cloudmersive-validate-api-client 2.1.4 → 2.2.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (72) hide show
  1. checksums.yaml +4 -4
  2. data/README.md +33 -4
  3. data/docs/BotCheckResponse.md +8 -0
  4. data/docs/DomainApi.md +275 -0
  5. data/docs/IPAddressApi.md +110 -0
  6. data/docs/IPIntelligenceResponse.md +16 -0
  7. data/docs/PhishingCheckRequest.md +8 -0
  8. data/docs/PhishingCheckResponse.md +9 -0
  9. data/docs/SqlInjectionCheckBatchRequest.md +9 -0
  10. data/docs/SqlInjectionCheckBatchResponse.md +8 -0
  11. data/docs/SqlInjectionCheckRequestItem.md +8 -0
  12. data/docs/SqlInjectionDetectionResult.md +10 -0
  13. data/docs/TextInputApi.md +233 -1
  14. data/docs/UrlSafetyCheckRequestFull.md +8 -0
  15. data/docs/UrlSafetyCheckResponseFull.md +9 -0
  16. data/docs/UrlSsrfRequestBatch.md +8 -0
  17. data/docs/UrlSsrfRequestFull.md +9 -0
  18. data/docs/UrlSsrfResponseBatch.md +8 -0
  19. data/docs/UrlSsrfResponseFull.md +9 -0
  20. data/docs/ValidateUrlResponseSyntaxOnly.md +1 -0
  21. data/docs/XxeDetectionBatchRequest.md +8 -0
  22. data/docs/XxeDetectionBatchResponse.md +8 -0
  23. data/docs/XxeDetectionRequestItem.md +11 -0
  24. data/docs/XxeDetectionResult.md +9 -0
  25. data/lib/cloudmersive-validate-api-client.rb +18 -0
  26. data/lib/cloudmersive-validate-api-client/api/domain_api.rb +270 -0
  27. data/lib/cloudmersive-validate-api-client/api/ip_address_api.rb +108 -0
  28. data/lib/cloudmersive-validate-api-client/api/text_input_api.rb +230 -2
  29. data/lib/cloudmersive-validate-api-client/models/bot_check_response.rb +186 -0
  30. data/lib/cloudmersive-validate-api-client/models/geolocate_response.rb +1 -1
  31. data/lib/cloudmersive-validate-api-client/models/ip_intelligence_response.rb +266 -0
  32. data/lib/cloudmersive-validate-api-client/models/phishing_check_request.rb +186 -0
  33. data/lib/cloudmersive-validate-api-client/models/phishing_check_response.rb +196 -0
  34. data/lib/cloudmersive-validate-api-client/models/sql_injection_check_batch_request.rb +198 -0
  35. data/lib/cloudmersive-validate-api-client/models/sql_injection_check_batch_response.rb +188 -0
  36. data/lib/cloudmersive-validate-api-client/models/sql_injection_check_request_item.rb +186 -0
  37. data/lib/cloudmersive-validate-api-client/models/sql_injection_detection_result.rb +206 -0
  38. data/lib/cloudmersive-validate-api-client/models/url_safety_check_request_full.rb +186 -0
  39. data/lib/cloudmersive-validate-api-client/models/url_safety_check_response_full.rb +196 -0
  40. data/lib/cloudmersive-validate-api-client/models/url_ssrf_request_batch.rb +188 -0
  41. data/lib/cloudmersive-validate-api-client/models/url_ssrf_request_full.rb +198 -0
  42. data/lib/cloudmersive-validate-api-client/models/url_ssrf_response_batch.rb +188 -0
  43. data/lib/cloudmersive-validate-api-client/models/url_ssrf_response_full.rb +196 -0
  44. data/lib/cloudmersive-validate-api-client/models/validate_url_response_syntax_only.rb +14 -4
  45. data/lib/cloudmersive-validate-api-client/models/xxe_detection_batch_request.rb +188 -0
  46. data/lib/cloudmersive-validate-api-client/models/xxe_detection_batch_response.rb +188 -0
  47. data/lib/cloudmersive-validate-api-client/models/xxe_detection_request_item.rb +220 -0
  48. data/lib/cloudmersive-validate-api-client/models/xxe_detection_result.rb +196 -0
  49. data/lib/cloudmersive-validate-api-client/version.rb +1 -1
  50. data/spec/api/domain_api_spec.rb +60 -0
  51. data/spec/api/ip_address_api_spec.rb +24 -0
  52. data/spec/api/text_input_api_spec.rb +53 -1
  53. data/spec/models/bot_check_response_spec.rb +41 -0
  54. data/spec/models/ip_intelligence_response_spec.rb +89 -0
  55. data/spec/models/phishing_check_request_spec.rb +41 -0
  56. data/spec/models/phishing_check_response_spec.rb +47 -0
  57. data/spec/models/sql_injection_check_batch_request_spec.rb +47 -0
  58. data/spec/models/sql_injection_check_batch_response_spec.rb +41 -0
  59. data/spec/models/sql_injection_check_request_item_spec.rb +41 -0
  60. data/spec/models/sql_injection_detection_result_spec.rb +53 -0
  61. data/spec/models/url_safety_check_request_full_spec.rb +41 -0
  62. data/spec/models/url_safety_check_response_full_spec.rb +47 -0
  63. data/spec/models/url_ssrf_request_batch_spec.rb +41 -0
  64. data/spec/models/url_ssrf_request_full_spec.rb +47 -0
  65. data/spec/models/url_ssrf_response_batch_spec.rb +41 -0
  66. data/spec/models/url_ssrf_response_full_spec.rb +47 -0
  67. data/spec/models/validate_url_response_syntax_only_spec.rb +6 -0
  68. data/spec/models/xxe_detection_batch_request_spec.rb +41 -0
  69. data/spec/models/xxe_detection_batch_response_spec.rb +41 -0
  70. data/spec/models/xxe_detection_request_item_spec.rb +59 -0
  71. data/spec/models/xxe_detection_result_spec.rb +47 -0
  72. metadata +56 -2
@@ -0,0 +1,16 @@
1
+ # CloudmersiveValidateApiClient::IPIntelligenceResponse
2
+
3
+ ## Properties
4
+ Name | Type | Description | Notes
5
+ ------------ | ------------- | ------------- | -------------
6
+ **is_bot** | **BOOLEAN** | True if the IP address is a known bot, otherwise false | [optional]
7
+ **is_tor_node** | **BOOLEAN** | True if the IP address is a known Tor exit node, otherwise false | [optional]
8
+ **is_threat** | **BOOLEAN** | True if the IP address is a known threat IP, otherwise false | [optional]
9
+ **is_eu** | **BOOLEAN** | True if the IP address is in the European Union, otherwise false | [optional]
10
+ **location** | [**GeolocateResponse**](GeolocateResponse.md) | Returns the location of the IP address | [optional]
11
+ **currency_code** | **String** | ISO 4217 currency code for the IP address location | [optional]
12
+ **currency_name** | **String** | Name of the currency in English | [optional]
13
+ **region_area** | **String** | Region (continent) in which the country is located; possible values are None, Europe, Americas, Asia, Africa, Oceania | [optional]
14
+ **subregion_area** | **String** | Subregion in which the country is located; possible values are None, NorthernEurope, WesternEurope, SouthernEurope, EasternEurope, CentralAmerica, NorthernAmerica, SouthAmerica, EasternAfrica, MiddleAfrica, NorthernAfrica , SouthernAfrica , WesternAfrica , CentralAsia , EasternAsia , SouthernAsia , SouthEasternAsia , WesternAsia , Southern , Middle , AustraliaandNewZealand , Melanesia , Polynesia , Micronesia , Caribbean, | [optional]
15
+
16
+
@@ -0,0 +1,8 @@
1
+ # CloudmersiveValidateApiClient::PhishingCheckRequest
2
+
3
+ ## Properties
4
+ Name | Type | Description | Notes
5
+ ------------ | ------------- | ------------- | -------------
6
+ **url** | **String** | URL to validate | [optional]
7
+
8
+
@@ -0,0 +1,9 @@
1
+ # CloudmersiveValidateApiClient::PhishingCheckResponse
2
+
3
+ ## Properties
4
+ Name | Type | Description | Notes
5
+ ------------ | ------------- | ------------- | -------------
6
+ **clean_url** | **BOOLEAN** | True if the URL is clean, false if it is at risk of containing a Phishing threat or attack | [optional]
7
+ **threat_type** | **String** | Threat type of the Phishing threat; possible values are VerifiedPhishingURL, UnverifiedPhishingURL, or VerifiedPhishingDomain | [optional]
8
+
9
+
@@ -0,0 +1,9 @@
1
+ # CloudmersiveValidateApiClient::SqlInjectionCheckBatchRequest
2
+
3
+ ## Properties
4
+ Name | Type | Description | Notes
5
+ ------------ | ------------- | ------------- | -------------
6
+ **request_items** | [**Array<SqlInjectionCheckRequestItem>**](SqlInjectionCheckRequestItem.md) | Multiple items to detect for SQL Injection | [optional]
7
+ **detection_level** | **String** | Set to Normal to target a high-security SQL Injection detection level with a very low false positive rate; select High to target a very-high security SQL Injection detection level with higher false positives. Default is Normal (recommended). | [optional]
8
+
9
+
@@ -0,0 +1,8 @@
1
+ # CloudmersiveValidateApiClient::SqlInjectionCheckBatchResponse
2
+
3
+ ## Properties
4
+ Name | Type | Description | Notes
5
+ ------------ | ------------- | ------------- | -------------
6
+ **result_items** | [**Array<SqlInjectionDetectionResult>**](SqlInjectionDetectionResult.md) | Results from performing a batch SQL Injection detection operation; order is preserved from input data | [optional]
7
+
8
+
@@ -0,0 +1,8 @@
1
+ # CloudmersiveValidateApiClient::SqlInjectionCheckRequestItem
2
+
3
+ ## Properties
4
+ Name | Type | Description | Notes
5
+ ------------ | ------------- | ------------- | -------------
6
+ **input_text** | **String** | Individual input text item to check for SQL Injection | [optional]
7
+
8
+
@@ -0,0 +1,10 @@
1
+ # CloudmersiveValidateApiClient::SqlInjectionDetectionResult
2
+
3
+ ## Properties
4
+ Name | Type | Description | Notes
5
+ ------------ | ------------- | ------------- | -------------
6
+ **successful** | **BOOLEAN** | True if the operation was successful, false otherwise | [optional]
7
+ **contained_sql_injection_attack** | **BOOLEAN** | True if the input contained SQL Injection attacks, false otherwise | [optional]
8
+ **original_input** | **String** | Original input string | [optional]
9
+
10
+
data/docs/TextInputApi.md CHANGED
@@ -4,11 +4,127 @@ All URIs are relative to *https://api.cloudmersive.com*
4
4
 
5
5
  Method | HTTP request | Description
6
6
  ------------- | ------------- | -------------
7
+ [**text_input_check_sql_injection**](TextInputApi.md#text_input_check_sql_injection) | **POST** /validate/text-input/check/sql-injection | Check text input for SQL Injection (SQLI) attacks
8
+ [**text_input_check_sql_injection_batch**](TextInputApi.md#text_input_check_sql_injection_batch) | **POST** /validate/text-input/check/sql-injection/batch | Check and protect multiple text inputs for SQL Injection (SQLI) attacks in batch
7
9
  [**text_input_check_xss**](TextInputApi.md#text_input_check_xss) | **POST** /validate/text-input/check/xss | Check text input for Cross-Site-Scripting (XSS) attacks
8
10
  [**text_input_check_xss_batch**](TextInputApi.md#text_input_check_xss_batch) | **POST** /validate/text-input/check-and-protect/xss/batch | Check and protect multiple text inputs for Cross-Site-Scripting (XSS) attacks in batch
11
+ [**text_input_check_xxe**](TextInputApi.md#text_input_check_xxe) | **POST** /validate/text-input/check/xxe | Protect text input from XML External Entity (XXE) attacks
12
+ [**text_input_check_xxe_batch**](TextInputApi.md#text_input_check_xxe_batch) | **POST** /validate/text-input/check/xxe/batch | Protect text input from XML External Entity (XXE) attacks
9
13
  [**text_input_protect_xss**](TextInputApi.md#text_input_protect_xss) | **POST** /validate/text-input/protect/xss | Protect text input from Cross-Site-Scripting (XSS) attacks through normalization
10
14
 
11
15
 
16
+ # **text_input_check_sql_injection**
17
+ > SqlInjectionDetectionResult text_input_check_sql_injection(value, opts)
18
+
19
+ Check text input for SQL Injection (SQLI) attacks
20
+
21
+ Detects SQL Injection (SQLI) attacks from text input.
22
+
23
+ ### Example
24
+ ```ruby
25
+ # load the gem
26
+ require 'cloudmersive-validate-api-client'
27
+ # setup authorization
28
+ CloudmersiveValidateApiClient.configure do |config|
29
+ # Configure API key authorization: Apikey
30
+ config.api_key['Apikey'] = 'YOUR API KEY'
31
+ # Uncomment the following line to set a prefix for the API key, e.g. 'Bearer' (defaults to nil)
32
+ #config.api_key_prefix['Apikey'] = 'Bearer'
33
+ end
34
+
35
+ api_instance = CloudmersiveValidateApiClient::TextInputApi.new
36
+
37
+ value = 'value_example' # String | User-facing text input.
38
+
39
+ opts = {
40
+ detection_level: 'detection_level_example' # String | Set to Normal to target a high-security SQL Injection detection level with a very low false positive rate; select High to target a very-high security SQL Injection detection level with higher false positives. Default is Normal (recommended).
41
+ }
42
+
43
+ begin
44
+ #Check text input for SQL Injection (SQLI) attacks
45
+ result = api_instance.text_input_check_sql_injection(value, opts)
46
+ p result
47
+ rescue CloudmersiveValidateApiClient::ApiError => e
48
+ puts "Exception when calling TextInputApi->text_input_check_sql_injection: #{e}"
49
+ end
50
+ ```
51
+
52
+ ### Parameters
53
+
54
+ Name | Type | Description | Notes
55
+ ------------- | ------------- | ------------- | -------------
56
+ **value** | **String**| User-facing text input. |
57
+ **detection_level** | **String**| Set to Normal to target a high-security SQL Injection detection level with a very low false positive rate; select High to target a very-high security SQL Injection detection level with higher false positives. Default is Normal (recommended). | [optional]
58
+
59
+ ### Return type
60
+
61
+ [**SqlInjectionDetectionResult**](SqlInjectionDetectionResult.md)
62
+
63
+ ### Authorization
64
+
65
+ [Apikey](../README.md#Apikey)
66
+
67
+ ### HTTP request headers
68
+
69
+ - **Content-Type**: application/json, text/json
70
+ - **Accept**: application/json, text/json, application/xml, text/xml
71
+
72
+
73
+
74
+ # **text_input_check_sql_injection_batch**
75
+ > SqlInjectionCheckBatchResponse text_input_check_sql_injection_batch(value)
76
+
77
+ Check and protect multiple text inputs for SQL Injection (SQLI) attacks in batch
78
+
79
+ Detects SQL Injection (SQLI) attacks from multiple text inputs. Output preverses order of input items.
80
+
81
+ ### Example
82
+ ```ruby
83
+ # load the gem
84
+ require 'cloudmersive-validate-api-client'
85
+ # setup authorization
86
+ CloudmersiveValidateApiClient.configure do |config|
87
+ # Configure API key authorization: Apikey
88
+ config.api_key['Apikey'] = 'YOUR API KEY'
89
+ # Uncomment the following line to set a prefix for the API key, e.g. 'Bearer' (defaults to nil)
90
+ #config.api_key_prefix['Apikey'] = 'Bearer'
91
+ end
92
+
93
+ api_instance = CloudmersiveValidateApiClient::TextInputApi.new
94
+
95
+ value = CloudmersiveValidateApiClient::SqlInjectionCheckBatchRequest.new # SqlInjectionCheckBatchRequest | User-facing text input.
96
+
97
+
98
+ begin
99
+ #Check and protect multiple text inputs for SQL Injection (SQLI) attacks in batch
100
+ result = api_instance.text_input_check_sql_injection_batch(value)
101
+ p result
102
+ rescue CloudmersiveValidateApiClient::ApiError => e
103
+ puts "Exception when calling TextInputApi->text_input_check_sql_injection_batch: #{e}"
104
+ end
105
+ ```
106
+
107
+ ### Parameters
108
+
109
+ Name | Type | Description | Notes
110
+ ------------- | ------------- | ------------- | -------------
111
+ **value** | [**SqlInjectionCheckBatchRequest**](SqlInjectionCheckBatchRequest.md)| User-facing text input. |
112
+
113
+ ### Return type
114
+
115
+ [**SqlInjectionCheckBatchResponse**](SqlInjectionCheckBatchResponse.md)
116
+
117
+ ### Authorization
118
+
119
+ [Apikey](../README.md#Apikey)
120
+
121
+ ### HTTP request headers
122
+
123
+ - **Content-Type**: application/json, text/json
124
+ - **Accept**: application/json, text/json, application/xml, text/xml
125
+
126
+
127
+
12
128
  # **text_input_check_xss**
13
129
  > XssProtectionResult text_input_check_xss(value)
14
130
 
@@ -68,7 +184,7 @@ Name | Type | Description | Notes
68
184
 
69
185
  Check and protect multiple text inputs for Cross-Site-Scripting (XSS) attacks in batch
70
186
 
71
- Detects XSS (Cross-Site-Scripting) attacks from multiple text input. Output preverses order of input items.
187
+ Detects XSS (Cross-Site-Scripting) attacks from multiple text inputs. Output preverses order of input items.
72
188
 
73
189
  ### Example
74
190
  ```ruby
@@ -117,6 +233,122 @@ Name | Type | Description | Notes
117
233
 
118
234
 
119
235
 
236
+ # **text_input_check_xxe**
237
+ > XxeDetectionResult text_input_check_xxe(value, opts)
238
+
239
+ Protect text input from XML External Entity (XXE) attacks
240
+
241
+ Detects XXE (XML External Entity) attacks from text input.
242
+
243
+ ### Example
244
+ ```ruby
245
+ # load the gem
246
+ require 'cloudmersive-validate-api-client'
247
+ # setup authorization
248
+ CloudmersiveValidateApiClient.configure do |config|
249
+ # Configure API key authorization: Apikey
250
+ config.api_key['Apikey'] = 'YOUR API KEY'
251
+ # Uncomment the following line to set a prefix for the API key, e.g. 'Bearer' (defaults to nil)
252
+ #config.api_key_prefix['Apikey'] = 'Bearer'
253
+ end
254
+
255
+ api_instance = CloudmersiveValidateApiClient::TextInputApi.new
256
+
257
+ value = 'value_example' # String | User-facing text input.
258
+
259
+ opts = {
260
+ allow_internet_urls: true, # BOOLEAN | Optional: Set to true to allow Internet-based dependency URLs for DTDs and other XML External Entitites, set to false to block. Default is false.
261
+ known_safe_urls: 'known_safe_urls_example', # String | Optional: Comma separated list of fully-qualified URLs that will automatically be considered safe.
262
+ known_unsafe_urls: 'known_unsafe_urls_example' # String | Optional: Comma separated list of fully-qualified URLs that will automatically be considered unsafe.
263
+ }
264
+
265
+ begin
266
+ #Protect text input from XML External Entity (XXE) attacks
267
+ result = api_instance.text_input_check_xxe(value, opts)
268
+ p result
269
+ rescue CloudmersiveValidateApiClient::ApiError => e
270
+ puts "Exception when calling TextInputApi->text_input_check_xxe: #{e}"
271
+ end
272
+ ```
273
+
274
+ ### Parameters
275
+
276
+ Name | Type | Description | Notes
277
+ ------------- | ------------- | ------------- | -------------
278
+ **value** | **String**| User-facing text input. |
279
+ **allow_internet_urls** | **BOOLEAN**| Optional: Set to true to allow Internet-based dependency URLs for DTDs and other XML External Entitites, set to false to block. Default is false. | [optional]
280
+ **known_safe_urls** | **String**| Optional: Comma separated list of fully-qualified URLs that will automatically be considered safe. | [optional]
281
+ **known_unsafe_urls** | **String**| Optional: Comma separated list of fully-qualified URLs that will automatically be considered unsafe. | [optional]
282
+
283
+ ### Return type
284
+
285
+ [**XxeDetectionResult**](XxeDetectionResult.md)
286
+
287
+ ### Authorization
288
+
289
+ [Apikey](../README.md#Apikey)
290
+
291
+ ### HTTP request headers
292
+
293
+ - **Content-Type**: application/json, text/json
294
+ - **Accept**: application/json, text/json, application/xml, text/xml
295
+
296
+
297
+
298
+ # **text_input_check_xxe_batch**
299
+ > XxeDetectionBatchResponse text_input_check_xxe_batch(request)
300
+
301
+ Protect text input from XML External Entity (XXE) attacks
302
+
303
+ Detects XXE (XML External Entity) attacks from text input.
304
+
305
+ ### Example
306
+ ```ruby
307
+ # load the gem
308
+ require 'cloudmersive-validate-api-client'
309
+ # setup authorization
310
+ CloudmersiveValidateApiClient.configure do |config|
311
+ # Configure API key authorization: Apikey
312
+ config.api_key['Apikey'] = 'YOUR API KEY'
313
+ # Uncomment the following line to set a prefix for the API key, e.g. 'Bearer' (defaults to nil)
314
+ #config.api_key_prefix['Apikey'] = 'Bearer'
315
+ end
316
+
317
+ api_instance = CloudmersiveValidateApiClient::TextInputApi.new
318
+
319
+ request = CloudmersiveValidateApiClient::XxeDetectionBatchRequest.new # XxeDetectionBatchRequest |
320
+
321
+
322
+ begin
323
+ #Protect text input from XML External Entity (XXE) attacks
324
+ result = api_instance.text_input_check_xxe_batch(request)
325
+ p result
326
+ rescue CloudmersiveValidateApiClient::ApiError => e
327
+ puts "Exception when calling TextInputApi->text_input_check_xxe_batch: #{e}"
328
+ end
329
+ ```
330
+
331
+ ### Parameters
332
+
333
+ Name | Type | Description | Notes
334
+ ------------- | ------------- | ------------- | -------------
335
+ **request** | [**XxeDetectionBatchRequest**](XxeDetectionBatchRequest.md)| |
336
+
337
+ ### Return type
338
+
339
+ [**XxeDetectionBatchResponse**](XxeDetectionBatchResponse.md)
340
+
341
+ ### Authorization
342
+
343
+ [Apikey](../README.md#Apikey)
344
+
345
+ ### HTTP request headers
346
+
347
+ - **Content-Type**: application/json, text/json
348
+ - **Accept**: application/json, text/json, application/xml, text/xml
349
+
350
+
351
+
120
352
  # **text_input_protect_xss**
121
353
  > XssProtectionResult text_input_protect_xss(value)
122
354
 
@@ -0,0 +1,8 @@
1
+ # CloudmersiveValidateApiClient::UrlSafetyCheckRequestFull
2
+
3
+ ## Properties
4
+ Name | Type | Description | Notes
5
+ ------------ | ------------- | ------------- | -------------
6
+ **url** | **String** | URL to validate | [optional]
7
+
8
+
@@ -0,0 +1,9 @@
1
+ # CloudmersiveValidateApiClient::UrlSafetyCheckResponseFull
2
+
3
+ ## Properties
4
+ Name | Type | Description | Notes
5
+ ------------ | ------------- | ------------- | -------------
6
+ **clean_url** | **BOOLEAN** | True if the URL is clean, false if it is at risk of containing a safety threat or attack | [optional]
7
+ **threat_type** | **String** | Threat type identified, if any; possible values are \"ForcedDownload\", \"VirusesAndMalware\", \"Phishing\" | [optional]
8
+
9
+
@@ -0,0 +1,8 @@
1
+ # CloudmersiveValidateApiClient::UrlSsrfRequestBatch
2
+
3
+ ## Properties
4
+ Name | Type | Description | Notes
5
+ ------------ | ------------- | ------------- | -------------
6
+ **input_items** | [**Array<UrlSsrfRequestFull>**](UrlSsrfRequestFull.md) | Input URLs to check for SSRF threats | [optional]
7
+
8
+
@@ -0,0 +1,9 @@
1
+ # CloudmersiveValidateApiClient::UrlSsrfRequestFull
2
+
3
+ ## Properties
4
+ Name | Type | Description | Notes
5
+ ------------ | ------------- | ------------- | -------------
6
+ **url** | **String** | URL to validate | [optional]
7
+ **blocked_domains** | **Array<String>** | Top level domains that you do not want to allow access to, e.g. mydomain.com - will block all subdomains as well | [optional]
8
+
9
+
@@ -0,0 +1,8 @@
1
+ # CloudmersiveValidateApiClient::UrlSsrfResponseBatch
2
+
3
+ ## Properties
4
+ Name | Type | Description | Notes
5
+ ------------ | ------------- | ------------- | -------------
6
+ **output_items** | [**Array<UrlSsrfResponseFull>**](UrlSsrfResponseFull.md) | Results of the operation, with indexes matched to input values | [optional]
7
+
8
+
@@ -0,0 +1,9 @@
1
+ # CloudmersiveValidateApiClient::UrlSsrfResponseFull
2
+
3
+ ## Properties
4
+ Name | Type | Description | Notes
5
+ ------------ | ------------- | ------------- | -------------
6
+ **clean_url** | **BOOLEAN** | True if the URL is clean, false if it is at risk of containing an SSRF threat or attack | [optional]
7
+ **threat_level** | **String** | Threat level of the URL; possible values are High, Medium, Low and None | [optional]
8
+
9
+
@@ -5,5 +5,6 @@ Name | Type | Description | Notes
5
5
  ------------ | ------------- | ------------- | -------------
6
6
  **valid_url** | **BOOLEAN** | True if the URL is valid, false otherwise | [optional]
7
7
  **well_formed_url** | **String** | Well-formed version of the URL | [optional]
8
+ **top_level_domain_name** | **String** | The top-level domain name of the URL, e.g. mydomain.com | [optional]
8
9
 
9
10
 
@@ -0,0 +1,8 @@
1
+ # CloudmersiveValidateApiClient::XxeDetectionBatchRequest
2
+
3
+ ## Properties
4
+ Name | Type | Description | Notes
5
+ ------------ | ------------- | ------------- | -------------
6
+ **request_items** | [**Array<XxeDetectionRequestItem>**](XxeDetectionRequestItem.md) | Multiple items to protect for XXE | [optional]
7
+
8
+
@@ -0,0 +1,8 @@
1
+ # CloudmersiveValidateApiClient::XxeDetectionBatchResponse
2
+
3
+ ## Properties
4
+ Name | Type | Description | Notes
5
+ ------------ | ------------- | ------------- | -------------
6
+ **result_items** | [**Array<XxeDetectionResult>**](XxeDetectionResult.md) | Results from performing a batch XSS protection operation | [optional]
7
+
8
+
@@ -0,0 +1,11 @@
1
+ # CloudmersiveValidateApiClient::XxeDetectionRequestItem
2
+
3
+ ## Properties
4
+ Name | Type | Description | Notes
5
+ ------------ | ------------- | ------------- | -------------
6
+ **input_text** | **String** | Individual input text item to protect from XXE | [optional]
7
+ **allow_internet_urls** | **BOOLEAN** | Optional: Set to true to allow Internet-based dependency URLs for DTDs and other XML External Entitites, set to false to block. Default is false. | [optional]
8
+ **known_safe_urls** | **Array<String>** | Optional: Comma separated list of fully-qualified URLs that will automatically be considered safe. | [optional]
9
+ **known_unsafe_urls** | **Array<String>** | Optional: Comma separated list of fully-qualified URLs that will automatically be considered unsafe. | [optional]
10
+
11
+
@@ -0,0 +1,9 @@
1
+ # CloudmersiveValidateApiClient::XxeDetectionResult
2
+
3
+ ## Properties
4
+ Name | Type | Description | Notes
5
+ ------------ | ------------- | ------------- | -------------
6
+ **successful** | **BOOLEAN** | True if the operation was successful, false otherwise | [optional]
7
+ **contained_xxe** | **BOOLEAN** | True if the input contained XXE threats, false otherwise | [optional]
8
+
9
+