cloudmersive-security-api-client 2.0.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (51) hide show
  1. checksums.yaml +7 -0
  2. data/Gemfile +7 -0
  3. data/README.md +119 -0
  4. data/Rakefile +8 -0
  5. data/cloudmersive-security-api-client.gemspec +45 -0
  6. data/docs/ContentThreatDetectionApi.md +283 -0
  7. data/docs/IPThreatDetectionResponse.md +9 -0
  8. data/docs/NetworkThreatDetectionApi.md +228 -0
  9. data/docs/StringAutomaticThreatDetection.md +18 -0
  10. data/docs/StringInsecureDeserializationJsonDetection.md +10 -0
  11. data/docs/StringSqlInjectionDetectionResult.md +10 -0
  12. data/docs/StringXssProtectionResult.md +11 -0
  13. data/docs/StringXxeDetectionResult.md +9 -0
  14. data/docs/ThreatDetectionBotCheckResponse.md +8 -0
  15. data/docs/ThreatDetectionTorNodeResponse.md +8 -0
  16. data/docs/UrlSsrfThreatDetectionRequestFull.md +9 -0
  17. data/docs/UrlSsrfThreatDetectionResponseFull.md +9 -0
  18. data/git_push.sh +55 -0
  19. data/lib/cloudmersive-security-api-client.rb +51 -0
  20. data/lib/cloudmersive-security-api-client/api/content_threat_detection_api.rb +293 -0
  21. data/lib/cloudmersive-security-api-client/api/network_threat_detection_api.rb +239 -0
  22. data/lib/cloudmersive-security-api-client/api_client.rb +391 -0
  23. data/lib/cloudmersive-security-api-client/api_error.rb +38 -0
  24. data/lib/cloudmersive-security-api-client/configuration.rb +209 -0
  25. data/lib/cloudmersive-security-api-client/models/ip_threat_detection_response.rb +196 -0
  26. data/lib/cloudmersive-security-api-client/models/string_automatic_threat_detection.rb +285 -0
  27. data/lib/cloudmersive-security-api-client/models/string_insecure_deserialization_json_detection.rb +206 -0
  28. data/lib/cloudmersive-security-api-client/models/string_sql_injection_detection_result.rb +206 -0
  29. data/lib/cloudmersive-security-api-client/models/string_xss_protection_result.rb +216 -0
  30. data/lib/cloudmersive-security-api-client/models/string_xxe_detection_result.rb +196 -0
  31. data/lib/cloudmersive-security-api-client/models/threat_detection_bot_check_response.rb +186 -0
  32. data/lib/cloudmersive-security-api-client/models/threat_detection_tor_node_response.rb +186 -0
  33. data/lib/cloudmersive-security-api-client/models/url_ssrf_threat_detection_request_full.rb +198 -0
  34. data/lib/cloudmersive-security-api-client/models/url_ssrf_threat_detection_response_full.rb +196 -0
  35. data/lib/cloudmersive-security-api-client/version.rb +15 -0
  36. data/spec/api/content_threat_detection_api_spec.rb +95 -0
  37. data/spec/api/network_threat_detection_api_spec.rb +83 -0
  38. data/spec/api_client_spec.rb +243 -0
  39. data/spec/configuration_spec.rb +42 -0
  40. data/spec/models/ip_threat_detection_response_spec.rb +47 -0
  41. data/spec/models/string_automatic_threat_detection_spec.rb +101 -0
  42. data/spec/models/string_insecure_deserialization_json_detection_spec.rb +53 -0
  43. data/spec/models/string_sql_injection_detection_result_spec.rb +53 -0
  44. data/spec/models/string_xss_protection_result_spec.rb +59 -0
  45. data/spec/models/string_xxe_detection_result_spec.rb +47 -0
  46. data/spec/models/threat_detection_bot_check_response_spec.rb +41 -0
  47. data/spec/models/threat_detection_tor_node_response_spec.rb +41 -0
  48. data/spec/models/url_ssrf_threat_detection_request_full_spec.rb +47 -0
  49. data/spec/models/url_ssrf_threat_detection_response_full_spec.rb +47 -0
  50. data/spec/spec_helper.rb +111 -0
  51. metadata +273 -0
@@ -0,0 +1,293 @@
1
+ =begin
2
+ #securityapi
3
+
4
+ #The security APIs help you detect and block security threats.
5
+
6
+ OpenAPI spec version: v1
7
+
8
+ Generated by: https://github.com/swagger-api/swagger-codegen.git
9
+ Swagger Codegen version: 2.4.14
10
+
11
+ =end
12
+
13
+ require 'uri'
14
+
15
+ module CloudmersiveSecurityApiClient
16
+ class ContentThreatDetectionApi
17
+ attr_accessor :api_client
18
+
19
+ def initialize(api_client = ApiClient.default)
20
+ @api_client = api_client
21
+ end
22
+ # Automatically detect threats in an input string
23
+ # Auto-detects a wide range of threat types in input string, including Cross-Site Scripting (XSS), SQL Injection (SQLI), XML External Entitites (XXE), Server-side Request Forgeries (SSRF), and JSON Insecure Deserialization (JID).
24
+ # @param value User-facing text input.
25
+ # @param [Hash] opts the optional parameters
26
+ # @return [StringAutomaticThreatDetection]
27
+ def content_threat_detection_automatic_threat_detection_string(value, opts = {})
28
+ data, _status_code, _headers = content_threat_detection_automatic_threat_detection_string_with_http_info(value, opts)
29
+ data
30
+ end
31
+
32
+ # Automatically detect threats in an input string
33
+ # Auto-detects a wide range of threat types in input string, including Cross-Site Scripting (XSS), SQL Injection (SQLI), XML External Entitites (XXE), Server-side Request Forgeries (SSRF), and JSON Insecure Deserialization (JID).
34
+ # @param value User-facing text input.
35
+ # @param [Hash] opts the optional parameters
36
+ # @return [Array<(StringAutomaticThreatDetection, Fixnum, Hash)>] StringAutomaticThreatDetection data, response status code and response headers
37
+ def content_threat_detection_automatic_threat_detection_string_with_http_info(value, opts = {})
38
+ if @api_client.config.debugging
39
+ @api_client.config.logger.debug 'Calling API: ContentThreatDetectionApi.content_threat_detection_automatic_threat_detection_string ...'
40
+ end
41
+ # verify the required parameter 'value' is set
42
+ if @api_client.config.client_side_validation && value.nil?
43
+ fail ArgumentError, "Missing the required parameter 'value' when calling ContentThreatDetectionApi.content_threat_detection_automatic_threat_detection_string"
44
+ end
45
+ # resource path
46
+ local_var_path = '/security/threat-detection/content/automatic/detect/string'
47
+
48
+ # query parameters
49
+ query_params = {}
50
+
51
+ # header parameters
52
+ header_params = {}
53
+ # HTTP header 'Accept' (if needed)
54
+ header_params['Accept'] = @api_client.select_header_accept(['application/json', 'text/json', 'application/xml', 'text/xml'])
55
+ # HTTP header 'Content-Type'
56
+ header_params['Content-Type'] = @api_client.select_header_content_type(['application/json', 'text/json'])
57
+
58
+ # form parameters
59
+ form_params = {}
60
+
61
+ # http body (model)
62
+ post_body = @api_client.object_to_http_body(value)
63
+ auth_names = ['Apikey']
64
+ data, status_code, headers = @api_client.call_api(:POST, local_var_path,
65
+ :header_params => header_params,
66
+ :query_params => query_params,
67
+ :form_params => form_params,
68
+ :body => post_body,
69
+ :auth_names => auth_names,
70
+ :return_type => 'StringAutomaticThreatDetection')
71
+ if @api_client.config.debugging
72
+ @api_client.config.logger.debug "API called: ContentThreatDetectionApi#content_threat_detection_automatic_threat_detection_string\nData: #{data.inspect}\nStatus code: #{status_code}\nHeaders: #{headers}"
73
+ end
74
+ return data, status_code, headers
75
+ end
76
+ # Check text input for SQL Injection (SQLI) attacks
77
+ # Detects SQL Injection (SQLI) attacks from text input.
78
+ # @param value User-facing text input.
79
+ # @param [Hash] opts the optional parameters
80
+ # @return [StringSqlInjectionDetectionResult]
81
+ def content_threat_detection_check_sql_injection_string(value, opts = {})
82
+ data, _status_code, _headers = content_threat_detection_check_sql_injection_string_with_http_info(value, opts)
83
+ data
84
+ end
85
+
86
+ # Check text input for SQL Injection (SQLI) attacks
87
+ # Detects SQL Injection (SQLI) attacks from text input.
88
+ # @param value User-facing text input.
89
+ # @param [Hash] opts the optional parameters
90
+ # @return [Array<(StringSqlInjectionDetectionResult, Fixnum, Hash)>] StringSqlInjectionDetectionResult data, response status code and response headers
91
+ def content_threat_detection_check_sql_injection_string_with_http_info(value, opts = {})
92
+ if @api_client.config.debugging
93
+ @api_client.config.logger.debug 'Calling API: ContentThreatDetectionApi.content_threat_detection_check_sql_injection_string ...'
94
+ end
95
+ # verify the required parameter 'value' is set
96
+ if @api_client.config.client_side_validation && value.nil?
97
+ fail ArgumentError, "Missing the required parameter 'value' when calling ContentThreatDetectionApi.content_threat_detection_check_sql_injection_string"
98
+ end
99
+ # resource path
100
+ local_var_path = '/security/threat-detection/content/sql-injection/detect/string'
101
+
102
+ # query parameters
103
+ query_params = {}
104
+
105
+ # header parameters
106
+ header_params = {}
107
+ # HTTP header 'Accept' (if needed)
108
+ header_params['Accept'] = @api_client.select_header_accept(['application/json', 'text/json', 'application/xml', 'text/xml'])
109
+ # HTTP header 'Content-Type'
110
+ header_params['Content-Type'] = @api_client.select_header_content_type(['application/json', 'text/json'])
111
+
112
+ # form parameters
113
+ form_params = {}
114
+
115
+ # http body (model)
116
+ post_body = @api_client.object_to_http_body(value)
117
+ auth_names = ['Apikey']
118
+ data, status_code, headers = @api_client.call_api(:POST, local_var_path,
119
+ :header_params => header_params,
120
+ :query_params => query_params,
121
+ :form_params => form_params,
122
+ :body => post_body,
123
+ :auth_names => auth_names,
124
+ :return_type => 'StringSqlInjectionDetectionResult')
125
+ if @api_client.config.debugging
126
+ @api_client.config.logger.debug "API called: ContentThreatDetectionApi#content_threat_detection_check_sql_injection_string\nData: #{data.inspect}\nStatus code: #{status_code}\nHeaders: #{headers}"
127
+ end
128
+ return data, status_code, headers
129
+ end
130
+ # Protect text input from XML External Entity (XXE) attacks
131
+ # Detects XXE (XML External Entity) attacks from XML text input.
132
+ # @param value User-facing text input.
133
+ # @param [Hash] opts the optional parameters
134
+ # @return [StringXxeDetectionResult]
135
+ def content_threat_detection_check_xxe(value, opts = {})
136
+ data, _status_code, _headers = content_threat_detection_check_xxe_with_http_info(value, opts)
137
+ data
138
+ end
139
+
140
+ # Protect text input from XML External Entity (XXE) attacks
141
+ # Detects XXE (XML External Entity) attacks from XML text input.
142
+ # @param value User-facing text input.
143
+ # @param [Hash] opts the optional parameters
144
+ # @return [Array<(StringXxeDetectionResult, Fixnum, Hash)>] StringXxeDetectionResult data, response status code and response headers
145
+ def content_threat_detection_check_xxe_with_http_info(value, opts = {})
146
+ if @api_client.config.debugging
147
+ @api_client.config.logger.debug 'Calling API: ContentThreatDetectionApi.content_threat_detection_check_xxe ...'
148
+ end
149
+ # verify the required parameter 'value' is set
150
+ if @api_client.config.client_side_validation && value.nil?
151
+ fail ArgumentError, "Missing the required parameter 'value' when calling ContentThreatDetectionApi.content_threat_detection_check_xxe"
152
+ end
153
+ # resource path
154
+ local_var_path = '/security/threat-detection/content/xxe/detect/xml/string'
155
+
156
+ # query parameters
157
+ query_params = {}
158
+
159
+ # header parameters
160
+ header_params = {}
161
+ # HTTP header 'Accept' (if needed)
162
+ header_params['Accept'] = @api_client.select_header_accept(['application/json', 'text/json', 'application/xml', 'text/xml'])
163
+ # HTTP header 'Content-Type'
164
+ header_params['Content-Type'] = @api_client.select_header_content_type(['application/json', 'text/json'])
165
+
166
+ # form parameters
167
+ form_params = {}
168
+
169
+ # http body (model)
170
+ post_body = @api_client.object_to_http_body(value)
171
+ auth_names = ['Apikey']
172
+ data, status_code, headers = @api_client.call_api(:POST, local_var_path,
173
+ :header_params => header_params,
174
+ :query_params => query_params,
175
+ :form_params => form_params,
176
+ :body => post_body,
177
+ :auth_names => auth_names,
178
+ :return_type => 'StringXxeDetectionResult')
179
+ if @api_client.config.debugging
180
+ @api_client.config.logger.debug "API called: ContentThreatDetectionApi#content_threat_detection_check_xxe\nData: #{data.inspect}\nStatus code: #{status_code}\nHeaders: #{headers}"
181
+ end
182
+ return data, status_code, headers
183
+ end
184
+ # Detect Insecure Deserialization JSON (JID) attacks in a string
185
+ # Detects Insecure Deserialization JSON (JID) attacks from text input.
186
+ # @param value User-facing text input.
187
+ # @param [Hash] opts the optional parameters
188
+ # @return [StringInsecureDeserializationJsonDetection]
189
+ def content_threat_detection_detect_insecure_deserialization_json_string(value, opts = {})
190
+ data, _status_code, _headers = content_threat_detection_detect_insecure_deserialization_json_string_with_http_info(value, opts)
191
+ data
192
+ end
193
+
194
+ # Detect Insecure Deserialization JSON (JID) attacks in a string
195
+ # Detects Insecure Deserialization JSON (JID) attacks from text input.
196
+ # @param value User-facing text input.
197
+ # @param [Hash] opts the optional parameters
198
+ # @return [Array<(StringInsecureDeserializationJsonDetection, Fixnum, Hash)>] StringInsecureDeserializationJsonDetection data, response status code and response headers
199
+ def content_threat_detection_detect_insecure_deserialization_json_string_with_http_info(value, opts = {})
200
+ if @api_client.config.debugging
201
+ @api_client.config.logger.debug 'Calling API: ContentThreatDetectionApi.content_threat_detection_detect_insecure_deserialization_json_string ...'
202
+ end
203
+ # verify the required parameter 'value' is set
204
+ if @api_client.config.client_side_validation && value.nil?
205
+ fail ArgumentError, "Missing the required parameter 'value' when calling ContentThreatDetectionApi.content_threat_detection_detect_insecure_deserialization_json_string"
206
+ end
207
+ # resource path
208
+ local_var_path = '/security/threat-detection/content/insecure-deserialization/json/detect/string'
209
+
210
+ # query parameters
211
+ query_params = {}
212
+
213
+ # header parameters
214
+ header_params = {}
215
+ # HTTP header 'Accept' (if needed)
216
+ header_params['Accept'] = @api_client.select_header_accept(['application/json', 'text/json', 'application/xml', 'text/xml'])
217
+ # HTTP header 'Content-Type'
218
+ header_params['Content-Type'] = @api_client.select_header_content_type(['application/json', 'text/json'])
219
+
220
+ # form parameters
221
+ form_params = {}
222
+
223
+ # http body (model)
224
+ post_body = @api_client.object_to_http_body(value)
225
+ auth_names = ['Apikey']
226
+ data, status_code, headers = @api_client.call_api(:POST, local_var_path,
227
+ :header_params => header_params,
228
+ :query_params => query_params,
229
+ :form_params => form_params,
230
+ :body => post_body,
231
+ :auth_names => auth_names,
232
+ :return_type => 'StringInsecureDeserializationJsonDetection')
233
+ if @api_client.config.debugging
234
+ @api_client.config.logger.debug "API called: ContentThreatDetectionApi#content_threat_detection_detect_insecure_deserialization_json_string\nData: #{data.inspect}\nStatus code: #{status_code}\nHeaders: #{headers}"
235
+ end
236
+ return data, status_code, headers
237
+ end
238
+ # Protect text input from Cross-Site-Scripting (XSS) attacks through normalization
239
+ # Detects and removes XSS (Cross-Site-Scripting) attacks from text input through normalization. Returns the normalized result, as well as information on whether the original input contained an XSS risk.
240
+ # @param value User-facing text input.
241
+ # @param [Hash] opts the optional parameters
242
+ # @return [StringXssProtectionResult]
243
+ def content_threat_detection_protect_xss(value, opts = {})
244
+ data, _status_code, _headers = content_threat_detection_protect_xss_with_http_info(value, opts)
245
+ data
246
+ end
247
+
248
+ # Protect text input from Cross-Site-Scripting (XSS) attacks through normalization
249
+ # Detects and removes XSS (Cross-Site-Scripting) attacks from text input through normalization. Returns the normalized result, as well as information on whether the original input contained an XSS risk.
250
+ # @param value User-facing text input.
251
+ # @param [Hash] opts the optional parameters
252
+ # @return [Array<(StringXssProtectionResult, Fixnum, Hash)>] StringXssProtectionResult data, response status code and response headers
253
+ def content_threat_detection_protect_xss_with_http_info(value, opts = {})
254
+ if @api_client.config.debugging
255
+ @api_client.config.logger.debug 'Calling API: ContentThreatDetectionApi.content_threat_detection_protect_xss ...'
256
+ end
257
+ # verify the required parameter 'value' is set
258
+ if @api_client.config.client_side_validation && value.nil?
259
+ fail ArgumentError, "Missing the required parameter 'value' when calling ContentThreatDetectionApi.content_threat_detection_protect_xss"
260
+ end
261
+ # resource path
262
+ local_var_path = '/security/threat-detection/content/xss/detect/string'
263
+
264
+ # query parameters
265
+ query_params = {}
266
+
267
+ # header parameters
268
+ header_params = {}
269
+ # HTTP header 'Accept' (if needed)
270
+ header_params['Accept'] = @api_client.select_header_accept(['application/json', 'text/json', 'application/xml', 'text/xml'])
271
+ # HTTP header 'Content-Type'
272
+ header_params['Content-Type'] = @api_client.select_header_content_type(['application/json', 'text/json'])
273
+
274
+ # form parameters
275
+ form_params = {}
276
+
277
+ # http body (model)
278
+ post_body = @api_client.object_to_http_body(value)
279
+ auth_names = ['Apikey']
280
+ data, status_code, headers = @api_client.call_api(:POST, local_var_path,
281
+ :header_params => header_params,
282
+ :query_params => query_params,
283
+ :form_params => form_params,
284
+ :body => post_body,
285
+ :auth_names => auth_names,
286
+ :return_type => 'StringXssProtectionResult')
287
+ if @api_client.config.debugging
288
+ @api_client.config.logger.debug "API called: ContentThreatDetectionApi#content_threat_detection_protect_xss\nData: #{data.inspect}\nStatus code: #{status_code}\nHeaders: #{headers}"
289
+ end
290
+ return data, status_code, headers
291
+ end
292
+ end
293
+ end
@@ -0,0 +1,239 @@
1
+ =begin
2
+ #securityapi
3
+
4
+ #The security APIs help you detect and block security threats.
5
+
6
+ OpenAPI spec version: v1
7
+
8
+ Generated by: https://github.com/swagger-api/swagger-codegen.git
9
+ Swagger Codegen version: 2.4.14
10
+
11
+ =end
12
+
13
+ require 'uri'
14
+
15
+ module CloudmersiveSecurityApiClient
16
+ class NetworkThreatDetectionApi
17
+ attr_accessor :api_client
18
+
19
+ def initialize(api_client = ApiClient.default)
20
+ @api_client = api_client
21
+ end
22
+ # Check a URL for Server-side Request Forgery (SSRF) threats
23
+ # Checks if an input URL is at risk of being an SSRF (Server-side request forgery) threat or attack.
24
+ # @param request Input URL request
25
+ # @param [Hash] opts the optional parameters
26
+ # @return [UrlSsrfThreatDetectionResponseFull]
27
+ def network_threat_detection_detect_ssrf_url(request, opts = {})
28
+ data, _status_code, _headers = network_threat_detection_detect_ssrf_url_with_http_info(request, opts)
29
+ data
30
+ end
31
+
32
+ # Check a URL for Server-side Request Forgery (SSRF) threats
33
+ # Checks if an input URL is at risk of being an SSRF (Server-side request forgery) threat or attack.
34
+ # @param request Input URL request
35
+ # @param [Hash] opts the optional parameters
36
+ # @return [Array<(UrlSsrfThreatDetectionResponseFull, Fixnum, Hash)>] UrlSsrfThreatDetectionResponseFull data, response status code and response headers
37
+ def network_threat_detection_detect_ssrf_url_with_http_info(request, opts = {})
38
+ if @api_client.config.debugging
39
+ @api_client.config.logger.debug 'Calling API: NetworkThreatDetectionApi.network_threat_detection_detect_ssrf_url ...'
40
+ end
41
+ # verify the required parameter 'request' is set
42
+ if @api_client.config.client_side_validation && request.nil?
43
+ fail ArgumentError, "Missing the required parameter 'request' when calling NetworkThreatDetectionApi.network_threat_detection_detect_ssrf_url"
44
+ end
45
+ # resource path
46
+ local_var_path = '/security/threat-detection/network/url/ssrf/detect'
47
+
48
+ # query parameters
49
+ query_params = {}
50
+
51
+ # header parameters
52
+ header_params = {}
53
+ # HTTP header 'Accept' (if needed)
54
+ header_params['Accept'] = @api_client.select_header_accept(['application/json', 'text/json', 'application/xml', 'text/xml'])
55
+ # HTTP header 'Content-Type'
56
+ header_params['Content-Type'] = @api_client.select_header_content_type(['application/json', 'text/json'])
57
+
58
+ # form parameters
59
+ form_params = {}
60
+
61
+ # http body (model)
62
+ post_body = @api_client.object_to_http_body(request)
63
+ auth_names = ['Apikey']
64
+ data, status_code, headers = @api_client.call_api(:POST, local_var_path,
65
+ :header_params => header_params,
66
+ :query_params => query_params,
67
+ :form_params => form_params,
68
+ :body => post_body,
69
+ :auth_names => auth_names,
70
+ :return_type => 'UrlSsrfThreatDetectionResponseFull')
71
+ if @api_client.config.debugging
72
+ @api_client.config.logger.debug "API called: NetworkThreatDetectionApi#network_threat_detection_detect_ssrf_url\nData: #{data.inspect}\nStatus code: #{status_code}\nHeaders: #{headers}"
73
+ end
74
+ return data, status_code, headers
75
+ end
76
+ # Check if IP address is a Bot client threat
77
+ # Check if the input IP address is a Bot, robot, or otherwise a non-user entity. Leverages real-time signals to check against known high-probability bots..
78
+ # @param value IP address to check, e.g. \&quot;55.55.55.55\&quot;. The input is a string so be sure to enclose it in double-quotes.
79
+ # @param [Hash] opts the optional parameters
80
+ # @return [ThreatDetectionBotCheckResponse]
81
+ def network_threat_detection_is_bot(value, opts = {})
82
+ data, _status_code, _headers = network_threat_detection_is_bot_with_http_info(value, opts)
83
+ data
84
+ end
85
+
86
+ # Check if IP address is a Bot client threat
87
+ # Check if the input IP address is a Bot, robot, or otherwise a non-user entity. Leverages real-time signals to check against known high-probability bots..
88
+ # @param value IP address to check, e.g. \&quot;55.55.55.55\&quot;. The input is a string so be sure to enclose it in double-quotes.
89
+ # @param [Hash] opts the optional parameters
90
+ # @return [Array<(ThreatDetectionBotCheckResponse, Fixnum, Hash)>] ThreatDetectionBotCheckResponse data, response status code and response headers
91
+ def network_threat_detection_is_bot_with_http_info(value, opts = {})
92
+ if @api_client.config.debugging
93
+ @api_client.config.logger.debug 'Calling API: NetworkThreatDetectionApi.network_threat_detection_is_bot ...'
94
+ end
95
+ # verify the required parameter 'value' is set
96
+ if @api_client.config.client_side_validation && value.nil?
97
+ fail ArgumentError, "Missing the required parameter 'value' when calling NetworkThreatDetectionApi.network_threat_detection_is_bot"
98
+ end
99
+ # resource path
100
+ local_var_path = '/security/threat-detection/network/ip/is-bot'
101
+
102
+ # query parameters
103
+ query_params = {}
104
+
105
+ # header parameters
106
+ header_params = {}
107
+ # HTTP header 'Accept' (if needed)
108
+ header_params['Accept'] = @api_client.select_header_accept(['application/json', 'text/json', 'application/xml', 'text/xml'])
109
+ # HTTP header 'Content-Type'
110
+ header_params['Content-Type'] = @api_client.select_header_content_type(['application/json', 'text/json'])
111
+
112
+ # form parameters
113
+ form_params = {}
114
+
115
+ # http body (model)
116
+ post_body = @api_client.object_to_http_body(value)
117
+ auth_names = ['Apikey']
118
+ data, status_code, headers = @api_client.call_api(:POST, local_var_path,
119
+ :header_params => header_params,
120
+ :query_params => query_params,
121
+ :form_params => form_params,
122
+ :body => post_body,
123
+ :auth_names => auth_names,
124
+ :return_type => 'ThreatDetectionBotCheckResponse')
125
+ if @api_client.config.debugging
126
+ @api_client.config.logger.debug "API called: NetworkThreatDetectionApi#network_threat_detection_is_bot\nData: #{data.inspect}\nStatus code: #{status_code}\nHeaders: #{headers}"
127
+ end
128
+ return data, status_code, headers
129
+ end
130
+ # Check if IP address is a known threat
131
+ # Check if the input IP address is a known threat IP address. Checks against known bad IPs, botnets, compromised servers, and other lists of threats.
132
+ # @param value IP address to check, e.g. \&quot;55.55.55.55\&quot;. The input is a string so be sure to enclose it in double-quotes.
133
+ # @param [Hash] opts the optional parameters
134
+ # @return [IPThreatDetectionResponse]
135
+ def network_threat_detection_is_threat(value, opts = {})
136
+ data, _status_code, _headers = network_threat_detection_is_threat_with_http_info(value, opts)
137
+ data
138
+ end
139
+
140
+ # Check if IP address is a known threat
141
+ # Check if the input IP address is a known threat IP address. Checks against known bad IPs, botnets, compromised servers, and other lists of threats.
142
+ # @param value IP address to check, e.g. \&quot;55.55.55.55\&quot;. The input is a string so be sure to enclose it in double-quotes.
143
+ # @param [Hash] opts the optional parameters
144
+ # @return [Array<(IPThreatDetectionResponse, Fixnum, Hash)>] IPThreatDetectionResponse data, response status code and response headers
145
+ def network_threat_detection_is_threat_with_http_info(value, opts = {})
146
+ if @api_client.config.debugging
147
+ @api_client.config.logger.debug 'Calling API: NetworkThreatDetectionApi.network_threat_detection_is_threat ...'
148
+ end
149
+ # verify the required parameter 'value' is set
150
+ if @api_client.config.client_side_validation && value.nil?
151
+ fail ArgumentError, "Missing the required parameter 'value' when calling NetworkThreatDetectionApi.network_threat_detection_is_threat"
152
+ end
153
+ # resource path
154
+ local_var_path = '/security/threat-detection/network/ip/is-threat'
155
+
156
+ # query parameters
157
+ query_params = {}
158
+
159
+ # header parameters
160
+ header_params = {}
161
+ # HTTP header 'Accept' (if needed)
162
+ header_params['Accept'] = @api_client.select_header_accept(['application/json', 'text/json', 'application/xml', 'text/xml'])
163
+ # HTTP header 'Content-Type'
164
+ header_params['Content-Type'] = @api_client.select_header_content_type(['application/json', 'text/json'])
165
+
166
+ # form parameters
167
+ form_params = {}
168
+
169
+ # http body (model)
170
+ post_body = @api_client.object_to_http_body(value)
171
+ auth_names = ['Apikey']
172
+ data, status_code, headers = @api_client.call_api(:POST, local_var_path,
173
+ :header_params => header_params,
174
+ :query_params => query_params,
175
+ :form_params => form_params,
176
+ :body => post_body,
177
+ :auth_names => auth_names,
178
+ :return_type => 'IPThreatDetectionResponse')
179
+ if @api_client.config.debugging
180
+ @api_client.config.logger.debug "API called: NetworkThreatDetectionApi#network_threat_detection_is_threat\nData: #{data.inspect}\nStatus code: #{status_code}\nHeaders: #{headers}"
181
+ end
182
+ return data, status_code, headers
183
+ end
184
+ # Check if IP address is a Tor node server
185
+ # Check if the input IP address is a Tor exit node server. Tor servers are a type of privacy-preserving technology that can hide the original IP address who makes a request.
186
+ # @param value IP address to check, e.g. \&quot;55.55.55.55\&quot;. The input is a string so be sure to enclose it in double-quotes.
187
+ # @param [Hash] opts the optional parameters
188
+ # @return [ThreatDetectionTorNodeResponse]
189
+ def network_threat_detection_is_tor_node(value, opts = {})
190
+ data, _status_code, _headers = network_threat_detection_is_tor_node_with_http_info(value, opts)
191
+ data
192
+ end
193
+
194
+ # Check if IP address is a Tor node server
195
+ # Check if the input IP address is a Tor exit node server. Tor servers are a type of privacy-preserving technology that can hide the original IP address who makes a request.
196
+ # @param value IP address to check, e.g. \&quot;55.55.55.55\&quot;. The input is a string so be sure to enclose it in double-quotes.
197
+ # @param [Hash] opts the optional parameters
198
+ # @return [Array<(ThreatDetectionTorNodeResponse, Fixnum, Hash)>] ThreatDetectionTorNodeResponse data, response status code and response headers
199
+ def network_threat_detection_is_tor_node_with_http_info(value, opts = {})
200
+ if @api_client.config.debugging
201
+ @api_client.config.logger.debug 'Calling API: NetworkThreatDetectionApi.network_threat_detection_is_tor_node ...'
202
+ end
203
+ # verify the required parameter 'value' is set
204
+ if @api_client.config.client_side_validation && value.nil?
205
+ fail ArgumentError, "Missing the required parameter 'value' when calling NetworkThreatDetectionApi.network_threat_detection_is_tor_node"
206
+ end
207
+ # resource path
208
+ local_var_path = '/security/threat-detection/network/ip/is-tor-node'
209
+
210
+ # query parameters
211
+ query_params = {}
212
+
213
+ # header parameters
214
+ header_params = {}
215
+ # HTTP header 'Accept' (if needed)
216
+ header_params['Accept'] = @api_client.select_header_accept(['application/json', 'text/json', 'application/xml', 'text/xml'])
217
+ # HTTP header 'Content-Type'
218
+ header_params['Content-Type'] = @api_client.select_header_content_type(['application/json', 'text/json'])
219
+
220
+ # form parameters
221
+ form_params = {}
222
+
223
+ # http body (model)
224
+ post_body = @api_client.object_to_http_body(value)
225
+ auth_names = ['Apikey']
226
+ data, status_code, headers = @api_client.call_api(:POST, local_var_path,
227
+ :header_params => header_params,
228
+ :query_params => query_params,
229
+ :form_params => form_params,
230
+ :body => post_body,
231
+ :auth_names => auth_names,
232
+ :return_type => 'ThreatDetectionTorNodeResponse')
233
+ if @api_client.config.debugging
234
+ @api_client.config.logger.debug "API called: NetworkThreatDetectionApi#network_threat_detection_is_tor_node\nData: #{data.inspect}\nStatus code: #{status_code}\nHeaders: #{headers}"
235
+ end
236
+ return data, status_code, headers
237
+ end
238
+ end
239
+ end