cloudmersive-security-api-client 2.0.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +7 -0
- data/Gemfile +7 -0
- data/README.md +119 -0
- data/Rakefile +8 -0
- data/cloudmersive-security-api-client.gemspec +45 -0
- data/docs/ContentThreatDetectionApi.md +283 -0
- data/docs/IPThreatDetectionResponse.md +9 -0
- data/docs/NetworkThreatDetectionApi.md +228 -0
- data/docs/StringAutomaticThreatDetection.md +18 -0
- data/docs/StringInsecureDeserializationJsonDetection.md +10 -0
- data/docs/StringSqlInjectionDetectionResult.md +10 -0
- data/docs/StringXssProtectionResult.md +11 -0
- data/docs/StringXxeDetectionResult.md +9 -0
- data/docs/ThreatDetectionBotCheckResponse.md +8 -0
- data/docs/ThreatDetectionTorNodeResponse.md +8 -0
- data/docs/UrlSsrfThreatDetectionRequestFull.md +9 -0
- data/docs/UrlSsrfThreatDetectionResponseFull.md +9 -0
- data/git_push.sh +55 -0
- data/lib/cloudmersive-security-api-client.rb +51 -0
- data/lib/cloudmersive-security-api-client/api/content_threat_detection_api.rb +293 -0
- data/lib/cloudmersive-security-api-client/api/network_threat_detection_api.rb +239 -0
- data/lib/cloudmersive-security-api-client/api_client.rb +391 -0
- data/lib/cloudmersive-security-api-client/api_error.rb +38 -0
- data/lib/cloudmersive-security-api-client/configuration.rb +209 -0
- data/lib/cloudmersive-security-api-client/models/ip_threat_detection_response.rb +196 -0
- data/lib/cloudmersive-security-api-client/models/string_automatic_threat_detection.rb +285 -0
- data/lib/cloudmersive-security-api-client/models/string_insecure_deserialization_json_detection.rb +206 -0
- data/lib/cloudmersive-security-api-client/models/string_sql_injection_detection_result.rb +206 -0
- data/lib/cloudmersive-security-api-client/models/string_xss_protection_result.rb +216 -0
- data/lib/cloudmersive-security-api-client/models/string_xxe_detection_result.rb +196 -0
- data/lib/cloudmersive-security-api-client/models/threat_detection_bot_check_response.rb +186 -0
- data/lib/cloudmersive-security-api-client/models/threat_detection_tor_node_response.rb +186 -0
- data/lib/cloudmersive-security-api-client/models/url_ssrf_threat_detection_request_full.rb +198 -0
- data/lib/cloudmersive-security-api-client/models/url_ssrf_threat_detection_response_full.rb +196 -0
- data/lib/cloudmersive-security-api-client/version.rb +15 -0
- data/spec/api/content_threat_detection_api_spec.rb +95 -0
- data/spec/api/network_threat_detection_api_spec.rb +83 -0
- data/spec/api_client_spec.rb +243 -0
- data/spec/configuration_spec.rb +42 -0
- data/spec/models/ip_threat_detection_response_spec.rb +47 -0
- data/spec/models/string_automatic_threat_detection_spec.rb +101 -0
- data/spec/models/string_insecure_deserialization_json_detection_spec.rb +53 -0
- data/spec/models/string_sql_injection_detection_result_spec.rb +53 -0
- data/spec/models/string_xss_protection_result_spec.rb +59 -0
- data/spec/models/string_xxe_detection_result_spec.rb +47 -0
- data/spec/models/threat_detection_bot_check_response_spec.rb +41 -0
- data/spec/models/threat_detection_tor_node_response_spec.rb +41 -0
- data/spec/models/url_ssrf_threat_detection_request_full_spec.rb +47 -0
- data/spec/models/url_ssrf_threat_detection_response_full_spec.rb +47 -0
- data/spec/spec_helper.rb +111 -0
- metadata +273 -0
@@ -0,0 +1,293 @@
|
|
1
|
+
=begin
|
2
|
+
#securityapi
|
3
|
+
|
4
|
+
#The security APIs help you detect and block security threats.
|
5
|
+
|
6
|
+
OpenAPI spec version: v1
|
7
|
+
|
8
|
+
Generated by: https://github.com/swagger-api/swagger-codegen.git
|
9
|
+
Swagger Codegen version: 2.4.14
|
10
|
+
|
11
|
+
=end
|
12
|
+
|
13
|
+
require 'uri'
|
14
|
+
|
15
|
+
module CloudmersiveSecurityApiClient
|
16
|
+
class ContentThreatDetectionApi
|
17
|
+
attr_accessor :api_client
|
18
|
+
|
19
|
+
def initialize(api_client = ApiClient.default)
|
20
|
+
@api_client = api_client
|
21
|
+
end
|
22
|
+
# Automatically detect threats in an input string
|
23
|
+
# Auto-detects a wide range of threat types in input string, including Cross-Site Scripting (XSS), SQL Injection (SQLI), XML External Entitites (XXE), Server-side Request Forgeries (SSRF), and JSON Insecure Deserialization (JID).
|
24
|
+
# @param value User-facing text input.
|
25
|
+
# @param [Hash] opts the optional parameters
|
26
|
+
# @return [StringAutomaticThreatDetection]
|
27
|
+
def content_threat_detection_automatic_threat_detection_string(value, opts = {})
|
28
|
+
data, _status_code, _headers = content_threat_detection_automatic_threat_detection_string_with_http_info(value, opts)
|
29
|
+
data
|
30
|
+
end
|
31
|
+
|
32
|
+
# Automatically detect threats in an input string
|
33
|
+
# Auto-detects a wide range of threat types in input string, including Cross-Site Scripting (XSS), SQL Injection (SQLI), XML External Entitites (XXE), Server-side Request Forgeries (SSRF), and JSON Insecure Deserialization (JID).
|
34
|
+
# @param value User-facing text input.
|
35
|
+
# @param [Hash] opts the optional parameters
|
36
|
+
# @return [Array<(StringAutomaticThreatDetection, Fixnum, Hash)>] StringAutomaticThreatDetection data, response status code and response headers
|
37
|
+
def content_threat_detection_automatic_threat_detection_string_with_http_info(value, opts = {})
|
38
|
+
if @api_client.config.debugging
|
39
|
+
@api_client.config.logger.debug 'Calling API: ContentThreatDetectionApi.content_threat_detection_automatic_threat_detection_string ...'
|
40
|
+
end
|
41
|
+
# verify the required parameter 'value' is set
|
42
|
+
if @api_client.config.client_side_validation && value.nil?
|
43
|
+
fail ArgumentError, "Missing the required parameter 'value' when calling ContentThreatDetectionApi.content_threat_detection_automatic_threat_detection_string"
|
44
|
+
end
|
45
|
+
# resource path
|
46
|
+
local_var_path = '/security/threat-detection/content/automatic/detect/string'
|
47
|
+
|
48
|
+
# query parameters
|
49
|
+
query_params = {}
|
50
|
+
|
51
|
+
# header parameters
|
52
|
+
header_params = {}
|
53
|
+
# HTTP header 'Accept' (if needed)
|
54
|
+
header_params['Accept'] = @api_client.select_header_accept(['application/json', 'text/json', 'application/xml', 'text/xml'])
|
55
|
+
# HTTP header 'Content-Type'
|
56
|
+
header_params['Content-Type'] = @api_client.select_header_content_type(['application/json', 'text/json'])
|
57
|
+
|
58
|
+
# form parameters
|
59
|
+
form_params = {}
|
60
|
+
|
61
|
+
# http body (model)
|
62
|
+
post_body = @api_client.object_to_http_body(value)
|
63
|
+
auth_names = ['Apikey']
|
64
|
+
data, status_code, headers = @api_client.call_api(:POST, local_var_path,
|
65
|
+
:header_params => header_params,
|
66
|
+
:query_params => query_params,
|
67
|
+
:form_params => form_params,
|
68
|
+
:body => post_body,
|
69
|
+
:auth_names => auth_names,
|
70
|
+
:return_type => 'StringAutomaticThreatDetection')
|
71
|
+
if @api_client.config.debugging
|
72
|
+
@api_client.config.logger.debug "API called: ContentThreatDetectionApi#content_threat_detection_automatic_threat_detection_string\nData: #{data.inspect}\nStatus code: #{status_code}\nHeaders: #{headers}"
|
73
|
+
end
|
74
|
+
return data, status_code, headers
|
75
|
+
end
|
76
|
+
# Check text input for SQL Injection (SQLI) attacks
|
77
|
+
# Detects SQL Injection (SQLI) attacks from text input.
|
78
|
+
# @param value User-facing text input.
|
79
|
+
# @param [Hash] opts the optional parameters
|
80
|
+
# @return [StringSqlInjectionDetectionResult]
|
81
|
+
def content_threat_detection_check_sql_injection_string(value, opts = {})
|
82
|
+
data, _status_code, _headers = content_threat_detection_check_sql_injection_string_with_http_info(value, opts)
|
83
|
+
data
|
84
|
+
end
|
85
|
+
|
86
|
+
# Check text input for SQL Injection (SQLI) attacks
|
87
|
+
# Detects SQL Injection (SQLI) attacks from text input.
|
88
|
+
# @param value User-facing text input.
|
89
|
+
# @param [Hash] opts the optional parameters
|
90
|
+
# @return [Array<(StringSqlInjectionDetectionResult, Fixnum, Hash)>] StringSqlInjectionDetectionResult data, response status code and response headers
|
91
|
+
def content_threat_detection_check_sql_injection_string_with_http_info(value, opts = {})
|
92
|
+
if @api_client.config.debugging
|
93
|
+
@api_client.config.logger.debug 'Calling API: ContentThreatDetectionApi.content_threat_detection_check_sql_injection_string ...'
|
94
|
+
end
|
95
|
+
# verify the required parameter 'value' is set
|
96
|
+
if @api_client.config.client_side_validation && value.nil?
|
97
|
+
fail ArgumentError, "Missing the required parameter 'value' when calling ContentThreatDetectionApi.content_threat_detection_check_sql_injection_string"
|
98
|
+
end
|
99
|
+
# resource path
|
100
|
+
local_var_path = '/security/threat-detection/content/sql-injection/detect/string'
|
101
|
+
|
102
|
+
# query parameters
|
103
|
+
query_params = {}
|
104
|
+
|
105
|
+
# header parameters
|
106
|
+
header_params = {}
|
107
|
+
# HTTP header 'Accept' (if needed)
|
108
|
+
header_params['Accept'] = @api_client.select_header_accept(['application/json', 'text/json', 'application/xml', 'text/xml'])
|
109
|
+
# HTTP header 'Content-Type'
|
110
|
+
header_params['Content-Type'] = @api_client.select_header_content_type(['application/json', 'text/json'])
|
111
|
+
|
112
|
+
# form parameters
|
113
|
+
form_params = {}
|
114
|
+
|
115
|
+
# http body (model)
|
116
|
+
post_body = @api_client.object_to_http_body(value)
|
117
|
+
auth_names = ['Apikey']
|
118
|
+
data, status_code, headers = @api_client.call_api(:POST, local_var_path,
|
119
|
+
:header_params => header_params,
|
120
|
+
:query_params => query_params,
|
121
|
+
:form_params => form_params,
|
122
|
+
:body => post_body,
|
123
|
+
:auth_names => auth_names,
|
124
|
+
:return_type => 'StringSqlInjectionDetectionResult')
|
125
|
+
if @api_client.config.debugging
|
126
|
+
@api_client.config.logger.debug "API called: ContentThreatDetectionApi#content_threat_detection_check_sql_injection_string\nData: #{data.inspect}\nStatus code: #{status_code}\nHeaders: #{headers}"
|
127
|
+
end
|
128
|
+
return data, status_code, headers
|
129
|
+
end
|
130
|
+
# Protect text input from XML External Entity (XXE) attacks
|
131
|
+
# Detects XXE (XML External Entity) attacks from XML text input.
|
132
|
+
# @param value User-facing text input.
|
133
|
+
# @param [Hash] opts the optional parameters
|
134
|
+
# @return [StringXxeDetectionResult]
|
135
|
+
def content_threat_detection_check_xxe(value, opts = {})
|
136
|
+
data, _status_code, _headers = content_threat_detection_check_xxe_with_http_info(value, opts)
|
137
|
+
data
|
138
|
+
end
|
139
|
+
|
140
|
+
# Protect text input from XML External Entity (XXE) attacks
|
141
|
+
# Detects XXE (XML External Entity) attacks from XML text input.
|
142
|
+
# @param value User-facing text input.
|
143
|
+
# @param [Hash] opts the optional parameters
|
144
|
+
# @return [Array<(StringXxeDetectionResult, Fixnum, Hash)>] StringXxeDetectionResult data, response status code and response headers
|
145
|
+
def content_threat_detection_check_xxe_with_http_info(value, opts = {})
|
146
|
+
if @api_client.config.debugging
|
147
|
+
@api_client.config.logger.debug 'Calling API: ContentThreatDetectionApi.content_threat_detection_check_xxe ...'
|
148
|
+
end
|
149
|
+
# verify the required parameter 'value' is set
|
150
|
+
if @api_client.config.client_side_validation && value.nil?
|
151
|
+
fail ArgumentError, "Missing the required parameter 'value' when calling ContentThreatDetectionApi.content_threat_detection_check_xxe"
|
152
|
+
end
|
153
|
+
# resource path
|
154
|
+
local_var_path = '/security/threat-detection/content/xxe/detect/xml/string'
|
155
|
+
|
156
|
+
# query parameters
|
157
|
+
query_params = {}
|
158
|
+
|
159
|
+
# header parameters
|
160
|
+
header_params = {}
|
161
|
+
# HTTP header 'Accept' (if needed)
|
162
|
+
header_params['Accept'] = @api_client.select_header_accept(['application/json', 'text/json', 'application/xml', 'text/xml'])
|
163
|
+
# HTTP header 'Content-Type'
|
164
|
+
header_params['Content-Type'] = @api_client.select_header_content_type(['application/json', 'text/json'])
|
165
|
+
|
166
|
+
# form parameters
|
167
|
+
form_params = {}
|
168
|
+
|
169
|
+
# http body (model)
|
170
|
+
post_body = @api_client.object_to_http_body(value)
|
171
|
+
auth_names = ['Apikey']
|
172
|
+
data, status_code, headers = @api_client.call_api(:POST, local_var_path,
|
173
|
+
:header_params => header_params,
|
174
|
+
:query_params => query_params,
|
175
|
+
:form_params => form_params,
|
176
|
+
:body => post_body,
|
177
|
+
:auth_names => auth_names,
|
178
|
+
:return_type => 'StringXxeDetectionResult')
|
179
|
+
if @api_client.config.debugging
|
180
|
+
@api_client.config.logger.debug "API called: ContentThreatDetectionApi#content_threat_detection_check_xxe\nData: #{data.inspect}\nStatus code: #{status_code}\nHeaders: #{headers}"
|
181
|
+
end
|
182
|
+
return data, status_code, headers
|
183
|
+
end
|
184
|
+
# Detect Insecure Deserialization JSON (JID) attacks in a string
|
185
|
+
# Detects Insecure Deserialization JSON (JID) attacks from text input.
|
186
|
+
# @param value User-facing text input.
|
187
|
+
# @param [Hash] opts the optional parameters
|
188
|
+
# @return [StringInsecureDeserializationJsonDetection]
|
189
|
+
def content_threat_detection_detect_insecure_deserialization_json_string(value, opts = {})
|
190
|
+
data, _status_code, _headers = content_threat_detection_detect_insecure_deserialization_json_string_with_http_info(value, opts)
|
191
|
+
data
|
192
|
+
end
|
193
|
+
|
194
|
+
# Detect Insecure Deserialization JSON (JID) attacks in a string
|
195
|
+
# Detects Insecure Deserialization JSON (JID) attacks from text input.
|
196
|
+
# @param value User-facing text input.
|
197
|
+
# @param [Hash] opts the optional parameters
|
198
|
+
# @return [Array<(StringInsecureDeserializationJsonDetection, Fixnum, Hash)>] StringInsecureDeserializationJsonDetection data, response status code and response headers
|
199
|
+
def content_threat_detection_detect_insecure_deserialization_json_string_with_http_info(value, opts = {})
|
200
|
+
if @api_client.config.debugging
|
201
|
+
@api_client.config.logger.debug 'Calling API: ContentThreatDetectionApi.content_threat_detection_detect_insecure_deserialization_json_string ...'
|
202
|
+
end
|
203
|
+
# verify the required parameter 'value' is set
|
204
|
+
if @api_client.config.client_side_validation && value.nil?
|
205
|
+
fail ArgumentError, "Missing the required parameter 'value' when calling ContentThreatDetectionApi.content_threat_detection_detect_insecure_deserialization_json_string"
|
206
|
+
end
|
207
|
+
# resource path
|
208
|
+
local_var_path = '/security/threat-detection/content/insecure-deserialization/json/detect/string'
|
209
|
+
|
210
|
+
# query parameters
|
211
|
+
query_params = {}
|
212
|
+
|
213
|
+
# header parameters
|
214
|
+
header_params = {}
|
215
|
+
# HTTP header 'Accept' (if needed)
|
216
|
+
header_params['Accept'] = @api_client.select_header_accept(['application/json', 'text/json', 'application/xml', 'text/xml'])
|
217
|
+
# HTTP header 'Content-Type'
|
218
|
+
header_params['Content-Type'] = @api_client.select_header_content_type(['application/json', 'text/json'])
|
219
|
+
|
220
|
+
# form parameters
|
221
|
+
form_params = {}
|
222
|
+
|
223
|
+
# http body (model)
|
224
|
+
post_body = @api_client.object_to_http_body(value)
|
225
|
+
auth_names = ['Apikey']
|
226
|
+
data, status_code, headers = @api_client.call_api(:POST, local_var_path,
|
227
|
+
:header_params => header_params,
|
228
|
+
:query_params => query_params,
|
229
|
+
:form_params => form_params,
|
230
|
+
:body => post_body,
|
231
|
+
:auth_names => auth_names,
|
232
|
+
:return_type => 'StringInsecureDeserializationJsonDetection')
|
233
|
+
if @api_client.config.debugging
|
234
|
+
@api_client.config.logger.debug "API called: ContentThreatDetectionApi#content_threat_detection_detect_insecure_deserialization_json_string\nData: #{data.inspect}\nStatus code: #{status_code}\nHeaders: #{headers}"
|
235
|
+
end
|
236
|
+
return data, status_code, headers
|
237
|
+
end
|
238
|
+
# Protect text input from Cross-Site-Scripting (XSS) attacks through normalization
|
239
|
+
# Detects and removes XSS (Cross-Site-Scripting) attacks from text input through normalization. Returns the normalized result, as well as information on whether the original input contained an XSS risk.
|
240
|
+
# @param value User-facing text input.
|
241
|
+
# @param [Hash] opts the optional parameters
|
242
|
+
# @return [StringXssProtectionResult]
|
243
|
+
def content_threat_detection_protect_xss(value, opts = {})
|
244
|
+
data, _status_code, _headers = content_threat_detection_protect_xss_with_http_info(value, opts)
|
245
|
+
data
|
246
|
+
end
|
247
|
+
|
248
|
+
# Protect text input from Cross-Site-Scripting (XSS) attacks through normalization
|
249
|
+
# Detects and removes XSS (Cross-Site-Scripting) attacks from text input through normalization. Returns the normalized result, as well as information on whether the original input contained an XSS risk.
|
250
|
+
# @param value User-facing text input.
|
251
|
+
# @param [Hash] opts the optional parameters
|
252
|
+
# @return [Array<(StringXssProtectionResult, Fixnum, Hash)>] StringXssProtectionResult data, response status code and response headers
|
253
|
+
def content_threat_detection_protect_xss_with_http_info(value, opts = {})
|
254
|
+
if @api_client.config.debugging
|
255
|
+
@api_client.config.logger.debug 'Calling API: ContentThreatDetectionApi.content_threat_detection_protect_xss ...'
|
256
|
+
end
|
257
|
+
# verify the required parameter 'value' is set
|
258
|
+
if @api_client.config.client_side_validation && value.nil?
|
259
|
+
fail ArgumentError, "Missing the required parameter 'value' when calling ContentThreatDetectionApi.content_threat_detection_protect_xss"
|
260
|
+
end
|
261
|
+
# resource path
|
262
|
+
local_var_path = '/security/threat-detection/content/xss/detect/string'
|
263
|
+
|
264
|
+
# query parameters
|
265
|
+
query_params = {}
|
266
|
+
|
267
|
+
# header parameters
|
268
|
+
header_params = {}
|
269
|
+
# HTTP header 'Accept' (if needed)
|
270
|
+
header_params['Accept'] = @api_client.select_header_accept(['application/json', 'text/json', 'application/xml', 'text/xml'])
|
271
|
+
# HTTP header 'Content-Type'
|
272
|
+
header_params['Content-Type'] = @api_client.select_header_content_type(['application/json', 'text/json'])
|
273
|
+
|
274
|
+
# form parameters
|
275
|
+
form_params = {}
|
276
|
+
|
277
|
+
# http body (model)
|
278
|
+
post_body = @api_client.object_to_http_body(value)
|
279
|
+
auth_names = ['Apikey']
|
280
|
+
data, status_code, headers = @api_client.call_api(:POST, local_var_path,
|
281
|
+
:header_params => header_params,
|
282
|
+
:query_params => query_params,
|
283
|
+
:form_params => form_params,
|
284
|
+
:body => post_body,
|
285
|
+
:auth_names => auth_names,
|
286
|
+
:return_type => 'StringXssProtectionResult')
|
287
|
+
if @api_client.config.debugging
|
288
|
+
@api_client.config.logger.debug "API called: ContentThreatDetectionApi#content_threat_detection_protect_xss\nData: #{data.inspect}\nStatus code: #{status_code}\nHeaders: #{headers}"
|
289
|
+
end
|
290
|
+
return data, status_code, headers
|
291
|
+
end
|
292
|
+
end
|
293
|
+
end
|
@@ -0,0 +1,239 @@
|
|
1
|
+
=begin
|
2
|
+
#securityapi
|
3
|
+
|
4
|
+
#The security APIs help you detect and block security threats.
|
5
|
+
|
6
|
+
OpenAPI spec version: v1
|
7
|
+
|
8
|
+
Generated by: https://github.com/swagger-api/swagger-codegen.git
|
9
|
+
Swagger Codegen version: 2.4.14
|
10
|
+
|
11
|
+
=end
|
12
|
+
|
13
|
+
require 'uri'
|
14
|
+
|
15
|
+
module CloudmersiveSecurityApiClient
|
16
|
+
class NetworkThreatDetectionApi
|
17
|
+
attr_accessor :api_client
|
18
|
+
|
19
|
+
def initialize(api_client = ApiClient.default)
|
20
|
+
@api_client = api_client
|
21
|
+
end
|
22
|
+
# Check a URL for Server-side Request Forgery (SSRF) threats
|
23
|
+
# Checks if an input URL is at risk of being an SSRF (Server-side request forgery) threat or attack.
|
24
|
+
# @param request Input URL request
|
25
|
+
# @param [Hash] opts the optional parameters
|
26
|
+
# @return [UrlSsrfThreatDetectionResponseFull]
|
27
|
+
def network_threat_detection_detect_ssrf_url(request, opts = {})
|
28
|
+
data, _status_code, _headers = network_threat_detection_detect_ssrf_url_with_http_info(request, opts)
|
29
|
+
data
|
30
|
+
end
|
31
|
+
|
32
|
+
# Check a URL for Server-side Request Forgery (SSRF) threats
|
33
|
+
# Checks if an input URL is at risk of being an SSRF (Server-side request forgery) threat or attack.
|
34
|
+
# @param request Input URL request
|
35
|
+
# @param [Hash] opts the optional parameters
|
36
|
+
# @return [Array<(UrlSsrfThreatDetectionResponseFull, Fixnum, Hash)>] UrlSsrfThreatDetectionResponseFull data, response status code and response headers
|
37
|
+
def network_threat_detection_detect_ssrf_url_with_http_info(request, opts = {})
|
38
|
+
if @api_client.config.debugging
|
39
|
+
@api_client.config.logger.debug 'Calling API: NetworkThreatDetectionApi.network_threat_detection_detect_ssrf_url ...'
|
40
|
+
end
|
41
|
+
# verify the required parameter 'request' is set
|
42
|
+
if @api_client.config.client_side_validation && request.nil?
|
43
|
+
fail ArgumentError, "Missing the required parameter 'request' when calling NetworkThreatDetectionApi.network_threat_detection_detect_ssrf_url"
|
44
|
+
end
|
45
|
+
# resource path
|
46
|
+
local_var_path = '/security/threat-detection/network/url/ssrf/detect'
|
47
|
+
|
48
|
+
# query parameters
|
49
|
+
query_params = {}
|
50
|
+
|
51
|
+
# header parameters
|
52
|
+
header_params = {}
|
53
|
+
# HTTP header 'Accept' (if needed)
|
54
|
+
header_params['Accept'] = @api_client.select_header_accept(['application/json', 'text/json', 'application/xml', 'text/xml'])
|
55
|
+
# HTTP header 'Content-Type'
|
56
|
+
header_params['Content-Type'] = @api_client.select_header_content_type(['application/json', 'text/json'])
|
57
|
+
|
58
|
+
# form parameters
|
59
|
+
form_params = {}
|
60
|
+
|
61
|
+
# http body (model)
|
62
|
+
post_body = @api_client.object_to_http_body(request)
|
63
|
+
auth_names = ['Apikey']
|
64
|
+
data, status_code, headers = @api_client.call_api(:POST, local_var_path,
|
65
|
+
:header_params => header_params,
|
66
|
+
:query_params => query_params,
|
67
|
+
:form_params => form_params,
|
68
|
+
:body => post_body,
|
69
|
+
:auth_names => auth_names,
|
70
|
+
:return_type => 'UrlSsrfThreatDetectionResponseFull')
|
71
|
+
if @api_client.config.debugging
|
72
|
+
@api_client.config.logger.debug "API called: NetworkThreatDetectionApi#network_threat_detection_detect_ssrf_url\nData: #{data.inspect}\nStatus code: #{status_code}\nHeaders: #{headers}"
|
73
|
+
end
|
74
|
+
return data, status_code, headers
|
75
|
+
end
|
76
|
+
# Check if IP address is a Bot client threat
|
77
|
+
# Check if the input IP address is a Bot, robot, or otherwise a non-user entity. Leverages real-time signals to check against known high-probability bots..
|
78
|
+
# @param value IP address to check, e.g. \"55.55.55.55\". The input is a string so be sure to enclose it in double-quotes.
|
79
|
+
# @param [Hash] opts the optional parameters
|
80
|
+
# @return [ThreatDetectionBotCheckResponse]
|
81
|
+
def network_threat_detection_is_bot(value, opts = {})
|
82
|
+
data, _status_code, _headers = network_threat_detection_is_bot_with_http_info(value, opts)
|
83
|
+
data
|
84
|
+
end
|
85
|
+
|
86
|
+
# Check if IP address is a Bot client threat
|
87
|
+
# Check if the input IP address is a Bot, robot, or otherwise a non-user entity. Leverages real-time signals to check against known high-probability bots..
|
88
|
+
# @param value IP address to check, e.g. \"55.55.55.55\". The input is a string so be sure to enclose it in double-quotes.
|
89
|
+
# @param [Hash] opts the optional parameters
|
90
|
+
# @return [Array<(ThreatDetectionBotCheckResponse, Fixnum, Hash)>] ThreatDetectionBotCheckResponse data, response status code and response headers
|
91
|
+
def network_threat_detection_is_bot_with_http_info(value, opts = {})
|
92
|
+
if @api_client.config.debugging
|
93
|
+
@api_client.config.logger.debug 'Calling API: NetworkThreatDetectionApi.network_threat_detection_is_bot ...'
|
94
|
+
end
|
95
|
+
# verify the required parameter 'value' is set
|
96
|
+
if @api_client.config.client_side_validation && value.nil?
|
97
|
+
fail ArgumentError, "Missing the required parameter 'value' when calling NetworkThreatDetectionApi.network_threat_detection_is_bot"
|
98
|
+
end
|
99
|
+
# resource path
|
100
|
+
local_var_path = '/security/threat-detection/network/ip/is-bot'
|
101
|
+
|
102
|
+
# query parameters
|
103
|
+
query_params = {}
|
104
|
+
|
105
|
+
# header parameters
|
106
|
+
header_params = {}
|
107
|
+
# HTTP header 'Accept' (if needed)
|
108
|
+
header_params['Accept'] = @api_client.select_header_accept(['application/json', 'text/json', 'application/xml', 'text/xml'])
|
109
|
+
# HTTP header 'Content-Type'
|
110
|
+
header_params['Content-Type'] = @api_client.select_header_content_type(['application/json', 'text/json'])
|
111
|
+
|
112
|
+
# form parameters
|
113
|
+
form_params = {}
|
114
|
+
|
115
|
+
# http body (model)
|
116
|
+
post_body = @api_client.object_to_http_body(value)
|
117
|
+
auth_names = ['Apikey']
|
118
|
+
data, status_code, headers = @api_client.call_api(:POST, local_var_path,
|
119
|
+
:header_params => header_params,
|
120
|
+
:query_params => query_params,
|
121
|
+
:form_params => form_params,
|
122
|
+
:body => post_body,
|
123
|
+
:auth_names => auth_names,
|
124
|
+
:return_type => 'ThreatDetectionBotCheckResponse')
|
125
|
+
if @api_client.config.debugging
|
126
|
+
@api_client.config.logger.debug "API called: NetworkThreatDetectionApi#network_threat_detection_is_bot\nData: #{data.inspect}\nStatus code: #{status_code}\nHeaders: #{headers}"
|
127
|
+
end
|
128
|
+
return data, status_code, headers
|
129
|
+
end
|
130
|
+
# Check if IP address is a known threat
|
131
|
+
# Check if the input IP address is a known threat IP address. Checks against known bad IPs, botnets, compromised servers, and other lists of threats.
|
132
|
+
# @param value IP address to check, e.g. \"55.55.55.55\". The input is a string so be sure to enclose it in double-quotes.
|
133
|
+
# @param [Hash] opts the optional parameters
|
134
|
+
# @return [IPThreatDetectionResponse]
|
135
|
+
def network_threat_detection_is_threat(value, opts = {})
|
136
|
+
data, _status_code, _headers = network_threat_detection_is_threat_with_http_info(value, opts)
|
137
|
+
data
|
138
|
+
end
|
139
|
+
|
140
|
+
# Check if IP address is a known threat
|
141
|
+
# Check if the input IP address is a known threat IP address. Checks against known bad IPs, botnets, compromised servers, and other lists of threats.
|
142
|
+
# @param value IP address to check, e.g. \"55.55.55.55\". The input is a string so be sure to enclose it in double-quotes.
|
143
|
+
# @param [Hash] opts the optional parameters
|
144
|
+
# @return [Array<(IPThreatDetectionResponse, Fixnum, Hash)>] IPThreatDetectionResponse data, response status code and response headers
|
145
|
+
def network_threat_detection_is_threat_with_http_info(value, opts = {})
|
146
|
+
if @api_client.config.debugging
|
147
|
+
@api_client.config.logger.debug 'Calling API: NetworkThreatDetectionApi.network_threat_detection_is_threat ...'
|
148
|
+
end
|
149
|
+
# verify the required parameter 'value' is set
|
150
|
+
if @api_client.config.client_side_validation && value.nil?
|
151
|
+
fail ArgumentError, "Missing the required parameter 'value' when calling NetworkThreatDetectionApi.network_threat_detection_is_threat"
|
152
|
+
end
|
153
|
+
# resource path
|
154
|
+
local_var_path = '/security/threat-detection/network/ip/is-threat'
|
155
|
+
|
156
|
+
# query parameters
|
157
|
+
query_params = {}
|
158
|
+
|
159
|
+
# header parameters
|
160
|
+
header_params = {}
|
161
|
+
# HTTP header 'Accept' (if needed)
|
162
|
+
header_params['Accept'] = @api_client.select_header_accept(['application/json', 'text/json', 'application/xml', 'text/xml'])
|
163
|
+
# HTTP header 'Content-Type'
|
164
|
+
header_params['Content-Type'] = @api_client.select_header_content_type(['application/json', 'text/json'])
|
165
|
+
|
166
|
+
# form parameters
|
167
|
+
form_params = {}
|
168
|
+
|
169
|
+
# http body (model)
|
170
|
+
post_body = @api_client.object_to_http_body(value)
|
171
|
+
auth_names = ['Apikey']
|
172
|
+
data, status_code, headers = @api_client.call_api(:POST, local_var_path,
|
173
|
+
:header_params => header_params,
|
174
|
+
:query_params => query_params,
|
175
|
+
:form_params => form_params,
|
176
|
+
:body => post_body,
|
177
|
+
:auth_names => auth_names,
|
178
|
+
:return_type => 'IPThreatDetectionResponse')
|
179
|
+
if @api_client.config.debugging
|
180
|
+
@api_client.config.logger.debug "API called: NetworkThreatDetectionApi#network_threat_detection_is_threat\nData: #{data.inspect}\nStatus code: #{status_code}\nHeaders: #{headers}"
|
181
|
+
end
|
182
|
+
return data, status_code, headers
|
183
|
+
end
|
184
|
+
# Check if IP address is a Tor node server
|
185
|
+
# Check if the input IP address is a Tor exit node server. Tor servers are a type of privacy-preserving technology that can hide the original IP address who makes a request.
|
186
|
+
# @param value IP address to check, e.g. \"55.55.55.55\". The input is a string so be sure to enclose it in double-quotes.
|
187
|
+
# @param [Hash] opts the optional parameters
|
188
|
+
# @return [ThreatDetectionTorNodeResponse]
|
189
|
+
def network_threat_detection_is_tor_node(value, opts = {})
|
190
|
+
data, _status_code, _headers = network_threat_detection_is_tor_node_with_http_info(value, opts)
|
191
|
+
data
|
192
|
+
end
|
193
|
+
|
194
|
+
# Check if IP address is a Tor node server
|
195
|
+
# Check if the input IP address is a Tor exit node server. Tor servers are a type of privacy-preserving technology that can hide the original IP address who makes a request.
|
196
|
+
# @param value IP address to check, e.g. \"55.55.55.55\". The input is a string so be sure to enclose it in double-quotes.
|
197
|
+
# @param [Hash] opts the optional parameters
|
198
|
+
# @return [Array<(ThreatDetectionTorNodeResponse, Fixnum, Hash)>] ThreatDetectionTorNodeResponse data, response status code and response headers
|
199
|
+
def network_threat_detection_is_tor_node_with_http_info(value, opts = {})
|
200
|
+
if @api_client.config.debugging
|
201
|
+
@api_client.config.logger.debug 'Calling API: NetworkThreatDetectionApi.network_threat_detection_is_tor_node ...'
|
202
|
+
end
|
203
|
+
# verify the required parameter 'value' is set
|
204
|
+
if @api_client.config.client_side_validation && value.nil?
|
205
|
+
fail ArgumentError, "Missing the required parameter 'value' when calling NetworkThreatDetectionApi.network_threat_detection_is_tor_node"
|
206
|
+
end
|
207
|
+
# resource path
|
208
|
+
local_var_path = '/security/threat-detection/network/ip/is-tor-node'
|
209
|
+
|
210
|
+
# query parameters
|
211
|
+
query_params = {}
|
212
|
+
|
213
|
+
# header parameters
|
214
|
+
header_params = {}
|
215
|
+
# HTTP header 'Accept' (if needed)
|
216
|
+
header_params['Accept'] = @api_client.select_header_accept(['application/json', 'text/json', 'application/xml', 'text/xml'])
|
217
|
+
# HTTP header 'Content-Type'
|
218
|
+
header_params['Content-Type'] = @api_client.select_header_content_type(['application/json', 'text/json'])
|
219
|
+
|
220
|
+
# form parameters
|
221
|
+
form_params = {}
|
222
|
+
|
223
|
+
# http body (model)
|
224
|
+
post_body = @api_client.object_to_http_body(value)
|
225
|
+
auth_names = ['Apikey']
|
226
|
+
data, status_code, headers = @api_client.call_api(:POST, local_var_path,
|
227
|
+
:header_params => header_params,
|
228
|
+
:query_params => query_params,
|
229
|
+
:form_params => form_params,
|
230
|
+
:body => post_body,
|
231
|
+
:auth_names => auth_names,
|
232
|
+
:return_type => 'ThreatDetectionTorNodeResponse')
|
233
|
+
if @api_client.config.debugging
|
234
|
+
@api_client.config.logger.debug "API called: NetworkThreatDetectionApi#network_threat_detection_is_tor_node\nData: #{data.inspect}\nStatus code: #{status_code}\nHeaders: #{headers}"
|
235
|
+
end
|
236
|
+
return data, status_code, headers
|
237
|
+
end
|
238
|
+
end
|
239
|
+
end
|