cloudmersive-phishing-detection-api-client 2.2.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +7 -0
- data/Gemfile +7 -0
- data/README.md +112 -0
- data/Rakefile +8 -0
- data/cloudmersive-phishing-detection-api-client.gemspec +45 -0
- data/docs/PhishingUrlAdvancedRequest.md +10 -0
- data/docs/PhishingUrlAdvancedRequestBatch.md +10 -0
- data/docs/PhishingUrlAdvancedResponse.md +18 -0
- data/docs/PhishingUrlAdvancedResponseBatch.md +9 -0
- data/docs/PhishingUrlApi.md +120 -0
- data/docs/PhishingUrlBatchApi.md +120 -0
- data/docs/PhishingUrlRequest.md +8 -0
- data/docs/PhishingUrlResponse.md +13 -0
- data/docs/PhishingUrlResponseBatch.md +9 -0
- data/git_push.sh +55 -0
- data/lib/cloudmersive-phishing-detection-api-client/api/phishing_url_api.rb +123 -0
- data/lib/cloudmersive-phishing-detection-api-client/api/phishing_url_batch_api.rb +123 -0
- data/lib/cloudmersive-phishing-detection-api-client/api_client.rb +391 -0
- data/lib/cloudmersive-phishing-detection-api-client/api_error.rb +38 -0
- data/lib/cloudmersive-phishing-detection-api-client/configuration.rb +209 -0
- data/lib/cloudmersive-phishing-detection-api-client/models/phishing_url_advanced_request.rb +234 -0
- data/lib/cloudmersive-phishing-detection-api-client/models/phishing_url_advanced_request_batch.rb +217 -0
- data/lib/cloudmersive-phishing-detection-api-client/models/phishing_url_advanced_response.rb +286 -0
- data/lib/cloudmersive-phishing-detection-api-client/models/phishing_url_advanced_response_batch.rb +198 -0
- data/lib/cloudmersive-phishing-detection-api-client/models/phishing_url_request.rb +191 -0
- data/lib/cloudmersive-phishing-detection-api-client/models/phishing_url_response.rb +236 -0
- data/lib/cloudmersive-phishing-detection-api-client/models/phishing_url_response_batch.rb +198 -0
- data/lib/cloudmersive-phishing-detection-api-client/version.rb +15 -0
- data/lib/cloudmersive-phishing-detection-api-client.rb +48 -0
- data/spec/api/phishing_url_api_spec.rb +59 -0
- data/spec/api/phishing_url_batch_api_spec.rb +59 -0
- data/spec/api_client_spec.rb +243 -0
- data/spec/configuration_spec.rb +42 -0
- data/spec/models/phishing_url_advanced_request_batch_spec.rb +53 -0
- data/spec/models/phishing_url_advanced_request_spec.rb +53 -0
- data/spec/models/phishing_url_advanced_response_batch_spec.rb +47 -0
- data/spec/models/phishing_url_advanced_response_spec.rb +101 -0
- data/spec/models/phishing_url_request_spec.rb +41 -0
- data/spec/models/phishing_url_response_batch_spec.rb +47 -0
- data/spec/models/phishing_url_response_spec.rb +71 -0
- data/spec/spec_helper.rb +111 -0
- metadata +264 -0
@@ -0,0 +1,286 @@
|
|
1
|
+
=begin
|
2
|
+
#phishingapi
|
3
|
+
|
4
|
+
#Easily and directly scan and block phishing security threats.
|
5
|
+
|
6
|
+
OpenAPI spec version: v1
|
7
|
+
|
8
|
+
Generated by: https://github.com/swagger-api/swagger-codegen.git
|
9
|
+
Swagger Codegen version: 2.4.14
|
10
|
+
|
11
|
+
=end
|
12
|
+
|
13
|
+
require 'date'
|
14
|
+
|
15
|
+
module CloudmersivePhishingDetectionApiClient
|
16
|
+
#
|
17
|
+
class PhishingUrlAdvancedResponse
|
18
|
+
# Specifies if the url (or its host or domain) passed all the checks or not.
|
19
|
+
attr_accessor :clean_result
|
20
|
+
|
21
|
+
# Risk value from 0.0 - 1.0. Higher numbers are a higher risk <br />Anything below 0.3 should be considered safe. Anything above 0.7 should be considered a significant risk. <br /> A score of 1.0 indicates the url, host, or domain failed significant safety checks.<br /> If a url passes all the tests for the basic api, the risk will be 0.7. If a url passes all the tests for the advanced api, the risk will be 0.2.
|
22
|
+
attr_accessor :risk
|
23
|
+
|
24
|
+
# Specifies if the full url with query parameters and fragment is a phishing threat <br />The advanced api performs more checks on the full url.
|
25
|
+
attr_accessor :contains_threat_url
|
26
|
+
|
27
|
+
# Specifies if the host of the url (i.e. ```mysite.hostingsite.com``` for a url of ```https://mysite.hostingsite.com/index.html```) is a phishing threat <br />The advanced api performs more checks on the host
|
28
|
+
attr_accessor :contains_threat_host
|
29
|
+
|
30
|
+
# Specifies if the registerable domain of the url (i.e. ```hostingsite.com``` for a url of ```https://mysite.hostingsite.com/index.html```) is a phishing threat <br />The advanced api performs more checks on the domain
|
31
|
+
attr_accessor :contains_threat_domain
|
32
|
+
|
33
|
+
# The url that was provided or the destination url after redirection contains an SSRF threat
|
34
|
+
attr_accessor :contains_threat_ssrf
|
35
|
+
|
36
|
+
# The url that was provided or the destination url after redirection is an unsafe format
|
37
|
+
attr_accessor :contains_threat_url_format
|
38
|
+
|
39
|
+
# The domain of the destination url is low quality.
|
40
|
+
attr_accessor :contains_threat_domain_quality
|
41
|
+
|
42
|
+
# The domain of the destination url has been registered too recently.
|
43
|
+
attr_accessor :contains_threat_domain_age
|
44
|
+
|
45
|
+
# Specifies if the url was malformed or not
|
46
|
+
attr_accessor :url_is_invalid_syntax
|
47
|
+
|
48
|
+
# Input URL that was scanned
|
49
|
+
attr_accessor :input_url
|
50
|
+
|
51
|
+
# Attribute mapping from ruby-style variable name to JSON key.
|
52
|
+
def self.attribute_map
|
53
|
+
{
|
54
|
+
:'clean_result' => :'CleanResult',
|
55
|
+
:'risk' => :'Risk',
|
56
|
+
:'contains_threat_url' => :'ContainsThreatUrl',
|
57
|
+
:'contains_threat_host' => :'ContainsThreatHost',
|
58
|
+
:'contains_threat_domain' => :'ContainsThreatDomain',
|
59
|
+
:'contains_threat_ssrf' => :'ContainsThreatSSRF',
|
60
|
+
:'contains_threat_url_format' => :'ContainsThreatUrlFormat',
|
61
|
+
:'contains_threat_domain_quality' => :'ContainsThreatDomainQuality',
|
62
|
+
:'contains_threat_domain_age' => :'ContainsThreatDomainAge',
|
63
|
+
:'url_is_invalid_syntax' => :'UrlIsInvalidSyntax',
|
64
|
+
:'input_url' => :'InputUrl'
|
65
|
+
}
|
66
|
+
end
|
67
|
+
|
68
|
+
# Attribute type mapping.
|
69
|
+
def self.swagger_types
|
70
|
+
{
|
71
|
+
:'clean_result' => :'BOOLEAN',
|
72
|
+
:'risk' => :'Float',
|
73
|
+
:'contains_threat_url' => :'BOOLEAN',
|
74
|
+
:'contains_threat_host' => :'BOOLEAN',
|
75
|
+
:'contains_threat_domain' => :'BOOLEAN',
|
76
|
+
:'contains_threat_ssrf' => :'BOOLEAN',
|
77
|
+
:'contains_threat_url_format' => :'BOOLEAN',
|
78
|
+
:'contains_threat_domain_quality' => :'BOOLEAN',
|
79
|
+
:'contains_threat_domain_age' => :'BOOLEAN',
|
80
|
+
:'url_is_invalid_syntax' => :'BOOLEAN',
|
81
|
+
:'input_url' => :'String'
|
82
|
+
}
|
83
|
+
end
|
84
|
+
|
85
|
+
# Initializes the object
|
86
|
+
# @param [Hash] attributes Model attributes in the form of hash
|
87
|
+
def initialize(attributes = {})
|
88
|
+
return unless attributes.is_a?(Hash)
|
89
|
+
|
90
|
+
# convert string to symbol for hash key
|
91
|
+
attributes = attributes.each_with_object({}) { |(k, v), h| h[k.to_sym] = v }
|
92
|
+
|
93
|
+
if attributes.has_key?(:'CleanResult')
|
94
|
+
self.clean_result = attributes[:'CleanResult']
|
95
|
+
end
|
96
|
+
|
97
|
+
if attributes.has_key?(:'Risk')
|
98
|
+
self.risk = attributes[:'Risk']
|
99
|
+
end
|
100
|
+
|
101
|
+
if attributes.has_key?(:'ContainsThreatUrl')
|
102
|
+
self.contains_threat_url = attributes[:'ContainsThreatUrl']
|
103
|
+
end
|
104
|
+
|
105
|
+
if attributes.has_key?(:'ContainsThreatHost')
|
106
|
+
self.contains_threat_host = attributes[:'ContainsThreatHost']
|
107
|
+
end
|
108
|
+
|
109
|
+
if attributes.has_key?(:'ContainsThreatDomain')
|
110
|
+
self.contains_threat_domain = attributes[:'ContainsThreatDomain']
|
111
|
+
end
|
112
|
+
|
113
|
+
if attributes.has_key?(:'ContainsThreatSSRF')
|
114
|
+
self.contains_threat_ssrf = attributes[:'ContainsThreatSSRF']
|
115
|
+
end
|
116
|
+
|
117
|
+
if attributes.has_key?(:'ContainsThreatUrlFormat')
|
118
|
+
self.contains_threat_url_format = attributes[:'ContainsThreatUrlFormat']
|
119
|
+
end
|
120
|
+
|
121
|
+
if attributes.has_key?(:'ContainsThreatDomainQuality')
|
122
|
+
self.contains_threat_domain_quality = attributes[:'ContainsThreatDomainQuality']
|
123
|
+
end
|
124
|
+
|
125
|
+
if attributes.has_key?(:'ContainsThreatDomainAge')
|
126
|
+
self.contains_threat_domain_age = attributes[:'ContainsThreatDomainAge']
|
127
|
+
end
|
128
|
+
|
129
|
+
if attributes.has_key?(:'UrlIsInvalidSyntax')
|
130
|
+
self.url_is_invalid_syntax = attributes[:'UrlIsInvalidSyntax']
|
131
|
+
end
|
132
|
+
|
133
|
+
if attributes.has_key?(:'InputUrl')
|
134
|
+
self.input_url = attributes[:'InputUrl']
|
135
|
+
end
|
136
|
+
end
|
137
|
+
|
138
|
+
# Show invalid properties with the reasons. Usually used together with valid?
|
139
|
+
# @return Array for valid properties with the reasons
|
140
|
+
def list_invalid_properties
|
141
|
+
invalid_properties = Array.new
|
142
|
+
invalid_properties
|
143
|
+
end
|
144
|
+
|
145
|
+
# Check to see if the all the properties in the model are valid
|
146
|
+
# @return true if the model is valid
|
147
|
+
def valid?
|
148
|
+
true
|
149
|
+
end
|
150
|
+
|
151
|
+
# Checks equality by comparing each attribute.
|
152
|
+
# @param [Object] Object to be compared
|
153
|
+
def ==(o)
|
154
|
+
return true if self.equal?(o)
|
155
|
+
self.class == o.class &&
|
156
|
+
clean_result == o.clean_result &&
|
157
|
+
risk == o.risk &&
|
158
|
+
contains_threat_url == o.contains_threat_url &&
|
159
|
+
contains_threat_host == o.contains_threat_host &&
|
160
|
+
contains_threat_domain == o.contains_threat_domain &&
|
161
|
+
contains_threat_ssrf == o.contains_threat_ssrf &&
|
162
|
+
contains_threat_url_format == o.contains_threat_url_format &&
|
163
|
+
contains_threat_domain_quality == o.contains_threat_domain_quality &&
|
164
|
+
contains_threat_domain_age == o.contains_threat_domain_age &&
|
165
|
+
url_is_invalid_syntax == o.url_is_invalid_syntax &&
|
166
|
+
input_url == o.input_url
|
167
|
+
end
|
168
|
+
|
169
|
+
# @see the `==` method
|
170
|
+
# @param [Object] Object to be compared
|
171
|
+
def eql?(o)
|
172
|
+
self == o
|
173
|
+
end
|
174
|
+
|
175
|
+
# Calculates hash code according to all attributes.
|
176
|
+
# @return [Fixnum] Hash code
|
177
|
+
def hash
|
178
|
+
[clean_result, risk, contains_threat_url, contains_threat_host, contains_threat_domain, contains_threat_ssrf, contains_threat_url_format, contains_threat_domain_quality, contains_threat_domain_age, url_is_invalid_syntax, input_url].hash
|
179
|
+
end
|
180
|
+
|
181
|
+
# Builds the object from hash
|
182
|
+
# @param [Hash] attributes Model attributes in the form of hash
|
183
|
+
# @return [Object] Returns the model itself
|
184
|
+
def build_from_hash(attributes)
|
185
|
+
return nil unless attributes.is_a?(Hash)
|
186
|
+
self.class.swagger_types.each_pair do |key, type|
|
187
|
+
if type =~ /\AArray<(.*)>/i
|
188
|
+
# check to ensure the input is an array given that the attribute
|
189
|
+
# is documented as an array but the input is not
|
190
|
+
if attributes[self.class.attribute_map[key]].is_a?(Array)
|
191
|
+
self.send("#{key}=", attributes[self.class.attribute_map[key]].map { |v| _deserialize($1, v) })
|
192
|
+
end
|
193
|
+
elsif !attributes[self.class.attribute_map[key]].nil?
|
194
|
+
self.send("#{key}=", _deserialize(type, attributes[self.class.attribute_map[key]]))
|
195
|
+
end # or else data not found in attributes(hash), not an issue as the data can be optional
|
196
|
+
end
|
197
|
+
|
198
|
+
self
|
199
|
+
end
|
200
|
+
|
201
|
+
# Deserializes the data based on type
|
202
|
+
# @param string type Data type
|
203
|
+
# @param string value Value to be deserialized
|
204
|
+
# @return [Object] Deserialized data
|
205
|
+
def _deserialize(type, value)
|
206
|
+
case type.to_sym
|
207
|
+
when :DateTime
|
208
|
+
DateTime.parse(value)
|
209
|
+
when :Date
|
210
|
+
Date.parse(value)
|
211
|
+
when :String
|
212
|
+
value.to_s
|
213
|
+
when :Integer
|
214
|
+
value.to_i
|
215
|
+
when :Float
|
216
|
+
value.to_f
|
217
|
+
when :BOOLEAN
|
218
|
+
if value.to_s =~ /\A(true|t|yes|y|1)\z/i
|
219
|
+
true
|
220
|
+
else
|
221
|
+
false
|
222
|
+
end
|
223
|
+
when :Object
|
224
|
+
# generic object (usually a Hash), return directly
|
225
|
+
value
|
226
|
+
when /\AArray<(?<inner_type>.+)>\z/
|
227
|
+
inner_type = Regexp.last_match[:inner_type]
|
228
|
+
value.map { |v| _deserialize(inner_type, v) }
|
229
|
+
when /\AHash<(?<k_type>.+?), (?<v_type>.+)>\z/
|
230
|
+
k_type = Regexp.last_match[:k_type]
|
231
|
+
v_type = Regexp.last_match[:v_type]
|
232
|
+
{}.tap do |hash|
|
233
|
+
value.each do |k, v|
|
234
|
+
hash[_deserialize(k_type, k)] = _deserialize(v_type, v)
|
235
|
+
end
|
236
|
+
end
|
237
|
+
else # model
|
238
|
+
temp_model = CloudmersivePhishingDetectionApiClient.const_get(type).new
|
239
|
+
temp_model.build_from_hash(value)
|
240
|
+
end
|
241
|
+
end
|
242
|
+
|
243
|
+
# Returns the string representation of the object
|
244
|
+
# @return [String] String presentation of the object
|
245
|
+
def to_s
|
246
|
+
to_hash.to_s
|
247
|
+
end
|
248
|
+
|
249
|
+
# to_body is an alias to to_hash (backward compatibility)
|
250
|
+
# @return [Hash] Returns the object in the form of hash
|
251
|
+
def to_body
|
252
|
+
to_hash
|
253
|
+
end
|
254
|
+
|
255
|
+
# Returns the object in the form of hash
|
256
|
+
# @return [Hash] Returns the object in the form of hash
|
257
|
+
def to_hash
|
258
|
+
hash = {}
|
259
|
+
self.class.attribute_map.each_pair do |attr, param|
|
260
|
+
value = self.send(attr)
|
261
|
+
next if value.nil?
|
262
|
+
hash[param] = _to_hash(value)
|
263
|
+
end
|
264
|
+
hash
|
265
|
+
end
|
266
|
+
|
267
|
+
# Outputs non-array value in the form of hash
|
268
|
+
# For object, use to_hash. Otherwise, just return the value
|
269
|
+
# @param [Object] value Any valid value
|
270
|
+
# @return [Hash] Returns the value in the form of hash
|
271
|
+
def _to_hash(value)
|
272
|
+
if value.is_a?(Array)
|
273
|
+
value.compact.map { |v| _to_hash(v) }
|
274
|
+
elsif value.is_a?(Hash)
|
275
|
+
{}.tap do |hash|
|
276
|
+
value.each { |k, v| hash[k] = _to_hash(v) }
|
277
|
+
end
|
278
|
+
elsif value.respond_to? :to_hash
|
279
|
+
value.to_hash
|
280
|
+
else
|
281
|
+
value
|
282
|
+
end
|
283
|
+
end
|
284
|
+
|
285
|
+
end
|
286
|
+
end
|
data/lib/cloudmersive-phishing-detection-api-client/models/phishing_url_advanced_response_batch.rb
ADDED
@@ -0,0 +1,198 @@
|
|
1
|
+
=begin
|
2
|
+
#phishingapi
|
3
|
+
|
4
|
+
#Easily and directly scan and block phishing security threats.
|
5
|
+
|
6
|
+
OpenAPI spec version: v1
|
7
|
+
|
8
|
+
Generated by: https://github.com/swagger-api/swagger-codegen.git
|
9
|
+
Swagger Codegen version: 2.4.14
|
10
|
+
|
11
|
+
=end
|
12
|
+
|
13
|
+
require 'date'
|
14
|
+
|
15
|
+
module CloudmersivePhishingDetectionApiClient
|
16
|
+
# Responses for the advanced batch calls to Phishing Url
|
17
|
+
class PhishingUrlAdvancedResponseBatch
|
18
|
+
# Specifies if all the urls (or its hosts or domains) in this batch call passed all the checks or not.
|
19
|
+
attr_accessor :clean_result
|
20
|
+
|
21
|
+
# Resulting URL validations
|
22
|
+
attr_accessor :url_responses
|
23
|
+
|
24
|
+
# Attribute mapping from ruby-style variable name to JSON key.
|
25
|
+
def self.attribute_map
|
26
|
+
{
|
27
|
+
:'clean_result' => :'CleanResult',
|
28
|
+
:'url_responses' => :'UrlResponses'
|
29
|
+
}
|
30
|
+
end
|
31
|
+
|
32
|
+
# Attribute type mapping.
|
33
|
+
def self.swagger_types
|
34
|
+
{
|
35
|
+
:'clean_result' => :'BOOLEAN',
|
36
|
+
:'url_responses' => :'Array<PhishingUrlAdvancedResponse>'
|
37
|
+
}
|
38
|
+
end
|
39
|
+
|
40
|
+
# Initializes the object
|
41
|
+
# @param [Hash] attributes Model attributes in the form of hash
|
42
|
+
def initialize(attributes = {})
|
43
|
+
return unless attributes.is_a?(Hash)
|
44
|
+
|
45
|
+
# convert string to symbol for hash key
|
46
|
+
attributes = attributes.each_with_object({}) { |(k, v), h| h[k.to_sym] = v }
|
47
|
+
|
48
|
+
if attributes.has_key?(:'CleanResult')
|
49
|
+
self.clean_result = attributes[:'CleanResult']
|
50
|
+
end
|
51
|
+
|
52
|
+
if attributes.has_key?(:'UrlResponses')
|
53
|
+
if (value = attributes[:'UrlResponses']).is_a?(Array)
|
54
|
+
self.url_responses = value
|
55
|
+
end
|
56
|
+
end
|
57
|
+
end
|
58
|
+
|
59
|
+
# Show invalid properties with the reasons. Usually used together with valid?
|
60
|
+
# @return Array for valid properties with the reasons
|
61
|
+
def list_invalid_properties
|
62
|
+
invalid_properties = Array.new
|
63
|
+
invalid_properties
|
64
|
+
end
|
65
|
+
|
66
|
+
# Check to see if the all the properties in the model are valid
|
67
|
+
# @return true if the model is valid
|
68
|
+
def valid?
|
69
|
+
true
|
70
|
+
end
|
71
|
+
|
72
|
+
# Checks equality by comparing each attribute.
|
73
|
+
# @param [Object] Object to be compared
|
74
|
+
def ==(o)
|
75
|
+
return true if self.equal?(o)
|
76
|
+
self.class == o.class &&
|
77
|
+
clean_result == o.clean_result &&
|
78
|
+
url_responses == o.url_responses
|
79
|
+
end
|
80
|
+
|
81
|
+
# @see the `==` method
|
82
|
+
# @param [Object] Object to be compared
|
83
|
+
def eql?(o)
|
84
|
+
self == o
|
85
|
+
end
|
86
|
+
|
87
|
+
# Calculates hash code according to all attributes.
|
88
|
+
# @return [Fixnum] Hash code
|
89
|
+
def hash
|
90
|
+
[clean_result, url_responses].hash
|
91
|
+
end
|
92
|
+
|
93
|
+
# Builds the object from hash
|
94
|
+
# @param [Hash] attributes Model attributes in the form of hash
|
95
|
+
# @return [Object] Returns the model itself
|
96
|
+
def build_from_hash(attributes)
|
97
|
+
return nil unless attributes.is_a?(Hash)
|
98
|
+
self.class.swagger_types.each_pair do |key, type|
|
99
|
+
if type =~ /\AArray<(.*)>/i
|
100
|
+
# check to ensure the input is an array given that the attribute
|
101
|
+
# is documented as an array but the input is not
|
102
|
+
if attributes[self.class.attribute_map[key]].is_a?(Array)
|
103
|
+
self.send("#{key}=", attributes[self.class.attribute_map[key]].map { |v| _deserialize($1, v) })
|
104
|
+
end
|
105
|
+
elsif !attributes[self.class.attribute_map[key]].nil?
|
106
|
+
self.send("#{key}=", _deserialize(type, attributes[self.class.attribute_map[key]]))
|
107
|
+
end # or else data not found in attributes(hash), not an issue as the data can be optional
|
108
|
+
end
|
109
|
+
|
110
|
+
self
|
111
|
+
end
|
112
|
+
|
113
|
+
# Deserializes the data based on type
|
114
|
+
# @param string type Data type
|
115
|
+
# @param string value Value to be deserialized
|
116
|
+
# @return [Object] Deserialized data
|
117
|
+
def _deserialize(type, value)
|
118
|
+
case type.to_sym
|
119
|
+
when :DateTime
|
120
|
+
DateTime.parse(value)
|
121
|
+
when :Date
|
122
|
+
Date.parse(value)
|
123
|
+
when :String
|
124
|
+
value.to_s
|
125
|
+
when :Integer
|
126
|
+
value.to_i
|
127
|
+
when :Float
|
128
|
+
value.to_f
|
129
|
+
when :BOOLEAN
|
130
|
+
if value.to_s =~ /\A(true|t|yes|y|1)\z/i
|
131
|
+
true
|
132
|
+
else
|
133
|
+
false
|
134
|
+
end
|
135
|
+
when :Object
|
136
|
+
# generic object (usually a Hash), return directly
|
137
|
+
value
|
138
|
+
when /\AArray<(?<inner_type>.+)>\z/
|
139
|
+
inner_type = Regexp.last_match[:inner_type]
|
140
|
+
value.map { |v| _deserialize(inner_type, v) }
|
141
|
+
when /\AHash<(?<k_type>.+?), (?<v_type>.+)>\z/
|
142
|
+
k_type = Regexp.last_match[:k_type]
|
143
|
+
v_type = Regexp.last_match[:v_type]
|
144
|
+
{}.tap do |hash|
|
145
|
+
value.each do |k, v|
|
146
|
+
hash[_deserialize(k_type, k)] = _deserialize(v_type, v)
|
147
|
+
end
|
148
|
+
end
|
149
|
+
else # model
|
150
|
+
temp_model = CloudmersivePhishingDetectionApiClient.const_get(type).new
|
151
|
+
temp_model.build_from_hash(value)
|
152
|
+
end
|
153
|
+
end
|
154
|
+
|
155
|
+
# Returns the string representation of the object
|
156
|
+
# @return [String] String presentation of the object
|
157
|
+
def to_s
|
158
|
+
to_hash.to_s
|
159
|
+
end
|
160
|
+
|
161
|
+
# to_body is an alias to to_hash (backward compatibility)
|
162
|
+
# @return [Hash] Returns the object in the form of hash
|
163
|
+
def to_body
|
164
|
+
to_hash
|
165
|
+
end
|
166
|
+
|
167
|
+
# Returns the object in the form of hash
|
168
|
+
# @return [Hash] Returns the object in the form of hash
|
169
|
+
def to_hash
|
170
|
+
hash = {}
|
171
|
+
self.class.attribute_map.each_pair do |attr, param|
|
172
|
+
value = self.send(attr)
|
173
|
+
next if value.nil?
|
174
|
+
hash[param] = _to_hash(value)
|
175
|
+
end
|
176
|
+
hash
|
177
|
+
end
|
178
|
+
|
179
|
+
# Outputs non-array value in the form of hash
|
180
|
+
# For object, use to_hash. Otherwise, just return the value
|
181
|
+
# @param [Object] value Any valid value
|
182
|
+
# @return [Hash] Returns the value in the form of hash
|
183
|
+
def _to_hash(value)
|
184
|
+
if value.is_a?(Array)
|
185
|
+
value.compact.map { |v| _to_hash(v) }
|
186
|
+
elsif value.is_a?(Hash)
|
187
|
+
{}.tap do |hash|
|
188
|
+
value.each { |k, v| hash[k] = _to_hash(v) }
|
189
|
+
end
|
190
|
+
elsif value.respond_to? :to_hash
|
191
|
+
value.to_hash
|
192
|
+
else
|
193
|
+
value
|
194
|
+
end
|
195
|
+
end
|
196
|
+
|
197
|
+
end
|
198
|
+
end
|
@@ -0,0 +1,191 @@
|
|
1
|
+
=begin
|
2
|
+
#phishingapi
|
3
|
+
|
4
|
+
#Easily and directly scan and block phishing security threats.
|
5
|
+
|
6
|
+
OpenAPI spec version: v1
|
7
|
+
|
8
|
+
Generated by: https://github.com/swagger-api/swagger-codegen.git
|
9
|
+
Swagger Codegen version: 2.4.14
|
10
|
+
|
11
|
+
=end
|
12
|
+
|
13
|
+
require 'date'
|
14
|
+
|
15
|
+
module CloudmersivePhishingDetectionApiClient
|
16
|
+
# Request data for the basic phishing validation apis
|
17
|
+
class PhishingUrlRequest
|
18
|
+
# Full url to be evaluated
|
19
|
+
attr_accessor :url
|
20
|
+
|
21
|
+
# Attribute mapping from ruby-style variable name to JSON key.
|
22
|
+
def self.attribute_map
|
23
|
+
{
|
24
|
+
:'url' => :'Url'
|
25
|
+
}
|
26
|
+
end
|
27
|
+
|
28
|
+
# Attribute type mapping.
|
29
|
+
def self.swagger_types
|
30
|
+
{
|
31
|
+
:'url' => :'String'
|
32
|
+
}
|
33
|
+
end
|
34
|
+
|
35
|
+
# Initializes the object
|
36
|
+
# @param [Hash] attributes Model attributes in the form of hash
|
37
|
+
def initialize(attributes = {})
|
38
|
+
return unless attributes.is_a?(Hash)
|
39
|
+
|
40
|
+
# convert string to symbol for hash key
|
41
|
+
attributes = attributes.each_with_object({}) { |(k, v), h| h[k.to_sym] = v }
|
42
|
+
|
43
|
+
if attributes.has_key?(:'Url')
|
44
|
+
self.url = attributes[:'Url']
|
45
|
+
end
|
46
|
+
end
|
47
|
+
|
48
|
+
# Show invalid properties with the reasons. Usually used together with valid?
|
49
|
+
# @return Array for valid properties with the reasons
|
50
|
+
def list_invalid_properties
|
51
|
+
invalid_properties = Array.new
|
52
|
+
if @url.nil?
|
53
|
+
invalid_properties.push('invalid value for "url", url cannot be nil.')
|
54
|
+
end
|
55
|
+
|
56
|
+
invalid_properties
|
57
|
+
end
|
58
|
+
|
59
|
+
# Check to see if the all the properties in the model are valid
|
60
|
+
# @return true if the model is valid
|
61
|
+
def valid?
|
62
|
+
return false if @url.nil?
|
63
|
+
true
|
64
|
+
end
|
65
|
+
|
66
|
+
# Checks equality by comparing each attribute.
|
67
|
+
# @param [Object] Object to be compared
|
68
|
+
def ==(o)
|
69
|
+
return true if self.equal?(o)
|
70
|
+
self.class == o.class &&
|
71
|
+
url == o.url
|
72
|
+
end
|
73
|
+
|
74
|
+
# @see the `==` method
|
75
|
+
# @param [Object] Object to be compared
|
76
|
+
def eql?(o)
|
77
|
+
self == o
|
78
|
+
end
|
79
|
+
|
80
|
+
# Calculates hash code according to all attributes.
|
81
|
+
# @return [Fixnum] Hash code
|
82
|
+
def hash
|
83
|
+
[url].hash
|
84
|
+
end
|
85
|
+
|
86
|
+
# Builds the object from hash
|
87
|
+
# @param [Hash] attributes Model attributes in the form of hash
|
88
|
+
# @return [Object] Returns the model itself
|
89
|
+
def build_from_hash(attributes)
|
90
|
+
return nil unless attributes.is_a?(Hash)
|
91
|
+
self.class.swagger_types.each_pair do |key, type|
|
92
|
+
if type =~ /\AArray<(.*)>/i
|
93
|
+
# check to ensure the input is an array given that the attribute
|
94
|
+
# is documented as an array but the input is not
|
95
|
+
if attributes[self.class.attribute_map[key]].is_a?(Array)
|
96
|
+
self.send("#{key}=", attributes[self.class.attribute_map[key]].map { |v| _deserialize($1, v) })
|
97
|
+
end
|
98
|
+
elsif !attributes[self.class.attribute_map[key]].nil?
|
99
|
+
self.send("#{key}=", _deserialize(type, attributes[self.class.attribute_map[key]]))
|
100
|
+
end # or else data not found in attributes(hash), not an issue as the data can be optional
|
101
|
+
end
|
102
|
+
|
103
|
+
self
|
104
|
+
end
|
105
|
+
|
106
|
+
# Deserializes the data based on type
|
107
|
+
# @param string type Data type
|
108
|
+
# @param string value Value to be deserialized
|
109
|
+
# @return [Object] Deserialized data
|
110
|
+
def _deserialize(type, value)
|
111
|
+
case type.to_sym
|
112
|
+
when :DateTime
|
113
|
+
DateTime.parse(value)
|
114
|
+
when :Date
|
115
|
+
Date.parse(value)
|
116
|
+
when :String
|
117
|
+
value.to_s
|
118
|
+
when :Integer
|
119
|
+
value.to_i
|
120
|
+
when :Float
|
121
|
+
value.to_f
|
122
|
+
when :BOOLEAN
|
123
|
+
if value.to_s =~ /\A(true|t|yes|y|1)\z/i
|
124
|
+
true
|
125
|
+
else
|
126
|
+
false
|
127
|
+
end
|
128
|
+
when :Object
|
129
|
+
# generic object (usually a Hash), return directly
|
130
|
+
value
|
131
|
+
when /\AArray<(?<inner_type>.+)>\z/
|
132
|
+
inner_type = Regexp.last_match[:inner_type]
|
133
|
+
value.map { |v| _deserialize(inner_type, v) }
|
134
|
+
when /\AHash<(?<k_type>.+?), (?<v_type>.+)>\z/
|
135
|
+
k_type = Regexp.last_match[:k_type]
|
136
|
+
v_type = Regexp.last_match[:v_type]
|
137
|
+
{}.tap do |hash|
|
138
|
+
value.each do |k, v|
|
139
|
+
hash[_deserialize(k_type, k)] = _deserialize(v_type, v)
|
140
|
+
end
|
141
|
+
end
|
142
|
+
else # model
|
143
|
+
temp_model = CloudmersivePhishingDetectionApiClient.const_get(type).new
|
144
|
+
temp_model.build_from_hash(value)
|
145
|
+
end
|
146
|
+
end
|
147
|
+
|
148
|
+
# Returns the string representation of the object
|
149
|
+
# @return [String] String presentation of the object
|
150
|
+
def to_s
|
151
|
+
to_hash.to_s
|
152
|
+
end
|
153
|
+
|
154
|
+
# to_body is an alias to to_hash (backward compatibility)
|
155
|
+
# @return [Hash] Returns the object in the form of hash
|
156
|
+
def to_body
|
157
|
+
to_hash
|
158
|
+
end
|
159
|
+
|
160
|
+
# Returns the object in the form of hash
|
161
|
+
# @return [Hash] Returns the object in the form of hash
|
162
|
+
def to_hash
|
163
|
+
hash = {}
|
164
|
+
self.class.attribute_map.each_pair do |attr, param|
|
165
|
+
value = self.send(attr)
|
166
|
+
next if value.nil?
|
167
|
+
hash[param] = _to_hash(value)
|
168
|
+
end
|
169
|
+
hash
|
170
|
+
end
|
171
|
+
|
172
|
+
# Outputs non-array value in the form of hash
|
173
|
+
# For object, use to_hash. Otherwise, just return the value
|
174
|
+
# @param [Object] value Any valid value
|
175
|
+
# @return [Hash] Returns the value in the form of hash
|
176
|
+
def _to_hash(value)
|
177
|
+
if value.is_a?(Array)
|
178
|
+
value.compact.map { |v| _to_hash(v) }
|
179
|
+
elsif value.is_a?(Hash)
|
180
|
+
{}.tap do |hash|
|
181
|
+
value.each { |k, v| hash[k] = _to_hash(v) }
|
182
|
+
end
|
183
|
+
elsif value.respond_to? :to_hash
|
184
|
+
value.to_hash
|
185
|
+
else
|
186
|
+
value
|
187
|
+
end
|
188
|
+
end
|
189
|
+
|
190
|
+
end
|
191
|
+
end
|