cloudmersive-phishing-detection-api-client 2.2.1 → 2.2.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (32) hide show
  1. checksums.yaml +4 -4
  2. data/README.md +11 -4
  3. data/docs/AdvancedEmailDetectionRequest.md +2 -1
  4. data/docs/AdvancedUrlDetectionRequest.md +9 -0
  5. data/docs/PhishingDetectionAdvancedRequest.md +15 -0
  6. data/docs/PhishingDetectionAdvancedResponse.md +8 -1
  7. data/docs/PhishingDetectionApi.md +110 -0
  8. data/docs/PhishingDetectionTextStringRequest.md +10 -0
  9. data/docs/PhishingDetectionTextStringResponse.md +10 -0
  10. data/docs/PhishingDetectionUrlAdvancedResponse.md +15 -0
  11. data/docs/UnsafeUrlResult.md +12 -0
  12. data/lib/cloudmersive-phishing-detection-api-client/api/phishing_detection_api.rb +99 -0
  13. data/lib/cloudmersive-phishing-detection-api-client/models/advanced_email_detection_request.rb +12 -1
  14. data/lib/cloudmersive-phishing-detection-api-client/models/advanced_url_detection_request.rb +196 -0
  15. data/lib/cloudmersive-phishing-detection-api-client/models/phishing_detection_advanced_request.rb +154 -4
  16. data/lib/cloudmersive-phishing-detection-api-client/models/phishing_detection_advanced_response.rb +83 -11
  17. data/lib/cloudmersive-phishing-detection-api-client/models/phishing_detection_text_string_request.rb +206 -0
  18. data/lib/cloudmersive-phishing-detection-api-client/models/phishing_detection_text_string_response.rb +206 -0
  19. data/lib/cloudmersive-phishing-detection-api-client/models/phishing_detection_url_advanced_response.rb +256 -0
  20. data/lib/cloudmersive-phishing-detection-api-client/models/unsafe_url_result.rb +226 -0
  21. data/lib/cloudmersive-phishing-detection-api-client/version.rb +1 -1
  22. data/lib/cloudmersive-phishing-detection-api-client.rb +5 -0
  23. data/spec/api/phishing_detection_api_spec.rb +23 -0
  24. data/spec/models/advanced_email_detection_request_spec.rb +6 -0
  25. data/spec/models/advanced_url_detection_request_spec.rb +47 -0
  26. data/spec/models/phishing_detection_advanced_request_spec.rb +90 -0
  27. data/spec/models/phishing_detection_advanced_response_spec.rb +43 -1
  28. data/spec/models/phishing_detection_text_string_request_spec.rb +53 -0
  29. data/spec/models/phishing_detection_text_string_response_spec.rb +53 -0
  30. data/spec/models/phishing_detection_url_advanced_response_spec.rb +83 -0
  31. data/spec/models/unsafe_url_result_spec.rb +65 -0
  32. metadata +17 -2
@@ -0,0 +1,226 @@
1
+ =begin
2
+ #phishingapi
3
+
4
+ #Easily and directly scan and block phishing security threats in input.
5
+
6
+ OpenAPI spec version: v1
7
+
8
+ Generated by: https://github.com/swagger-api/swagger-codegen.git
9
+ Swagger Codegen version: 2.4.14
10
+
11
+ =end
12
+
13
+ require 'date'
14
+
15
+ module CloudmersivePhishingDetectionApiClient
16
+ # Result of analyzing an individual URL found in text
17
+ class UnsafeUrlResult
18
+ # The URL that was detected and analyzed
19
+ attr_accessor :url
20
+
21
+ # True if the result is not phishing (clean), and false otherwise
22
+ attr_accessor :clean_result
23
+
24
+ # True if the URL is an SSRF threat
25
+ attr_accessor :is_ssrf_threat
26
+
27
+ # True if the URL contains phishing threat risks, false otherwise
28
+ attr_accessor :contains_phishing
29
+
30
+ # True if the URL contains a phishing attempt, false otherwise
31
+ attr_accessor :contains_phishing_attempt
32
+
33
+ # Attribute mapping from ruby-style variable name to JSON key.
34
+ def self.attribute_map
35
+ {
36
+ :'url' => :'Url',
37
+ :'clean_result' => :'CleanResult',
38
+ :'is_ssrf_threat' => :'IsSsrfThreat',
39
+ :'contains_phishing' => :'ContainsPhishing',
40
+ :'contains_phishing_attempt' => :'ContainsPhishingAttempt'
41
+ }
42
+ end
43
+
44
+ # Attribute type mapping.
45
+ def self.swagger_types
46
+ {
47
+ :'url' => :'String',
48
+ :'clean_result' => :'BOOLEAN',
49
+ :'is_ssrf_threat' => :'BOOLEAN',
50
+ :'contains_phishing' => :'BOOLEAN',
51
+ :'contains_phishing_attempt' => :'BOOLEAN'
52
+ }
53
+ end
54
+
55
+ # Initializes the object
56
+ # @param [Hash] attributes Model attributes in the form of hash
57
+ def initialize(attributes = {})
58
+ return unless attributes.is_a?(Hash)
59
+
60
+ # convert string to symbol for hash key
61
+ attributes = attributes.each_with_object({}) { |(k, v), h| h[k.to_sym] = v }
62
+
63
+ if attributes.has_key?(:'Url')
64
+ self.url = attributes[:'Url']
65
+ end
66
+
67
+ if attributes.has_key?(:'CleanResult')
68
+ self.clean_result = attributes[:'CleanResult']
69
+ end
70
+
71
+ if attributes.has_key?(:'IsSsrfThreat')
72
+ self.is_ssrf_threat = attributes[:'IsSsrfThreat']
73
+ end
74
+
75
+ if attributes.has_key?(:'ContainsPhishing')
76
+ self.contains_phishing = attributes[:'ContainsPhishing']
77
+ end
78
+
79
+ if attributes.has_key?(:'ContainsPhishingAttempt')
80
+ self.contains_phishing_attempt = attributes[:'ContainsPhishingAttempt']
81
+ end
82
+ end
83
+
84
+ # Show invalid properties with the reasons. Usually used together with valid?
85
+ # @return Array for valid properties with the reasons
86
+ def list_invalid_properties
87
+ invalid_properties = Array.new
88
+ invalid_properties
89
+ end
90
+
91
+ # Check to see if the all the properties in the model are valid
92
+ # @return true if the model is valid
93
+ def valid?
94
+ true
95
+ end
96
+
97
+ # Checks equality by comparing each attribute.
98
+ # @param [Object] Object to be compared
99
+ def ==(o)
100
+ return true if self.equal?(o)
101
+ self.class == o.class &&
102
+ url == o.url &&
103
+ clean_result == o.clean_result &&
104
+ is_ssrf_threat == o.is_ssrf_threat &&
105
+ contains_phishing == o.contains_phishing &&
106
+ contains_phishing_attempt == o.contains_phishing_attempt
107
+ end
108
+
109
+ # @see the `==` method
110
+ # @param [Object] Object to be compared
111
+ def eql?(o)
112
+ self == o
113
+ end
114
+
115
+ # Calculates hash code according to all attributes.
116
+ # @return [Fixnum] Hash code
117
+ def hash
118
+ [url, clean_result, is_ssrf_threat, contains_phishing, contains_phishing_attempt].hash
119
+ end
120
+
121
+ # Builds the object from hash
122
+ # @param [Hash] attributes Model attributes in the form of hash
123
+ # @return [Object] Returns the model itself
124
+ def build_from_hash(attributes)
125
+ return nil unless attributes.is_a?(Hash)
126
+ self.class.swagger_types.each_pair do |key, type|
127
+ if type =~ /\AArray<(.*)>/i
128
+ # check to ensure the input is an array given that the attribute
129
+ # is documented as an array but the input is not
130
+ if attributes[self.class.attribute_map[key]].is_a?(Array)
131
+ self.send("#{key}=", attributes[self.class.attribute_map[key]].map { |v| _deserialize($1, v) })
132
+ end
133
+ elsif !attributes[self.class.attribute_map[key]].nil?
134
+ self.send("#{key}=", _deserialize(type, attributes[self.class.attribute_map[key]]))
135
+ end # or else data not found in attributes(hash), not an issue as the data can be optional
136
+ end
137
+
138
+ self
139
+ end
140
+
141
+ # Deserializes the data based on type
142
+ # @param string type Data type
143
+ # @param string value Value to be deserialized
144
+ # @return [Object] Deserialized data
145
+ def _deserialize(type, value)
146
+ case type.to_sym
147
+ when :DateTime
148
+ DateTime.parse(value)
149
+ when :Date
150
+ Date.parse(value)
151
+ when :String
152
+ value.to_s
153
+ when :Integer
154
+ value.to_i
155
+ when :Float
156
+ value.to_f
157
+ when :BOOLEAN
158
+ if value.to_s =~ /\A(true|t|yes|y|1)\z/i
159
+ true
160
+ else
161
+ false
162
+ end
163
+ when :Object
164
+ # generic object (usually a Hash), return directly
165
+ value
166
+ when /\AArray<(?<inner_type>.+)>\z/
167
+ inner_type = Regexp.last_match[:inner_type]
168
+ value.map { |v| _deserialize(inner_type, v) }
169
+ when /\AHash<(?<k_type>.+?), (?<v_type>.+)>\z/
170
+ k_type = Regexp.last_match[:k_type]
171
+ v_type = Regexp.last_match[:v_type]
172
+ {}.tap do |hash|
173
+ value.each do |k, v|
174
+ hash[_deserialize(k_type, k)] = _deserialize(v_type, v)
175
+ end
176
+ end
177
+ else # model
178
+ temp_model = CloudmersivePhishingDetectionApiClient.const_get(type).new
179
+ temp_model.build_from_hash(value)
180
+ end
181
+ end
182
+
183
+ # Returns the string representation of the object
184
+ # @return [String] String presentation of the object
185
+ def to_s
186
+ to_hash.to_s
187
+ end
188
+
189
+ # to_body is an alias to to_hash (backward compatibility)
190
+ # @return [Hash] Returns the object in the form of hash
191
+ def to_body
192
+ to_hash
193
+ end
194
+
195
+ # Returns the object in the form of hash
196
+ # @return [Hash] Returns the object in the form of hash
197
+ def to_hash
198
+ hash = {}
199
+ self.class.attribute_map.each_pair do |attr, param|
200
+ value = self.send(attr)
201
+ next if value.nil?
202
+ hash[param] = _to_hash(value)
203
+ end
204
+ hash
205
+ end
206
+
207
+ # Outputs non-array value in the form of hash
208
+ # For object, use to_hash. Otherwise, just return the value
209
+ # @param [Object] value Any valid value
210
+ # @return [Hash] Returns the value in the form of hash
211
+ def _to_hash(value)
212
+ if value.is_a?(Array)
213
+ value.compact.map { |v| _to_hash(v) }
214
+ elsif value.is_a?(Hash)
215
+ {}.tap do |hash|
216
+ value.each { |k, v| hash[k] = _to_hash(v) }
217
+ end
218
+ elsif value.respond_to? :to_hash
219
+ value.to_hash
220
+ else
221
+ value
222
+ end
223
+ end
224
+
225
+ end
226
+ end
@@ -11,5 +11,5 @@ Swagger Codegen version: 2.4.14
11
11
  =end
12
12
 
13
13
  module CloudmersivePhishingDetectionApiClient
14
- VERSION = '2.2.1'
14
+ VERSION = '2.2.3'
15
15
  end
@@ -18,10 +18,15 @@ require 'cloudmersive-phishing-detection-api-client/configuration'
18
18
 
19
19
  # Models
20
20
  require 'cloudmersive-phishing-detection-api-client/models/advanced_email_detection_request'
21
+ require 'cloudmersive-phishing-detection-api-client/models/advanced_url_detection_request'
21
22
  require 'cloudmersive-phishing-detection-api-client/models/phishing_detection_advanced_request'
22
23
  require 'cloudmersive-phishing-detection-api-client/models/phishing_detection_advanced_response'
23
24
  require 'cloudmersive-phishing-detection-api-client/models/phishing_detection_email_advanced_response'
24
25
  require 'cloudmersive-phishing-detection-api-client/models/phishing_detection_response'
26
+ require 'cloudmersive-phishing-detection-api-client/models/phishing_detection_text_string_request'
27
+ require 'cloudmersive-phishing-detection-api-client/models/phishing_detection_text_string_response'
28
+ require 'cloudmersive-phishing-detection-api-client/models/phishing_detection_url_advanced_response'
29
+ require 'cloudmersive-phishing-detection-api-client/models/unsafe_url_result'
25
30
 
26
31
  # APIs
27
32
  require 'cloudmersive-phishing-detection-api-client/api/phishing_detection_api'
@@ -47,6 +47,7 @@ describe 'PhishingDetectionApi' do
47
47
  # Perform advanced AI phishing detection and classification against input text string. Analyzes input content as well as embedded URLs with AI deep learning to detect phishing, phishing and other unsafe content. Uses 25-100 API calls depending on model selected.
48
48
  # @param [Hash] opts the optional parameters
49
49
  # @option opts [String] :model
50
+ # @option opts [String] :custom_policy_id
50
51
  # @option opts [File] :input_file
51
52
  # @return [PhishingDetectionAdvancedResponse]
52
53
  describe 'phishing_detect_file_advanced_post test' do
@@ -78,4 +79,26 @@ describe 'PhishingDetectionApi' do
78
79
  end
79
80
  end
80
81
 
82
+ # unit tests for phishing_detect_text_string_post
83
+ # Perform AI phishing detection against input text string. Returns a clean/not-clean result with confidence level and optional rationale.
84
+ # @param [Hash] opts the optional parameters
85
+ # @option opts [PhishingDetectionTextStringRequest] :body Phishing detection request
86
+ # @return [PhishingDetectionTextStringResponse]
87
+ describe 'phishing_detect_text_string_post test' do
88
+ it 'should work' do
89
+ # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
90
+ end
91
+ end
92
+
93
+ # unit tests for phishing_detect_url_advanced_post
94
+ # Perform advanced AI phishing detection and classification against an input URL. Retrieves the URL content, checks for SSRF threats, and analyzes the page with AI deep learning to detect phishing and other unsafe content. Uses 100-125 API calls.
95
+ # @param [Hash] opts the optional parameters
96
+ # @option opts [AdvancedUrlDetectionRequest] :body URL phishing detection request
97
+ # @return [PhishingDetectionUrlAdvancedResponse]
98
+ describe 'phishing_detect_url_advanced_post test' do
99
+ it 'should work' do
100
+ # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
101
+ end
102
+ end
103
+
81
104
  end
@@ -68,6 +68,12 @@ describe 'AdvancedEmailDetectionRequest' do
68
68
  end
69
69
  end
70
70
 
71
+ describe 'test attribute "custom_policy_id"' do
72
+ it 'should work' do
73
+ # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
74
+ end
75
+ end
76
+
71
77
  describe 'test attribute "input_email_file"' do
72
78
  it 'should work' do
73
79
  # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
@@ -0,0 +1,47 @@
1
+ =begin
2
+ #phishingapi
3
+
4
+ #Easily and directly scan and block phishing security threats in input.
5
+
6
+ OpenAPI spec version: v1
7
+
8
+ Generated by: https://github.com/swagger-api/swagger-codegen.git
9
+ Swagger Codegen version: 2.4.14
10
+
11
+ =end
12
+
13
+ require 'spec_helper'
14
+ require 'json'
15
+ require 'date'
16
+
17
+ # Unit tests for CloudmersivePhishingDetectionApiClient::AdvancedUrlDetectionRequest
18
+ # Automatically generated by swagger-codegen (github.com/swagger-api/swagger-codegen)
19
+ # Please update as you see appropriate
20
+ describe 'AdvancedUrlDetectionRequest' do
21
+ before do
22
+ # run before each test
23
+ @instance = CloudmersivePhishingDetectionApiClient::AdvancedUrlDetectionRequest.new
24
+ end
25
+
26
+ after do
27
+ # run after each test
28
+ end
29
+
30
+ describe 'test an instance of AdvancedUrlDetectionRequest' do
31
+ it 'should create an instance of AdvancedUrlDetectionRequest' do
32
+ expect(@instance).to be_instance_of(CloudmersivePhishingDetectionApiClient::AdvancedUrlDetectionRequest)
33
+ end
34
+ end
35
+ describe 'test attribute "url"' do
36
+ it 'should work' do
37
+ # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
38
+ end
39
+ end
40
+
41
+ describe 'test attribute "custom_policy_id"' do
42
+ it 'should work' do
43
+ # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
44
+ end
45
+ end
46
+
47
+ end
@@ -38,10 +38,100 @@ describe 'PhishingDetectionAdvancedRequest' do
38
38
  end
39
39
  end
40
40
 
41
+ describe 'test attribute "text_type"' do
42
+ it 'should work' do
43
+ # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
44
+ end
45
+ end
46
+
41
47
  describe 'test attribute "model"' do
42
48
  it 'should work' do
43
49
  # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
44
50
  end
45
51
  end
46
52
 
53
+ describe 'test attribute "allow_unsolicited_sales"' do
54
+ it 'should work' do
55
+ # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
56
+ end
57
+ end
58
+
59
+ describe 'test attribute "allow_promotional_content"' do
60
+ it 'should work' do
61
+ # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
62
+ end
63
+ end
64
+
65
+ describe 'test attribute "allow_web_urls"' do
66
+ it 'should work' do
67
+ # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
68
+ end
69
+ end
70
+
71
+ describe 'test attribute "allow_phone_numbers"' do
72
+ it 'should work' do
73
+ # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
74
+ end
75
+ end
76
+
77
+ describe 'test attribute "allow_email_addresses"' do
78
+ it 'should work' do
79
+ # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
80
+ end
81
+ end
82
+
83
+ describe 'test attribute "provide_url_analysis"' do
84
+ it 'should work' do
85
+ # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
86
+ end
87
+ end
88
+
89
+ describe 'test attribute "custom_policy_id"' do
90
+ it 'should work' do
91
+ # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
92
+ end
93
+ end
94
+
95
+ describe 'test attribute "provide_analysis_rationale"' do
96
+ it 'should work' do
97
+ # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
98
+ end
99
+ end
100
+
101
+ describe 'test attribute "from_name"' do
102
+ it 'should work' do
103
+ # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
104
+ end
105
+ end
106
+
107
+ describe 'test attribute "to_name"' do
108
+ it 'should work' do
109
+ # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
110
+ end
111
+ end
112
+
113
+ describe 'test attribute "from_phone_number"' do
114
+ it 'should work' do
115
+ # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
116
+ end
117
+ end
118
+
119
+ describe 'test attribute "to_phone_number"' do
120
+ it 'should work' do
121
+ # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
122
+ end
123
+ end
124
+
125
+ describe 'test attribute "from_email_address"' do
126
+ it 'should work' do
127
+ # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
128
+ end
129
+ end
130
+
131
+ describe 'test attribute "to_email_address"' do
132
+ it 'should work' do
133
+ # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
134
+ end
135
+ end
136
+
47
137
  end
@@ -38,7 +38,43 @@ describe 'PhishingDetectionAdvancedResponse' do
38
38
  end
39
39
  end
40
40
 
41
- describe 'test attribute "phishing_risk_level"' do
41
+ describe 'test attribute "contains_phishing"' do
42
+ it 'should work' do
43
+ # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
44
+ end
45
+ end
46
+
47
+ describe 'test attribute "contains_unsolicited_sales"' do
48
+ it 'should work' do
49
+ # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
50
+ end
51
+ end
52
+
53
+ describe 'test attribute "contains_promotional_content"' do
54
+ it 'should work' do
55
+ # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
56
+ end
57
+ end
58
+
59
+ describe 'test attribute "contains_web_urls"' do
60
+ it 'should work' do
61
+ # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
62
+ end
63
+ end
64
+
65
+ describe 'test attribute "contains_phone_numbers"' do
66
+ it 'should work' do
67
+ # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
68
+ end
69
+ end
70
+
71
+ describe 'test attribute "contains_email_addresses"' do
72
+ it 'should work' do
73
+ # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
74
+ end
75
+ end
76
+
77
+ describe 'test attribute "confidence_level"' do
42
78
  it 'should work' do
43
79
  # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
44
80
  end
@@ -50,4 +86,10 @@ describe 'PhishingDetectionAdvancedResponse' do
50
86
  end
51
87
  end
52
88
 
89
+ describe 'test attribute "unsafe_urls"' do
90
+ it 'should work' do
91
+ # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
92
+ end
93
+ end
94
+
53
95
  end
@@ -0,0 +1,53 @@
1
+ =begin
2
+ #phishingapi
3
+
4
+ #Easily and directly scan and block phishing security threats in input.
5
+
6
+ OpenAPI spec version: v1
7
+
8
+ Generated by: https://github.com/swagger-api/swagger-codegen.git
9
+ Swagger Codegen version: 2.4.14
10
+
11
+ =end
12
+
13
+ require 'spec_helper'
14
+ require 'json'
15
+ require 'date'
16
+
17
+ # Unit tests for CloudmersivePhishingDetectionApiClient::PhishingDetectionTextStringRequest
18
+ # Automatically generated by swagger-codegen (github.com/swagger-api/swagger-codegen)
19
+ # Please update as you see appropriate
20
+ describe 'PhishingDetectionTextStringRequest' do
21
+ before do
22
+ # run before each test
23
+ @instance = CloudmersivePhishingDetectionApiClient::PhishingDetectionTextStringRequest.new
24
+ end
25
+
26
+ after do
27
+ # run after each test
28
+ end
29
+
30
+ describe 'test an instance of PhishingDetectionTextStringRequest' do
31
+ it 'should create an instance of PhishingDetectionTextStringRequest' do
32
+ expect(@instance).to be_instance_of(CloudmersivePhishingDetectionApiClient::PhishingDetectionTextStringRequest)
33
+ end
34
+ end
35
+ describe 'test attribute "input_string"' do
36
+ it 'should work' do
37
+ # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
38
+ end
39
+ end
40
+
41
+ describe 'test attribute "model"' do
42
+ it 'should work' do
43
+ # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
44
+ end
45
+ end
46
+
47
+ describe 'test attribute "provide_analysis_rationale"' do
48
+ it 'should work' do
49
+ # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
50
+ end
51
+ end
52
+
53
+ end
@@ -0,0 +1,53 @@
1
+ =begin
2
+ #phishingapi
3
+
4
+ #Easily and directly scan and block phishing security threats in input.
5
+
6
+ OpenAPI spec version: v1
7
+
8
+ Generated by: https://github.com/swagger-api/swagger-codegen.git
9
+ Swagger Codegen version: 2.4.14
10
+
11
+ =end
12
+
13
+ require 'spec_helper'
14
+ require 'json'
15
+ require 'date'
16
+
17
+ # Unit tests for CloudmersivePhishingDetectionApiClient::PhishingDetectionTextStringResponse
18
+ # Automatically generated by swagger-codegen (github.com/swagger-api/swagger-codegen)
19
+ # Please update as you see appropriate
20
+ describe 'PhishingDetectionTextStringResponse' do
21
+ before do
22
+ # run before each test
23
+ @instance = CloudmersivePhishingDetectionApiClient::PhishingDetectionTextStringResponse.new
24
+ end
25
+
26
+ after do
27
+ # run after each test
28
+ end
29
+
30
+ describe 'test an instance of PhishingDetectionTextStringResponse' do
31
+ it 'should create an instance of PhishingDetectionTextStringResponse' do
32
+ expect(@instance).to be_instance_of(CloudmersivePhishingDetectionApiClient::PhishingDetectionTextStringResponse)
33
+ end
34
+ end
35
+ describe 'test attribute "clean_result"' do
36
+ it 'should work' do
37
+ # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
38
+ end
39
+ end
40
+
41
+ describe 'test attribute "confidence_level"' do
42
+ it 'should work' do
43
+ # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
44
+ end
45
+ end
46
+
47
+ describe 'test attribute "analysis_rationale"' do
48
+ it 'should work' do
49
+ # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
50
+ end
51
+ end
52
+
53
+ end