification, e.g.
custom:
documentation:
title: myService
x-other-field: This is an extended field
x-tagGroups:
- name: Customers
tags:
- Customers
converts to:
{
"info": {
"title": "myService",
"x-other-field": "This is an extended field"
},
"x-tagGroups": [
{
"name": "Customers",
"tags": ["Customers"]
}
]
}
These configurations can be quite verbose; you can separate it out into it's own file, such as serverless.doc.yml
as below:
custom:
documentation: ${file(serverless.doc.yml):documentation}
functions:
myFunc:
events:
- http:
path: getStuff
method: get
documentation: ${file(serverless.doc.yml):endpoints.myFunc}
For more info on serverless.yml
syntax, see their docs.
You can provide optional Security Schemes:
custom:
documentation:
securitySchemes:
my_api_key:
type: apiKey
name: api_key
in: header
It accepts all available Security Schemes and follows the specification: https://spec.openapis.org/oas/v3.0.3#security-scheme-object
To apply an overall security scheme to all of your operations without having to add the documentation to each one, you can write it like:
custom:
documentation:
securitySchemes:
my_api_key:
type: apiKey
name: api_key
in: header
security:
- my_api_key: []
This will apply the requirement of each operation requiring your my_api_key
security scheme, you can override this.
There are two ways to write the Models. Models contain additional information that you can use to define schemas for endpoints. You must define the content type for each schema that you provide in the models.
The first way of writing the model is: required directives for the models section are as follow:
name
: the name of the schemadescription
: a description of the schemacontentType
: the content type of the described request/response (ie.application/json
orapplication/xml
).schema
: The JSON Schema (website) that describes the model. You can either use inlineYAML
to define these or use either an external file schema that serverless will resolve (as below), or a reference to an externally hosted schema that will be attempted to be resolved.
custom:
documentation:
models:
- name: "ErrorResponse"
description: "This is an error"
contentType: "application/json"
schema: ${file(models/ErrorResponse.json)}
- name: "PutDocumentResponse"
description: "PUT Document response model (external reference example)"
contentType: "application/json"
schema: ${file(models/PutDocumentResponse.json)}
- name: "PutDocumentRequest"
description: "PUT Document request model (inline example)"
contentType: "application/json"
schema:
$schema: "http://json-schema.org/draft-04/schema#"
type: object
properties:
SomeObject:
type: "object"
properties:
SomeAttribute:
type: "string"
examples:
- name: someObjectInlineExample
summary: an example of a request
description: a longer string than the summary
value: { SomeObject: { SomeAttribute: "attribute" } }
- name: someObjectExternalExample
summary: an example of a request external
description: a longer string than the summary
externalValue: https://example.com/external.json
The Second way of writing the models:
name
: the name of the schemadescription
: a description of the schemacontent
: an Object made up of the contentType and the schema, as shown below
custom:
documentation:
models:
- name: "ErrorResponse"
description: "This is an error"
content:
application/json:
schema: ${file(models/ErrorResponse.json)}
- name: "PutDocumentResponse"
description: "PUT Document response model (external reference example)"
content:
application/json:
schema: ${file(models/PutDocumentResponse.json)}
- name: "PutDocumentRequest"
description: "PUT Document request model (inline example)"
content:
application/json:
schema:
$schema: "http://json-schema.org/draft-04/schema#"
type: object
properties:
SomeObject:
type: "object"
properties:
SomeAttribute:
type: "string"
examples:
- name: someObjectInlineExample
summary: an example of a request
description: a longer string than the summary
value: { SomeObject: { SomeAttribute: "attribute" } }
- name: someObjectExternalExample
summary: an example of a request external
description: a longer string than the summary
externalValue: https://example.com/external.json
Through the magic of YAML, you can re-use models:
custom:
documentation:
...
models:
- name: "ErrorResponse"
description: "This is an error"
content:
application/json:
schema: &ErrorItem
type: object
properties:
message:
type: string
code:
type: integer
- name: "PutDocumentResponse"
description: "PUT Document response model (external reference example)"
content:
application/json:
schema:
type: array
items: *ErrorItem
&ErrorItem
in the above example creates a node anchor (&ErrorItem) to the ErrorResponse
schema which then can be used in the PutDocumentResponse
schema via the reference (*ErrorItem). The node anchor needs to be declared first before it can be used elsewhere via the reference, swapping the above example around would result in an error.
It was brought to my attention that an older plugin version allowed the use of modelsList
. As of 0.0.60, you can continue to use modelsList
as well as using models
, however modelsList
now has to be nested within the documentation
section. You can write modelsList
the same way as any of the two styles for Models.
custom:
documentation:
...
modelsList:
- name: "ErrorResponse"
description: "This is an error"
content:
application/json:
schema:
type: string
As of 0.0.64, you can now make use of Request Schema Validators. This allows you to define Request models via the apiGateway
settings:
provider:
...
apiGateway:
request:
schemas:
post-create-model:
name: PostCreateModel
schema: ${file(api_schema/post_add_schema.json)}
description: "A Model validation for adding posts"
which are then used like:
functions:
create:
handler: posts.create
events:
- http:
path: posts/create
method: post
request:
schemas:
application/json: post-create-model
documentation: ...
The generator will match to the model within the apiGateway
settings model list. If you are using the apiGateway
to define models, please do not re-use any names that you might define in the models
list.
You can also skip writing a requestBody
and requestModels
if you have defined a request
property in your event.
If you're not using apiGateway
, you can still make use of request
by writing in the other styles that serverless accepts for Request Schema Validators:
functions:
create:
handler: posts.create
events:
- http:
path: posts/create
method: post
request:
schemas:
application/json:
schema: ${file(create_request.json)}
name: PostCreateModel
description: "Validation model for Creating Posts"
or
functions:
create:
handler: posts.create
events:
- http:
path: posts/create
method: post
request:
schemas:
application/json: ${file(create_request.json)}
To define the documentation for a given function event, you need to create a documentation
attribute for your http
or httpApi
event in your serverless.yml
file.
The documentation
section of the event configuration can contain the following attributes:
summary
: A short description of the methoddescription
: A detailed description of the methodtags
: An array of tags for this eventdeprecated
: Boolean indicator that indicates clients should migrate away from this functionrequestBody
: Contains description of the requestdescription
: A description of the request bodyrequired
: Whether the request body is required, defaults to false
requestModels
: A list of models to describe the request bodies (see requestModels below)queryParams
: A list of query parameters (see queryParams below)pathParams
: A list of path parameters (see pathParams below)cookieParams
: A list of cookie parameters (see cookieParams below)headerParams
: A list of headers (see headerParams below)security
: The security requirement to apply (see security below)methodResponses
: An array of response models and applicable status codesstatusCode
: Applicable http status code (ie. 200/404/500 etc.)responseBody
: Contains description of the responsedescription
: A description of the body response
responseHeaders
: A list of response headers (see responseHeaders below)responseModels
: A list of models to describe the request bodies (see responseModels below) for eachContent-Type
If you don't want a http
or httpApi
event to be documented, you can leave off the documentation
object. The configuration schema will only check that you have specified a methodResponses
on the documentation
event, previously the plugin would cause serverless to warn or error (depending on your configValidationMode
) if you had not supplied a documentation
on an event.
functions:
createUser:
handler: handler.create
events:
- http:
path: create
method: post
cors: true
summary:
documentation:
summary: "Create User"
description: "Creates a user and then sends a generated password email"
tags:
- tag1
externalDocumentation:
url: https://bing.com
description: A link to bing
requestBody:
description: "A user information object"
requestModels:
application/json: "PutDocumentRequest"
pathParams:
- name: "username"
description: "The username for a user to create"
schema:
type: "string"
pattern: "^[-a-z0-9_]+$"
queryParams:
- name: "membershipType"
description: "The user's Membership Type"
schema:
type: "string"
enum:
- "premium"
- "standard"
cookieParams:
- name: "SessionId"
description: "A Session ID variable"
schema:
type: "string"
headerParams:
name: "Content-Type"
description: "The content type"
schema:
type: "string"
methodResponses:
- statusCode: 201
responseBody:
description: "A user object along with generated API Keys"
responseModels:
application/json: "PutDocumentResponse"
responseHeaders:
X-Rate-Limit-Limit:
description: The number of allowed requests in the current period
schema:
type: integer
- statusCode: 500
responseBody:
description: "An error message when creating a new user"
responseModels:
application/json: "ErrorResponse"
Query parameters can be described as follow:
name
: the name of the query variabledescription
: a description of the query variablerequired
: whether the query parameter is mandatory (boolean)schema
: JSON schema (inline, file or externally hosted)
queryParams:
- name: "filter"
description: "The filter parameter"
required: true
schema:
type: "string"
Path parameters can be described as follow:
name
: the name of the path parameterdescription
: a description of the path parameterschema
: JSON schema (inline, file or externally hosted)
pathParams:
- name: "usernameId"
description: "The usernameId parameter"
schema:
type: "string"
Cookie parameters can be described as follow:
name
: the name of the cookie parameterdescription
: a description of the cookie parameterrequired
: whether the cookie parameter is mandatory (boolean)schema
: JSON schema (inline, file or externally hosted)
cookieParams:
- name: "sessionId"
description: "The sessionId parameter"
required: true
schema:
type: "string"
Request Headers can be described as follow:
name
: the name of the headerdescription
: a description of the headerrequired
: whether the header is mandatory (boolean)schema
: JSON schema (inline, file or externally hosted)
headerParams:
- name: "Content-Type"
description: "The content type"
required: true
schema:
type: "string"
The security
property allows you to specify the Security Scheme to apply to the HTTP Request. If you have applied an security
(see Security on each operation) then you can either leave this field off, or to override it with a different scheme you can write it like:
custom:
documentation:
securitySchemes:
my_api_key:
type: apiKey
name: api_key
in: header
petstore_auth:
type: oauth2
flows:
implicit:
authorizationUrl: https://example.com/api/oauth/dialog
scopes:
write:pets: modify pets in your account
read:pets: read your pets
security:
- my_api_key: []
functions:
getData:
events:
- http:
documentation:
security:
- petstore_auth:
- write:pets
- read:pets
If you have specified an security
at the document root, but this HTTP Request should not apply any security schemes, you should set security to be an array with an empty object:
custom:
documentation:
securitySchemes:
my_api_key:
type: apiKey
name: api_key
in: header
security:
- my_api_key: []
functions:
getData:
events:
- http:
documentation:
security:
- {}
If you use the private property on your event:
functions:
getData:
events:
- http:
path: /
method: get
private: true
It will automatically setup an apiKey security scheme of x-api-key
attached to that method. You don't need to add this to the Security Scheme in the main documentation. If you have already added a Security Scheme of an apiKey
with a name of x-api-key
, it will associate with that key.
custom:
documentation:
securitySchemes:
my_api_key:
type: apiKey
name: x-api-key
in: header
security:
- my_api_key: []
functions:
getData:
events:
- http:
path: /
method: get
private: true
documentation: ...
Will set the Security Scheme to my_api_key
for that operation.
The requestModels
property allows you to define models for the HTTP Request of the function event. You can define a different model for each different Content-Type
. You can define a reference to the relevant request model named in the models
section of your configuration (see Defining Models section).
requestModels:
application/json: "CreateRequest"
application/xml: "CreateRequestXML"
methodResponses
is a mandatory property and should include the responseBody
and description
properties.
You can define the response schemas by defining properties for your function event.
For an example of a methodResponses
configuration for an event see below:
methodResponse:
- statusCode: 200
responseBody:
description: Success
responseModels:
application/json: "CreateResponse"
application/xml: "CreateResponseXML"
links:
getDataLink:
operation: getData
description: The id created here can be used to get Data
parameters:
contentId: $response.body#/id
responseHeaders:
X-Rate-Limit-Limit:
description: The number of allowed requests in the current period
schema:
type: integer
X-Rate-Limit-Remaining:
description: The number of remaining requests in the current period
schema:
type: integer
X-Rate-Limit-Reset:
description: The number of seconds left in the current period
schema:
type: integer
The responseModels
property allows you to define models for the HTTP Response of the function event. You can define a different model for each different Content-Type
. You can define a reference to the relevant response model named in the models
section of your configuration (see Defining Models section).
responseModels:
application/json: "CreateResponse"
application/xml: "CreateResponseXML"
The links
property allows you to define how operations are linked to each other:
links:
linkName:
operation: getContent
description: The contentId created here can be used to get content
parameters:
contentId: $response.body#/contentId
Where we are specifying operation, this should map to the function name:
functions:
createContent:
events:
- httpApi:
path: /
method: POST
documentation: ...
getContent:
events:
- http:
path: /{contentId}
method: POST
documentation: ...
If our example link was attached to the createContent function, and we wanted the contentId
that was created to be used on the getContent function in the contentId
parameter, we'd specify the operation
property as getContent. If however, you had specified an operationId in the documentation to override the automatically created one:
getContent:
events:
- http:
path: /{contentId}
method: POST
documentation:
operationId: getMyContent
You can refer to the operationId
that you created.
You can read more about links on the swagger.io site and in the OpenAPI specification. They don't seem widely supported just yet, but perhaps they'll improve your documentation.
The responseHeaders
property allows you to define the headers expected in a HTTP Response of the function event. This should only contain a description and a schema, which must be a JSON schema (inline, file or externally hosted).
responseHeaders:
X-Rate-Limit-Limit:
description: The number of allowed requests in the current period
schema:
type: integer
You can automatically generate CORS response headers by setting cors
at the function level. Serverless allows you to modify how CORS is setup, so you can have the default options with cors: true
, or you can modify the settings as shown in the serverless documentation for CORS.
The generator will interpret your settings for CORS and automatically add the response headers. If for whatever reason you wish to override these, you can set them via the above responseHeaders
setting and it'll apply your overrides.
You can make use of the OWASP Secure Headers to generate response headers. These are a selection of response headers with default values that OWASP recommends returning with your response to help secure your application.
The OWASP Secure Headers Project contains a set of recommended headers to return with recommended values, when generating the documentation, the generator will attempt to get the latest version of this document and apply the latest recommendations. If you do not allow outside connections, it will default to a version of recommendations from 2024-09-19 21:29:28 UTC.
Like CORS, if you have already set any of the OWASP Secure headers via responseHeaders
, it will not overwrite them.
To make use of OWASP Secure Headers, you can use the following:
methodResponse:
- statusCode: 200
responseBody:
description: Success
responseModels:
application/json: "CreateResponse"
owasp: true
This will use the full set of OWASP Secure Headers and their recommended values. Some of these might not be appropriate for your application.
methodResponse:
- statusCode: 200
responseBody:
description: Success
responseModels:
application/json: "CreateResponse"
owasp:
cacheControl: true
referrerPolicy: true
This will set only the cacheControl
and referrerPolicy
response header with the default recommendations.
The full list of OWASP Secure Headers you can set are:
- cacheControl - Cache-Control,
- clearSiteData - Clear-Site-Data,
- contentSecurityPolicy - Content-Security-Policy,
- crossOriginEmbedderPolicy - Cross-Origin-Embedder-Policy,
- crossOriginOpenerPolicy - Cross-Origin-Opener-Policy,
- crossOriginResourcePolicy - Cross-Origin-Resource-Policy,
- permissionsPolicy - Permissions-Policy,
- referrerPolicy - Referrer-Policy,
- strictTransportSecurity - Strict-Transport-Security,
- xContentTypeOptions - X-Content-Type-Options,
- xFrameOptions - X-Frame-Options,
- xPermittedCrossDomainPolicies - X-Permitted-Cross-Domain-Policies
You should note that Pragma
has been deprecated by owasp, this plugin will issue a warning when you are still using Pragma and might drop support.
If you wish to override the OWASP Secure Headers, you can write your methodResponse
like:
methodResponse:
- statusCode: 200
responseBody:
description: Success
responseModels:
application/json: "CreateResponse"
owasp:
cacheControl:
value: no-store
This will set the Cache-Control
Response Header to have a value of "no-store" rather than any value the OWASP Secure Headers Project recommends.
Validation for the OpenAPI Description is now (as of 0.0.90) done by Redocly. This is a slightly less opinionated validator for an OpenAPI Description, it should result in less errors around "YAML Anchors". It's also a maintained library, and has support for OpenAPI 3.1.0 which I hope to be able to support very soon.
I am making use of https://www.npmjs.com/package/@redocly/openapi-core, which I have been warned is likely to change. If you notice anything going wrong with validation of your OpenAPI Description, feel free to open an issue here. I make active use of this library, so will hopefully come across those issues too.
I have configured the validator to use these Rules:
- spec
- path-parameters-defined
- operation-2xx-response
- operation-4xx-response
- operation-operationId-unique
- path-declaration-must-exist
However, you can configure your own rules from the ruleset available on the Redocly site. To do this, you will need to create a redocly.json
file within an options
folder. The file should look like:
{
"spec": "error",
"path-parameters-defined": "error",
"operation-2xx-response": "error",
"operation-4xx-response": "error",
"operation-operationId-unique": "error",
"path-declaration-must-exist": "error"
}
Since rules can be set to "warn", you no longer are required to tell the plugin to ignore errors with the --validationWarn
flag.
Please view the example serverless.yml.
Schemas can be either: inline, in file or externally hosted. If they're inline or in file, the plugin will attempt to normalise the schema to OpenAPI 3.0.X specification.
If they exist as an external reference, for instance:
schema: https://raw.githubusercontent.com/SchemaStore/schemastore/master/src/schemas/json/bettercodehub.json
We use the plugin JSON Schema $Ref Parser to attempt to parse and resolve the references. There are limitations to this. Consider the schema:
{
"$schema": "https://json-schema.org/draft-04/schema",
"title": "Reusable Definitions",
"type": "object",
"id": "https://raw.githubusercontent.com/json-editor/json-editor/master/tests/fixtures/definitions.json",
"definitions": {
"address": {
"title": "Address",
"type": "object",
"properties": {
"street_address": { "type": "string" },
"city": { "type": "string" },
"state": { "type": "string" }
},
"required": ["street_address"]
},
"link": { "$refs": "./properties.json#/properties/title" }
},
"properties": {
"address": { "$refs": "#/definitions/address" }
}
}
Where the definition "link" refers to a schema held in a directory that the resolver does not know about, we will not be able to fully resolve the schema which will likely cause errors in validation of the OpenAPI 3.0.X Description.
Because of the dependency we use to parse externally linked schemas, we can supply our own options to resolve schemas that are more difficult than a straight forward example.
You can create your own options file: https://apitools.dev/json-schema-ref-parser/docs/options.html to pass into the dependency that contains it's own resolver to allow you to resolve references that might be in hard to reach places. In your main project folder, you should have a folder called options
with a file called ref-parser.js
that looks like:
"use strict";
// options from: https://apitools.dev/json-schema-ref-parser/docs/options.html
module.exports = {
continueOnError: true, // Don't throw on the first error
parse: {
json: false, // Disable the JSON parser
yaml: {
allowEmpty: false, // Don't allow empty YAML files
},
text: {
canParse: [".txt", ".html"], // Parse .txt and .html files as plain text (strings)
encoding: "utf16", // Use UTF-16 encoding
},
},
resolve: {
file: false, // Don't resolve local file references
http: {
timeout: 2000, // 2 second timeout
withCredentials: true, // Include auth credentials when resolving HTTP references
},
},
dereference: {
circular: false, // Don't allow circular $refs
excludedPathMatcher: (
path // Skip dereferencing content under any 'example' key
) => path.includes("/example/"),
},
};
If you don't supply this file, it will use the default options.
MIT