cloudmersive-virus-scan-api-client 1.3.4 → 2.0.1

Sign up to get free protection for your applications and to get access to all the features.
Files changed (33) hide show
  1. checksums.yaml +4 -4
  2. metadata +3 -34
  3. data/Gemfile +0 -7
  4. data/README.md +0 -108
  5. data/Rakefile +0 -8
  6. data/cloudmersive-virus-scan-api-client.gemspec +0 -45
  7. data/docs/ScanApi.md +0 -185
  8. data/docs/VirusFound.md +0 -9
  9. data/docs/VirusScanAdvancedResult.md +0 -15
  10. data/docs/VirusScanResult.md +0 -9
  11. data/docs/WebsiteScanRequest.md +0 -8
  12. data/docs/WebsiteScanResult.md +0 -11
  13. data/git_push.sh +0 -55
  14. data/lib/cloudmersive-virus-scan-api-client.rb +0 -45
  15. data/lib/cloudmersive-virus-scan-api-client/api/scan_api.rb +0 -205
  16. data/lib/cloudmersive-virus-scan-api-client/api_client.rb +0 -389
  17. data/lib/cloudmersive-virus-scan-api-client/api_error.rb +0 -38
  18. data/lib/cloudmersive-virus-scan-api-client/configuration.rb +0 -209
  19. data/lib/cloudmersive-virus-scan-api-client/models/virus_found.rb +0 -199
  20. data/lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb +0 -261
  21. data/lib/cloudmersive-virus-scan-api-client/models/virus_scan_result.rb +0 -201
  22. data/lib/cloudmersive-virus-scan-api-client/models/website_scan_request.rb +0 -189
  23. data/lib/cloudmersive-virus-scan-api-client/models/website_scan_result.rb +0 -254
  24. data/lib/cloudmersive-virus-scan-api-client/version.rb +0 -15
  25. data/spec/api/scan_api_spec.rb +0 -76
  26. data/spec/api_client_spec.rb +0 -226
  27. data/spec/configuration_spec.rb +0 -42
  28. data/spec/models/virus_found_spec.rb +0 -48
  29. data/spec/models/virus_scan_advanced_result_spec.rb +0 -84
  30. data/spec/models/virus_scan_result_spec.rb +0 -48
  31. data/spec/models/website_scan_request_spec.rb +0 -42
  32. data/spec/models/website_scan_result_spec.rb +0 -64
  33. data/spec/spec_helper.rb +0 -111
@@ -1,15 +0,0 @@
1
- =begin
2
- #virusapi
3
-
4
- #The Cloudmersive Virus Scan API lets you scan files and content for viruses and identify security issues with content.
5
-
6
- OpenAPI spec version: v1
7
-
8
- Generated by: https://github.com/swagger-api/swagger-codegen.git
9
- Swagger Codegen version: 2.3.1
10
-
11
- =end
12
-
13
- module CloudmersiveVirusScanApiClient
14
- VERSION = "1.3.4"
15
- end
@@ -1,76 +0,0 @@
1
- =begin
2
- #virusapi
3
-
4
- #The Cloudmersive Virus Scan API lets you scan files and content for viruses and identify security issues with content.
5
-
6
- OpenAPI spec version: v1
7
-
8
- Generated by: https://github.com/swagger-api/swagger-codegen.git
9
- Swagger Codegen version: 2.3.1
10
-
11
- =end
12
-
13
- require 'spec_helper'
14
- require 'json'
15
-
16
- # Unit tests for CloudmersiveVirusScanApiClient::ScanApi
17
- # Automatically generated by swagger-codegen (github.com/swagger-api/swagger-codegen)
18
- # Please update as you see appropriate
19
- describe 'ScanApi' do
20
- before do
21
- # run before each test
22
- @instance = CloudmersiveVirusScanApiClient::ScanApi.new
23
- end
24
-
25
- after do
26
- # run after each test
27
- end
28
-
29
- describe 'test an instance of ScanApi' do
30
- it 'should create an instance of ScanApi' do
31
- expect(@instance).to be_instance_of(CloudmersiveVirusScanApiClient::ScanApi)
32
- end
33
- end
34
-
35
- # unit tests for scan_file
36
- # Scan a file for viruses
37
- # Scan files and content for viruses. Leverage continuously updated signatures for millions of threats, and advanced high-performance scanning capabilities. Over 17 million virus and malware signatures. Continuous cloud-based updates. Wide file format support including Office, PDF, HTML, Flash. Zip support including .Zip, .Rar, .DMG, .Tar, and other archive formats. Multi-threat scanning across viruses, malware, trojans, ransomware, and spyware. High-speed in-memory scanning delivers subsecond typical response time.
38
- # @param input_file Input file to perform the operation on.
39
- # @param [Hash] opts the optional parameters
40
- # @return [VirusScanResult]
41
- describe 'scan_file test' do
42
- it "should work" do
43
- # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
44
- end
45
- end
46
-
47
- # unit tests for scan_file_advanced
48
- # Advanced Scan a file for viruses
49
- # Advanced Scan files with 360-degree Content Protection across Viruses and Malware, executables, invalid files, scripts, and even restrictions on accepted file types with complete content verification. Customize threat rules to your needs. Leverage continuously updated signatures for millions of threats, and advanced high-performance scanning capabilities. Over 17 million virus and malware signatures. Continuous cloud-based updates. Block threats beyond viruses including executables, scripts, invalid files, and more. Optionally limit input files to a specific set of file types (e.g. PDF and Word Documents only). Wide file format support including Office, PDF, HTML, Flash. Zip support including .Zip, .Rar, .DMG, .Tar, and other archive formats. Multi-threat scanning across viruses, malware, trojans, ransomware, and spyware. High-speed in-memory scanning delivers subsecond typical response time.
50
- # @param input_file Input file to perform the operation on.
51
- # @param [Hash] opts the optional parameters
52
- # @option opts [BOOLEAN] :allow_executables Set to false to block executable files (program code) from being allowed in the input file. Default is false (recommended).
53
- # @option opts [BOOLEAN] :allow_invalid_files Set to false to block invalid files, such as a PDF file that is not really a valid PDF file, or a Word Document that is not a valid Word Document. Default is false (recommended).
54
- # @option opts [BOOLEAN] :allow_scripts Set to false to block script files, such as a PHP files, Pythong scripts, and other malicious content or security threats that can be embedded in the file. Set to true to allow these file types. Default is false (recommended).
55
- # @option opts [BOOLEAN] :allow_password_protected_files Set to false to block password protected and encrypted files, such as encrypted zip and rar files, and other files that seek to circumvent scanning through passwords. Set to true to allow these file types. Default is false (recommended).
56
- # @option opts [String] :restrict_file_types Specify a restricted set of file formats to allow as clean as a comma-separated list of file formats, such as .pdf,.docx,.png would allow only PDF, PNG and Word document files. All files must pass content verification against this list of file formats, if they do not, then the result will be returned as CleanResult=false. Set restrictFileTypes parameter to null or empty string to disable; default is disabled.
57
- # @return [VirusScanAdvancedResult]
58
- describe 'scan_file_advanced test' do
59
- it "should work" do
60
- # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
61
- end
62
- end
63
-
64
- # unit tests for scan_website
65
- # Scan a website for malicious content and threats
66
- # Operation includes scanning the content of the URL for various types of malicious content and threats, including viruses and threats (including Phishing).
67
- # @param input
68
- # @param [Hash] opts the optional parameters
69
- # @return [WebsiteScanResult]
70
- describe 'scan_website test' do
71
- it "should work" do
72
- # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
73
- end
74
- end
75
-
76
- end
@@ -1,226 +0,0 @@
1
- =begin
2
- #virusapi
3
-
4
- #The Cloudmersive Virus Scan API lets you scan files and content for viruses and identify security issues with content.
5
-
6
- OpenAPI spec version: v1
7
-
8
- Generated by: https://github.com/swagger-api/swagger-codegen.git
9
- Swagger Codegen version: 2.3.1
10
-
11
- =end
12
-
13
- require 'spec_helper'
14
-
15
- describe CloudmersiveVirusScanApiClient::ApiClient do
16
- context 'initialization' do
17
- context 'URL stuff' do
18
- context 'host' do
19
- it 'removes http from host' do
20
- CloudmersiveVirusScanApiClient.configure { |c| c.host = 'http://example.com' }
21
- expect(CloudmersiveVirusScanApiClient::Configuration.default.host).to eq('example.com')
22
- end
23
-
24
- it 'removes https from host' do
25
- CloudmersiveVirusScanApiClient.configure { |c| c.host = 'https://wookiee.com' }
26
- expect(CloudmersiveVirusScanApiClient::ApiClient.default.config.host).to eq('wookiee.com')
27
- end
28
-
29
- it 'removes trailing path from host' do
30
- CloudmersiveVirusScanApiClient.configure { |c| c.host = 'hobo.com/v4' }
31
- expect(CloudmersiveVirusScanApiClient::Configuration.default.host).to eq('hobo.com')
32
- end
33
- end
34
-
35
- context 'base_path' do
36
- it "prepends a slash to base_path" do
37
- CloudmersiveVirusScanApiClient.configure { |c| c.base_path = 'v4/dog' }
38
- expect(CloudmersiveVirusScanApiClient::Configuration.default.base_path).to eq('/v4/dog')
39
- end
40
-
41
- it "doesn't prepend a slash if one is already there" do
42
- CloudmersiveVirusScanApiClient.configure { |c| c.base_path = '/v4/dog' }
43
- expect(CloudmersiveVirusScanApiClient::Configuration.default.base_path).to eq('/v4/dog')
44
- end
45
-
46
- it "ends up as a blank string if nil" do
47
- CloudmersiveVirusScanApiClient.configure { |c| c.base_path = nil }
48
- expect(CloudmersiveVirusScanApiClient::Configuration.default.base_path).to eq('')
49
- end
50
- end
51
- end
52
- end
53
-
54
- describe "params_encoding in #build_request" do
55
- let(:config) { CloudmersiveVirusScanApiClient::Configuration.new }
56
- let(:api_client) { CloudmersiveVirusScanApiClient::ApiClient.new(config) }
57
-
58
- it "defaults to nil" do
59
- expect(CloudmersiveVirusScanApiClient::Configuration.default.params_encoding).to eq(nil)
60
- expect(config.params_encoding).to eq(nil)
61
-
62
- request = api_client.build_request(:get, '/test')
63
- expect(request.options[:params_encoding]).to eq(nil)
64
- end
65
-
66
- it "can be customized" do
67
- config.params_encoding = :multi
68
- request = api_client.build_request(:get, '/test')
69
- expect(request.options[:params_encoding]).to eq(:multi)
70
- end
71
- end
72
-
73
- describe "timeout in #build_request" do
74
- let(:config) { CloudmersiveVirusScanApiClient::Configuration.new }
75
- let(:api_client) { CloudmersiveVirusScanApiClient::ApiClient.new(config) }
76
-
77
- it "defaults to 0" do
78
- expect(CloudmersiveVirusScanApiClient::Configuration.default.timeout).to eq(0)
79
- expect(config.timeout).to eq(0)
80
-
81
- request = api_client.build_request(:get, '/test')
82
- expect(request.options[:timeout]).to eq(0)
83
- end
84
-
85
- it "can be customized" do
86
- config.timeout = 100
87
- request = api_client.build_request(:get, '/test')
88
- expect(request.options[:timeout]).to eq(100)
89
- end
90
- end
91
-
92
- describe "#deserialize" do
93
- it "handles Array<Integer>" do
94
- api_client = CloudmersiveVirusScanApiClient::ApiClient.new
95
- headers = {'Content-Type' => 'application/json'}
96
- response = double('response', headers: headers, body: '[12, 34]')
97
- data = api_client.deserialize(response, 'Array<Integer>')
98
- expect(data).to be_instance_of(Array)
99
- expect(data).to eq([12, 34])
100
- end
101
-
102
- it "handles Array<Array<Integer>>" do
103
- api_client = CloudmersiveVirusScanApiClient::ApiClient.new
104
- headers = {'Content-Type' => 'application/json'}
105
- response = double('response', headers: headers, body: '[[12, 34], [56]]')
106
- data = api_client.deserialize(response, 'Array<Array<Integer>>')
107
- expect(data).to be_instance_of(Array)
108
- expect(data).to eq([[12, 34], [56]])
109
- end
110
-
111
- it "handles Hash<String, String>" do
112
- api_client = CloudmersiveVirusScanApiClient::ApiClient.new
113
- headers = {'Content-Type' => 'application/json'}
114
- response = double('response', headers: headers, body: '{"message": "Hello"}')
115
- data = api_client.deserialize(response, 'Hash<String, String>')
116
- expect(data).to be_instance_of(Hash)
117
- expect(data).to eq({:message => 'Hello'})
118
- end
119
- end
120
-
121
- describe "#object_to_hash" do
122
- it "ignores nils and includes empty arrays" do
123
- # uncomment below to test object_to_hash for model
124
- #api_client = CloudmersiveVirusScanApiClient::ApiClient.new
125
- #_model = CloudmersiveVirusScanApiClient::ModelName.new
126
- # update the model attribute below
127
- #_model.id = 1
128
- # update the expected value (hash) below
129
- #expected = {id: 1, name: '', tags: []}
130
- #expect(api_client.object_to_hash(_model)).to eq(expected)
131
- end
132
- end
133
-
134
- describe "#build_collection_param" do
135
- let(:param) { ['aa', 'bb', 'cc'] }
136
- let(:api_client) { CloudmersiveVirusScanApiClient::ApiClient.new }
137
-
138
- it "works for csv" do
139
- expect(api_client.build_collection_param(param, :csv)).to eq('aa,bb,cc')
140
- end
141
-
142
- it "works for ssv" do
143
- expect(api_client.build_collection_param(param, :ssv)).to eq('aa bb cc')
144
- end
145
-
146
- it "works for tsv" do
147
- expect(api_client.build_collection_param(param, :tsv)).to eq("aa\tbb\tcc")
148
- end
149
-
150
- it "works for pipes" do
151
- expect(api_client.build_collection_param(param, :pipes)).to eq('aa|bb|cc')
152
- end
153
-
154
- it "works for multi" do
155
- expect(api_client.build_collection_param(param, :multi)).to eq(['aa', 'bb', 'cc'])
156
- end
157
-
158
- it "fails for invalid collection format" do
159
- expect(proc { api_client.build_collection_param(param, :INVALID) }).to raise_error(RuntimeError, 'unknown collection format: :INVALID')
160
- end
161
- end
162
-
163
- describe "#json_mime?" do
164
- let(:api_client) { CloudmersiveVirusScanApiClient::ApiClient.new }
165
-
166
- it "works" do
167
- expect(api_client.json_mime?(nil)).to eq false
168
- expect(api_client.json_mime?('')).to eq false
169
-
170
- expect(api_client.json_mime?('application/json')).to eq true
171
- expect(api_client.json_mime?('application/json; charset=UTF8')).to eq true
172
- expect(api_client.json_mime?('APPLICATION/JSON')).to eq true
173
-
174
- expect(api_client.json_mime?('application/xml')).to eq false
175
- expect(api_client.json_mime?('text/plain')).to eq false
176
- expect(api_client.json_mime?('application/jsonp')).to eq false
177
- end
178
- end
179
-
180
- describe "#select_header_accept" do
181
- let(:api_client) { CloudmersiveVirusScanApiClient::ApiClient.new }
182
-
183
- it "works" do
184
- expect(api_client.select_header_accept(nil)).to be_nil
185
- expect(api_client.select_header_accept([])).to be_nil
186
-
187
- expect(api_client.select_header_accept(['application/json'])).to eq('application/json')
188
- expect(api_client.select_header_accept(['application/xml', 'application/json; charset=UTF8'])).to eq('application/json; charset=UTF8')
189
- expect(api_client.select_header_accept(['APPLICATION/JSON', 'text/html'])).to eq('APPLICATION/JSON')
190
-
191
- expect(api_client.select_header_accept(['application/xml'])).to eq('application/xml')
192
- expect(api_client.select_header_accept(['text/html', 'application/xml'])).to eq('text/html,application/xml')
193
- end
194
- end
195
-
196
- describe "#select_header_content_type" do
197
- let(:api_client) { CloudmersiveVirusScanApiClient::ApiClient.new }
198
-
199
- it "works" do
200
- expect(api_client.select_header_content_type(nil)).to eq('application/json')
201
- expect(api_client.select_header_content_type([])).to eq('application/json')
202
-
203
- expect(api_client.select_header_content_type(['application/json'])).to eq('application/json')
204
- expect(api_client.select_header_content_type(['application/xml', 'application/json; charset=UTF8'])).to eq('application/json; charset=UTF8')
205
- expect(api_client.select_header_content_type(['APPLICATION/JSON', 'text/html'])).to eq('APPLICATION/JSON')
206
- expect(api_client.select_header_content_type(['application/xml'])).to eq('application/xml')
207
- expect(api_client.select_header_content_type(['text/plain', 'application/xml'])).to eq('text/plain')
208
- end
209
- end
210
-
211
- describe "#sanitize_filename" do
212
- let(:api_client) { CloudmersiveVirusScanApiClient::ApiClient.new }
213
-
214
- it "works" do
215
- expect(api_client.sanitize_filename('sun')).to eq('sun')
216
- expect(api_client.sanitize_filename('sun.gif')).to eq('sun.gif')
217
- expect(api_client.sanitize_filename('../sun.gif')).to eq('sun.gif')
218
- expect(api_client.sanitize_filename('/var/tmp/sun.gif')).to eq('sun.gif')
219
- expect(api_client.sanitize_filename('./sun.gif')).to eq('sun.gif')
220
- expect(api_client.sanitize_filename('..\sun.gif')).to eq('sun.gif')
221
- expect(api_client.sanitize_filename('\var\tmp\sun.gif')).to eq('sun.gif')
222
- expect(api_client.sanitize_filename('c:\var\tmp\sun.gif')).to eq('sun.gif')
223
- expect(api_client.sanitize_filename('.\sun.gif')).to eq('sun.gif')
224
- end
225
- end
226
- end
@@ -1,42 +0,0 @@
1
- =begin
2
- #virusapi
3
-
4
- #The Cloudmersive Virus Scan API lets you scan files and content for viruses and identify security issues with content.
5
-
6
- OpenAPI spec version: v1
7
-
8
- Generated by: https://github.com/swagger-api/swagger-codegen.git
9
- Swagger Codegen version: 2.3.1
10
-
11
- =end
12
-
13
- require 'spec_helper'
14
-
15
- describe CloudmersiveVirusScanApiClient::Configuration do
16
- let(:config) { CloudmersiveVirusScanApiClient::Configuration.default }
17
-
18
- before(:each) do
19
- # uncomment below to setup host and base_path
20
- #require 'URI'
21
- #uri = URI.parse("https://api.cloudmersive.com")
22
- #CloudmersiveVirusScanApiClient.configure do |c|
23
- # c.host = uri.host
24
- # c.base_path = uri.path
25
- #end
26
- end
27
-
28
- describe '#base_url' do
29
- it 'should have the default value' do
30
- # uncomment below to test default value of the base path
31
- #expect(config.base_url).to eq("https://api.cloudmersive.com")
32
- end
33
-
34
- it 'should remove trailing slashes' do
35
- [nil, '', '/', '//'].each do |base_path|
36
- config.base_path = base_path
37
- # uncomment below to test trailing slashes
38
- #expect(config.base_url).to eq("https://api.cloudmersive.com")
39
- end
40
- end
41
- end
42
- end
@@ -1,48 +0,0 @@
1
- =begin
2
- #virusapi
3
-
4
- #The Cloudmersive Virus Scan API lets you scan files and content for viruses and identify security issues with content.
5
-
6
- OpenAPI spec version: v1
7
-
8
- Generated by: https://github.com/swagger-api/swagger-codegen.git
9
- Swagger Codegen version: 2.3.1
10
-
11
- =end
12
-
13
- require 'spec_helper'
14
- require 'json'
15
- require 'date'
16
-
17
- # Unit tests for CloudmersiveVirusScanApiClient::VirusFound
18
- # Automatically generated by swagger-codegen (github.com/swagger-api/swagger-codegen)
19
- # Please update as you see appropriate
20
- describe 'VirusFound' do
21
- before do
22
- # run before each test
23
- @instance = CloudmersiveVirusScanApiClient::VirusFound.new
24
- end
25
-
26
- after do
27
- # run after each test
28
- end
29
-
30
- describe 'test an instance of VirusFound' do
31
- it 'should create an instance of VirusFound' do
32
- expect(@instance).to be_instance_of(CloudmersiveVirusScanApiClient::VirusFound)
33
- end
34
- end
35
- describe 'test attribute "file_name"' do
36
- it 'should work' do
37
- # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
38
- end
39
- end
40
-
41
- describe 'test attribute "virus_name"' do
42
- it 'should work' do
43
- # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
44
- end
45
- end
46
-
47
- end
48
-
@@ -1,84 +0,0 @@
1
- =begin
2
- #virusapi
3
-
4
- #The Cloudmersive Virus Scan API lets you scan files and content for viruses and identify security issues with content.
5
-
6
- OpenAPI spec version: v1
7
-
8
- Generated by: https://github.com/swagger-api/swagger-codegen.git
9
- Swagger Codegen version: 2.3.1
10
-
11
- =end
12
-
13
- require 'spec_helper'
14
- require 'json'
15
- require 'date'
16
-
17
- # Unit tests for CloudmersiveVirusScanApiClient::VirusScanAdvancedResult
18
- # Automatically generated by swagger-codegen (github.com/swagger-api/swagger-codegen)
19
- # Please update as you see appropriate
20
- describe 'VirusScanAdvancedResult' do
21
- before do
22
- # run before each test
23
- @instance = CloudmersiveVirusScanApiClient::VirusScanAdvancedResult.new
24
- end
25
-
26
- after do
27
- # run after each test
28
- end
29
-
30
- describe 'test an instance of VirusScanAdvancedResult' do
31
- it 'should create an instance of VirusScanAdvancedResult' do
32
- expect(@instance).to be_instance_of(CloudmersiveVirusScanApiClient::VirusScanAdvancedResult)
33
- end
34
- end
35
- describe 'test attribute "clean_result"' do
36
- it 'should work' do
37
- # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
38
- end
39
- end
40
-
41
- describe 'test attribute "contains_executable"' do
42
- it 'should work' do
43
- # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
44
- end
45
- end
46
-
47
- describe 'test attribute "contains_invalid_file"' do
48
- it 'should work' do
49
- # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
50
- end
51
- end
52
-
53
- describe 'test attribute "contains_script"' do
54
- it 'should work' do
55
- # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
56
- end
57
- end
58
-
59
- describe 'test attribute "contains_password_protected_file"' do
60
- it 'should work' do
61
- # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
62
- end
63
- end
64
-
65
- describe 'test attribute "contains_restricted_file_format"' do
66
- it 'should work' do
67
- # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
68
- end
69
- end
70
-
71
- describe 'test attribute "verified_file_format"' do
72
- it 'should work' do
73
- # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
74
- end
75
- end
76
-
77
- describe 'test attribute "found_viruses"' do
78
- it 'should work' do
79
- # assertion here. ref: https://www.relishapp.com/rspec/rspec-expectations/docs/built-in-matchers
80
- end
81
- end
82
-
83
- end
84
-