cloudmersive-validate-api-client 2.2.5 → 2.2.6

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 6eced1f0005e1d25a42ac4809b4112292bae4c750b285795d22761339fb79eeb
4
- data.tar.gz: 726969fc56bee4cf40921619f06479c8b304e293d23ffeff7c79cb735fba504d
3
+ metadata.gz: 5eaddd281d0980dfb5489995726042b7496e497dd657a540d0692bf3fa9bdc59
4
+ data.tar.gz: 7912ea78518310c66a58259b23087378f174856cd46de6cebf1d2ebea2b636bd
5
5
  SHA512:
6
- metadata.gz: fc16b7c25e271cd03544a8acab8e311201361ee55228da1180f7614ec8db0a39b7851c5fcafdbb776eaee13251c192f468e97c05a7b9c863e4b56b229d9ad6b1
7
- data.tar.gz: 3dbad4a9baac018d5fce20f23a1a10a764f80ccd60fafc7f201c217253d3ba17d83282007bb9af07bb3d2b8645b3d595f85f46abfd56e08e1a493aa19ed7436b
6
+ metadata.gz: 4adc139adc7c59222b7fb60a3536346723c770be12fb0cc3fce6561d49ea539d7b4d9226ed885a1403e9d5623405f6877b4be6920fa3b88aa1f300d8e512824b
7
+ data.tar.gz: f8ca0d221d78d7452338859eeae1fd3700565240db9056f8931d7ff9a5da82a2e2005945f2e843dccb88a054e162d432eeb4f7724218a7b037d82b1d64ade081
data/README.md CHANGED
@@ -7,7 +7,7 @@ The validation APIs help you validate data. Check if an E-mail address is real.
7
7
  This SDK is automatically generated by the [Swagger Codegen](https://github.com/swagger-api/swagger-codegen) project:
8
8
 
9
9
  - API version: v1
10
- - Package version: 2.2.5
10
+ - Package version: 2.2.6
11
11
  - Build package: io.swagger.codegen.languages.RubyClientCodegen
12
12
 
13
13
  ## Installation
@@ -23,15 +23,15 @@ gem build cloudmersive-validate-api-client.gemspec
23
23
  Then either install the gem locally:
24
24
 
25
25
  ```shell
26
- gem install ./cloudmersive-validate-api-client-2.2.5.gem
26
+ gem install ./cloudmersive-validate-api-client-2.2.6.gem
27
27
  ```
28
- (for development, run `gem install --dev ./cloudmersive-validate-api-client-2.2.5.gem` to install the development dependencies)
28
+ (for development, run `gem install --dev ./cloudmersive-validate-api-client-2.2.6.gem` to install the development dependencies)
29
29
 
30
30
  or publish the gem to a gem hosting service, e.g. [RubyGems](https://rubygems.org/).
31
31
 
32
32
  Finally add this to the Gemfile:
33
33
 
34
- gem 'cloudmersive-validate-api-client', '~> 2.2.5'
34
+ gem 'cloudmersive-validate-api-client', '~> 2.2.6'
35
35
 
36
36
  ### Install from Git
37
37
 
data/docs/TextInputApi.md CHANGED
@@ -15,7 +15,7 @@ Method | HTTP request | Description
15
15
 
16
16
 
17
17
  # **text_input_check_html_ssrf**
18
- > HtmlSsrfDetectionResult text_input_check_html_ssrf(value)
18
+ > HtmlSsrfDetectionResult text_input_check_html_ssrf(value, opts)
19
19
 
20
20
  Protect html input from Server-side Request Forgery (SSRF) attacks
21
21
 
@@ -37,10 +37,13 @@ api_instance = CloudmersiveValidateApiClient::TextInputApi.new
37
37
 
38
38
  value = 'value_example' # String | User-facing HTML input.
39
39
 
40
+ opts = {
41
+ allow_cid_scheme: true # BOOLEAN | Optional: Set to true to allow cid: scheme URLs for email message attachments. Default is false.
42
+ }
40
43
 
41
44
  begin
42
45
  #Protect html input from Server-side Request Forgery (SSRF) attacks
43
- result = api_instance.text_input_check_html_ssrf(value)
46
+ result = api_instance.text_input_check_html_ssrf(value, opts)
44
47
  p result
45
48
  rescue CloudmersiveValidateApiClient::ApiError => e
46
49
  puts "Exception when calling TextInputApi->text_input_check_html_ssrf: #{e}"
@@ -52,6 +55,7 @@ end
52
55
  Name | Type | Description | Notes
53
56
  ------------- | ------------- | ------------- | -------------
54
57
  **value** | **String**| User-facing HTML input. |
58
+ **allow_cid_scheme** | **BOOLEAN**| Optional: Set to true to allow cid: scheme URLs for email message attachments. Default is false. | [optional]
55
59
 
56
60
  ### Return type
57
61
 
@@ -23,6 +23,7 @@ module CloudmersiveValidateApiClient
23
23
  # Detects SSRF (Server-side request forgery) attacks and unsafe URL attacks from HTML text input, where attackers can attempt to access unsafe local or network paths in the server environment by injecting them into HTML.
24
24
  # @param value User-facing HTML input.
25
25
  # @param [Hash] opts the optional parameters
26
+ # @option opts [BOOLEAN] :allow_cid_scheme Optional: Set to true to allow cid: scheme URLs for email message attachments. Default is false.
26
27
  # @return [HtmlSsrfDetectionResult]
27
28
  def text_input_check_html_ssrf(value, opts = {})
28
29
  data, _status_code, _headers = text_input_check_html_ssrf_with_http_info(value, opts)
@@ -33,6 +34,7 @@ module CloudmersiveValidateApiClient
33
34
  # Detects SSRF (Server-side request forgery) attacks and unsafe URL attacks from HTML text input, where attackers can attempt to access unsafe local or network paths in the server environment by injecting them into HTML.
34
35
  # @param value User-facing HTML input.
35
36
  # @param [Hash] opts the optional parameters
37
+ # @option opts [BOOLEAN] :allow_cid_scheme Optional: Set to true to allow cid: scheme URLs for email message attachments. Default is false.
36
38
  # @return [Array<(HtmlSsrfDetectionResult, Fixnum, Hash)>] HtmlSsrfDetectionResult data, response status code and response headers
37
39
  def text_input_check_html_ssrf_with_http_info(value, opts = {})
38
40
  if @api_client.config.debugging
@@ -54,6 +56,7 @@ module CloudmersiveValidateApiClient
54
56
  header_params['Accept'] = @api_client.select_header_accept(['application/json', 'text/json', 'application/xml', 'text/xml'])
55
57
  # HTTP header 'Content-Type'
56
58
  header_params['Content-Type'] = @api_client.select_header_content_type(['application/json', 'text/json'])
59
+ header_params[:'allowCidScheme'] = opts[:'allow_cid_scheme'] if !opts[:'allow_cid_scheme'].nil?
57
60
 
58
61
  # form parameters
59
62
  form_params = {}
@@ -11,5 +11,5 @@ Swagger Codegen version: 2.4.14
11
11
  =end
12
12
 
13
13
  module CloudmersiveValidateApiClient
14
- VERSION = '2.2.5'
14
+ VERSION = '2.2.6'
15
15
  end
@@ -37,6 +37,7 @@ describe 'TextInputApi' do
37
37
  # Detects SSRF (Server-side request forgery) attacks and unsafe URL attacks from HTML text input, where attackers can attempt to access unsafe local or network paths in the server environment by injecting them into HTML.
38
38
  # @param value User-facing HTML input.
39
39
  # @param [Hash] opts the optional parameters
40
+ # @option opts [BOOLEAN] :allow_cid_scheme Optional: Set to true to allow cid: scheme URLs for email message attachments. Default is false.
40
41
  # @return [HtmlSsrfDetectionResult]
41
42
  describe 'text_input_check_html_ssrf test' do
42
43
  it 'should work' do
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: cloudmersive-validate-api-client
3
3
  version: !ruby/object:Gem::Version
4
- version: 2.2.5
4
+ version: 2.2.6
5
5
  platform: ruby
6
6
  authors:
7
7
  - Cloudmersive
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2022-05-30 00:00:00.000000000 Z
11
+ date: 2023-06-03 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: typhoeus