Coder Social home page Coder Social logo

joancaron / cryptocompare-api Goto Github PK

View Code? Open in Web Editor NEW
46.0 6.0 23.0 1.64 MB

An async-based CryptoCompare API client library for .NET and .NET Core

Home Page: https://cryptocompare.joancaron.com

License: Apache License 2.0

C# 100.00%
cryptocompare-api cryptocurrency bitcoin dotnet-core dotnet-standard dotnet async cryptocurrencies cryptocompare

cryptocompare-api's People

Contributors

codacy-badger avatar cohowap avatar dependabot-preview[bot] avatar dependabot-support avatar dependabot[bot] avatar imgbotapp avatar joancaron avatar monsieurleberre avatar stepkillah avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar

cryptocompare-api's Issues

[DepShield] (CVSS 7.5) Vulnerability due to usage of set-value:2.0.0

Vulnerabilities

DepShield reports that this application's usage of set-value:2.0.0 results in the following vulnerability(s):


Occurrences

set-value:2.0.0 is a transitive dependency introduced by the following direct dependency(s):

docsify-cli:4.3.0
        └─ livereload:0.7.0
              └─ chokidar:1.7.0
                    └─ readdirp:2.2.1
                          └─ micromatch:3.1.10
                                └─ snapdragon:0.8.2
                                      └─ base:0.11.2
                                            └─ cache-base:1.0.1
                                                  └─ set-value:2.0.0

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 7.5) Vulnerability due to usage of q:1.5.1

Vulnerabilities

DepShield reports that this application's usage of q:1.5.1 results in the following vulnerability(s):


Occurrences

q:1.5.1 is a transitive dependency introduced by the following direct dependency(s):

standard-version:4.2.0
        └─ conventional-changelog:1.1.24
              └─ conventional-changelog-angular:1.6.6
                    └─ q:1.5.1
              └─ conventional-changelog-atom:0.2.8
                    └─ q:1.5.1
              └─ conventional-changelog-codemirror:0.3.8
                    └─ q:1.5.1
              └─ conventional-changelog-core:2.0.11
                    └─ q:1.5.1
              └─ conventional-changelog-ember:0.3.12
                    └─ q:1.5.1
              └─ conventional-changelog-eslint:1.0.9
                    └─ q:1.5.1
              └─ conventional-changelog-express:0.3.6
                    └─ q:1.5.1
              └─ conventional-changelog-jquery:0.1.0
                    └─ q:1.5.1
              └─ conventional-changelog-jscs:0.1.0
                    └─ q:1.5.1
              └─ conventional-changelog-jshint:0.3.8
                    └─ q:1.5.1

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

Json UnixTime Conversion Error

I am getting an exception when called a SnapShotFullAsync on coin Id 33639 and a few others

This is the line of code im calling that triggeres the exception
CryptoCompare.CoinSnapshotFullData coinInfo = CryptoCompareClient.Instance.Coins.SnapshotFullAsync(33639).Result.Data;

The exception has to do with the UnixTimeConverter.
Here is the full exception:
error

error2

That's not quite clear what does the library actually do.

Hi!

Could you clarify (and possibly add more description to read.me file if you want) what is actually the purpose of the library. It's not quite clear what should it compare, compare to what and what are the sources of the data.

Thanks!

Add support for SmartContractAddress field in CoinInfo

✨ Feature request

Add a string field to the CoinInfo to allow retrieving smart contract address when available

📝 Description

Currently, the field doesn't exist so the JSON data is not deserialized into the CoinInfo object

Describe the solution you'd like

Simply add a string field with the correct name on the class

Describe alternatives you've considered

Nothing really, apart from setting the field to null when the API returns "N/A", but this is not done anywhere else in the code

[DepShield] (CVSS 7.5) Vulnerability due to usage of debug:2.6.9

Vulnerabilities

DepShield reports that this application's usage of debug:2.6.9 results in the following vulnerability(s):


Occurrences

debug:2.6.9 is a transitive dependency introduced by the following direct dependency(s):

docsify-cli:4.3.0
        └─ connect:3.6.6
              └─ debug:2.6.9
              └─ finalhandler:1.1.0
                    └─ debug:2.6.9
        └─ docsify-server-renderer:4.8.6
              └─ debug:2.6.9
        └─ livereload:0.7.0
              └─ chokidar:1.7.0
                    └─ fsevents:1.2.4
                          └─ node-pre-gyp:0.10.0
                                └─ needle:2.2.0
                                      └─ debug:2.6.9
                    └─ readdirp:2.2.1
                          └─ micromatch:3.1.10
                                └─ extglob:2.0.4
                                      └─ expand-brackets:2.1.4
                                            └─ debug:2.6.9
                                └─ snapdragon:0.8.2
                                      └─ debug:2.6.9
        └─ serve-static:1.13.2
              └─ send:0.16.2
                    └─ debug:2.6.9

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 7.4) Vulnerability due to usage of lodash.templatesettings:4.1.0

Vulnerabilities

DepShield reports that this application's usage of lodash.templatesettings:4.1.0 results in the following vulnerability(s):


Occurrences

lodash.templatesettings:4.1.0 is a transitive dependency introduced by the following direct dependency(s):

standard-version:4.2.0
        └─ conventional-recommended-bump:1.2.1
              └─ git-raw-commits:1.3.6
                    └─ lodash.template:4.4.0
                          └─ lodash.templatesettings:4.1.0

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 7.4) Vulnerability due to usage of lodash._reinterpolate:3.0.0

Vulnerabilities

DepShield reports that this application's usage of lodash._reinterpolate:3.0.0 results in the following vulnerability(s):


Occurrences

lodash._reinterpolate:3.0.0 is a transitive dependency introduced by the following direct dependency(s):

standard-version:4.2.0
        └─ conventional-recommended-bump:1.2.1
              └─ git-raw-commits:1.3.6
                    └─ lodash.template:4.4.0
                          └─ lodash._reinterpolate:3.0.0
                          └─ lodash.templatesettings:4.1.0
                                └─ lodash._reinterpolate:3.0.0

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 7.4) Vulnerability due to usage of lodash.template:4.4.0

Vulnerabilities

DepShield reports that this application's usage of lodash.template:4.4.0 results in the following vulnerability(s):


Occurrences

lodash.template:4.4.0 is a transitive dependency introduced by the following direct dependency(s):

standard-version:4.2.0
        └─ conventional-recommended-bump:1.2.1
              └─ git-raw-commits:1.3.6
                    └─ lodash.template:4.4.0

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 7.5) Vulnerability due to usage of braces:1.8.5

Vulnerabilities

DepShield reports that this application's usage of braces:1.8.5 results in the following vulnerability(s):


Occurrences

braces:1.8.5 is a transitive dependency introduced by the following direct dependency(s):

commitizen:3.0.5
        └─ find-node-modules:1.0.4
              └─ findup-sync:0.4.2
                    └─ micromatch:2.3.11
                          └─ braces:1.8.5

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

Streamer

Hello
I can see you did the 'Streamer subscription channels'. Is it for realtime trades?
I couldn't find the function in CryptoCompareClient class or its members.

Multiple Symbols Full Data

✨ Feature request

The Multiple Symbols Full Data Api return object (CoinFullAggregatedDataDisplay) is missing some members like

  • VolumeHour
  • VolumeHourTo
  • OpenHour
  • OpenHourTo
  • LowHour
  • ImageUrl

Can you include them.

UnixTimeConverter: NotImplementedException when writing CandleData to json

Thank you for providing this library for people to use. I found a problem with the serialization of CandleData.

To reproduce in C#:

var date = new DateTimeOffset(2018, 6, 15, 0, 0, 0, new TimeSpan(0, 0, 0));  
var hist = await CryptoCompareClient.Instance.History.HourAsync("BTC", "USD", 2, "Coinbase", date); 
var json = Newtonsoft.Json.JsonConvert.SerializeObject(data); //exception thrown

The issue is here:

public override void WriteJson(JsonWriter writer, object value, JsonSerializer serializer)
{
throw new NotImplementedException();
}

I'm assuming it's only a minor amount of work needed. Would the project maintainer prefer I submit a PR or will they handle it on their own?

Boolean Values Not Working

When running the history client I noticed that I was getting an exception that said alldata was not a boolean value. What I noticted was bool?.ToString() was True. Added ToLower() and the parameter is now valid. I also got exceptions when testing other parameters on the same method also.

[DepShield] (CVSS 7.5) Vulnerability due to usage of marked:0.5.2

Vulnerabilities

DepShield reports that this application's usage of marked:0.5.2 results in the following vulnerability(s):


Occurrences

marked:0.5.2 is a transitive dependency introduced by the following direct dependency(s):

docsify-cli:4.3.0
        └─ docsify:4.8.6
              └─ marked:0.5.2

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 7.4) Vulnerability due to usage of lodash.map:4.6.0

Vulnerabilities

DepShield reports that this application's usage of lodash.map:4.6.0 results in the following vulnerability(s):


Occurrences

lodash.map:4.6.0 is a transitive dependency introduced by the following direct dependency(s):

cz-conventional-changelog:2.1.0
        └─ lodash.map:4.6.0

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 7.5) Vulnerability due to usage of tar:4.4.1

Vulnerabilities

DepShield reports that this application's usage of tar:4.4.1 results in the following vulnerability(s):


Occurrences

tar:4.4.1 is a transitive dependency introduced by the following direct dependency(s):

docsify-cli:4.3.0
        └─ livereload:0.7.0
              └─ chokidar:1.7.0
                    └─ fsevents:1.2.4
                          └─ node-pre-gyp:0.10.0
                                └─ tar:4.4.1

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 7.5) Vulnerability due to usage of set-value:0.4.3

Vulnerabilities

DepShield reports that this application's usage of set-value:0.4.3 results in the following vulnerability(s):


Occurrences

set-value:0.4.3 is a transitive dependency introduced by the following direct dependency(s):

docsify-cli:4.3.0
        └─ livereload:0.7.0
              └─ chokidar:1.7.0
                    └─ readdirp:2.2.1
                          └─ micromatch:3.1.10
                                └─ snapdragon:0.8.2
                                      └─ base:0.11.2
                                            └─ cache-base:1.0.1
                                                  └─ union-value:1.0.0
                                                        └─ set-value:0.4.3

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

[DepShield] (CVSS 9.8) Vulnerability due to usage of lodash:4.17.11

Vulnerabilities

DepShield reports that this application's usage of lodash:4.17.11 results in the following vulnerability(s):


Occurrences

lodash:4.17.11 is a transitive dependency introduced by the following direct dependency(s):

all-contributors-cli:5.4.1
        └─ inquirer:4.0.2
              └─ lodash:4.17.11
        └─ async:2.6.1
              └─ lodash:4.17.11
        └─ lodash:4.17.11

commitizen:3.0.5
        └─ inquirer:6.2.0
              └─ lodash:4.17.11
        └─ lodash:4.17.11

docsify-cli:4.3.0
        └─ docsify:4.8.6
              └─ opencollective:1.0.3
                    └─ inquirer:3.0.6
                          └─ lodash:4.17.11

standard-version:4.2.0
        └─ conventional-changelog:1.1.24
              └─ conventional-changelog-core:2.0.11
                    └─ conventional-changelog-writer:3.0.9
                          └─ lodash:4.17.11
                    └─ lodash:4.17.11
        └─ conventional-recommended-bump:1.2.1
              └─ conventional-commits-parser:2.1.7
                    └─ lodash:4.17.11

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

Throttling HttpClient

✨ Feature request

Add a possibility to throttle request to CryptoCompare.com API

📝 Description

The aim of this new feature is to allow users to remain below the maximum number of requests per second imposed by CryptoCompare.com when using their API.
For instance the free key I am using restricts the user to less than 10 requests per second.

Describe the solution you'd like

Please look at this draft solution:
master...monsieurleberre:throttle

I am happy to add some unit tests showing that the queries are delayed, however that will require mocking the wrapped HttpClient and therefore the introduction of the IHttpClientFactory interface (cf https://gingter.org/2018/07/26/how-to-mock-httpclient-in-your-net-c-unit-tests/). I felt that was a bit too much for this proposal but let me know if this is required.

Describe alternatives you've considered

For a more re-usable solution, I think we could also introduce a generic type that would wrap the type containing the method being throttled and take a Function in its constructor (the call that needs to be throttled). I think this might be an overkill here though.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.