Download a binary for your OS from the Releases page, or build from source:
git clone https://github.com/chillmatin/enpara-transactions-parser.git
cd enpara-transactions-parser
make build
cd binBinaries are in the bin/ directory.
After obtaining binaries, there are two ways you can use this tool: enpara-api and enpara-cli
- Start the API server:
Visit http://localhost:8080/swagger for interactive API docs.
./enpara-api --swagger
-
Place your Enpara statement PDF (e.g.
1- Enpara Hesap Hareketleri.pdf) in the current directory. -
Convert to CSV (default):
./enpara-cli "1- Enpara Hesap Hareketleri.pdf"This creates
1- Enpara Hesap Hareketleri.csvin the same folder. -
Convert to JSON, XLSX, or OFX:
./enpara-cli "1- Enpara Hesap Hareketleri.pdf" --format json ./enpara-cli "1- Enpara Hesap Hareketleri.pdf" --format xlsx ./enpara-cli "1- Enpara Hesap Hareketleri.pdf" --format ofx
-
Choose PDF parser type (default: auto):
./enpara-cli "1- Enpara Hesap Hareketleri.pdf" --type auto ./enpara-cli "1- Enpara Hesap Hareketleri.pdf" --type type1 ./enpara-cli "1- Enpara Hesap Hareketleri.pdf" --type type2
-
Set output file name:
./enpara-cli "1- Enpara Hesap Hareketleri.pdf" --format csv --output my.csv
type1: Manual statement layout (existing parser behavior).type2: Automatic monthly statement layout with columnsTarih,Açıklama,Tutar,Bakiye.auto: Detects layout from PDF text and choosestype1ortype2.
For type2, an NFC field is included in JSON/CSV/XLSX outputs as 1 or 0.
POST /api/v1/convert multipart form fields:
file(required): PDF file.format(optional):json|csv|xlsx|ofx(defaultjson).type(optional):auto|type1|type2(defaultauto).
Show all Makefile targets:
make helpShow CLI help:
./enpara-cli --helpShow API help:
./enpara-api --helpGenerate release artifacts:
make releaseArtifacts are written to dist/.
Assume you downloaded the release files into one folder.
-
Create a local keyring from the bundled public key and verify the checksum signature:
gpg --no-default-keyring --keyring ./release-public-key.gpg --verify CHECKSUMS.sha256.asc CHECKSUMS.sha256
-
Verify file integrity:
sha256sum -c CHECKSUMS.sha256
The first check confirms the checksums were signed by the release key without adding it to your normal keyring. The second check confirms the zip contents match the published checksums.
Open an issue on GitHub.