cloudmersive-security-api-client 2.0.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (51) hide show
  1. checksums.yaml +7 -0
  2. data/Gemfile +7 -0
  3. data/README.md +119 -0
  4. data/Rakefile +8 -0
  5. data/cloudmersive-security-api-client.gemspec +45 -0
  6. data/docs/ContentThreatDetectionApi.md +283 -0
  7. data/docs/IPThreatDetectionResponse.md +9 -0
  8. data/docs/NetworkThreatDetectionApi.md +228 -0
  9. data/docs/StringAutomaticThreatDetection.md +18 -0
  10. data/docs/StringInsecureDeserializationJsonDetection.md +10 -0
  11. data/docs/StringSqlInjectionDetectionResult.md +10 -0
  12. data/docs/StringXssProtectionResult.md +11 -0
  13. data/docs/StringXxeDetectionResult.md +9 -0
  14. data/docs/ThreatDetectionBotCheckResponse.md +8 -0
  15. data/docs/ThreatDetectionTorNodeResponse.md +8 -0
  16. data/docs/UrlSsrfThreatDetectionRequestFull.md +9 -0
  17. data/docs/UrlSsrfThreatDetectionResponseFull.md +9 -0
  18. data/git_push.sh +55 -0
  19. data/lib/cloudmersive-security-api-client.rb +51 -0
  20. data/lib/cloudmersive-security-api-client/api/content_threat_detection_api.rb +293 -0
  21. data/lib/cloudmersive-security-api-client/api/network_threat_detection_api.rb +239 -0
  22. data/lib/cloudmersive-security-api-client/api_client.rb +391 -0
  23. data/lib/cloudmersive-security-api-client/api_error.rb +38 -0
  24. data/lib/cloudmersive-security-api-client/configuration.rb +209 -0
  25. data/lib/cloudmersive-security-api-client/models/ip_threat_detection_response.rb +196 -0
  26. data/lib/cloudmersive-security-api-client/models/string_automatic_threat_detection.rb +285 -0
  27. data/lib/cloudmersive-security-api-client/models/string_insecure_deserialization_json_detection.rb +206 -0
  28. data/lib/cloudmersive-security-api-client/models/string_sql_injection_detection_result.rb +206 -0
  29. data/lib/cloudmersive-security-api-client/models/string_xss_protection_result.rb +216 -0
  30. data/lib/cloudmersive-security-api-client/models/string_xxe_detection_result.rb +196 -0
  31. data/lib/cloudmersive-security-api-client/models/threat_detection_bot_check_response.rb +186 -0
  32. data/lib/cloudmersive-security-api-client/models/threat_detection_tor_node_response.rb +186 -0
  33. data/lib/cloudmersive-security-api-client/models/url_ssrf_threat_detection_request_full.rb +198 -0
  34. data/lib/cloudmersive-security-api-client/models/url_ssrf_threat_detection_response_full.rb +196 -0
  35. data/lib/cloudmersive-security-api-client/version.rb +15 -0
  36. data/spec/api/content_threat_detection_api_spec.rb +95 -0
  37. data/spec/api/network_threat_detection_api_spec.rb +83 -0
  38. data/spec/api_client_spec.rb +243 -0
  39. data/spec/configuration_spec.rb +42 -0
  40. data/spec/models/ip_threat_detection_response_spec.rb +47 -0
  41. data/spec/models/string_automatic_threat_detection_spec.rb +101 -0
  42. data/spec/models/string_insecure_deserialization_json_detection_spec.rb +53 -0
  43. data/spec/models/string_sql_injection_detection_result_spec.rb +53 -0
  44. data/spec/models/string_xss_protection_result_spec.rb +59 -0
  45. data/spec/models/string_xxe_detection_result_spec.rb +47 -0
  46. data/spec/models/threat_detection_bot_check_response_spec.rb +41 -0
  47. data/spec/models/threat_detection_tor_node_response_spec.rb +41 -0
  48. data/spec/models/url_ssrf_threat_detection_request_full_spec.rb +47 -0
  49. data/spec/models/url_ssrf_threat_detection_response_full_spec.rb +47 -0
  50. data/spec/spec_helper.rb +111 -0
  51. metadata +273 -0
@@ -0,0 +1,196 @@
1
+ =begin
2
+ #securityapi
3
+
4
+ #The security APIs help you detect and block security threats.
5
+
6
+ OpenAPI spec version: v1
7
+
8
+ Generated by: https://github.com/swagger-api/swagger-codegen.git
9
+ Swagger Codegen version: 2.4.14
10
+
11
+ =end
12
+
13
+ require 'date'
14
+
15
+ module CloudmersiveSecurityApiClient
16
+ # Result of performing a IP threat check on an IP address
17
+ class IPThreatDetectionResponse
18
+ # True if the input IP address is a threat, false otherwise
19
+ attr_accessor :is_threat
20
+
21
+ # Specifies the type of IP threat; possible values include Blocklist, Botnet, WebBot
22
+ attr_accessor :threat_type
23
+
24
+ # Attribute mapping from ruby-style variable name to JSON key.
25
+ def self.attribute_map
26
+ {
27
+ :'is_threat' => :'IsThreat',
28
+ :'threat_type' => :'ThreatType'
29
+ }
30
+ end
31
+
32
+ # Attribute type mapping.
33
+ def self.swagger_types
34
+ {
35
+ :'is_threat' => :'BOOLEAN',
36
+ :'threat_type' => :'String'
37
+ }
38
+ end
39
+
40
+ # Initializes the object
41
+ # @param [Hash] attributes Model attributes in the form of hash
42
+ def initialize(attributes = {})
43
+ return unless attributes.is_a?(Hash)
44
+
45
+ # convert string to symbol for hash key
46
+ attributes = attributes.each_with_object({}) { |(k, v), h| h[k.to_sym] = v }
47
+
48
+ if attributes.has_key?(:'IsThreat')
49
+ self.is_threat = attributes[:'IsThreat']
50
+ end
51
+
52
+ if attributes.has_key?(:'ThreatType')
53
+ self.threat_type = attributes[:'ThreatType']
54
+ end
55
+ end
56
+
57
+ # Show invalid properties with the reasons. Usually used together with valid?
58
+ # @return Array for valid properties with the reasons
59
+ def list_invalid_properties
60
+ invalid_properties = Array.new
61
+ invalid_properties
62
+ end
63
+
64
+ # Check to see if the all the properties in the model are valid
65
+ # @return true if the model is valid
66
+ def valid?
67
+ true
68
+ end
69
+
70
+ # Checks equality by comparing each attribute.
71
+ # @param [Object] Object to be compared
72
+ def ==(o)
73
+ return true if self.equal?(o)
74
+ self.class == o.class &&
75
+ is_threat == o.is_threat &&
76
+ threat_type == o.threat_type
77
+ end
78
+
79
+ # @see the `==` method
80
+ # @param [Object] Object to be compared
81
+ def eql?(o)
82
+ self == o
83
+ end
84
+
85
+ # Calculates hash code according to all attributes.
86
+ # @return [Fixnum] Hash code
87
+ def hash
88
+ [is_threat, threat_type].hash
89
+ end
90
+
91
+ # Builds the object from hash
92
+ # @param [Hash] attributes Model attributes in the form of hash
93
+ # @return [Object] Returns the model itself
94
+ def build_from_hash(attributes)
95
+ return nil unless attributes.is_a?(Hash)
96
+ self.class.swagger_types.each_pair do |key, type|
97
+ if type =~ /\AArray<(.*)>/i
98
+ # check to ensure the input is an array given that the attribute
99
+ # is documented as an array but the input is not
100
+ if attributes[self.class.attribute_map[key]].is_a?(Array)
101
+ self.send("#{key}=", attributes[self.class.attribute_map[key]].map { |v| _deserialize($1, v) })
102
+ end
103
+ elsif !attributes[self.class.attribute_map[key]].nil?
104
+ self.send("#{key}=", _deserialize(type, attributes[self.class.attribute_map[key]]))
105
+ end # or else data not found in attributes(hash), not an issue as the data can be optional
106
+ end
107
+
108
+ self
109
+ end
110
+
111
+ # Deserializes the data based on type
112
+ # @param string type Data type
113
+ # @param string value Value to be deserialized
114
+ # @return [Object] Deserialized data
115
+ def _deserialize(type, value)
116
+ case type.to_sym
117
+ when :DateTime
118
+ DateTime.parse(value)
119
+ when :Date
120
+ Date.parse(value)
121
+ when :String
122
+ value.to_s
123
+ when :Integer
124
+ value.to_i
125
+ when :Float
126
+ value.to_f
127
+ when :BOOLEAN
128
+ if value.to_s =~ /\A(true|t|yes|y|1)\z/i
129
+ true
130
+ else
131
+ false
132
+ end
133
+ when :Object
134
+ # generic object (usually a Hash), return directly
135
+ value
136
+ when /\AArray<(?<inner_type>.+)>\z/
137
+ inner_type = Regexp.last_match[:inner_type]
138
+ value.map { |v| _deserialize(inner_type, v) }
139
+ when /\AHash<(?<k_type>.+?), (?<v_type>.+)>\z/
140
+ k_type = Regexp.last_match[:k_type]
141
+ v_type = Regexp.last_match[:v_type]
142
+ {}.tap do |hash|
143
+ value.each do |k, v|
144
+ hash[_deserialize(k_type, k)] = _deserialize(v_type, v)
145
+ end
146
+ end
147
+ else # model
148
+ temp_model = CloudmersiveSecurityApiClient.const_get(type).new
149
+ temp_model.build_from_hash(value)
150
+ end
151
+ end
152
+
153
+ # Returns the string representation of the object
154
+ # @return [String] String presentation of the object
155
+ def to_s
156
+ to_hash.to_s
157
+ end
158
+
159
+ # to_body is an alias to to_hash (backward compatibility)
160
+ # @return [Hash] Returns the object in the form of hash
161
+ def to_body
162
+ to_hash
163
+ end
164
+
165
+ # Returns the object in the form of hash
166
+ # @return [Hash] Returns the object in the form of hash
167
+ def to_hash
168
+ hash = {}
169
+ self.class.attribute_map.each_pair do |attr, param|
170
+ value = self.send(attr)
171
+ next if value.nil?
172
+ hash[param] = _to_hash(value)
173
+ end
174
+ hash
175
+ end
176
+
177
+ # Outputs non-array value in the form of hash
178
+ # For object, use to_hash. Otherwise, just return the value
179
+ # @param [Object] value Any valid value
180
+ # @return [Hash] Returns the value in the form of hash
181
+ def _to_hash(value)
182
+ if value.is_a?(Array)
183
+ value.compact.map { |v| _to_hash(v) }
184
+ elsif value.is_a?(Hash)
185
+ {}.tap do |hash|
186
+ value.each { |k, v| hash[k] = _to_hash(v) }
187
+ end
188
+ elsif value.respond_to? :to_hash
189
+ value.to_hash
190
+ else
191
+ value
192
+ end
193
+ end
194
+
195
+ end
196
+ end
@@ -0,0 +1,285 @@
1
+ =begin
2
+ #securityapi
3
+
4
+ #The security APIs help you detect and block security threats.
5
+
6
+ OpenAPI spec version: v1
7
+
8
+ Generated by: https://github.com/swagger-api/swagger-codegen.git
9
+ Swagger Codegen version: 2.4.14
10
+
11
+ =end
12
+
13
+ require 'date'
14
+
15
+ module CloudmersiveSecurityApiClient
16
+ # Result of performing an Insecure Deserialization JSON protection operation
17
+ class StringAutomaticThreatDetection
18
+ # True if the operation was successful, false otherwise
19
+ attr_accessor :successful
20
+
21
+ attr_accessor :clean_result
22
+
23
+ # True if the input contained Insecure Deserialization JSON, false otherwise
24
+ attr_accessor :contained_json_insecure_deserialization_attack
25
+
26
+ # True if the input contained XSS attack, false otherwise
27
+ attr_accessor :contained_xss_threat
28
+
29
+ # True if the input contained XXE attack, false otherwise
30
+ attr_accessor :contained_xxe_threat
31
+
32
+ # True if the input contained SQL Injection attack, false otherwise
33
+ attr_accessor :contained_sql_injection_threat
34
+
35
+ # True if the input contained an Server-Side Request Forgery (SSRF) URL attack, false otherwise
36
+ attr_accessor :contained_ssrf_threat
37
+
38
+ # True if the input string is XML, false otherwise
39
+ attr_accessor :is_xml
40
+
41
+ # True if the input string is JSON, false otherwise
42
+ attr_accessor :is_json
43
+
44
+ # True if the input string is a URL, false otherwise
45
+ attr_accessor :is_url
46
+
47
+ # Original input string
48
+ attr_accessor :original_input
49
+
50
+ # Attribute mapping from ruby-style variable name to JSON key.
51
+ def self.attribute_map
52
+ {
53
+ :'successful' => :'Successful',
54
+ :'clean_result' => :'CleanResult',
55
+ :'contained_json_insecure_deserialization_attack' => :'ContainedJsonInsecureDeserializationAttack',
56
+ :'contained_xss_threat' => :'ContainedXssThreat',
57
+ :'contained_xxe_threat' => :'ContainedXxeThreat',
58
+ :'contained_sql_injection_threat' => :'ContainedSqlInjectionThreat',
59
+ :'contained_ssrf_threat' => :'ContainedSsrfThreat',
60
+ :'is_xml' => :'IsXML',
61
+ :'is_json' => :'IsJSON',
62
+ :'is_url' => :'IsURL',
63
+ :'original_input' => :'OriginalInput'
64
+ }
65
+ end
66
+
67
+ # Attribute type mapping.
68
+ def self.swagger_types
69
+ {
70
+ :'successful' => :'BOOLEAN',
71
+ :'clean_result' => :'BOOLEAN',
72
+ :'contained_json_insecure_deserialization_attack' => :'BOOLEAN',
73
+ :'contained_xss_threat' => :'BOOLEAN',
74
+ :'contained_xxe_threat' => :'BOOLEAN',
75
+ :'contained_sql_injection_threat' => :'BOOLEAN',
76
+ :'contained_ssrf_threat' => :'BOOLEAN',
77
+ :'is_xml' => :'BOOLEAN',
78
+ :'is_json' => :'BOOLEAN',
79
+ :'is_url' => :'BOOLEAN',
80
+ :'original_input' => :'String'
81
+ }
82
+ end
83
+
84
+ # Initializes the object
85
+ # @param [Hash] attributes Model attributes in the form of hash
86
+ def initialize(attributes = {})
87
+ return unless attributes.is_a?(Hash)
88
+
89
+ # convert string to symbol for hash key
90
+ attributes = attributes.each_with_object({}) { |(k, v), h| h[k.to_sym] = v }
91
+
92
+ if attributes.has_key?(:'Successful')
93
+ self.successful = attributes[:'Successful']
94
+ end
95
+
96
+ if attributes.has_key?(:'CleanResult')
97
+ self.clean_result = attributes[:'CleanResult']
98
+ end
99
+
100
+ if attributes.has_key?(:'ContainedJsonInsecureDeserializationAttack')
101
+ self.contained_json_insecure_deserialization_attack = attributes[:'ContainedJsonInsecureDeserializationAttack']
102
+ end
103
+
104
+ if attributes.has_key?(:'ContainedXssThreat')
105
+ self.contained_xss_threat = attributes[:'ContainedXssThreat']
106
+ end
107
+
108
+ if attributes.has_key?(:'ContainedXxeThreat')
109
+ self.contained_xxe_threat = attributes[:'ContainedXxeThreat']
110
+ end
111
+
112
+ if attributes.has_key?(:'ContainedSqlInjectionThreat')
113
+ self.contained_sql_injection_threat = attributes[:'ContainedSqlInjectionThreat']
114
+ end
115
+
116
+ if attributes.has_key?(:'ContainedSsrfThreat')
117
+ self.contained_ssrf_threat = attributes[:'ContainedSsrfThreat']
118
+ end
119
+
120
+ if attributes.has_key?(:'IsXML')
121
+ self.is_xml = attributes[:'IsXML']
122
+ end
123
+
124
+ if attributes.has_key?(:'IsJSON')
125
+ self.is_json = attributes[:'IsJSON']
126
+ end
127
+
128
+ if attributes.has_key?(:'IsURL')
129
+ self.is_url = attributes[:'IsURL']
130
+ end
131
+
132
+ if attributes.has_key?(:'OriginalInput')
133
+ self.original_input = attributes[:'OriginalInput']
134
+ end
135
+ end
136
+
137
+ # Show invalid properties with the reasons. Usually used together with valid?
138
+ # @return Array for valid properties with the reasons
139
+ def list_invalid_properties
140
+ invalid_properties = Array.new
141
+ invalid_properties
142
+ end
143
+
144
+ # Check to see if the all the properties in the model are valid
145
+ # @return true if the model is valid
146
+ def valid?
147
+ true
148
+ end
149
+
150
+ # Checks equality by comparing each attribute.
151
+ # @param [Object] Object to be compared
152
+ def ==(o)
153
+ return true if self.equal?(o)
154
+ self.class == o.class &&
155
+ successful == o.successful &&
156
+ clean_result == o.clean_result &&
157
+ contained_json_insecure_deserialization_attack == o.contained_json_insecure_deserialization_attack &&
158
+ contained_xss_threat == o.contained_xss_threat &&
159
+ contained_xxe_threat == o.contained_xxe_threat &&
160
+ contained_sql_injection_threat == o.contained_sql_injection_threat &&
161
+ contained_ssrf_threat == o.contained_ssrf_threat &&
162
+ is_xml == o.is_xml &&
163
+ is_json == o.is_json &&
164
+ is_url == o.is_url &&
165
+ original_input == o.original_input
166
+ end
167
+
168
+ # @see the `==` method
169
+ # @param [Object] Object to be compared
170
+ def eql?(o)
171
+ self == o
172
+ end
173
+
174
+ # Calculates hash code according to all attributes.
175
+ # @return [Fixnum] Hash code
176
+ def hash
177
+ [successful, clean_result, contained_json_insecure_deserialization_attack, contained_xss_threat, contained_xxe_threat, contained_sql_injection_threat, contained_ssrf_threat, is_xml, is_json, is_url, original_input].hash
178
+ end
179
+
180
+ # Builds the object from hash
181
+ # @param [Hash] attributes Model attributes in the form of hash
182
+ # @return [Object] Returns the model itself
183
+ def build_from_hash(attributes)
184
+ return nil unless attributes.is_a?(Hash)
185
+ self.class.swagger_types.each_pair do |key, type|
186
+ if type =~ /\AArray<(.*)>/i
187
+ # check to ensure the input is an array given that the attribute
188
+ # is documented as an array but the input is not
189
+ if attributes[self.class.attribute_map[key]].is_a?(Array)
190
+ self.send("#{key}=", attributes[self.class.attribute_map[key]].map { |v| _deserialize($1, v) })
191
+ end
192
+ elsif !attributes[self.class.attribute_map[key]].nil?
193
+ self.send("#{key}=", _deserialize(type, attributes[self.class.attribute_map[key]]))
194
+ end # or else data not found in attributes(hash), not an issue as the data can be optional
195
+ end
196
+
197
+ self
198
+ end
199
+
200
+ # Deserializes the data based on type
201
+ # @param string type Data type
202
+ # @param string value Value to be deserialized
203
+ # @return [Object] Deserialized data
204
+ def _deserialize(type, value)
205
+ case type.to_sym
206
+ when :DateTime
207
+ DateTime.parse(value)
208
+ when :Date
209
+ Date.parse(value)
210
+ when :String
211
+ value.to_s
212
+ when :Integer
213
+ value.to_i
214
+ when :Float
215
+ value.to_f
216
+ when :BOOLEAN
217
+ if value.to_s =~ /\A(true|t|yes|y|1)\z/i
218
+ true
219
+ else
220
+ false
221
+ end
222
+ when :Object
223
+ # generic object (usually a Hash), return directly
224
+ value
225
+ when /\AArray<(?<inner_type>.+)>\z/
226
+ inner_type = Regexp.last_match[:inner_type]
227
+ value.map { |v| _deserialize(inner_type, v) }
228
+ when /\AHash<(?<k_type>.+?), (?<v_type>.+)>\z/
229
+ k_type = Regexp.last_match[:k_type]
230
+ v_type = Regexp.last_match[:v_type]
231
+ {}.tap do |hash|
232
+ value.each do |k, v|
233
+ hash[_deserialize(k_type, k)] = _deserialize(v_type, v)
234
+ end
235
+ end
236
+ else # model
237
+ temp_model = CloudmersiveSecurityApiClient.const_get(type).new
238
+ temp_model.build_from_hash(value)
239
+ end
240
+ end
241
+
242
+ # Returns the string representation of the object
243
+ # @return [String] String presentation of the object
244
+ def to_s
245
+ to_hash.to_s
246
+ end
247
+
248
+ # to_body is an alias to to_hash (backward compatibility)
249
+ # @return [Hash] Returns the object in the form of hash
250
+ def to_body
251
+ to_hash
252
+ end
253
+
254
+ # Returns the object in the form of hash
255
+ # @return [Hash] Returns the object in the form of hash
256
+ def to_hash
257
+ hash = {}
258
+ self.class.attribute_map.each_pair do |attr, param|
259
+ value = self.send(attr)
260
+ next if value.nil?
261
+ hash[param] = _to_hash(value)
262
+ end
263
+ hash
264
+ end
265
+
266
+ # Outputs non-array value in the form of hash
267
+ # For object, use to_hash. Otherwise, just return the value
268
+ # @param [Object] value Any valid value
269
+ # @return [Hash] Returns the value in the form of hash
270
+ def _to_hash(value)
271
+ if value.is_a?(Array)
272
+ value.compact.map { |v| _to_hash(v) }
273
+ elsif value.is_a?(Hash)
274
+ {}.tap do |hash|
275
+ value.each { |k, v| hash[k] = _to_hash(v) }
276
+ end
277
+ elsif value.respond_to? :to_hash
278
+ value.to_hash
279
+ else
280
+ value
281
+ end
282
+ end
283
+
284
+ end
285
+ end