afaik, there are efforts to implement toolings around reverse engineering and get a RAML from your existing API landscape where multiple services are already running. Let me get a little bit more information about that.
Hi mloskot, actually we are working on some tooling for reverse engineering of APIs from log of HAR requests (can be easily saved from the browser or generated from other formats of logs), I am not sure about exact date when it will be publicly available, but it is planned to be in the end of October
I’ve seen a few videos around (sorry, don’t have the links) that explain exactly how to do that using a proxy (can be a local one if you are bothered about requests hitting a remote server). The desktop application only works on a Mac currently, but Windows and Linux are planned for a release soon.
As for I know, I had discussed this with @ddossot and he suggested that “we could use the JAX-RS to RAML tool but it dynamically generates (and thus changes) the RAML spec based on the implementation, which is a bad thing if we keep it that way (the implementation should be based on the spec, not the other way around). We could use this tool once, save the RAML file and then turn the feature off. Then the RAML file would become the spec against which the implementation is checked.”