cloudmersive-virus-scan-api-client 2.0.1 → 2.0.2
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/Gemfile +7 -0
- data/README.md +108 -0
- data/Rakefile +8 -0
- data/cloudmersive-virus-scan-api-client.gemspec +45 -0
- data/docs/ScanApi.md +185 -0
- data/docs/VirusFound.md +9 -0
- data/docs/VirusScanAdvancedResult.md +15 -0
- data/docs/VirusScanResult.md +9 -0
- data/docs/WebsiteScanRequest.md +8 -0
- data/docs/WebsiteScanResult.md +11 -0
- data/git_push.sh +55 -0
- data/lib/cloudmersive-virus-scan-api-client.rb +45 -0
- data/lib/cloudmersive-virus-scan-api-client/api/scan_api.rb +202 -0
- data/lib/cloudmersive-virus-scan-api-client/api_client.rb +391 -0
- data/lib/cloudmersive-virus-scan-api-client/api_error.rb +38 -0
- data/lib/cloudmersive-virus-scan-api-client/configuration.rb +209 -0
- data/lib/cloudmersive-virus-scan-api-client/models/virus_found.rb +196 -0
- data/lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb +258 -0
- data/lib/cloudmersive-virus-scan-api-client/models/virus_scan_result.rb +198 -0
- data/lib/cloudmersive-virus-scan-api-client/models/website_scan_request.rb +186 -0
- data/lib/cloudmersive-virus-scan-api-client/models/website_scan_result.rb +252 -0
- data/lib/cloudmersive-virus-scan-api-client/version.rb +15 -0
- data/spec/api/scan_api_spec.rb +76 -0
- data/spec/api_client_spec.rb +243 -0
- data/spec/configuration_spec.rb +42 -0
- data/spec/models/virus_found_spec.rb +47 -0
- data/spec/models/virus_scan_advanced_result_spec.rb +83 -0
- data/spec/models/virus_scan_result_spec.rb +47 -0
- data/spec/models/website_scan_request_spec.rb +41 -0
- data/spec/models/website_scan_result_spec.rb +63 -0
- data/spec/spec_helper.rb +111 -0
- metadata +34 -3
@@ -0,0 +1,45 @@
|
|
1
|
+
=begin
|
2
|
+
#virusapi
|
3
|
+
|
4
|
+
#The Cloudmersive Virus Scan API lets you scan files and content for viruses and identify security issues with content.
|
5
|
+
|
6
|
+
OpenAPI spec version: v1
|
7
|
+
|
8
|
+
Generated by: https://github.com/swagger-api/swagger-codegen.git
|
9
|
+
Swagger Codegen version: 2.4.14
|
10
|
+
|
11
|
+
=end
|
12
|
+
|
13
|
+
# Common files
|
14
|
+
require 'cloudmersive-virus-scan-api-client/api_client'
|
15
|
+
require 'cloudmersive-virus-scan-api-client/api_error'
|
16
|
+
require 'cloudmersive-virus-scan-api-client/version'
|
17
|
+
require 'cloudmersive-virus-scan-api-client/configuration'
|
18
|
+
|
19
|
+
# Models
|
20
|
+
require 'cloudmersive-virus-scan-api-client/models/virus_found'
|
21
|
+
require 'cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result'
|
22
|
+
require 'cloudmersive-virus-scan-api-client/models/virus_scan_result'
|
23
|
+
require 'cloudmersive-virus-scan-api-client/models/website_scan_request'
|
24
|
+
require 'cloudmersive-virus-scan-api-client/models/website_scan_result'
|
25
|
+
|
26
|
+
# APIs
|
27
|
+
require 'cloudmersive-virus-scan-api-client/api/scan_api'
|
28
|
+
|
29
|
+
module CloudmersiveVirusScanApiClient
|
30
|
+
class << self
|
31
|
+
# Customize default settings for the SDK using block.
|
32
|
+
# CloudmersiveVirusScanApiClient.configure do |config|
|
33
|
+
# config.username = "xxx"
|
34
|
+
# config.password = "xxx"
|
35
|
+
# end
|
36
|
+
# If no block given, return the default Configuration object.
|
37
|
+
def configure
|
38
|
+
if block_given?
|
39
|
+
yield(Configuration.default)
|
40
|
+
else
|
41
|
+
Configuration.default
|
42
|
+
end
|
43
|
+
end
|
44
|
+
end
|
45
|
+
end
|
@@ -0,0 +1,202 @@
|
|
1
|
+
=begin
|
2
|
+
#virusapi
|
3
|
+
|
4
|
+
#The Cloudmersive Virus Scan API lets you scan files and content for viruses and identify security issues with content.
|
5
|
+
|
6
|
+
OpenAPI spec version: v1
|
7
|
+
|
8
|
+
Generated by: https://github.com/swagger-api/swagger-codegen.git
|
9
|
+
Swagger Codegen version: 2.4.14
|
10
|
+
|
11
|
+
=end
|
12
|
+
|
13
|
+
require 'uri'
|
14
|
+
|
15
|
+
module CloudmersiveVirusScanApiClient
|
16
|
+
class ScanApi
|
17
|
+
attr_accessor :api_client
|
18
|
+
|
19
|
+
def initialize(api_client = ApiClient.default)
|
20
|
+
@api_client = api_client
|
21
|
+
end
|
22
|
+
# Scan a file for viruses
|
23
|
+
# Scan files and content for viruses. Leverage continuously updated signatures for millions of threats, and advanced high-performance scanning capabilities. Over 17 million virus and malware signatures. Continuous cloud-based updates. Wide file format support including Office, PDF, HTML, Flash. Zip support including .Zip, .Rar, .DMG, .Tar, and other archive formats. Multi-threat scanning across viruses, malware, trojans, ransomware, and spyware. High-speed in-memory scanning delivers subsecond typical response time.
|
24
|
+
# @param input_file Input file to perform the operation on.
|
25
|
+
# @param [Hash] opts the optional parameters
|
26
|
+
# @return [VirusScanResult]
|
27
|
+
def scan_file(input_file, opts = {})
|
28
|
+
data, _status_code, _headers = scan_file_with_http_info(input_file, opts)
|
29
|
+
data
|
30
|
+
end
|
31
|
+
|
32
|
+
# Scan a file for viruses
|
33
|
+
# Scan files and content for viruses. Leverage continuously updated signatures for millions of threats, and advanced high-performance scanning capabilities. Over 17 million virus and malware signatures. Continuous cloud-based updates. Wide file format support including Office, PDF, HTML, Flash. Zip support including .Zip, .Rar, .DMG, .Tar, and other archive formats. Multi-threat scanning across viruses, malware, trojans, ransomware, and spyware. High-speed in-memory scanning delivers subsecond typical response time.
|
34
|
+
# @param input_file Input file to perform the operation on.
|
35
|
+
# @param [Hash] opts the optional parameters
|
36
|
+
# @return [Array<(VirusScanResult, Fixnum, Hash)>] VirusScanResult data, response status code and response headers
|
37
|
+
def scan_file_with_http_info(input_file, opts = {})
|
38
|
+
if @api_client.config.debugging
|
39
|
+
@api_client.config.logger.debug 'Calling API: ScanApi.scan_file ...'
|
40
|
+
end
|
41
|
+
# verify the required parameter 'input_file' is set
|
42
|
+
if @api_client.config.client_side_validation && input_file.nil?
|
43
|
+
fail ArgumentError, "Missing the required parameter 'input_file' when calling ScanApi.scan_file"
|
44
|
+
end
|
45
|
+
# resource path
|
46
|
+
local_var_path = '/virus/scan/file'
|
47
|
+
|
48
|
+
# query parameters
|
49
|
+
query_params = {}
|
50
|
+
|
51
|
+
# header parameters
|
52
|
+
header_params = {}
|
53
|
+
# HTTP header 'Accept' (if needed)
|
54
|
+
header_params['Accept'] = @api_client.select_header_accept(['application/json', 'text/json', 'application/xml', 'text/xml'])
|
55
|
+
# HTTP header 'Content-Type'
|
56
|
+
header_params['Content-Type'] = @api_client.select_header_content_type(['multipart/form-data'])
|
57
|
+
|
58
|
+
# form parameters
|
59
|
+
form_params = {}
|
60
|
+
form_params['inputFile'] = input_file
|
61
|
+
|
62
|
+
# http body (model)
|
63
|
+
post_body = nil
|
64
|
+
auth_names = ['Apikey']
|
65
|
+
data, status_code, headers = @api_client.call_api(:POST, local_var_path,
|
66
|
+
:header_params => header_params,
|
67
|
+
:query_params => query_params,
|
68
|
+
:form_params => form_params,
|
69
|
+
:body => post_body,
|
70
|
+
:auth_names => auth_names,
|
71
|
+
:return_type => 'VirusScanResult')
|
72
|
+
if @api_client.config.debugging
|
73
|
+
@api_client.config.logger.debug "API called: ScanApi#scan_file\nData: #{data.inspect}\nStatus code: #{status_code}\nHeaders: #{headers}"
|
74
|
+
end
|
75
|
+
return data, status_code, headers
|
76
|
+
end
|
77
|
+
# Advanced Scan a file for viruses
|
78
|
+
# Advanced Scan files with 360-degree Content Protection across Viruses and Malware, executables, invalid files, scripts, and even restrictions on accepted file types with complete content verification. Customize threat rules to your needs. Leverage continuously updated signatures for millions of threats, and advanced high-performance scanning capabilities. Over 17 million virus and malware signatures. Continuous cloud-based updates. Block threats beyond viruses including executables, scripts, invalid files, and more. Optionally limit input files to a specific set of file types (e.g. PDF and Word Documents only). Wide file format support including Office, PDF, HTML, Flash. Zip support including .Zip, .Rar, .DMG, .Tar, and other archive formats. Multi-threat scanning across viruses, malware, trojans, ransomware, and spyware. High-speed in-memory scanning delivers subsecond typical response time.
|
79
|
+
# @param input_file Input file to perform the operation on.
|
80
|
+
# @param [Hash] opts the optional parameters
|
81
|
+
# @option opts [BOOLEAN] :allow_executables Set to false to block executable files (program code) from being allowed in the input file. Default is false (recommended).
|
82
|
+
# @option opts [BOOLEAN] :allow_invalid_files Set to false to block invalid files, such as a PDF file that is not really a valid PDF file, or a Word Document that is not a valid Word Document. Default is false (recommended).
|
83
|
+
# @option opts [BOOLEAN] :allow_scripts Set to false to block script files, such as a PHP files, Pythong scripts, and other malicious content or security threats that can be embedded in the file. Set to true to allow these file types. Default is false (recommended).
|
84
|
+
# @option opts [BOOLEAN] :allow_password_protected_files Set to false to block password protected and encrypted files, such as encrypted zip and rar files, and other files that seek to circumvent scanning through passwords. Set to true to allow these file types. Default is false (recommended).
|
85
|
+
# @option opts [String] :restrict_file_types Specify a restricted set of file formats to allow as clean as a comma-separated list of file formats, such as .pdf,.docx,.png would allow only PDF, PNG and Word document files. All files must pass content verification against this list of file formats, if they do not, then the result will be returned as CleanResult=false. Set restrictFileTypes parameter to null or empty string to disable; default is disabled.
|
86
|
+
# @return [VirusScanAdvancedResult]
|
87
|
+
def scan_file_advanced(input_file, opts = {})
|
88
|
+
data, _status_code, _headers = scan_file_advanced_with_http_info(input_file, opts)
|
89
|
+
data
|
90
|
+
end
|
91
|
+
|
92
|
+
# Advanced Scan a file for viruses
|
93
|
+
# Advanced Scan files with 360-degree Content Protection across Viruses and Malware, executables, invalid files, scripts, and even restrictions on accepted file types with complete content verification. Customize threat rules to your needs. Leverage continuously updated signatures for millions of threats, and advanced high-performance scanning capabilities. Over 17 million virus and malware signatures. Continuous cloud-based updates. Block threats beyond viruses including executables, scripts, invalid files, and more. Optionally limit input files to a specific set of file types (e.g. PDF and Word Documents only). Wide file format support including Office, PDF, HTML, Flash. Zip support including .Zip, .Rar, .DMG, .Tar, and other archive formats. Multi-threat scanning across viruses, malware, trojans, ransomware, and spyware. High-speed in-memory scanning delivers subsecond typical response time.
|
94
|
+
# @param input_file Input file to perform the operation on.
|
95
|
+
# @param [Hash] opts the optional parameters
|
96
|
+
# @option opts [BOOLEAN] :allow_executables Set to false to block executable files (program code) from being allowed in the input file. Default is false (recommended).
|
97
|
+
# @option opts [BOOLEAN] :allow_invalid_files Set to false to block invalid files, such as a PDF file that is not really a valid PDF file, or a Word Document that is not a valid Word Document. Default is false (recommended).
|
98
|
+
# @option opts [BOOLEAN] :allow_scripts Set to false to block script files, such as a PHP files, Pythong scripts, and other malicious content or security threats that can be embedded in the file. Set to true to allow these file types. Default is false (recommended).
|
99
|
+
# @option opts [BOOLEAN] :allow_password_protected_files Set to false to block password protected and encrypted files, such as encrypted zip and rar files, and other files that seek to circumvent scanning through passwords. Set to true to allow these file types. Default is false (recommended).
|
100
|
+
# @option opts [String] :restrict_file_types Specify a restricted set of file formats to allow as clean as a comma-separated list of file formats, such as .pdf,.docx,.png would allow only PDF, PNG and Word document files. All files must pass content verification against this list of file formats, if they do not, then the result will be returned as CleanResult=false. Set restrictFileTypes parameter to null or empty string to disable; default is disabled.
|
101
|
+
# @return [Array<(VirusScanAdvancedResult, Fixnum, Hash)>] VirusScanAdvancedResult data, response status code and response headers
|
102
|
+
def scan_file_advanced_with_http_info(input_file, opts = {})
|
103
|
+
if @api_client.config.debugging
|
104
|
+
@api_client.config.logger.debug 'Calling API: ScanApi.scan_file_advanced ...'
|
105
|
+
end
|
106
|
+
# verify the required parameter 'input_file' is set
|
107
|
+
if @api_client.config.client_side_validation && input_file.nil?
|
108
|
+
fail ArgumentError, "Missing the required parameter 'input_file' when calling ScanApi.scan_file_advanced"
|
109
|
+
end
|
110
|
+
# resource path
|
111
|
+
local_var_path = '/virus/scan/file/advanced'
|
112
|
+
|
113
|
+
# query parameters
|
114
|
+
query_params = {}
|
115
|
+
|
116
|
+
# header parameters
|
117
|
+
header_params = {}
|
118
|
+
# HTTP header 'Accept' (if needed)
|
119
|
+
header_params['Accept'] = @api_client.select_header_accept(['application/json', 'text/json', 'application/xml', 'text/xml'])
|
120
|
+
# HTTP header 'Content-Type'
|
121
|
+
header_params['Content-Type'] = @api_client.select_header_content_type(['multipart/form-data'])
|
122
|
+
header_params[:'allowExecutables'] = opts[:'allow_executables'] if !opts[:'allow_executables'].nil?
|
123
|
+
header_params[:'allowInvalidFiles'] = opts[:'allow_invalid_files'] if !opts[:'allow_invalid_files'].nil?
|
124
|
+
header_params[:'allowScripts'] = opts[:'allow_scripts'] if !opts[:'allow_scripts'].nil?
|
125
|
+
header_params[:'allowPasswordProtectedFiles'] = opts[:'allow_password_protected_files'] if !opts[:'allow_password_protected_files'].nil?
|
126
|
+
header_params[:'restrictFileTypes'] = opts[:'restrict_file_types'] if !opts[:'restrict_file_types'].nil?
|
127
|
+
|
128
|
+
# form parameters
|
129
|
+
form_params = {}
|
130
|
+
form_params['inputFile'] = input_file
|
131
|
+
|
132
|
+
# http body (model)
|
133
|
+
post_body = nil
|
134
|
+
auth_names = ['Apikey']
|
135
|
+
data, status_code, headers = @api_client.call_api(:POST, local_var_path,
|
136
|
+
:header_params => header_params,
|
137
|
+
:query_params => query_params,
|
138
|
+
:form_params => form_params,
|
139
|
+
:body => post_body,
|
140
|
+
:auth_names => auth_names,
|
141
|
+
:return_type => 'VirusScanAdvancedResult')
|
142
|
+
if @api_client.config.debugging
|
143
|
+
@api_client.config.logger.debug "API called: ScanApi#scan_file_advanced\nData: #{data.inspect}\nStatus code: #{status_code}\nHeaders: #{headers}"
|
144
|
+
end
|
145
|
+
return data, status_code, headers
|
146
|
+
end
|
147
|
+
# Scan a website for malicious content and threats
|
148
|
+
# Operation includes scanning the content of the URL for various types of malicious content and threats, including viruses and threats (including Phishing).
|
149
|
+
# @param input
|
150
|
+
# @param [Hash] opts the optional parameters
|
151
|
+
# @return [WebsiteScanResult]
|
152
|
+
def scan_website(input, opts = {})
|
153
|
+
data, _status_code, _headers = scan_website_with_http_info(input, opts)
|
154
|
+
data
|
155
|
+
end
|
156
|
+
|
157
|
+
# Scan a website for malicious content and threats
|
158
|
+
# Operation includes scanning the content of the URL for various types of malicious content and threats, including viruses and threats (including Phishing).
|
159
|
+
# @param input
|
160
|
+
# @param [Hash] opts the optional parameters
|
161
|
+
# @return [Array<(WebsiteScanResult, Fixnum, Hash)>] WebsiteScanResult data, response status code and response headers
|
162
|
+
def scan_website_with_http_info(input, opts = {})
|
163
|
+
if @api_client.config.debugging
|
164
|
+
@api_client.config.logger.debug 'Calling API: ScanApi.scan_website ...'
|
165
|
+
end
|
166
|
+
# verify the required parameter 'input' is set
|
167
|
+
if @api_client.config.client_side_validation && input.nil?
|
168
|
+
fail ArgumentError, "Missing the required parameter 'input' when calling ScanApi.scan_website"
|
169
|
+
end
|
170
|
+
# resource path
|
171
|
+
local_var_path = '/virus/scan/website'
|
172
|
+
|
173
|
+
# query parameters
|
174
|
+
query_params = {}
|
175
|
+
|
176
|
+
# header parameters
|
177
|
+
header_params = {}
|
178
|
+
# HTTP header 'Accept' (if needed)
|
179
|
+
header_params['Accept'] = @api_client.select_header_accept(['application/json', 'text/json', 'application/xml', 'text/xml'])
|
180
|
+
# HTTP header 'Content-Type'
|
181
|
+
header_params['Content-Type'] = @api_client.select_header_content_type(['application/json', 'text/json', 'application/xml', 'text/xml', 'application/x-www-form-urlencoded'])
|
182
|
+
|
183
|
+
# form parameters
|
184
|
+
form_params = {}
|
185
|
+
|
186
|
+
# http body (model)
|
187
|
+
post_body = @api_client.object_to_http_body(input)
|
188
|
+
auth_names = ['Apikey']
|
189
|
+
data, status_code, headers = @api_client.call_api(:POST, local_var_path,
|
190
|
+
:header_params => header_params,
|
191
|
+
:query_params => query_params,
|
192
|
+
:form_params => form_params,
|
193
|
+
:body => post_body,
|
194
|
+
:auth_names => auth_names,
|
195
|
+
:return_type => 'WebsiteScanResult')
|
196
|
+
if @api_client.config.debugging
|
197
|
+
@api_client.config.logger.debug "API called: ScanApi#scan_website\nData: #{data.inspect}\nStatus code: #{status_code}\nHeaders: #{headers}"
|
198
|
+
end
|
199
|
+
return data, status_code, headers
|
200
|
+
end
|
201
|
+
end
|
202
|
+
end
|
@@ -0,0 +1,391 @@
|
|
1
|
+
=begin
|
2
|
+
#virusapi
|
3
|
+
|
4
|
+
#The Cloudmersive Virus Scan API lets you scan files and content for viruses and identify security issues with content.
|
5
|
+
|
6
|
+
OpenAPI spec version: v1
|
7
|
+
|
8
|
+
Generated by: https://github.com/swagger-api/swagger-codegen.git
|
9
|
+
Swagger Codegen version: 2.4.14
|
10
|
+
|
11
|
+
=end
|
12
|
+
|
13
|
+
require 'date'
|
14
|
+
require 'json'
|
15
|
+
require 'logger'
|
16
|
+
require 'tempfile'
|
17
|
+
require 'typhoeus'
|
18
|
+
require 'uri'
|
19
|
+
|
20
|
+
module CloudmersiveVirusScanApiClient
|
21
|
+
class ApiClient
|
22
|
+
# The Configuration object holding settings to be used in the API client.
|
23
|
+
attr_accessor :config
|
24
|
+
|
25
|
+
# Defines the headers to be used in HTTP requests of all API calls by default.
|
26
|
+
#
|
27
|
+
# @return [Hash]
|
28
|
+
attr_accessor :default_headers
|
29
|
+
|
30
|
+
# Initializes the ApiClient
|
31
|
+
# @option config [Configuration] Configuration for initializing the object, default to Configuration.default
|
32
|
+
def initialize(config = Configuration.default)
|
33
|
+
@config = config
|
34
|
+
@user_agent = "Swagger-Codegen/#{VERSION}/ruby"
|
35
|
+
@default_headers = {
|
36
|
+
'Content-Type' => 'application/json',
|
37
|
+
'User-Agent' => @user_agent
|
38
|
+
}
|
39
|
+
end
|
40
|
+
|
41
|
+
def self.default
|
42
|
+
@@default ||= ApiClient.new
|
43
|
+
end
|
44
|
+
|
45
|
+
# Call an API with given options.
|
46
|
+
#
|
47
|
+
# @return [Array<(Object, Fixnum, Hash)>] an array of 3 elements:
|
48
|
+
# the data deserialized from response body (could be nil), response status code and response headers.
|
49
|
+
def call_api(http_method, path, opts = {})
|
50
|
+
request = build_request(http_method, path, opts)
|
51
|
+
response = request.run
|
52
|
+
|
53
|
+
if @config.debugging
|
54
|
+
@config.logger.debug "HTTP response body ~BEGIN~\n#{response.body}\n~END~\n"
|
55
|
+
end
|
56
|
+
|
57
|
+
unless response.success?
|
58
|
+
if response.timed_out?
|
59
|
+
fail ApiError.new('Connection timed out')
|
60
|
+
elsif response.code == 0
|
61
|
+
# Errors from libcurl will be made visible here
|
62
|
+
fail ApiError.new(:code => 0,
|
63
|
+
:message => response.return_message)
|
64
|
+
else
|
65
|
+
fail ApiError.new(:code => response.code,
|
66
|
+
:response_headers => response.headers,
|
67
|
+
:response_body => response.body),
|
68
|
+
response.status_message
|
69
|
+
end
|
70
|
+
end
|
71
|
+
|
72
|
+
if opts[:return_type]
|
73
|
+
data = deserialize(response, opts[:return_type])
|
74
|
+
else
|
75
|
+
data = nil
|
76
|
+
end
|
77
|
+
return data, response.code, response.headers
|
78
|
+
end
|
79
|
+
|
80
|
+
# Builds the HTTP request
|
81
|
+
#
|
82
|
+
# @param [String] http_method HTTP method/verb (e.g. POST)
|
83
|
+
# @param [String] path URL path (e.g. /account/new)
|
84
|
+
# @option opts [Hash] :header_params Header parameters
|
85
|
+
# @option opts [Hash] :query_params Query parameters
|
86
|
+
# @option opts [Hash] :form_params Query parameters
|
87
|
+
# @option opts [Object] :body HTTP body (JSON/XML)
|
88
|
+
# @return [Typhoeus::Request] A Typhoeus Request
|
89
|
+
def build_request(http_method, path, opts = {})
|
90
|
+
url = build_request_url(path)
|
91
|
+
http_method = http_method.to_sym.downcase
|
92
|
+
|
93
|
+
header_params = @default_headers.merge(opts[:header_params] || {})
|
94
|
+
query_params = opts[:query_params] || {}
|
95
|
+
form_params = opts[:form_params] || {}
|
96
|
+
|
97
|
+
update_params_for_auth! header_params, query_params, opts[:auth_names]
|
98
|
+
|
99
|
+
# set ssl_verifyhosts option based on @config.verify_ssl_host (true/false)
|
100
|
+
_verify_ssl_host = @config.verify_ssl_host ? 2 : 0
|
101
|
+
|
102
|
+
req_opts = {
|
103
|
+
:method => http_method,
|
104
|
+
:headers => header_params,
|
105
|
+
:params => query_params,
|
106
|
+
:params_encoding => @config.params_encoding,
|
107
|
+
:timeout => @config.timeout,
|
108
|
+
:ssl_verifypeer => @config.verify_ssl,
|
109
|
+
:ssl_verifyhost => _verify_ssl_host,
|
110
|
+
:sslcert => @config.cert_file,
|
111
|
+
:sslkey => @config.key_file,
|
112
|
+
:verbose => @config.debugging
|
113
|
+
}
|
114
|
+
|
115
|
+
req_opts.merge!(multipart: true) if header_params['Content-Type'].start_with? "multipart/"
|
116
|
+
|
117
|
+
# set custom cert, if provided
|
118
|
+
req_opts[:cainfo] = @config.ssl_ca_cert if @config.ssl_ca_cert
|
119
|
+
|
120
|
+
if [:post, :patch, :put, :delete].include?(http_method)
|
121
|
+
req_body = build_request_body(header_params, form_params, opts[:body])
|
122
|
+
req_opts.update :body => req_body
|
123
|
+
if @config.debugging
|
124
|
+
@config.logger.debug "HTTP request body param ~BEGIN~\n#{req_body}\n~END~\n"
|
125
|
+
end
|
126
|
+
end
|
127
|
+
|
128
|
+
request = Typhoeus::Request.new(url, req_opts)
|
129
|
+
download_file(request) if opts[:return_type] == 'File'
|
130
|
+
request
|
131
|
+
end
|
132
|
+
|
133
|
+
# Check if the given MIME is a JSON MIME.
|
134
|
+
# JSON MIME examples:
|
135
|
+
# application/json
|
136
|
+
# application/json; charset=UTF8
|
137
|
+
# APPLICATION/JSON
|
138
|
+
# */*
|
139
|
+
# @param [String] mime MIME
|
140
|
+
# @return [Boolean] True if the MIME is application/json
|
141
|
+
def json_mime?(mime)
|
142
|
+
(mime == '*/*') || !(mime =~ /Application\/.*json(?!p)(;.*)?/i).nil?
|
143
|
+
end
|
144
|
+
|
145
|
+
# Deserialize the response to the given return type.
|
146
|
+
#
|
147
|
+
# @param [Response] response HTTP response
|
148
|
+
# @param [String] return_type some examples: "User", "Array[User]", "Hash[String,Integer]"
|
149
|
+
def deserialize(response, return_type)
|
150
|
+
body = response.body
|
151
|
+
|
152
|
+
# handle file downloading - return the File instance processed in request callbacks
|
153
|
+
# note that response body is empty when the file is written in chunks in request on_body callback
|
154
|
+
return @tempfile if return_type == 'File'
|
155
|
+
|
156
|
+
return nil if body.nil? || body.empty?
|
157
|
+
|
158
|
+
# return response body directly for String return type
|
159
|
+
return body if return_type == 'String'
|
160
|
+
|
161
|
+
# ensuring a default content type
|
162
|
+
content_type = response.headers['Content-Type'] || 'application/json'
|
163
|
+
|
164
|
+
fail "Content-Type is not supported: #{content_type}" unless json_mime?(content_type)
|
165
|
+
|
166
|
+
begin
|
167
|
+
data = JSON.parse("[#{body}]", :symbolize_names => true)[0]
|
168
|
+
rescue JSON::ParserError => e
|
169
|
+
if %w(String Date DateTime).include?(return_type)
|
170
|
+
data = body
|
171
|
+
else
|
172
|
+
raise e
|
173
|
+
end
|
174
|
+
end
|
175
|
+
|
176
|
+
convert_to_type data, return_type
|
177
|
+
end
|
178
|
+
|
179
|
+
# Convert data to the given return type.
|
180
|
+
# @param [Object] data Data to be converted
|
181
|
+
# @param [String] return_type Return type
|
182
|
+
# @return [Mixed] Data in a particular type
|
183
|
+
def convert_to_type(data, return_type)
|
184
|
+
return nil if data.nil?
|
185
|
+
case return_type
|
186
|
+
when 'String'
|
187
|
+
data.to_s
|
188
|
+
when 'Integer'
|
189
|
+
data.to_i
|
190
|
+
when 'Float'
|
191
|
+
data.to_f
|
192
|
+
when 'BOOLEAN'
|
193
|
+
data == true
|
194
|
+
when 'DateTime'
|
195
|
+
# parse date time (expecting ISO 8601 format)
|
196
|
+
DateTime.parse data
|
197
|
+
when 'Date'
|
198
|
+
# parse date time (expecting ISO 8601 format)
|
199
|
+
Date.parse data
|
200
|
+
when 'Object'
|
201
|
+
# generic object (usually a Hash), return directly
|
202
|
+
data
|
203
|
+
when /\AArray<(.+)>\z/
|
204
|
+
# e.g. Array<Pet>
|
205
|
+
sub_type = $1
|
206
|
+
data.map { |item| convert_to_type(item, sub_type) }
|
207
|
+
when /\AHash\<String, (.+)\>\z/
|
208
|
+
# e.g. Hash<String, Integer>
|
209
|
+
sub_type = $1
|
210
|
+
{}.tap do |hash|
|
211
|
+
data.each { |k, v| hash[k] = convert_to_type(v, sub_type) }
|
212
|
+
end
|
213
|
+
else
|
214
|
+
# models, e.g. Pet
|
215
|
+
CloudmersiveVirusScanApiClient.const_get(return_type).new.tap do |model|
|
216
|
+
model.build_from_hash data
|
217
|
+
end
|
218
|
+
end
|
219
|
+
end
|
220
|
+
|
221
|
+
# Save response body into a file in (the defined) temporary folder, using the filename
|
222
|
+
# from the "Content-Disposition" header if provided, otherwise a random filename.
|
223
|
+
# The response body is written to the file in chunks in order to handle files which
|
224
|
+
# size is larger than maximum Ruby String or even larger than the maximum memory a Ruby
|
225
|
+
# process can use.
|
226
|
+
#
|
227
|
+
# @see Configuration#temp_folder_path
|
228
|
+
def download_file(request)
|
229
|
+
tempfile = nil
|
230
|
+
encoding = nil
|
231
|
+
request.on_headers do |response|
|
232
|
+
content_disposition = response.headers['Content-Disposition']
|
233
|
+
if content_disposition && content_disposition =~ /filename=/i
|
234
|
+
filename = content_disposition[/filename=['"]?([^'"\s]+)['"]?/, 1]
|
235
|
+
prefix = sanitize_filename(filename)
|
236
|
+
else
|
237
|
+
prefix = 'download-'
|
238
|
+
end
|
239
|
+
prefix = prefix + '-' unless prefix.end_with?('-')
|
240
|
+
encoding = response.body.encoding
|
241
|
+
tempfile = Tempfile.open(prefix, @config.temp_folder_path, encoding: encoding)
|
242
|
+
@tempfile = tempfile
|
243
|
+
end
|
244
|
+
request.on_body do |chunk|
|
245
|
+
chunk.force_encoding(encoding)
|
246
|
+
tempfile.write(chunk)
|
247
|
+
end
|
248
|
+
request.on_complete do |response|
|
249
|
+
tempfile.close
|
250
|
+
@config.logger.info "Temp file written to #{tempfile.path}, please copy the file to a proper folder "\
|
251
|
+
"with e.g. `FileUtils.cp(tempfile.path, '/new/file/path')` otherwise the temp file "\
|
252
|
+
"will be deleted automatically with GC. It's also recommended to delete the temp file "\
|
253
|
+
"explicitly with `tempfile.delete`"
|
254
|
+
end
|
255
|
+
end
|
256
|
+
|
257
|
+
# Sanitize filename by removing path.
|
258
|
+
# e.g. ../../sun.gif becomes sun.gif
|
259
|
+
#
|
260
|
+
# @param [String] filename the filename to be sanitized
|
261
|
+
# @return [String] the sanitized filename
|
262
|
+
def sanitize_filename(filename)
|
263
|
+
filename.gsub(/.*[\/\\]/, '')
|
264
|
+
end
|
265
|
+
|
266
|
+
def build_request_url(path)
|
267
|
+
# Add leading and trailing slashes to path
|
268
|
+
path = "/#{path}".gsub(/\/+/, '/')
|
269
|
+
URI.encode(@config.base_url + path)
|
270
|
+
end
|
271
|
+
|
272
|
+
# Builds the HTTP request body
|
273
|
+
#
|
274
|
+
# @param [Hash] header_params Header parameters
|
275
|
+
# @param [Hash] form_params Query parameters
|
276
|
+
# @param [Object] body HTTP body (JSON/XML)
|
277
|
+
# @return [String] HTTP body data in the form of string
|
278
|
+
def build_request_body(header_params, form_params, body)
|
279
|
+
# http form
|
280
|
+
if header_params['Content-Type'] == 'application/x-www-form-urlencoded' ||
|
281
|
+
header_params['Content-Type'] == 'multipart/form-data'
|
282
|
+
data = {}
|
283
|
+
form_params.each do |key, value|
|
284
|
+
case value
|
285
|
+
when ::File, ::Array, nil
|
286
|
+
# let typhoeus handle File, Array and nil parameters
|
287
|
+
data[key] = value
|
288
|
+
else
|
289
|
+
data[key] = value.to_s
|
290
|
+
end
|
291
|
+
end
|
292
|
+
elsif body
|
293
|
+
data = body.is_a?(String) ? body : body.to_json
|
294
|
+
else
|
295
|
+
data = nil
|
296
|
+
end
|
297
|
+
data
|
298
|
+
end
|
299
|
+
|
300
|
+
# Update hearder and query params based on authentication settings.
|
301
|
+
#
|
302
|
+
# @param [Hash] header_params Header parameters
|
303
|
+
# @param [Hash] query_params Query parameters
|
304
|
+
# @param [String] auth_names Authentication scheme name
|
305
|
+
def update_params_for_auth!(header_params, query_params, auth_names)
|
306
|
+
Array(auth_names).each do |auth_name|
|
307
|
+
auth_setting = @config.auth_settings[auth_name]
|
308
|
+
next unless auth_setting
|
309
|
+
case auth_setting[:in]
|
310
|
+
when 'header' then header_params[auth_setting[:key]] = auth_setting[:value]
|
311
|
+
when 'query' then query_params[auth_setting[:key]] = auth_setting[:value]
|
312
|
+
else fail ArgumentError, 'Authentication token must be in `query` of `header`'
|
313
|
+
end
|
314
|
+
end
|
315
|
+
end
|
316
|
+
|
317
|
+
# Sets user agent in HTTP header
|
318
|
+
#
|
319
|
+
# @param [String] user_agent User agent (e.g. swagger-codegen/ruby/1.0.0)
|
320
|
+
def user_agent=(user_agent)
|
321
|
+
@user_agent = user_agent
|
322
|
+
@default_headers['User-Agent'] = @user_agent
|
323
|
+
end
|
324
|
+
|
325
|
+
# Return Accept header based on an array of accepts provided.
|
326
|
+
# @param [Array] accepts array for Accept
|
327
|
+
# @return [String] the Accept header (e.g. application/json)
|
328
|
+
def select_header_accept(accepts)
|
329
|
+
return nil if accepts.nil? || accepts.empty?
|
330
|
+
# use JSON when present, otherwise use all of the provided
|
331
|
+
json_accept = accepts.find { |s| json_mime?(s) }
|
332
|
+
json_accept || accepts.join(',')
|
333
|
+
end
|
334
|
+
|
335
|
+
# Return Content-Type header based on an array of content types provided.
|
336
|
+
# @param [Array] content_types array for Content-Type
|
337
|
+
# @return [String] the Content-Type header (e.g. application/json)
|
338
|
+
def select_header_content_type(content_types)
|
339
|
+
# use application/json by default
|
340
|
+
return 'application/json' if content_types.nil? || content_types.empty?
|
341
|
+
# use JSON when present, otherwise use the first one
|
342
|
+
json_content_type = content_types.find { |s| json_mime?(s) }
|
343
|
+
json_content_type || content_types.first
|
344
|
+
end
|
345
|
+
|
346
|
+
# Convert object (array, hash, object, etc) to JSON string.
|
347
|
+
# @param [Object] model object to be converted into JSON string
|
348
|
+
# @return [String] JSON string representation of the object
|
349
|
+
def object_to_http_body(model)
|
350
|
+
return model if model.nil? || model.is_a?(String)
|
351
|
+
local_body = nil
|
352
|
+
if model.is_a?(Array)
|
353
|
+
local_body = model.map { |m| object_to_hash(m) }
|
354
|
+
else
|
355
|
+
local_body = object_to_hash(model)
|
356
|
+
end
|
357
|
+
local_body.to_json
|
358
|
+
end
|
359
|
+
|
360
|
+
# Convert object(non-array) to hash.
|
361
|
+
# @param [Object] obj object to be converted into JSON string
|
362
|
+
# @return [String] JSON string representation of the object
|
363
|
+
def object_to_hash(obj)
|
364
|
+
if obj.respond_to?(:to_hash)
|
365
|
+
obj.to_hash
|
366
|
+
else
|
367
|
+
obj
|
368
|
+
end
|
369
|
+
end
|
370
|
+
|
371
|
+
# Build parameter value according to the given collection format.
|
372
|
+
# @param [String] collection_format one of :csv, :ssv, :tsv, :pipes and :multi
|
373
|
+
def build_collection_param(param, collection_format)
|
374
|
+
case collection_format
|
375
|
+
when :csv
|
376
|
+
param.join(',')
|
377
|
+
when :ssv
|
378
|
+
param.join(' ')
|
379
|
+
when :tsv
|
380
|
+
param.join("\t")
|
381
|
+
when :pipes
|
382
|
+
param.join('|')
|
383
|
+
when :multi
|
384
|
+
# return the array directly as typhoeus will handle it as expected
|
385
|
+
param
|
386
|
+
else
|
387
|
+
fail "unknown collection format: #{collection_format.inspect}"
|
388
|
+
end
|
389
|
+
end
|
390
|
+
end
|
391
|
+
end
|