cloudmersive-phishing-detection-api-client 2.2.0 → 2.2.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (47) hide show
  1. checksums.yaml +4 -4
  2. data/README.md +19 -21
  3. data/cloudmersive-phishing-detection-api-client.gemspec +1 -1
  4. data/docs/AdvancedEmailDetectionRequest.md +14 -0
  5. data/docs/PhishingDetectionAdvancedRequest.md +9 -0
  6. data/docs/PhishingDetectionAdvancedResponse.md +10 -0
  7. data/docs/PhishingDetectionApi.md +228 -0
  8. data/docs/PhishingDetectionEmailAdvancedResponse.md +17 -0
  9. data/docs/PhishingDetectionResponse.md +8 -0
  10. data/lib/cloudmersive-phishing-detection-api-client/api/phishing_detection_api.rb +223 -0
  11. data/lib/cloudmersive-phishing-detection-api-client/api_client.rb +1 -1
  12. data/lib/cloudmersive-phishing-detection-api-client/api_error.rb +1 -1
  13. data/lib/cloudmersive-phishing-detection-api-client/configuration.rb +1 -1
  14. data/lib/cloudmersive-phishing-detection-api-client/models/{phishing_url_advanced_request.rb → advanced_email_detection_request.rb} +72 -46
  15. data/lib/cloudmersive-phishing-detection-api-client/models/{phishing_url_advanced_response_batch.rb → phishing_detection_advanced_request.rb} +18 -20
  16. data/lib/cloudmersive-phishing-detection-api-client/models/{phishing_url_response_batch.rb → phishing_detection_advanced_response.rb} +22 -14
  17. data/lib/cloudmersive-phishing-detection-api-client/models/{phishing_url_response.rb → phishing_detection_email_advanced_response.rb} +80 -40
  18. data/lib/cloudmersive-phishing-detection-api-client/models/{phishing_url_request.rb → phishing_detection_response.rb} +11 -16
  19. data/lib/cloudmersive-phishing-detection-api-client/version.rb +2 -2
  20. data/lib/cloudmersive-phishing-detection-api-client.rb +7 -10
  21. data/spec/api/phishing_detection_api_spec.rb +81 -0
  22. data/spec/api_client_spec.rb +1 -1
  23. data/spec/configuration_spec.rb +1 -1
  24. data/spec/models/{phishing_url_response_spec.rb → advanced_email_detection_request_spec.rb} +19 -13
  25. data/spec/models/{phishing_url_advanced_response_batch_spec.rb → phishing_detection_advanced_request_spec.rb} +9 -9
  26. data/spec/models/{phishing_url_advanced_request_spec.rb → phishing_detection_advanced_response_spec.rb} +10 -10
  27. data/spec/models/{phishing_url_advanced_response_spec.rb → phishing_detection_email_advanced_response_spec.rb} +16 -22
  28. data/spec/models/{phishing_url_request_spec.rb → phishing_detection_response_spec.rb} +8 -8
  29. data/spec/spec_helper.rb +1 -1
  30. metadata +20 -29
  31. data/docs/PhishingUrlAdvancedRequest.md +0 -10
  32. data/docs/PhishingUrlAdvancedRequestBatch.md +0 -10
  33. data/docs/PhishingUrlAdvancedResponse.md +0 -18
  34. data/docs/PhishingUrlAdvancedResponseBatch.md +0 -9
  35. data/docs/PhishingUrlApi.md +0 -120
  36. data/docs/PhishingUrlBatchApi.md +0 -120
  37. data/docs/PhishingUrlRequest.md +0 -8
  38. data/docs/PhishingUrlResponse.md +0 -13
  39. data/docs/PhishingUrlResponseBatch.md +0 -9
  40. data/lib/cloudmersive-phishing-detection-api-client/api/phishing_url_api.rb +0 -123
  41. data/lib/cloudmersive-phishing-detection-api-client/api/phishing_url_batch_api.rb +0 -123
  42. data/lib/cloudmersive-phishing-detection-api-client/models/phishing_url_advanced_request_batch.rb +0 -217
  43. data/lib/cloudmersive-phishing-detection-api-client/models/phishing_url_advanced_response.rb +0 -286
  44. data/spec/api/phishing_url_api_spec.rb +0 -59
  45. data/spec/api/phishing_url_batch_api_spec.rb +0 -59
  46. data/spec/models/phishing_url_advanced_request_batch_spec.rb +0 -53
  47. data/spec/models/phishing_url_response_batch_spec.rb +0 -47
@@ -1,217 +0,0 @@
1
- =begin
2
- #phishingapi
3
-
4
- #Easily and directly scan and block phishing security threats.
5
-
6
- OpenAPI spec version: v1
7
-
8
- Generated by: https://github.com/swagger-api/swagger-codegen.git
9
- Swagger Codegen version: 2.4.14
10
-
11
- =end
12
-
13
- require 'date'
14
-
15
- module CloudmersivePhishingDetectionApiClient
16
- # Request data for the advanced api batch request
17
- class PhishingUrlAdvancedRequestBatch
18
- # Collection of all urls to check
19
- attr_accessor :urls
20
-
21
- # The caller may specify a collection of hosts or domains which are always considered safe.<br /> This is to allow internal sites to be marked as safe
22
- attr_accessor :allow_list
23
-
24
- # The caller may specify a collection of hosts or domains which are always considered unsafe.<br /> This is to allow internal sites to be marked as safe
25
- attr_accessor :block_list
26
-
27
- # Attribute mapping from ruby-style variable name to JSON key.
28
- def self.attribute_map
29
- {
30
- :'urls' => :'Urls',
31
- :'allow_list' => :'AllowList',
32
- :'block_list' => :'BlockList'
33
- }
34
- end
35
-
36
- # Attribute type mapping.
37
- def self.swagger_types
38
- {
39
- :'urls' => :'Array<String>',
40
- :'allow_list' => :'Array<String>',
41
- :'block_list' => :'Array<String>'
42
- }
43
- end
44
-
45
- # Initializes the object
46
- # @param [Hash] attributes Model attributes in the form of hash
47
- def initialize(attributes = {})
48
- return unless attributes.is_a?(Hash)
49
-
50
- # convert string to symbol for hash key
51
- attributes = attributes.each_with_object({}) { |(k, v), h| h[k.to_sym] = v }
52
-
53
- if attributes.has_key?(:'Urls')
54
- if (value = attributes[:'Urls']).is_a?(Array)
55
- self.urls = value
56
- end
57
- end
58
-
59
- if attributes.has_key?(:'AllowList')
60
- if (value = attributes[:'AllowList']).is_a?(Array)
61
- self.allow_list = value
62
- end
63
- end
64
-
65
- if attributes.has_key?(:'BlockList')
66
- if (value = attributes[:'BlockList']).is_a?(Array)
67
- self.block_list = value
68
- end
69
- end
70
- end
71
-
72
- # Show invalid properties with the reasons. Usually used together with valid?
73
- # @return Array for valid properties with the reasons
74
- def list_invalid_properties
75
- invalid_properties = Array.new
76
- if @urls.nil?
77
- invalid_properties.push('invalid value for "urls", urls cannot be nil.')
78
- end
79
-
80
- invalid_properties
81
- end
82
-
83
- # Check to see if the all the properties in the model are valid
84
- # @return true if the model is valid
85
- def valid?
86
- return false if @urls.nil?
87
- true
88
- end
89
-
90
- # Checks equality by comparing each attribute.
91
- # @param [Object] Object to be compared
92
- def ==(o)
93
- return true if self.equal?(o)
94
- self.class == o.class &&
95
- urls == o.urls &&
96
- allow_list == o.allow_list &&
97
- block_list == o.block_list
98
- end
99
-
100
- # @see the `==` method
101
- # @param [Object] Object to be compared
102
- def eql?(o)
103
- self == o
104
- end
105
-
106
- # Calculates hash code according to all attributes.
107
- # @return [Fixnum] Hash code
108
- def hash
109
- [urls, allow_list, block_list].hash
110
- end
111
-
112
- # Builds the object from hash
113
- # @param [Hash] attributes Model attributes in the form of hash
114
- # @return [Object] Returns the model itself
115
- def build_from_hash(attributes)
116
- return nil unless attributes.is_a?(Hash)
117
- self.class.swagger_types.each_pair do |key, type|
118
- if type =~ /\AArray<(.*)>/i
119
- # check to ensure the input is an array given that the attribute
120
- # is documented as an array but the input is not
121
- if attributes[self.class.attribute_map[key]].is_a?(Array)
122
- self.send("#{key}=", attributes[self.class.attribute_map[key]].map { |v| _deserialize($1, v) })
123
- end
124
- elsif !attributes[self.class.attribute_map[key]].nil?
125
- self.send("#{key}=", _deserialize(type, attributes[self.class.attribute_map[key]]))
126
- end # or else data not found in attributes(hash), not an issue as the data can be optional
127
- end
128
-
129
- self
130
- end
131
-
132
- # Deserializes the data based on type
133
- # @param string type Data type
134
- # @param string value Value to be deserialized
135
- # @return [Object] Deserialized data
136
- def _deserialize(type, value)
137
- case type.to_sym
138
- when :DateTime
139
- DateTime.parse(value)
140
- when :Date
141
- Date.parse(value)
142
- when :String
143
- value.to_s
144
- when :Integer
145
- value.to_i
146
- when :Float
147
- value.to_f
148
- when :BOOLEAN
149
- if value.to_s =~ /\A(true|t|yes|y|1)\z/i
150
- true
151
- else
152
- false
153
- end
154
- when :Object
155
- # generic object (usually a Hash), return directly
156
- value
157
- when /\AArray<(?<inner_type>.+)>\z/
158
- inner_type = Regexp.last_match[:inner_type]
159
- value.map { |v| _deserialize(inner_type, v) }
160
- when /\AHash<(?<k_type>.+?), (?<v_type>.+)>\z/
161
- k_type = Regexp.last_match[:k_type]
162
- v_type = Regexp.last_match[:v_type]
163
- {}.tap do |hash|
164
- value.each do |k, v|
165
- hash[_deserialize(k_type, k)] = _deserialize(v_type, v)
166
- end
167
- end
168
- else # model
169
- temp_model = CloudmersivePhishingDetectionApiClient.const_get(type).new
170
- temp_model.build_from_hash(value)
171
- end
172
- end
173
-
174
- # Returns the string representation of the object
175
- # @return [String] String presentation of the object
176
- def to_s
177
- to_hash.to_s
178
- end
179
-
180
- # to_body is an alias to to_hash (backward compatibility)
181
- # @return [Hash] Returns the object in the form of hash
182
- def to_body
183
- to_hash
184
- end
185
-
186
- # Returns the object in the form of hash
187
- # @return [Hash] Returns the object in the form of hash
188
- def to_hash
189
- hash = {}
190
- self.class.attribute_map.each_pair do |attr, param|
191
- value = self.send(attr)
192
- next if value.nil?
193
- hash[param] = _to_hash(value)
194
- end
195
- hash
196
- end
197
-
198
- # Outputs non-array value in the form of hash
199
- # For object, use to_hash. Otherwise, just return the value
200
- # @param [Object] value Any valid value
201
- # @return [Hash] Returns the value in the form of hash
202
- def _to_hash(value)
203
- if value.is_a?(Array)
204
- value.compact.map { |v| _to_hash(v) }
205
- elsif value.is_a?(Hash)
206
- {}.tap do |hash|
207
- value.each { |k, v| hash[k] = _to_hash(v) }
208
- end
209
- elsif value.respond_to? :to_hash
210
- value.to_hash
211
- else
212
- value
213
- end
214
- end
215
-
216
- end
217
- end
@@ -1,286 +0,0 @@
1
- =begin
2
- #phishingapi
3
-
4
- #Easily and directly scan and block phishing security threats.
5
-
6
- OpenAPI spec version: v1
7
-
8
- Generated by: https://github.com/swagger-api/swagger-codegen.git
9
- Swagger Codegen version: 2.4.14
10
-
11
- =end
12
-
13
- require 'date'
14
-
15
- module CloudmersivePhishingDetectionApiClient
16
- #
17
- class PhishingUrlAdvancedResponse
18
- # Specifies if the url (or its host or domain) passed all the checks or not.
19
- attr_accessor :clean_result
20
-
21
- # Risk value from 0.0 - 1.0. Higher numbers are a higher risk <br />Anything below 0.3 should be considered safe. Anything above 0.7 should be considered a significant risk. <br /> A score of 1.0 indicates the url, host, or domain failed significant safety checks.<br /> If a url passes all the tests for the basic api, the risk will be 0.7. If a url passes all the tests for the advanced api, the risk will be 0.2.
22
- attr_accessor :risk
23
-
24
- # Specifies if the full url with query parameters and fragment is a phishing threat <br />The advanced api performs more checks on the full url.
25
- attr_accessor :contains_threat_url
26
-
27
- # Specifies if the host of the url (i.e. ```mysite.hostingsite.com``` for a url of ```https://mysite.hostingsite.com/index.html```) is a phishing threat <br />The advanced api performs more checks on the host
28
- attr_accessor :contains_threat_host
29
-
30
- # Specifies if the registerable domain of the url (i.e. ```hostingsite.com``` for a url of ```https://mysite.hostingsite.com/index.html```) is a phishing threat <br />The advanced api performs more checks on the domain
31
- attr_accessor :contains_threat_domain
32
-
33
- # The url that was provided or the destination url after redirection contains an SSRF threat
34
- attr_accessor :contains_threat_ssrf
35
-
36
- # The url that was provided or the destination url after redirection is an unsafe format
37
- attr_accessor :contains_threat_url_format
38
-
39
- # The domain of the destination url is low quality.
40
- attr_accessor :contains_threat_domain_quality
41
-
42
- # The domain of the destination url has been registered too recently.
43
- attr_accessor :contains_threat_domain_age
44
-
45
- # Specifies if the url was malformed or not
46
- attr_accessor :url_is_invalid_syntax
47
-
48
- # Input URL that was scanned
49
- attr_accessor :input_url
50
-
51
- # Attribute mapping from ruby-style variable name to JSON key.
52
- def self.attribute_map
53
- {
54
- :'clean_result' => :'CleanResult',
55
- :'risk' => :'Risk',
56
- :'contains_threat_url' => :'ContainsThreatUrl',
57
- :'contains_threat_host' => :'ContainsThreatHost',
58
- :'contains_threat_domain' => :'ContainsThreatDomain',
59
- :'contains_threat_ssrf' => :'ContainsThreatSSRF',
60
- :'contains_threat_url_format' => :'ContainsThreatUrlFormat',
61
- :'contains_threat_domain_quality' => :'ContainsThreatDomainQuality',
62
- :'contains_threat_domain_age' => :'ContainsThreatDomainAge',
63
- :'url_is_invalid_syntax' => :'UrlIsInvalidSyntax',
64
- :'input_url' => :'InputUrl'
65
- }
66
- end
67
-
68
- # Attribute type mapping.
69
- def self.swagger_types
70
- {
71
- :'clean_result' => :'BOOLEAN',
72
- :'risk' => :'Float',
73
- :'contains_threat_url' => :'BOOLEAN',
74
- :'contains_threat_host' => :'BOOLEAN',
75
- :'contains_threat_domain' => :'BOOLEAN',
76
- :'contains_threat_ssrf' => :'BOOLEAN',
77
- :'contains_threat_url_format' => :'BOOLEAN',
78
- :'contains_threat_domain_quality' => :'BOOLEAN',
79
- :'contains_threat_domain_age' => :'BOOLEAN',
80
- :'url_is_invalid_syntax' => :'BOOLEAN',
81
- :'input_url' => :'String'
82
- }
83
- end
84
-
85
- # Initializes the object
86
- # @param [Hash] attributes Model attributes in the form of hash
87
- def initialize(attributes = {})
88
- return unless attributes.is_a?(Hash)
89
-
90
- # convert string to symbol for hash key
91
- attributes = attributes.each_with_object({}) { |(k, v), h| h[k.to_sym] = v }
92
-
93
- if attributes.has_key?(:'CleanResult')
94
- self.clean_result = attributes[:'CleanResult']
95
- end
96
-
97
- if attributes.has_key?(:'Risk')
98
- self.risk = attributes[:'Risk']
99
- end
100
-
101
- if attributes.has_key?(:'ContainsThreatUrl')
102
- self.contains_threat_url = attributes[:'ContainsThreatUrl']
103
- end
104
-
105
- if attributes.has_key?(:'ContainsThreatHost')
106
- self.contains_threat_host = attributes[:'ContainsThreatHost']
107
- end
108
-
109
- if attributes.has_key?(:'ContainsThreatDomain')
110
- self.contains_threat_domain = attributes[:'ContainsThreatDomain']
111
- end
112
-
113
- if attributes.has_key?(:'ContainsThreatSSRF')
114
- self.contains_threat_ssrf = attributes[:'ContainsThreatSSRF']
115
- end
116
-
117
- if attributes.has_key?(:'ContainsThreatUrlFormat')
118
- self.contains_threat_url_format = attributes[:'ContainsThreatUrlFormat']
119
- end
120
-
121
- if attributes.has_key?(:'ContainsThreatDomainQuality')
122
- self.contains_threat_domain_quality = attributes[:'ContainsThreatDomainQuality']
123
- end
124
-
125
- if attributes.has_key?(:'ContainsThreatDomainAge')
126
- self.contains_threat_domain_age = attributes[:'ContainsThreatDomainAge']
127
- end
128
-
129
- if attributes.has_key?(:'UrlIsInvalidSyntax')
130
- self.url_is_invalid_syntax = attributes[:'UrlIsInvalidSyntax']
131
- end
132
-
133
- if attributes.has_key?(:'InputUrl')
134
- self.input_url = attributes[:'InputUrl']
135
- end
136
- end
137
-
138
- # Show invalid properties with the reasons. Usually used together with valid?
139
- # @return Array for valid properties with the reasons
140
- def list_invalid_properties
141
- invalid_properties = Array.new
142
- invalid_properties
143
- end
144
-
145
- # Check to see if the all the properties in the model are valid
146
- # @return true if the model is valid
147
- def valid?
148
- true
149
- end
150
-
151
- # Checks equality by comparing each attribute.
152
- # @param [Object] Object to be compared
153
- def ==(o)
154
- return true if self.equal?(o)
155
- self.class == o.class &&
156
- clean_result == o.clean_result &&
157
- risk == o.risk &&
158
- contains_threat_url == o.contains_threat_url &&
159
- contains_threat_host == o.contains_threat_host &&
160
- contains_threat_domain == o.contains_threat_domain &&
161
- contains_threat_ssrf == o.contains_threat_ssrf &&
162
- contains_threat_url_format == o.contains_threat_url_format &&
163
- contains_threat_domain_quality == o.contains_threat_domain_quality &&
164
- contains_threat_domain_age == o.contains_threat_domain_age &&
165
- url_is_invalid_syntax == o.url_is_invalid_syntax &&
166
- input_url == o.input_url
167
- end
168
-
169
- # @see the `==` method
170
- # @param [Object] Object to be compared
171
- def eql?(o)
172
- self == o
173
- end
174
-
175
- # Calculates hash code according to all attributes.
176
- # @return [Fixnum] Hash code
177
- def hash
178
- [clean_result, risk, contains_threat_url, contains_threat_host, contains_threat_domain, contains_threat_ssrf, contains_threat_url_format, contains_threat_domain_quality, contains_threat_domain_age, url_is_invalid_syntax, input_url].hash
179
- end
180
-
181
- # Builds the object from hash
182
- # @param [Hash] attributes Model attributes in the form of hash
183
- # @return [Object] Returns the model itself
184
- def build_from_hash(attributes)
185
- return nil unless attributes.is_a?(Hash)
186
- self.class.swagger_types.each_pair do |key, type|
187
- if type =~ /\AArray<(.*)>/i
188
- # check to ensure the input is an array given that the attribute
189
- # is documented as an array but the input is not
190
- if attributes[self.class.attribute_map[key]].is_a?(Array)
191
- self.send("#{key}=", attributes[self.class.attribute_map[key]].map { |v| _deserialize($1, v) })
192
- end
193
- elsif !attributes[self.class.attribute_map[key]].nil?
194
- self.send("#{key}=", _deserialize(type, attributes[self.class.attribute_map[key]]))
195
- end # or else data not found in attributes(hash), not an issue as the data can be optional
196
- end
197
-
198
- self
199
- end
200
-
201
- # Deserializes the data based on type
202
- # @param string type Data type
203
- # @param string value Value to be deserialized
204
- # @return [Object] Deserialized data
205
- def _deserialize(type, value)
206
- case type.to_sym
207
- when :DateTime
208
- DateTime.parse(value)
209
- when :Date
210
- Date.parse(value)
211
- when :String
212
- value.to_s
213
- when :Integer
214
- value.to_i
215
- when :Float
216
- value.to_f
217
- when :BOOLEAN
218
- if value.to_s =~ /\A(true|t|yes|y|1)\z/i
219
- true
220
- else
221
- false
222
- end
223
- when :Object
224
- # generic object (usually a Hash), return directly
225
- value
226
- when /\AArray<(?<inner_type>.+)>\z/
227
- inner_type = Regexp.last_match[:inner_type]
228
- value.map { |v| _deserialize(inner_type, v) }
229
- when /\AHash<(?<k_type>.+?), (?<v_type>.+)>\z/
230
- k_type = Regexp.last_match[:k_type]
231
- v_type = Regexp.last_match[:v_type]
232
- {}.tap do |hash|
233
- value.each do |k, v|
234
- hash[_deserialize(k_type, k)] = _deserialize(v_type, v)
235
- end
236
- end
237
- else # model
238
- temp_model = CloudmersivePhishingDetectionApiClient.const_get(type).new
239
- temp_model.build_from_hash(value)
240
- end
241
- end
242
-
243
- # Returns the string representation of the object
244
- # @return [String] String presentation of the object
245
- def to_s
246
- to_hash.to_s
247
- end
248
-
249
- # to_body is an alias to to_hash (backward compatibility)
250
- # @return [Hash] Returns the object in the form of hash
251
- def to_body
252
- to_hash
253
- end
254
-
255
- # Returns the object in the form of hash
256
- # @return [Hash] Returns the object in the form of hash
257
- def to_hash
258
- hash = {}
259
- self.class.attribute_map.each_pair do |attr, param|
260
- value = self.send(attr)
261
- next if value.nil?
262
- hash[param] = _to_hash(value)
263
- end
264
- hash
265
- end
266
-
267
- # Outputs non-array value in the form of hash
268
- # For object, use to_hash. Otherwise, just return the value
269
- # @param [Object] value Any valid value
270
- # @return [Hash] Returns the value in the form of hash
271
- def _to_hash(value)
272
- if value.is_a?(Array)
273
- value.compact.map { |v| _to_hash(v) }
274
- elsif value.is_a?(Hash)
275
- {}.tap do |hash|
276
- value.each { |k, v| hash[k] = _to_hash(v) }
277
- end
278
- elsif value.respond_to? :to_hash
279
- value.to_hash
280
- else
281
- value
282
- end
283
- end
284
-
285
- end
286
- end
@@ -1,59 +0,0 @@
1
- =begin
2
- #phishingapi
3
-
4
- #Easily and directly scan and block phishing security threats.
5
-
6
- OpenAPI spec version: v1
7
-
8
- Generated by: https://github.com/swagger-api/swagger-codegen.git
9
- Swagger Codegen version: 2.4.14
10
-
11
- =end
12
-
13
- require 'spec_helper'
14
- require 'json'
15
-
16
- # Unit tests for CloudmersivePhishingDetectionApiClient::PhishingUrlApi
17
- # Automatically generated by swagger-codegen (github.com/swagger-api/swagger-codegen)
18
- # Please update as you see appropriate
19
- describe 'PhishingUrlApi' do
20
- before do
21
- # run before each test
22
- @instance = CloudmersivePhishingDetectionApiClient::PhishingUrlApi.new
23
- end
24
-
25
- after do
26
- # run after each test
27
- end
28
-
29
- describe 'test an instance of PhishingUrlApi' do
30
- it 'should create an instance of PhishingUrlApi' do
31
- expect(@instance).to be_instance_of(CloudmersivePhishingDetectionApiClient::PhishingUrlApi)
32
- end
33
- end
34
-
35
- # unit tests for phishing_url_advanced_post
36
- # Use advanced AI detection to determine if a URL is a known phishing threat
37
- # Uses advanced AI and deterministic methods to detect if a URL is a phishing threat.
38
- # @param [Hash] opts the optional parameters
39
- # @option opts [PhishingUrlAdvancedRequest] :body
40
- # @return [PhishingUrlAdvancedResponse]
41
- describe 'phishing_url_advanced_post test' do
42
- it 'should work' do
43
- # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
44
- end
45
- end
46
-
47
- # unit tests for phishing_url_post
48
- # Use AI and deterministic detection to determine if a URL is a phishing threat
49
- # Uses AI and deterministic methods to detect if a URL is a phishing threat.
50
- # @param [Hash] opts the optional parameters
51
- # @option opts [PhishingUrlRequest] :body
52
- # @return [PhishingUrlResponse]
53
- describe 'phishing_url_post test' do
54
- it 'should work' do
55
- # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
56
- end
57
- end
58
-
59
- end
@@ -1,59 +0,0 @@
1
- =begin
2
- #phishingapi
3
-
4
- #Easily and directly scan and block phishing security threats.
5
-
6
- OpenAPI spec version: v1
7
-
8
- Generated by: https://github.com/swagger-api/swagger-codegen.git
9
- Swagger Codegen version: 2.4.14
10
-
11
- =end
12
-
13
- require 'spec_helper'
14
- require 'json'
15
-
16
- # Unit tests for CloudmersivePhishingDetectionApiClient::PhishingUrlBatchApi
17
- # Automatically generated by swagger-codegen (github.com/swagger-api/swagger-codegen)
18
- # Please update as you see appropriate
19
- describe 'PhishingUrlBatchApi' do
20
- before do
21
- # run before each test
22
- @instance = CloudmersivePhishingDetectionApiClient::PhishingUrlBatchApi.new
23
- end
24
-
25
- after do
26
- # run after each test
27
- end
28
-
29
- describe 'test an instance of PhishingUrlBatchApi' do
30
- it 'should create an instance of PhishingUrlBatchApi' do
31
- expect(@instance).to be_instance_of(CloudmersivePhishingDetectionApiClient::PhishingUrlBatchApi)
32
- end
33
- end
34
-
35
- # unit tests for phishing_url_advanced_batch_post
36
- # Accept multiple urls at once to perform lookups to see if the urls are known phishing sites as well as multiple other scans to determine if the URL is a potential phishing threat.
37
- # Uses advanced AI and deterministic methods to detect if a URL is a phishing threat.
38
- # @param [Hash] opts the optional parameters
39
- # @option opts [PhishingUrlAdvancedRequestBatch] :body
40
- # @return [PhishingUrlAdvancedResponseBatch]
41
- describe 'phishing_url_advanced_batch_post test' do
42
- it 'should work' do
43
- # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
44
- end
45
- end
46
-
47
- # unit tests for phishing_url_batch_post
48
- # Accept multiple urls at oncee and perform AI and deterministic methods to detect if a URL is a phishing threat.
49
- # Uses AI and deterministic methods to detect if a URL is a phishing threat.
50
- # @param [Hash] opts the optional parameters
51
- # @option opts [Array<PhishingUrlRequest>] :body
52
- # @return [PhishingUrlResponseBatch]
53
- describe 'phishing_url_batch_post test' do
54
- it 'should work' do
55
- # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
56
- end
57
- end
58
-
59
- end
@@ -1,53 +0,0 @@
1
- =begin
2
- #phishingapi
3
-
4
- #Easily and directly scan and block phishing security threats.
5
-
6
- OpenAPI spec version: v1
7
-
8
- Generated by: https://github.com/swagger-api/swagger-codegen.git
9
- Swagger Codegen version: 2.4.14
10
-
11
- =end
12
-
13
- require 'spec_helper'
14
- require 'json'
15
- require 'date'
16
-
17
- # Unit tests for CloudmersivePhishingDetectionApiClient::PhishingUrlAdvancedRequestBatch
18
- # Automatically generated by swagger-codegen (github.com/swagger-api/swagger-codegen)
19
- # Please update as you see appropriate
20
- describe 'PhishingUrlAdvancedRequestBatch' do
21
- before do
22
- # run before each test
23
- @instance = CloudmersivePhishingDetectionApiClient::PhishingUrlAdvancedRequestBatch.new
24
- end
25
-
26
- after do
27
- # run after each test
28
- end
29
-
30
- describe 'test an instance of PhishingUrlAdvancedRequestBatch' do
31
- it 'should create an instance of PhishingUrlAdvancedRequestBatch' do
32
- expect(@instance).to be_instance_of(CloudmersivePhishingDetectionApiClient::PhishingUrlAdvancedRequestBatch)
33
- end
34
- end
35
- describe 'test attribute "urls"' do
36
- it 'should work' do
37
- # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
38
- end
39
- end
40
-
41
- describe 'test attribute "allow_list"' do
42
- it 'should work' do
43
- # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
44
- end
45
- end
46
-
47
- describe 'test attribute "block_list"' do
48
- it 'should work' do
49
- # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
50
- end
51
- end
52
-
53
- end