cloudmersive-validate-api-client 2.1.4 → 2.2.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/README.md +33 -4
- data/docs/BotCheckResponse.md +8 -0
- data/docs/DomainApi.md +275 -0
- data/docs/IPAddressApi.md +110 -0
- data/docs/IPIntelligenceResponse.md +16 -0
- data/docs/PhishingCheckRequest.md +8 -0
- data/docs/PhishingCheckResponse.md +9 -0
- data/docs/SqlInjectionCheckBatchRequest.md +9 -0
- data/docs/SqlInjectionCheckBatchResponse.md +8 -0
- data/docs/SqlInjectionCheckRequestItem.md +8 -0
- data/docs/SqlInjectionDetectionResult.md +10 -0
- data/docs/TextInputApi.md +233 -1
- data/docs/UrlSafetyCheckRequestFull.md +8 -0
- data/docs/UrlSafetyCheckResponseFull.md +9 -0
- data/docs/UrlSsrfRequestBatch.md +8 -0
- data/docs/UrlSsrfRequestFull.md +9 -0
- data/docs/UrlSsrfResponseBatch.md +8 -0
- data/docs/UrlSsrfResponseFull.md +9 -0
- data/docs/ValidateUrlResponseSyntaxOnly.md +1 -0
- data/docs/XxeDetectionBatchRequest.md +8 -0
- data/docs/XxeDetectionBatchResponse.md +8 -0
- data/docs/XxeDetectionRequestItem.md +11 -0
- data/docs/XxeDetectionResult.md +9 -0
- data/lib/cloudmersive-validate-api-client.rb +18 -0
- data/lib/cloudmersive-validate-api-client/api/domain_api.rb +270 -0
- data/lib/cloudmersive-validate-api-client/api/ip_address_api.rb +108 -0
- data/lib/cloudmersive-validate-api-client/api/text_input_api.rb +230 -2
- data/lib/cloudmersive-validate-api-client/models/bot_check_response.rb +186 -0
- data/lib/cloudmersive-validate-api-client/models/geolocate_response.rb +1 -1
- data/lib/cloudmersive-validate-api-client/models/ip_intelligence_response.rb +266 -0
- data/lib/cloudmersive-validate-api-client/models/phishing_check_request.rb +186 -0
- data/lib/cloudmersive-validate-api-client/models/phishing_check_response.rb +196 -0
- data/lib/cloudmersive-validate-api-client/models/sql_injection_check_batch_request.rb +198 -0
- data/lib/cloudmersive-validate-api-client/models/sql_injection_check_batch_response.rb +188 -0
- data/lib/cloudmersive-validate-api-client/models/sql_injection_check_request_item.rb +186 -0
- data/lib/cloudmersive-validate-api-client/models/sql_injection_detection_result.rb +206 -0
- data/lib/cloudmersive-validate-api-client/models/url_safety_check_request_full.rb +186 -0
- data/lib/cloudmersive-validate-api-client/models/url_safety_check_response_full.rb +196 -0
- data/lib/cloudmersive-validate-api-client/models/url_ssrf_request_batch.rb +188 -0
- data/lib/cloudmersive-validate-api-client/models/url_ssrf_request_full.rb +198 -0
- data/lib/cloudmersive-validate-api-client/models/url_ssrf_response_batch.rb +188 -0
- data/lib/cloudmersive-validate-api-client/models/url_ssrf_response_full.rb +196 -0
- data/lib/cloudmersive-validate-api-client/models/validate_url_response_syntax_only.rb +14 -4
- data/lib/cloudmersive-validate-api-client/models/xxe_detection_batch_request.rb +188 -0
- data/lib/cloudmersive-validate-api-client/models/xxe_detection_batch_response.rb +188 -0
- data/lib/cloudmersive-validate-api-client/models/xxe_detection_request_item.rb +220 -0
- data/lib/cloudmersive-validate-api-client/models/xxe_detection_result.rb +196 -0
- data/lib/cloudmersive-validate-api-client/version.rb +1 -1
- data/spec/api/domain_api_spec.rb +60 -0
- data/spec/api/ip_address_api_spec.rb +24 -0
- data/spec/api/text_input_api_spec.rb +53 -1
- data/spec/models/bot_check_response_spec.rb +41 -0
- data/spec/models/ip_intelligence_response_spec.rb +89 -0
- data/spec/models/phishing_check_request_spec.rb +41 -0
- data/spec/models/phishing_check_response_spec.rb +47 -0
- data/spec/models/sql_injection_check_batch_request_spec.rb +47 -0
- data/spec/models/sql_injection_check_batch_response_spec.rb +41 -0
- data/spec/models/sql_injection_check_request_item_spec.rb +41 -0
- data/spec/models/sql_injection_detection_result_spec.rb +53 -0
- data/spec/models/url_safety_check_request_full_spec.rb +41 -0
- data/spec/models/url_safety_check_response_full_spec.rb +47 -0
- data/spec/models/url_ssrf_request_batch_spec.rb +41 -0
- data/spec/models/url_ssrf_request_full_spec.rb +47 -0
- data/spec/models/url_ssrf_response_batch_spec.rb +41 -0
- data/spec/models/url_ssrf_response_full_spec.rb +47 -0
- data/spec/models/validate_url_response_syntax_only_spec.rb +6 -0
- data/spec/models/xxe_detection_batch_request_spec.rb +41 -0
- data/spec/models/xxe_detection_batch_response_spec.rb +41 -0
- data/spec/models/xxe_detection_request_item_spec.rb +59 -0
- data/spec/models/xxe_detection_result_spec.rb +47 -0
- metadata +56 -2
@@ -0,0 +1,16 @@
|
|
1
|
+
# CloudmersiveValidateApiClient::IPIntelligenceResponse
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
Name | Type | Description | Notes
|
5
|
+
------------ | ------------- | ------------- | -------------
|
6
|
+
**is_bot** | **BOOLEAN** | True if the IP address is a known bot, otherwise false | [optional]
|
7
|
+
**is_tor_node** | **BOOLEAN** | True if the IP address is a known Tor exit node, otherwise false | [optional]
|
8
|
+
**is_threat** | **BOOLEAN** | True if the IP address is a known threat IP, otherwise false | [optional]
|
9
|
+
**is_eu** | **BOOLEAN** | True if the IP address is in the European Union, otherwise false | [optional]
|
10
|
+
**location** | [**GeolocateResponse**](GeolocateResponse.md) | Returns the location of the IP address | [optional]
|
11
|
+
**currency_code** | **String** | ISO 4217 currency code for the IP address location | [optional]
|
12
|
+
**currency_name** | **String** | Name of the currency in English | [optional]
|
13
|
+
**region_area** | **String** | Region (continent) in which the country is located; possible values are None, Europe, Americas, Asia, Africa, Oceania | [optional]
|
14
|
+
**subregion_area** | **String** | Subregion in which the country is located; possible values are None, NorthernEurope, WesternEurope, SouthernEurope, EasternEurope, CentralAmerica, NorthernAmerica, SouthAmerica, EasternAfrica, MiddleAfrica, NorthernAfrica , SouthernAfrica , WesternAfrica , CentralAsia , EasternAsia , SouthernAsia , SouthEasternAsia , WesternAsia , Southern , Middle , AustraliaandNewZealand , Melanesia , Polynesia , Micronesia , Caribbean, | [optional]
|
15
|
+
|
16
|
+
|
@@ -0,0 +1,9 @@
|
|
1
|
+
# CloudmersiveValidateApiClient::PhishingCheckResponse
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
Name | Type | Description | Notes
|
5
|
+
------------ | ------------- | ------------- | -------------
|
6
|
+
**clean_url** | **BOOLEAN** | True if the URL is clean, false if it is at risk of containing a Phishing threat or attack | [optional]
|
7
|
+
**threat_type** | **String** | Threat type of the Phishing threat; possible values are VerifiedPhishingURL, UnverifiedPhishingURL, or VerifiedPhishingDomain | [optional]
|
8
|
+
|
9
|
+
|
@@ -0,0 +1,9 @@
|
|
1
|
+
# CloudmersiveValidateApiClient::SqlInjectionCheckBatchRequest
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
Name | Type | Description | Notes
|
5
|
+
------------ | ------------- | ------------- | -------------
|
6
|
+
**request_items** | [**Array<SqlInjectionCheckRequestItem>**](SqlInjectionCheckRequestItem.md) | Multiple items to detect for SQL Injection | [optional]
|
7
|
+
**detection_level** | **String** | Set to Normal to target a high-security SQL Injection detection level with a very low false positive rate; select High to target a very-high security SQL Injection detection level with higher false positives. Default is Normal (recommended). | [optional]
|
8
|
+
|
9
|
+
|
@@ -0,0 +1,8 @@
|
|
1
|
+
# CloudmersiveValidateApiClient::SqlInjectionCheckBatchResponse
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
Name | Type | Description | Notes
|
5
|
+
------------ | ------------- | ------------- | -------------
|
6
|
+
**result_items** | [**Array<SqlInjectionDetectionResult>**](SqlInjectionDetectionResult.md) | Results from performing a batch SQL Injection detection operation; order is preserved from input data | [optional]
|
7
|
+
|
8
|
+
|
@@ -0,0 +1,8 @@
|
|
1
|
+
# CloudmersiveValidateApiClient::SqlInjectionCheckRequestItem
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
Name | Type | Description | Notes
|
5
|
+
------------ | ------------- | ------------- | -------------
|
6
|
+
**input_text** | **String** | Individual input text item to check for SQL Injection | [optional]
|
7
|
+
|
8
|
+
|
@@ -0,0 +1,10 @@
|
|
1
|
+
# CloudmersiveValidateApiClient::SqlInjectionDetectionResult
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
Name | Type | Description | Notes
|
5
|
+
------------ | ------------- | ------------- | -------------
|
6
|
+
**successful** | **BOOLEAN** | True if the operation was successful, false otherwise | [optional]
|
7
|
+
**contained_sql_injection_attack** | **BOOLEAN** | True if the input contained SQL Injection attacks, false otherwise | [optional]
|
8
|
+
**original_input** | **String** | Original input string | [optional]
|
9
|
+
|
10
|
+
|
data/docs/TextInputApi.md
CHANGED
@@ -4,11 +4,127 @@ All URIs are relative to *https://api.cloudmersive.com*
|
|
4
4
|
|
5
5
|
Method | HTTP request | Description
|
6
6
|
------------- | ------------- | -------------
|
7
|
+
[**text_input_check_sql_injection**](TextInputApi.md#text_input_check_sql_injection) | **POST** /validate/text-input/check/sql-injection | Check text input for SQL Injection (SQLI) attacks
|
8
|
+
[**text_input_check_sql_injection_batch**](TextInputApi.md#text_input_check_sql_injection_batch) | **POST** /validate/text-input/check/sql-injection/batch | Check and protect multiple text inputs for SQL Injection (SQLI) attacks in batch
|
7
9
|
[**text_input_check_xss**](TextInputApi.md#text_input_check_xss) | **POST** /validate/text-input/check/xss | Check text input for Cross-Site-Scripting (XSS) attacks
|
8
10
|
[**text_input_check_xss_batch**](TextInputApi.md#text_input_check_xss_batch) | **POST** /validate/text-input/check-and-protect/xss/batch | Check and protect multiple text inputs for Cross-Site-Scripting (XSS) attacks in batch
|
11
|
+
[**text_input_check_xxe**](TextInputApi.md#text_input_check_xxe) | **POST** /validate/text-input/check/xxe | Protect text input from XML External Entity (XXE) attacks
|
12
|
+
[**text_input_check_xxe_batch**](TextInputApi.md#text_input_check_xxe_batch) | **POST** /validate/text-input/check/xxe/batch | Protect text input from XML External Entity (XXE) attacks
|
9
13
|
[**text_input_protect_xss**](TextInputApi.md#text_input_protect_xss) | **POST** /validate/text-input/protect/xss | Protect text input from Cross-Site-Scripting (XSS) attacks through normalization
|
10
14
|
|
11
15
|
|
16
|
+
# **text_input_check_sql_injection**
|
17
|
+
> SqlInjectionDetectionResult text_input_check_sql_injection(value, opts)
|
18
|
+
|
19
|
+
Check text input for SQL Injection (SQLI) attacks
|
20
|
+
|
21
|
+
Detects SQL Injection (SQLI) attacks from text input.
|
22
|
+
|
23
|
+
### Example
|
24
|
+
```ruby
|
25
|
+
# load the gem
|
26
|
+
require 'cloudmersive-validate-api-client'
|
27
|
+
# setup authorization
|
28
|
+
CloudmersiveValidateApiClient.configure do |config|
|
29
|
+
# Configure API key authorization: Apikey
|
30
|
+
config.api_key['Apikey'] = 'YOUR API KEY'
|
31
|
+
# Uncomment the following line to set a prefix for the API key, e.g. 'Bearer' (defaults to nil)
|
32
|
+
#config.api_key_prefix['Apikey'] = 'Bearer'
|
33
|
+
end
|
34
|
+
|
35
|
+
api_instance = CloudmersiveValidateApiClient::TextInputApi.new
|
36
|
+
|
37
|
+
value = 'value_example' # String | User-facing text input.
|
38
|
+
|
39
|
+
opts = {
|
40
|
+
detection_level: 'detection_level_example' # String | Set to Normal to target a high-security SQL Injection detection level with a very low false positive rate; select High to target a very-high security SQL Injection detection level with higher false positives. Default is Normal (recommended).
|
41
|
+
}
|
42
|
+
|
43
|
+
begin
|
44
|
+
#Check text input for SQL Injection (SQLI) attacks
|
45
|
+
result = api_instance.text_input_check_sql_injection(value, opts)
|
46
|
+
p result
|
47
|
+
rescue CloudmersiveValidateApiClient::ApiError => e
|
48
|
+
puts "Exception when calling TextInputApi->text_input_check_sql_injection: #{e}"
|
49
|
+
end
|
50
|
+
```
|
51
|
+
|
52
|
+
### Parameters
|
53
|
+
|
54
|
+
Name | Type | Description | Notes
|
55
|
+
------------- | ------------- | ------------- | -------------
|
56
|
+
**value** | **String**| User-facing text input. |
|
57
|
+
**detection_level** | **String**| Set to Normal to target a high-security SQL Injection detection level with a very low false positive rate; select High to target a very-high security SQL Injection detection level with higher false positives. Default is Normal (recommended). | [optional]
|
58
|
+
|
59
|
+
### Return type
|
60
|
+
|
61
|
+
[**SqlInjectionDetectionResult**](SqlInjectionDetectionResult.md)
|
62
|
+
|
63
|
+
### Authorization
|
64
|
+
|
65
|
+
[Apikey](../README.md#Apikey)
|
66
|
+
|
67
|
+
### HTTP request headers
|
68
|
+
|
69
|
+
- **Content-Type**: application/json, text/json
|
70
|
+
- **Accept**: application/json, text/json, application/xml, text/xml
|
71
|
+
|
72
|
+
|
73
|
+
|
74
|
+
# **text_input_check_sql_injection_batch**
|
75
|
+
> SqlInjectionCheckBatchResponse text_input_check_sql_injection_batch(value)
|
76
|
+
|
77
|
+
Check and protect multiple text inputs for SQL Injection (SQLI) attacks in batch
|
78
|
+
|
79
|
+
Detects SQL Injection (SQLI) attacks from multiple text inputs. Output preverses order of input items.
|
80
|
+
|
81
|
+
### Example
|
82
|
+
```ruby
|
83
|
+
# load the gem
|
84
|
+
require 'cloudmersive-validate-api-client'
|
85
|
+
# setup authorization
|
86
|
+
CloudmersiveValidateApiClient.configure do |config|
|
87
|
+
# Configure API key authorization: Apikey
|
88
|
+
config.api_key['Apikey'] = 'YOUR API KEY'
|
89
|
+
# Uncomment the following line to set a prefix for the API key, e.g. 'Bearer' (defaults to nil)
|
90
|
+
#config.api_key_prefix['Apikey'] = 'Bearer'
|
91
|
+
end
|
92
|
+
|
93
|
+
api_instance = CloudmersiveValidateApiClient::TextInputApi.new
|
94
|
+
|
95
|
+
value = CloudmersiveValidateApiClient::SqlInjectionCheckBatchRequest.new # SqlInjectionCheckBatchRequest | User-facing text input.
|
96
|
+
|
97
|
+
|
98
|
+
begin
|
99
|
+
#Check and protect multiple text inputs for SQL Injection (SQLI) attacks in batch
|
100
|
+
result = api_instance.text_input_check_sql_injection_batch(value)
|
101
|
+
p result
|
102
|
+
rescue CloudmersiveValidateApiClient::ApiError => e
|
103
|
+
puts "Exception when calling TextInputApi->text_input_check_sql_injection_batch: #{e}"
|
104
|
+
end
|
105
|
+
```
|
106
|
+
|
107
|
+
### Parameters
|
108
|
+
|
109
|
+
Name | Type | Description | Notes
|
110
|
+
------------- | ------------- | ------------- | -------------
|
111
|
+
**value** | [**SqlInjectionCheckBatchRequest**](SqlInjectionCheckBatchRequest.md)| User-facing text input. |
|
112
|
+
|
113
|
+
### Return type
|
114
|
+
|
115
|
+
[**SqlInjectionCheckBatchResponse**](SqlInjectionCheckBatchResponse.md)
|
116
|
+
|
117
|
+
### Authorization
|
118
|
+
|
119
|
+
[Apikey](../README.md#Apikey)
|
120
|
+
|
121
|
+
### HTTP request headers
|
122
|
+
|
123
|
+
- **Content-Type**: application/json, text/json
|
124
|
+
- **Accept**: application/json, text/json, application/xml, text/xml
|
125
|
+
|
126
|
+
|
127
|
+
|
12
128
|
# **text_input_check_xss**
|
13
129
|
> XssProtectionResult text_input_check_xss(value)
|
14
130
|
|
@@ -68,7 +184,7 @@ Name | Type | Description | Notes
|
|
68
184
|
|
69
185
|
Check and protect multiple text inputs for Cross-Site-Scripting (XSS) attacks in batch
|
70
186
|
|
71
|
-
Detects XSS (Cross-Site-Scripting) attacks from multiple text
|
187
|
+
Detects XSS (Cross-Site-Scripting) attacks from multiple text inputs. Output preverses order of input items.
|
72
188
|
|
73
189
|
### Example
|
74
190
|
```ruby
|
@@ -117,6 +233,122 @@ Name | Type | Description | Notes
|
|
117
233
|
|
118
234
|
|
119
235
|
|
236
|
+
# **text_input_check_xxe**
|
237
|
+
> XxeDetectionResult text_input_check_xxe(value, opts)
|
238
|
+
|
239
|
+
Protect text input from XML External Entity (XXE) attacks
|
240
|
+
|
241
|
+
Detects XXE (XML External Entity) attacks from text input.
|
242
|
+
|
243
|
+
### Example
|
244
|
+
```ruby
|
245
|
+
# load the gem
|
246
|
+
require 'cloudmersive-validate-api-client'
|
247
|
+
# setup authorization
|
248
|
+
CloudmersiveValidateApiClient.configure do |config|
|
249
|
+
# Configure API key authorization: Apikey
|
250
|
+
config.api_key['Apikey'] = 'YOUR API KEY'
|
251
|
+
# Uncomment the following line to set a prefix for the API key, e.g. 'Bearer' (defaults to nil)
|
252
|
+
#config.api_key_prefix['Apikey'] = 'Bearer'
|
253
|
+
end
|
254
|
+
|
255
|
+
api_instance = CloudmersiveValidateApiClient::TextInputApi.new
|
256
|
+
|
257
|
+
value = 'value_example' # String | User-facing text input.
|
258
|
+
|
259
|
+
opts = {
|
260
|
+
allow_internet_urls: true, # BOOLEAN | Optional: Set to true to allow Internet-based dependency URLs for DTDs and other XML External Entitites, set to false to block. Default is false.
|
261
|
+
known_safe_urls: 'known_safe_urls_example', # String | Optional: Comma separated list of fully-qualified URLs that will automatically be considered safe.
|
262
|
+
known_unsafe_urls: 'known_unsafe_urls_example' # String | Optional: Comma separated list of fully-qualified URLs that will automatically be considered unsafe.
|
263
|
+
}
|
264
|
+
|
265
|
+
begin
|
266
|
+
#Protect text input from XML External Entity (XXE) attacks
|
267
|
+
result = api_instance.text_input_check_xxe(value, opts)
|
268
|
+
p result
|
269
|
+
rescue CloudmersiveValidateApiClient::ApiError => e
|
270
|
+
puts "Exception when calling TextInputApi->text_input_check_xxe: #{e}"
|
271
|
+
end
|
272
|
+
```
|
273
|
+
|
274
|
+
### Parameters
|
275
|
+
|
276
|
+
Name | Type | Description | Notes
|
277
|
+
------------- | ------------- | ------------- | -------------
|
278
|
+
**value** | **String**| User-facing text input. |
|
279
|
+
**allow_internet_urls** | **BOOLEAN**| Optional: Set to true to allow Internet-based dependency URLs for DTDs and other XML External Entitites, set to false to block. Default is false. | [optional]
|
280
|
+
**known_safe_urls** | **String**| Optional: Comma separated list of fully-qualified URLs that will automatically be considered safe. | [optional]
|
281
|
+
**known_unsafe_urls** | **String**| Optional: Comma separated list of fully-qualified URLs that will automatically be considered unsafe. | [optional]
|
282
|
+
|
283
|
+
### Return type
|
284
|
+
|
285
|
+
[**XxeDetectionResult**](XxeDetectionResult.md)
|
286
|
+
|
287
|
+
### Authorization
|
288
|
+
|
289
|
+
[Apikey](../README.md#Apikey)
|
290
|
+
|
291
|
+
### HTTP request headers
|
292
|
+
|
293
|
+
- **Content-Type**: application/json, text/json
|
294
|
+
- **Accept**: application/json, text/json, application/xml, text/xml
|
295
|
+
|
296
|
+
|
297
|
+
|
298
|
+
# **text_input_check_xxe_batch**
|
299
|
+
> XxeDetectionBatchResponse text_input_check_xxe_batch(request)
|
300
|
+
|
301
|
+
Protect text input from XML External Entity (XXE) attacks
|
302
|
+
|
303
|
+
Detects XXE (XML External Entity) attacks from text input.
|
304
|
+
|
305
|
+
### Example
|
306
|
+
```ruby
|
307
|
+
# load the gem
|
308
|
+
require 'cloudmersive-validate-api-client'
|
309
|
+
# setup authorization
|
310
|
+
CloudmersiveValidateApiClient.configure do |config|
|
311
|
+
# Configure API key authorization: Apikey
|
312
|
+
config.api_key['Apikey'] = 'YOUR API KEY'
|
313
|
+
# Uncomment the following line to set a prefix for the API key, e.g. 'Bearer' (defaults to nil)
|
314
|
+
#config.api_key_prefix['Apikey'] = 'Bearer'
|
315
|
+
end
|
316
|
+
|
317
|
+
api_instance = CloudmersiveValidateApiClient::TextInputApi.new
|
318
|
+
|
319
|
+
request = CloudmersiveValidateApiClient::XxeDetectionBatchRequest.new # XxeDetectionBatchRequest |
|
320
|
+
|
321
|
+
|
322
|
+
begin
|
323
|
+
#Protect text input from XML External Entity (XXE) attacks
|
324
|
+
result = api_instance.text_input_check_xxe_batch(request)
|
325
|
+
p result
|
326
|
+
rescue CloudmersiveValidateApiClient::ApiError => e
|
327
|
+
puts "Exception when calling TextInputApi->text_input_check_xxe_batch: #{e}"
|
328
|
+
end
|
329
|
+
```
|
330
|
+
|
331
|
+
### Parameters
|
332
|
+
|
333
|
+
Name | Type | Description | Notes
|
334
|
+
------------- | ------------- | ------------- | -------------
|
335
|
+
**request** | [**XxeDetectionBatchRequest**](XxeDetectionBatchRequest.md)| |
|
336
|
+
|
337
|
+
### Return type
|
338
|
+
|
339
|
+
[**XxeDetectionBatchResponse**](XxeDetectionBatchResponse.md)
|
340
|
+
|
341
|
+
### Authorization
|
342
|
+
|
343
|
+
[Apikey](../README.md#Apikey)
|
344
|
+
|
345
|
+
### HTTP request headers
|
346
|
+
|
347
|
+
- **Content-Type**: application/json, text/json
|
348
|
+
- **Accept**: application/json, text/json, application/xml, text/xml
|
349
|
+
|
350
|
+
|
351
|
+
|
120
352
|
# **text_input_protect_xss**
|
121
353
|
> XssProtectionResult text_input_protect_xss(value)
|
122
354
|
|
@@ -0,0 +1,9 @@
|
|
1
|
+
# CloudmersiveValidateApiClient::UrlSafetyCheckResponseFull
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
Name | Type | Description | Notes
|
5
|
+
------------ | ------------- | ------------- | -------------
|
6
|
+
**clean_url** | **BOOLEAN** | True if the URL is clean, false if it is at risk of containing a safety threat or attack | [optional]
|
7
|
+
**threat_type** | **String** | Threat type identified, if any; possible values are \"ForcedDownload\", \"VirusesAndMalware\", \"Phishing\" | [optional]
|
8
|
+
|
9
|
+
|
@@ -0,0 +1,8 @@
|
|
1
|
+
# CloudmersiveValidateApiClient::UrlSsrfRequestBatch
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
Name | Type | Description | Notes
|
5
|
+
------------ | ------------- | ------------- | -------------
|
6
|
+
**input_items** | [**Array<UrlSsrfRequestFull>**](UrlSsrfRequestFull.md) | Input URLs to check for SSRF threats | [optional]
|
7
|
+
|
8
|
+
|
@@ -0,0 +1,9 @@
|
|
1
|
+
# CloudmersiveValidateApiClient::UrlSsrfRequestFull
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
Name | Type | Description | Notes
|
5
|
+
------------ | ------------- | ------------- | -------------
|
6
|
+
**url** | **String** | URL to validate | [optional]
|
7
|
+
**blocked_domains** | **Array<String>** | Top level domains that you do not want to allow access to, e.g. mydomain.com - will block all subdomains as well | [optional]
|
8
|
+
|
9
|
+
|
@@ -0,0 +1,8 @@
|
|
1
|
+
# CloudmersiveValidateApiClient::UrlSsrfResponseBatch
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
Name | Type | Description | Notes
|
5
|
+
------------ | ------------- | ------------- | -------------
|
6
|
+
**output_items** | [**Array<UrlSsrfResponseFull>**](UrlSsrfResponseFull.md) | Results of the operation, with indexes matched to input values | [optional]
|
7
|
+
|
8
|
+
|
@@ -0,0 +1,9 @@
|
|
1
|
+
# CloudmersiveValidateApiClient::UrlSsrfResponseFull
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
Name | Type | Description | Notes
|
5
|
+
------------ | ------------- | ------------- | -------------
|
6
|
+
**clean_url** | **BOOLEAN** | True if the URL is clean, false if it is at risk of containing an SSRF threat or attack | [optional]
|
7
|
+
**threat_level** | **String** | Threat level of the URL; possible values are High, Medium, Low and None | [optional]
|
8
|
+
|
9
|
+
|
@@ -5,5 +5,6 @@ Name | Type | Description | Notes
|
|
5
5
|
------------ | ------------- | ------------- | -------------
|
6
6
|
**valid_url** | **BOOLEAN** | True if the URL is valid, false otherwise | [optional]
|
7
7
|
**well_formed_url** | **String** | Well-formed version of the URL | [optional]
|
8
|
+
**top_level_domain_name** | **String** | The top-level domain name of the URL, e.g. mydomain.com | [optional]
|
8
9
|
|
9
10
|
|
@@ -0,0 +1,8 @@
|
|
1
|
+
# CloudmersiveValidateApiClient::XxeDetectionBatchRequest
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
Name | Type | Description | Notes
|
5
|
+
------------ | ------------- | ------------- | -------------
|
6
|
+
**request_items** | [**Array<XxeDetectionRequestItem>**](XxeDetectionRequestItem.md) | Multiple items to protect for XXE | [optional]
|
7
|
+
|
8
|
+
|
@@ -0,0 +1,8 @@
|
|
1
|
+
# CloudmersiveValidateApiClient::XxeDetectionBatchResponse
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
Name | Type | Description | Notes
|
5
|
+
------------ | ------------- | ------------- | -------------
|
6
|
+
**result_items** | [**Array<XxeDetectionResult>**](XxeDetectionResult.md) | Results from performing a batch XSS protection operation | [optional]
|
7
|
+
|
8
|
+
|
@@ -0,0 +1,11 @@
|
|
1
|
+
# CloudmersiveValidateApiClient::XxeDetectionRequestItem
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
Name | Type | Description | Notes
|
5
|
+
------------ | ------------- | ------------- | -------------
|
6
|
+
**input_text** | **String** | Individual input text item to protect from XXE | [optional]
|
7
|
+
**allow_internet_urls** | **BOOLEAN** | Optional: Set to true to allow Internet-based dependency URLs for DTDs and other XML External Entitites, set to false to block. Default is false. | [optional]
|
8
|
+
**known_safe_urls** | **Array<String>** | Optional: Comma separated list of fully-qualified URLs that will automatically be considered safe. | [optional]
|
9
|
+
**known_unsafe_urls** | **Array<String>** | Optional: Comma separated list of fully-qualified URLs that will automatically be considered unsafe. | [optional]
|
10
|
+
|
11
|
+
|
@@ -0,0 +1,9 @@
|
|
1
|
+
# CloudmersiveValidateApiClient::XxeDetectionResult
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
Name | Type | Description | Notes
|
5
|
+
------------ | ------------- | ------------- | -------------
|
6
|
+
**successful** | **BOOLEAN** | True if the operation was successful, false otherwise | [optional]
|
7
|
+
**contained_xxe** | **BOOLEAN** | True if the input contained XXE threats, false otherwise | [optional]
|
8
|
+
|
9
|
+
|