Class: CloudmersiveSecurityApiClient::StringAutomaticThreatDetection

Inherits:
Object
  • Object
show all
Defined in:
lib/cloudmersive-security-api-client/models/string_automatic_threat_detection.rb

Overview

Result of performing an Insecure Deserialization JSON protection operation

Instance Attribute Summary collapse

Class Method Summary collapse

Instance Method Summary collapse

Constructor Details

#initialize(attributes = {}) ⇒ StringAutomaticThreatDetection

Initializes the object

Parameters:

  • attributes (Hash) (defaults to: {})

    Model attributes in the form of hash



86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
# File 'lib/cloudmersive-security-api-client/models/string_automatic_threat_detection.rb', line 86

def initialize(attributes = {})
  return unless attributes.is_a?(Hash)

  # convert string to symbol for hash key
  attributes = attributes.each_with_object({}) { |(k, v), h| h[k.to_sym] = v }

  if attributes.has_key?(:'Successful')
    self.successful = attributes[:'Successful']
  end

  if attributes.has_key?(:'CleanResult')
    self.clean_result = attributes[:'CleanResult']
  end

  if attributes.has_key?(:'ContainedJsonInsecureDeserializationAttack')
    self.contained_json_insecure_deserialization_attack = attributes[:'ContainedJsonInsecureDeserializationAttack']
  end

  if attributes.has_key?(:'ContainedXssThreat')
    self.contained_xss_threat = attributes[:'ContainedXssThreat']
  end

  if attributes.has_key?(:'ContainedXxeThreat')
    self.contained_xxe_threat = attributes[:'ContainedXxeThreat']
  end

  if attributes.has_key?(:'ContainedSqlInjectionThreat')
    self.contained_sql_injection_threat = attributes[:'ContainedSqlInjectionThreat']
  end

  if attributes.has_key?(:'ContainedSsrfThreat')
    self.contained_ssrf_threat = attributes[:'ContainedSsrfThreat']
  end

  if attributes.has_key?(:'IsXML')
    self.is_xml = attributes[:'IsXML']
  end

  if attributes.has_key?(:'IsJSON')
    self.is_json = attributes[:'IsJSON']
  end

  if attributes.has_key?(:'IsURL')
    self.is_url = attributes[:'IsURL']
  end

  if attributes.has_key?(:'OriginalInput')
    self.original_input = attributes[:'OriginalInput']
  end
end

Instance Attribute Details

#clean_resultObject

Returns the value of attribute clean_result.



21
22
23
# File 'lib/cloudmersive-security-api-client/models/string_automatic_threat_detection.rb', line 21

def clean_result
  @clean_result
end

#contained_json_insecure_deserialization_attackObject

True if the input contained Insecure Deserialization JSON, false otherwise



24
25
26
# File 'lib/cloudmersive-security-api-client/models/string_automatic_threat_detection.rb', line 24

def contained_json_insecure_deserialization_attack
  @contained_json_insecure_deserialization_attack
end

#contained_sql_injection_threatObject

True if the input contained SQL Injection attack, false otherwise



33
34
35
# File 'lib/cloudmersive-security-api-client/models/string_automatic_threat_detection.rb', line 33

def contained_sql_injection_threat
  @contained_sql_injection_threat
end

#contained_ssrf_threatObject

True if the input contained an Server-Side Request Forgery (SSRF) URL attack, false otherwise



36
37
38
# File 'lib/cloudmersive-security-api-client/models/string_automatic_threat_detection.rb', line 36

def contained_ssrf_threat
  @contained_ssrf_threat
end

#contained_xss_threatObject

True if the input contained XSS attack, false otherwise



27
28
29
# File 'lib/cloudmersive-security-api-client/models/string_automatic_threat_detection.rb', line 27

def contained_xss_threat
  @contained_xss_threat
end

#contained_xxe_threatObject

True if the input contained XXE attack, false otherwise



30
31
32
# File 'lib/cloudmersive-security-api-client/models/string_automatic_threat_detection.rb', line 30

def contained_xxe_threat
  @contained_xxe_threat
end

#is_jsonObject

True if the input string is JSON, false otherwise



42
43
44
# File 'lib/cloudmersive-security-api-client/models/string_automatic_threat_detection.rb', line 42

def is_json
  @is_json
end

#is_urlObject

True if the input string is a URL, false otherwise



45
46
47
# File 'lib/cloudmersive-security-api-client/models/string_automatic_threat_detection.rb', line 45

def is_url
  @is_url
end

#is_xmlObject

True if the input string is XML, false otherwise



39
40
41
# File 'lib/cloudmersive-security-api-client/models/string_automatic_threat_detection.rb', line 39

def is_xml
  @is_xml
end

#original_inputObject

Original input string



48
49
50
# File 'lib/cloudmersive-security-api-client/models/string_automatic_threat_detection.rb', line 48

def original_input
  @original_input
end

#successfulObject

True if the operation was successful, false otherwise



19
20
21
# File 'lib/cloudmersive-security-api-client/models/string_automatic_threat_detection.rb', line 19

def successful
  @successful
end

Class Method Details

.attribute_mapObject

Attribute mapping from ruby-style variable name to JSON key.



51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
# File 'lib/cloudmersive-security-api-client/models/string_automatic_threat_detection.rb', line 51

def self.attribute_map
  {
    :'successful' => :'Successful',
    :'clean_result' => :'CleanResult',
    :'contained_json_insecure_deserialization_attack' => :'ContainedJsonInsecureDeserializationAttack',
    :'contained_xss_threat' => :'ContainedXssThreat',
    :'contained_xxe_threat' => :'ContainedXxeThreat',
    :'contained_sql_injection_threat' => :'ContainedSqlInjectionThreat',
    :'contained_ssrf_threat' => :'ContainedSsrfThreat',
    :'is_xml' => :'IsXML',
    :'is_json' => :'IsJSON',
    :'is_url' => :'IsURL',
    :'original_input' => :'OriginalInput'
  }
end

.swagger_typesObject

Attribute type mapping.



68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
# File 'lib/cloudmersive-security-api-client/models/string_automatic_threat_detection.rb', line 68

def self.swagger_types
  {
    :'successful' => :'BOOLEAN',
    :'clean_result' => :'BOOLEAN',
    :'contained_json_insecure_deserialization_attack' => :'BOOLEAN',
    :'contained_xss_threat' => :'BOOLEAN',
    :'contained_xxe_threat' => :'BOOLEAN',
    :'contained_sql_injection_threat' => :'BOOLEAN',
    :'contained_ssrf_threat' => :'BOOLEAN',
    :'is_xml' => :'BOOLEAN',
    :'is_json' => :'BOOLEAN',
    :'is_url' => :'BOOLEAN',
    :'original_input' => :'String'
  }
end

Instance Method Details

#==(o) ⇒ Object

Checks equality by comparing each attribute.

Parameters:

  • Object (Object)

    to be compared



152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
# File 'lib/cloudmersive-security-api-client/models/string_automatic_threat_detection.rb', line 152

def ==(o)
  return true if self.equal?(o)
  self.class == o.class &&
      successful == o.successful &&
      clean_result == o.clean_result &&
      contained_json_insecure_deserialization_attack == o.contained_json_insecure_deserialization_attack &&
      contained_xss_threat == o.contained_xss_threat &&
      contained_xxe_threat == o.contained_xxe_threat &&
      contained_sql_injection_threat == o.contained_sql_injection_threat &&
      contained_ssrf_threat == o.contained_ssrf_threat &&
      is_xml == o.is_xml &&
      is_json == o.is_json &&
      is_url == o.is_url &&
      original_input == o.original_input
end

#_deserialize(type, value) ⇒ Object

Deserializes the data based on type

Parameters:

  • string

    type Data type

  • string

    value Value to be deserialized

Returns:

  • (Object)

    Deserialized data



204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
# File 'lib/cloudmersive-security-api-client/models/string_automatic_threat_detection.rb', line 204

def _deserialize(type, value)
  case type.to_sym
  when :DateTime
    DateTime.parse(value)
  when :Date
    Date.parse(value)
  when :String
    value.to_s
  when :Integer
    value.to_i
  when :Float
    value.to_f
  when :BOOLEAN
    if value.to_s =~ /\A(true|t|yes|y|1)\z/i
      true
    else
      false
    end
  when :Object
    # generic object (usually a Hash), return directly
    value
  when /\AArray<(?<inner_type>.+)>\z/
    inner_type = Regexp.last_match[:inner_type]
    value.map { |v| _deserialize(inner_type, v) }
  when /\AHash<(?<k_type>.+?), (?<v_type>.+)>\z/
    k_type = Regexp.last_match[:k_type]
    v_type = Regexp.last_match[:v_type]
    {}.tap do |hash|
      value.each do |k, v|
        hash[_deserialize(k_type, k)] = _deserialize(v_type, v)
      end
    end
  else # model
    temp_model = CloudmersiveSecurityApiClient.const_get(type).new
    temp_model.build_from_hash(value)
  end
end

#_to_hash(value) ⇒ Hash

Outputs non-array value in the form of hash For object, use to_hash. Otherwise, just return the value

Parameters:

  • value (Object)

    Any valid value

Returns:

  • (Hash)

    Returns the value in the form of hash



270
271
272
273
274
275
276
277
278
279
280
281
282
# File 'lib/cloudmersive-security-api-client/models/string_automatic_threat_detection.rb', line 270

def _to_hash(value)
  if value.is_a?(Array)
    value.compact.map { |v| _to_hash(v) }
  elsif value.is_a?(Hash)
    {}.tap do |hash|
      value.each { |k, v| hash[k] = _to_hash(v) }
    end
  elsif value.respond_to? :to_hash
    value.to_hash
  else
    value
  end
end

#build_from_hash(attributes) ⇒ Object

Builds the object from hash

Parameters:

  • attributes (Hash)

    Model attributes in the form of hash

Returns:

  • (Object)

    Returns the model itself



183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
# File 'lib/cloudmersive-security-api-client/models/string_automatic_threat_detection.rb', line 183

def build_from_hash(attributes)
  return nil unless attributes.is_a?(Hash)
  self.class.swagger_types.each_pair do |key, type|
    if type =~ /\AArray<(.*)>/i
      # check to ensure the input is an array given that the attribute
      # is documented as an array but the input is not
      if attributes[self.class.attribute_map[key]].is_a?(Array)
        self.send("#{key}=", attributes[self.class.attribute_map[key]].map { |v| _deserialize($1, v) })
      end
    elsif !attributes[self.class.attribute_map[key]].nil?
      self.send("#{key}=", _deserialize(type, attributes[self.class.attribute_map[key]]))
    end # or else data not found in attributes(hash), not an issue as the data can be optional
  end

  self
end

#eql?(o) ⇒ Boolean

Parameters:

  • Object (Object)

    to be compared

Returns:

  • (Boolean)

See Also:

  • `==` method


170
171
172
# File 'lib/cloudmersive-security-api-client/models/string_automatic_threat_detection.rb', line 170

def eql?(o)
  self == o
end

#hashFixnum

Calculates hash code according to all attributes.

Returns:

  • (Fixnum)

    Hash code



176
177
178
# File 'lib/cloudmersive-security-api-client/models/string_automatic_threat_detection.rb', line 176

def hash
  [successful, clean_result, contained_json_insecure_deserialization_attack, contained_xss_threat, contained_xxe_threat, contained_sql_injection_threat, contained_ssrf_threat, is_xml, is_json, is_url, original_input].hash
end

#list_invalid_propertiesObject

Show invalid properties with the reasons. Usually used together with valid?

Returns:

  • Array for valid properties with the reasons



139
140
141
142
# File 'lib/cloudmersive-security-api-client/models/string_automatic_threat_detection.rb', line 139

def list_invalid_properties
  invalid_properties = Array.new
  invalid_properties
end

#to_bodyHash

to_body is an alias to to_hash (backward compatibility)

Returns:

  • (Hash)

    Returns the object in the form of hash



250
251
252
# File 'lib/cloudmersive-security-api-client/models/string_automatic_threat_detection.rb', line 250

def to_body
  to_hash
end

#to_hashHash

Returns the object in the form of hash

Returns:

  • (Hash)

    Returns the object in the form of hash



256
257
258
259
260
261
262
263
264
# File 'lib/cloudmersive-security-api-client/models/string_automatic_threat_detection.rb', line 256

def to_hash
  hash = {}
  self.class.attribute_map.each_pair do |attr, param|
    value = self.send(attr)
    next if value.nil?
    hash[param] = _to_hash(value)
  end
  hash
end

#to_sString

Returns the string representation of the object

Returns:

  • (String)

    String presentation of the object



244
245
246
# File 'lib/cloudmersive-security-api-client/models/string_automatic_threat_detection.rb', line 244

def to_s
  to_hash.to_s
end

#valid?Boolean

Check to see if the all the properties in the model are valid

Returns:

  • (Boolean)

    true if the model is valid



146
147
148
# File 'lib/cloudmersive-security-api-client/models/string_automatic_threat_detection.rb', line 146

def valid?
  true
end