cloudmersive-validate-api-client 2.1.7 → 2.2.4
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/README.md +23 -4
- data/docs/DomainApi.md +110 -0
- data/docs/HtmlSsrfDetectionResult.md +9 -0
- data/docs/IsAdminPathResponse.md +9 -0
- data/docs/SqlInjectionCheckBatchRequest.md +9 -0
- data/docs/SqlInjectionCheckBatchResponse.md +8 -0
- data/docs/SqlInjectionCheckRequestItem.md +8 -0
- data/docs/SqlInjectionDetectionResult.md +10 -0
- data/docs/TextInputApi.md +288 -1
- data/docs/UrlHtmlSsrfRequestFull.md +8 -0
- data/docs/UrlHtmlSsrfResponseFull.md +9 -0
- data/docs/XxeDetectionBatchRequest.md +8 -0
- data/docs/XxeDetectionBatchResponse.md +8 -0
- data/docs/XxeDetectionRequestItem.md +11 -0
- data/docs/XxeDetectionResult.md +9 -0
- data/lib/cloudmersive-validate-api-client.rb +12 -0
- data/lib/cloudmersive-validate-api-client/api/domain_api.rb +108 -0
- data/lib/cloudmersive-validate-api-client/api/text_input_api.rb +284 -2
- data/lib/cloudmersive-validate-api-client/models/html_ssrf_detection_result.rb +196 -0
- data/lib/cloudmersive-validate-api-client/models/is_admin_path_response.rb +196 -0
- data/lib/cloudmersive-validate-api-client/models/sql_injection_check_batch_request.rb +198 -0
- data/lib/cloudmersive-validate-api-client/models/sql_injection_check_batch_response.rb +188 -0
- data/lib/cloudmersive-validate-api-client/models/sql_injection_check_request_item.rb +186 -0
- data/lib/cloudmersive-validate-api-client/models/sql_injection_detection_result.rb +206 -0
- data/lib/cloudmersive-validate-api-client/models/url_html_ssrf_request_full.rb +186 -0
- data/lib/cloudmersive-validate-api-client/models/url_html_ssrf_response_full.rb +196 -0
- data/lib/cloudmersive-validate-api-client/models/xxe_detection_batch_request.rb +188 -0
- data/lib/cloudmersive-validate-api-client/models/xxe_detection_batch_response.rb +188 -0
- data/lib/cloudmersive-validate-api-client/models/xxe_detection_request_item.rb +220 -0
- data/lib/cloudmersive-validate-api-client/models/xxe_detection_result.rb +196 -0
- data/lib/cloudmersive-validate-api-client/version.rb +1 -1
- data/spec/api/domain_api_spec.rb +24 -0
- data/spec/api/text_input_api_spec.rb +65 -1
- data/spec/models/html_ssrf_detection_result_spec.rb +47 -0
- data/spec/models/is_admin_path_response_spec.rb +47 -0
- data/spec/models/sql_injection_check_batch_request_spec.rb +47 -0
- data/spec/models/sql_injection_check_batch_response_spec.rb +41 -0
- data/spec/models/sql_injection_check_request_item_spec.rb +41 -0
- data/spec/models/sql_injection_detection_result_spec.rb +53 -0
- data/spec/models/url_html_ssrf_request_full_spec.rb +41 -0
- data/spec/models/url_html_ssrf_response_full_spec.rb +47 -0
- data/spec/models/xxe_detection_batch_request_spec.rb +41 -0
- data/spec/models/xxe_detection_batch_response_spec.rb +41 -0
- data/spec/models/xxe_detection_request_item_spec.rb +59 -0
- data/spec/models/xxe_detection_result_spec.rb +47 -0
- metadata +38 -2
data/spec/api/domain_api_spec.rb
CHANGED
@@ -56,6 +56,18 @@ describe 'DomainApi' do
|
|
56
56
|
end
|
57
57
|
end
|
58
58
|
|
59
|
+
# unit tests for domain_is_admin_path
|
60
|
+
# Check if path is a high-risk or vulnerable server administration path
|
61
|
+
# Check if the input URL or relative path is a server Administration Path, and therefore a risk or vulnerability for remote access.
|
62
|
+
# @param value URL or relative path to check, e.g. \"/admin/login\". The input is a string so be sure to enclose it in double-quotes.
|
63
|
+
# @param [Hash] opts the optional parameters
|
64
|
+
# @return [IsAdminPathResponse]
|
65
|
+
describe 'domain_is_admin_path test' do
|
66
|
+
it 'should work' do
|
67
|
+
# assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
|
68
|
+
end
|
69
|
+
end
|
70
|
+
|
59
71
|
# unit tests for domain_phishing_check
|
60
72
|
# Check a URL for Phishing threats
|
61
73
|
# Checks if an input URL is at risk of being an Phishing (fake login page, or other page designed to collect information via social engineering) threat or attack.
|
@@ -140,6 +152,18 @@ describe 'DomainApi' do
|
|
140
152
|
end
|
141
153
|
end
|
142
154
|
|
155
|
+
# unit tests for domain_url_html_ssrf_check
|
156
|
+
# Check a URL for HTML embedded SSRF threats
|
157
|
+
# Checks if an input URL HTML is at risk of containing one or more embedded SSRF (Server-side request forgery) threats or attacks.
|
158
|
+
# @param request Input URL request
|
159
|
+
# @param [Hash] opts the optional parameters
|
160
|
+
# @return [UrlHtmlSsrfResponseFull]
|
161
|
+
describe 'domain_url_html_ssrf_check test' do
|
162
|
+
it 'should work' do
|
163
|
+
# assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
|
164
|
+
end
|
165
|
+
end
|
166
|
+
|
143
167
|
# unit tests for domain_url_syntax_only
|
144
168
|
# Validate a URL syntactically
|
145
169
|
# Validate whether a URL is syntactically valid (does not check endpoint for validity). Accepts various types of input and produces a well-formed URL as output.
|
@@ -32,6 +32,43 @@ describe 'TextInputApi' do
|
|
32
32
|
end
|
33
33
|
end
|
34
34
|
|
35
|
+
# unit tests for text_input_check_html_ssrf
|
36
|
+
# Protect html input from Server-side Request Forgery (SSRF) attacks
|
37
|
+
# Detects SSRF (Server-side request forgery) attacks and unsafe URL attacks from HTML text input, where attackers can attempt to access unsafe local or network paths in the server environment by injecting them into HTML.
|
38
|
+
# @param value User-facing HTML input.
|
39
|
+
# @param [Hash] opts the optional parameters
|
40
|
+
# @return [HtmlSsrfDetectionResult]
|
41
|
+
describe 'text_input_check_html_ssrf test' do
|
42
|
+
it 'should work' do
|
43
|
+
# assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
|
44
|
+
end
|
45
|
+
end
|
46
|
+
|
47
|
+
# unit tests for text_input_check_sql_injection
|
48
|
+
# Check text input for SQL Injection (SQLI) attacks
|
49
|
+
# Detects SQL Injection (SQLI) attacks from text input.
|
50
|
+
# @param value User-facing text input.
|
51
|
+
# @param [Hash] opts the optional parameters
|
52
|
+
# @option opts [String] :detection_level Set to Normal to target a high-security SQL Injection detection level with a very low false positive rate; select High to target a very-high security SQL Injection detection level with higher false positives. Default is Normal (recommended).
|
53
|
+
# @return [SqlInjectionDetectionResult]
|
54
|
+
describe 'text_input_check_sql_injection test' do
|
55
|
+
it 'should work' do
|
56
|
+
# assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
|
57
|
+
end
|
58
|
+
end
|
59
|
+
|
60
|
+
# unit tests for text_input_check_sql_injection_batch
|
61
|
+
# Check and protect multiple text inputs for SQL Injection (SQLI) attacks in batch
|
62
|
+
# Detects SQL Injection (SQLI) attacks from multiple text inputs. Output preverses order of input items.
|
63
|
+
# @param value User-facing text input.
|
64
|
+
# @param [Hash] opts the optional parameters
|
65
|
+
# @return [SqlInjectionCheckBatchResponse]
|
66
|
+
describe 'text_input_check_sql_injection_batch test' do
|
67
|
+
it 'should work' do
|
68
|
+
# assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
|
69
|
+
end
|
70
|
+
end
|
71
|
+
|
35
72
|
# unit tests for text_input_check_xss
|
36
73
|
# Check text input for Cross-Site-Scripting (XSS) attacks
|
37
74
|
# Detects XSS (Cross-Site-Scripting) attacks from text input.
|
@@ -46,7 +83,7 @@ describe 'TextInputApi' do
|
|
46
83
|
|
47
84
|
# unit tests for text_input_check_xss_batch
|
48
85
|
# Check and protect multiple text inputs for Cross-Site-Scripting (XSS) attacks in batch
|
49
|
-
# Detects XSS (Cross-Site-Scripting) attacks from multiple text
|
86
|
+
# Detects XSS (Cross-Site-Scripting) attacks from multiple text inputs. Output preverses order of input items.
|
50
87
|
# @param value User-facing text input.
|
51
88
|
# @param [Hash] opts the optional parameters
|
52
89
|
# @return [XssProtectionBatchResponse]
|
@@ -56,6 +93,33 @@ describe 'TextInputApi' do
|
|
56
93
|
end
|
57
94
|
end
|
58
95
|
|
96
|
+
# unit tests for text_input_check_xxe
|
97
|
+
# Protect text input from XML External Entity (XXE) attacks
|
98
|
+
# Detects XXE (XML External Entity) attacks from text input.
|
99
|
+
# @param value User-facing text input.
|
100
|
+
# @param [Hash] opts the optional parameters
|
101
|
+
# @option opts [BOOLEAN] :allow_internet_urls Optional: Set to true to allow Internet-based dependency URLs for DTDs and other XML External Entitites, set to false to block. Default is false.
|
102
|
+
# @option opts [String] :known_safe_urls Optional: Comma separated list of fully-qualified URLs that will automatically be considered safe.
|
103
|
+
# @option opts [String] :known_unsafe_urls Optional: Comma separated list of fully-qualified URLs that will automatically be considered unsafe.
|
104
|
+
# @return [XxeDetectionResult]
|
105
|
+
describe 'text_input_check_xxe test' do
|
106
|
+
it 'should work' do
|
107
|
+
# assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
|
108
|
+
end
|
109
|
+
end
|
110
|
+
|
111
|
+
# unit tests for text_input_check_xxe_batch
|
112
|
+
# Protect text input from XML External Entity (XXE) attacks
|
113
|
+
# Detects XXE (XML External Entity) attacks from text input.
|
114
|
+
# @param request
|
115
|
+
# @param [Hash] opts the optional parameters
|
116
|
+
# @return [XxeDetectionBatchResponse]
|
117
|
+
describe 'text_input_check_xxe_batch test' do
|
118
|
+
it 'should work' do
|
119
|
+
# assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
|
120
|
+
end
|
121
|
+
end
|
122
|
+
|
59
123
|
# unit tests for text_input_protect_xss
|
60
124
|
# Protect text input from Cross-Site-Scripting (XSS) attacks through normalization
|
61
125
|
# Detects and removes XSS (Cross-Site-Scripting) attacks from text input through normalization. Returns the normalized result, as well as information on whether the original input contained an XSS risk.
|
@@ -0,0 +1,47 @@
|
|
1
|
+
=begin
|
2
|
+
#validateapi
|
3
|
+
|
4
|
+
#The validation APIs help you validate data. Check if an E-mail address is real. Check if a domain is real. Check up on an IP address, and even where it is located. All this and much more is available in the validation API.
|
5
|
+
|
6
|
+
OpenAPI spec version: v1
|
7
|
+
|
8
|
+
Generated by: https://github.com/swagger-api/swagger-codegen.git
|
9
|
+
Swagger Codegen version: 2.4.14
|
10
|
+
|
11
|
+
=end
|
12
|
+
|
13
|
+
require 'spec_helper'
|
14
|
+
require 'json'
|
15
|
+
require 'date'
|
16
|
+
|
17
|
+
# Unit tests for CloudmersiveValidateApiClient::HtmlSsrfDetectionResult
|
18
|
+
# Automatically generated by swagger-codegen (github.com/swagger-api/swagger-codegen)
|
19
|
+
# Please update as you see appropriate
|
20
|
+
describe 'HtmlSsrfDetectionResult' do
|
21
|
+
before do
|
22
|
+
# run before each test
|
23
|
+
@instance = CloudmersiveValidateApiClient::HtmlSsrfDetectionResult.new
|
24
|
+
end
|
25
|
+
|
26
|
+
after do
|
27
|
+
# run after each test
|
28
|
+
end
|
29
|
+
|
30
|
+
describe 'test an instance of HtmlSsrfDetectionResult' do
|
31
|
+
it 'should create an instance of HtmlSsrfDetectionResult' do
|
32
|
+
expect(@instance).to be_instance_of(CloudmersiveValidateApiClient::HtmlSsrfDetectionResult)
|
33
|
+
end
|
34
|
+
end
|
35
|
+
describe 'test attribute "successful"' do
|
36
|
+
it 'should work' do
|
37
|
+
# assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
|
38
|
+
end
|
39
|
+
end
|
40
|
+
|
41
|
+
describe 'test attribute "contained_threats"' do
|
42
|
+
it 'should work' do
|
43
|
+
# assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
|
44
|
+
end
|
45
|
+
end
|
46
|
+
|
47
|
+
end
|
@@ -0,0 +1,47 @@
|
|
1
|
+
=begin
|
2
|
+
#validateapi
|
3
|
+
|
4
|
+
#The validation APIs help you validate data. Check if an E-mail address is real. Check if a domain is real. Check up on an IP address, and even where it is located. All this and much more is available in the validation API.
|
5
|
+
|
6
|
+
OpenAPI spec version: v1
|
7
|
+
|
8
|
+
Generated by: https://github.com/swagger-api/swagger-codegen.git
|
9
|
+
Swagger Codegen version: 2.4.14
|
10
|
+
|
11
|
+
=end
|
12
|
+
|
13
|
+
require 'spec_helper'
|
14
|
+
require 'json'
|
15
|
+
require 'date'
|
16
|
+
|
17
|
+
# Unit tests for CloudmersiveValidateApiClient::IsAdminPathResponse
|
18
|
+
# Automatically generated by swagger-codegen (github.com/swagger-api/swagger-codegen)
|
19
|
+
# Please update as you see appropriate
|
20
|
+
describe 'IsAdminPathResponse' do
|
21
|
+
before do
|
22
|
+
# run before each test
|
23
|
+
@instance = CloudmersiveValidateApiClient::IsAdminPathResponse.new
|
24
|
+
end
|
25
|
+
|
26
|
+
after do
|
27
|
+
# run after each test
|
28
|
+
end
|
29
|
+
|
30
|
+
describe 'test an instance of IsAdminPathResponse' do
|
31
|
+
it 'should create an instance of IsAdminPathResponse' do
|
32
|
+
expect(@instance).to be_instance_of(CloudmersiveValidateApiClient::IsAdminPathResponse)
|
33
|
+
end
|
34
|
+
end
|
35
|
+
describe 'test attribute "is_admin_path_node"' do
|
36
|
+
it 'should work' do
|
37
|
+
# assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
|
38
|
+
end
|
39
|
+
end
|
40
|
+
|
41
|
+
describe 'test attribute "successful"' do
|
42
|
+
it 'should work' do
|
43
|
+
# assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
|
44
|
+
end
|
45
|
+
end
|
46
|
+
|
47
|
+
end
|
@@ -0,0 +1,47 @@
|
|
1
|
+
=begin
|
2
|
+
#validateapi
|
3
|
+
|
4
|
+
#The validation APIs help you validate data. Check if an E-mail address is real. Check if a domain is real. Check up on an IP address, and even where it is located. All this and much more is available in the validation API.
|
5
|
+
|
6
|
+
OpenAPI spec version: v1
|
7
|
+
|
8
|
+
Generated by: https://github.com/swagger-api/swagger-codegen.git
|
9
|
+
Swagger Codegen version: 2.4.14
|
10
|
+
|
11
|
+
=end
|
12
|
+
|
13
|
+
require 'spec_helper'
|
14
|
+
require 'json'
|
15
|
+
require 'date'
|
16
|
+
|
17
|
+
# Unit tests for CloudmersiveValidateApiClient::SqlInjectionCheckBatchRequest
|
18
|
+
# Automatically generated by swagger-codegen (github.com/swagger-api/swagger-codegen)
|
19
|
+
# Please update as you see appropriate
|
20
|
+
describe 'SqlInjectionCheckBatchRequest' do
|
21
|
+
before do
|
22
|
+
# run before each test
|
23
|
+
@instance = CloudmersiveValidateApiClient::SqlInjectionCheckBatchRequest.new
|
24
|
+
end
|
25
|
+
|
26
|
+
after do
|
27
|
+
# run after each test
|
28
|
+
end
|
29
|
+
|
30
|
+
describe 'test an instance of SqlInjectionCheckBatchRequest' do
|
31
|
+
it 'should create an instance of SqlInjectionCheckBatchRequest' do
|
32
|
+
expect(@instance).to be_instance_of(CloudmersiveValidateApiClient::SqlInjectionCheckBatchRequest)
|
33
|
+
end
|
34
|
+
end
|
35
|
+
describe 'test attribute "request_items"' do
|
36
|
+
it 'should work' do
|
37
|
+
# assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
|
38
|
+
end
|
39
|
+
end
|
40
|
+
|
41
|
+
describe 'test attribute "detection_level"' do
|
42
|
+
it 'should work' do
|
43
|
+
# assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
|
44
|
+
end
|
45
|
+
end
|
46
|
+
|
47
|
+
end
|
@@ -0,0 +1,41 @@
|
|
1
|
+
=begin
|
2
|
+
#validateapi
|
3
|
+
|
4
|
+
#The validation APIs help you validate data. Check if an E-mail address is real. Check if a domain is real. Check up on an IP address, and even where it is located. All this and much more is available in the validation API.
|
5
|
+
|
6
|
+
OpenAPI spec version: v1
|
7
|
+
|
8
|
+
Generated by: https://github.com/swagger-api/swagger-codegen.git
|
9
|
+
Swagger Codegen version: 2.4.14
|
10
|
+
|
11
|
+
=end
|
12
|
+
|
13
|
+
require 'spec_helper'
|
14
|
+
require 'json'
|
15
|
+
require 'date'
|
16
|
+
|
17
|
+
# Unit tests for CloudmersiveValidateApiClient::SqlInjectionCheckBatchResponse
|
18
|
+
# Automatically generated by swagger-codegen (github.com/swagger-api/swagger-codegen)
|
19
|
+
# Please update as you see appropriate
|
20
|
+
describe 'SqlInjectionCheckBatchResponse' do
|
21
|
+
before do
|
22
|
+
# run before each test
|
23
|
+
@instance = CloudmersiveValidateApiClient::SqlInjectionCheckBatchResponse.new
|
24
|
+
end
|
25
|
+
|
26
|
+
after do
|
27
|
+
# run after each test
|
28
|
+
end
|
29
|
+
|
30
|
+
describe 'test an instance of SqlInjectionCheckBatchResponse' do
|
31
|
+
it 'should create an instance of SqlInjectionCheckBatchResponse' do
|
32
|
+
expect(@instance).to be_instance_of(CloudmersiveValidateApiClient::SqlInjectionCheckBatchResponse)
|
33
|
+
end
|
34
|
+
end
|
35
|
+
describe 'test attribute "result_items"' do
|
36
|
+
it 'should work' do
|
37
|
+
# assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
|
38
|
+
end
|
39
|
+
end
|
40
|
+
|
41
|
+
end
|
@@ -0,0 +1,41 @@
|
|
1
|
+
=begin
|
2
|
+
#validateapi
|
3
|
+
|
4
|
+
#The validation APIs help you validate data. Check if an E-mail address is real. Check if a domain is real. Check up on an IP address, and even where it is located. All this and much more is available in the validation API.
|
5
|
+
|
6
|
+
OpenAPI spec version: v1
|
7
|
+
|
8
|
+
Generated by: https://github.com/swagger-api/swagger-codegen.git
|
9
|
+
Swagger Codegen version: 2.4.14
|
10
|
+
|
11
|
+
=end
|
12
|
+
|
13
|
+
require 'spec_helper'
|
14
|
+
require 'json'
|
15
|
+
require 'date'
|
16
|
+
|
17
|
+
# Unit tests for CloudmersiveValidateApiClient::SqlInjectionCheckRequestItem
|
18
|
+
# Automatically generated by swagger-codegen (github.com/swagger-api/swagger-codegen)
|
19
|
+
# Please update as you see appropriate
|
20
|
+
describe 'SqlInjectionCheckRequestItem' do
|
21
|
+
before do
|
22
|
+
# run before each test
|
23
|
+
@instance = CloudmersiveValidateApiClient::SqlInjectionCheckRequestItem.new
|
24
|
+
end
|
25
|
+
|
26
|
+
after do
|
27
|
+
# run after each test
|
28
|
+
end
|
29
|
+
|
30
|
+
describe 'test an instance of SqlInjectionCheckRequestItem' do
|
31
|
+
it 'should create an instance of SqlInjectionCheckRequestItem' do
|
32
|
+
expect(@instance).to be_instance_of(CloudmersiveValidateApiClient::SqlInjectionCheckRequestItem)
|
33
|
+
end
|
34
|
+
end
|
35
|
+
describe 'test attribute "input_text"' do
|
36
|
+
it 'should work' do
|
37
|
+
# assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
|
38
|
+
end
|
39
|
+
end
|
40
|
+
|
41
|
+
end
|
@@ -0,0 +1,53 @@
|
|
1
|
+
=begin
|
2
|
+
#validateapi
|
3
|
+
|
4
|
+
#The validation APIs help you validate data. Check if an E-mail address is real. Check if a domain is real. Check up on an IP address, and even where it is located. All this and much more is available in the validation API.
|
5
|
+
|
6
|
+
OpenAPI spec version: v1
|
7
|
+
|
8
|
+
Generated by: https://github.com/swagger-api/swagger-codegen.git
|
9
|
+
Swagger Codegen version: 2.4.14
|
10
|
+
|
11
|
+
=end
|
12
|
+
|
13
|
+
require 'spec_helper'
|
14
|
+
require 'json'
|
15
|
+
require 'date'
|
16
|
+
|
17
|
+
# Unit tests for CloudmersiveValidateApiClient::SqlInjectionDetectionResult
|
18
|
+
# Automatically generated by swagger-codegen (github.com/swagger-api/swagger-codegen)
|
19
|
+
# Please update as you see appropriate
|
20
|
+
describe 'SqlInjectionDetectionResult' do
|
21
|
+
before do
|
22
|
+
# run before each test
|
23
|
+
@instance = CloudmersiveValidateApiClient::SqlInjectionDetectionResult.new
|
24
|
+
end
|
25
|
+
|
26
|
+
after do
|
27
|
+
# run after each test
|
28
|
+
end
|
29
|
+
|
30
|
+
describe 'test an instance of SqlInjectionDetectionResult' do
|
31
|
+
it 'should create an instance of SqlInjectionDetectionResult' do
|
32
|
+
expect(@instance).to be_instance_of(CloudmersiveValidateApiClient::SqlInjectionDetectionResult)
|
33
|
+
end
|
34
|
+
end
|
35
|
+
describe 'test attribute "successful"' do
|
36
|
+
it 'should work' do
|
37
|
+
# assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
|
38
|
+
end
|
39
|
+
end
|
40
|
+
|
41
|
+
describe 'test attribute "contained_sql_injection_attack"' do
|
42
|
+
it 'should work' do
|
43
|
+
# assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
|
44
|
+
end
|
45
|
+
end
|
46
|
+
|
47
|
+
describe 'test attribute "original_input"' do
|
48
|
+
it 'should work' do
|
49
|
+
# assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
|
50
|
+
end
|
51
|
+
end
|
52
|
+
|
53
|
+
end
|
@@ -0,0 +1,41 @@
|
|
1
|
+
=begin
|
2
|
+
#validateapi
|
3
|
+
|
4
|
+
#The validation APIs help you validate data. Check if an E-mail address is real. Check if a domain is real. Check up on an IP address, and even where it is located. All this and much more is available in the validation API.
|
5
|
+
|
6
|
+
OpenAPI spec version: v1
|
7
|
+
|
8
|
+
Generated by: https://github.com/swagger-api/swagger-codegen.git
|
9
|
+
Swagger Codegen version: 2.4.14
|
10
|
+
|
11
|
+
=end
|
12
|
+
|
13
|
+
require 'spec_helper'
|
14
|
+
require 'json'
|
15
|
+
require 'date'
|
16
|
+
|
17
|
+
# Unit tests for CloudmersiveValidateApiClient::UrlHtmlSsrfRequestFull
|
18
|
+
# Automatically generated by swagger-codegen (github.com/swagger-api/swagger-codegen)
|
19
|
+
# Please update as you see appropriate
|
20
|
+
describe 'UrlHtmlSsrfRequestFull' do
|
21
|
+
before do
|
22
|
+
# run before each test
|
23
|
+
@instance = CloudmersiveValidateApiClient::UrlHtmlSsrfRequestFull.new
|
24
|
+
end
|
25
|
+
|
26
|
+
after do
|
27
|
+
# run after each test
|
28
|
+
end
|
29
|
+
|
30
|
+
describe 'test an instance of UrlHtmlSsrfRequestFull' do
|
31
|
+
it 'should create an instance of UrlHtmlSsrfRequestFull' do
|
32
|
+
expect(@instance).to be_instance_of(CloudmersiveValidateApiClient::UrlHtmlSsrfRequestFull)
|
33
|
+
end
|
34
|
+
end
|
35
|
+
describe 'test attribute "url"' do
|
36
|
+
it 'should work' do
|
37
|
+
# assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
|
38
|
+
end
|
39
|
+
end
|
40
|
+
|
41
|
+
end
|