Class: CloudmersiveVirusScanApiClient::VirusScanAdvancedResult

Inherits:
Object
  • Object
show all
Defined in:
lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb

Overview

Result of running an advanced virus scan

Instance Attribute Summary collapse

Class Method Summary collapse

Instance Method Summary collapse

Constructor Details

#initialize(attributes = {}) ⇒ VirusScanAdvancedResult

Initializes the object

Parameters:

  • attributes (Hash) (defaults to: {})

    Model attributes in the form of hash



107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 107

def initialize(attributes = {})
  return unless attributes.is_a?(Hash)

  # convert string to symbol for hash key
  attributes = attributes.each_with_object({}) { |(k, v), h| h[k.to_sym] = v }

  if attributes.has_key?(:'CleanResult')
    self.clean_result = attributes[:'CleanResult']
  end

  if attributes.has_key?(:'ContainsExecutable')
    self.contains_executable = attributes[:'ContainsExecutable']
  end

  if attributes.has_key?(:'ContainsInvalidFile')
    self.contains_invalid_file = attributes[:'ContainsInvalidFile']
  end

  if attributes.has_key?(:'ContainsScript')
    self.contains_script = attributes[:'ContainsScript']
  end

  if attributes.has_key?(:'ContainsPasswordProtectedFile')
    self.contains_password_protected_file = attributes[:'ContainsPasswordProtectedFile']
  end

  if attributes.has_key?(:'ContainsRestrictedFileFormat')
    self.contains_restricted_file_format = attributes[:'ContainsRestrictedFileFormat']
  end

  if attributes.has_key?(:'ContainsMacros')
    self.contains_macros = attributes[:'ContainsMacros']
  end

  if attributes.has_key?(:'ContainsXmlExternalEntities')
    self.contains_xml_external_entities = attributes[:'ContainsXmlExternalEntities']
  end

  if attributes.has_key?(:'ContainsInsecureDeserialization')
    self.contains_insecure_deserialization = attributes[:'ContainsInsecureDeserialization']
  end

  if attributes.has_key?(:'ContainsHtml')
    self.contains_html = attributes[:'ContainsHtml']
  end

  if attributes.has_key?(:'ContainsUnsafeArchive')
    self.contains_unsafe_archive = attributes[:'ContainsUnsafeArchive']
  end

  if attributes.has_key?(:'ContainsOleEmbeddedObject')
    self.contains_ole_embedded_object = attributes[:'ContainsOleEmbeddedObject']
  end

  if attributes.has_key?(:'VerifiedFileFormat')
    self.verified_file_format = attributes[:'VerifiedFileFormat']
  end

  if attributes.has_key?(:'FoundViruses')
    if (value = attributes[:'FoundViruses']).is_a?(Array)
      self.found_viruses = value
    end
  end

  if attributes.has_key?(:'ContentInformation')
    self. = attributes[:'ContentInformation']
  end
end

Instance Attribute Details

#clean_resultObject

True if the scan contained no viruses, false otherwise



19
20
21
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 19

def clean_result
  @clean_result
end

#contains_executableObject

True if the scan contained an executable (application code), which can be a significant risk factor



22
23
24
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 22

def contains_executable
  @contains_executable
end

#contains_htmlObject

True if the uploaded file contains HTML, which can be a significant risk factor



46
47
48
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 46

def contains_html
  @contains_html
end

#contains_insecure_deserializationObject

True if the uploaded file contains embedded Insecure Deserialization threats of other embedded threats within the document, which can be a significant risk factor



43
44
45
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 43

def contains_insecure_deserialization
  @contains_insecure_deserialization
end

#contains_invalid_fileObject

True if the scan contained an invalid file (such as a PDF that is not a valid PDF, Word Document that is not a valid Word Document, etc.), which can be a significant risk factor



25
26
27
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 25

def contains_invalid_file
  @contains_invalid_file
end

#contains_macrosObject

True if the uploaded file contains embedded Macros of other embedded threats within the document, which can be a significant risk factor



37
38
39
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 37

def contains_macros
  @contains_macros
end

#contains_ole_embedded_objectObject

True if the uploaded file contains an OLE embedded object, which can be a significant risk factor



52
53
54
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 52

def contains_ole_embedded_object
  @contains_ole_embedded_object
end

#contains_password_protected_fileObject

True if the scan contained a password protected or encrypted file, which can be a significant risk factor



31
32
33
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 31

def contains_password_protected_file
  @contains_password_protected_file
end

#contains_restricted_file_formatObject

True if the uploaded file is of a type that is not allowed based on the optional restrictFileTypes parameter, false otherwise; if restrictFileTypes is not set, this will always be false



34
35
36
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 34

def contains_restricted_file_format
  @contains_restricted_file_format
end

#contains_scriptObject

True if the scan contained a script (such as a PHP script, Python script, etc.) which can be a significant risk factor



28
29
30
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 28

def contains_script
  @contains_script
end

#contains_unsafe_archiveObject

True if the uploaded file contains unsafe archive (e.g. zip) content, such as a Zip Bomb, or other configurations of a zip file that could lead to an unsafe extraction



49
50
51
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 49

def contains_unsafe_archive
  @contains_unsafe_archive
end

#contains_xml_external_entitiesObject

True if the uploaded file contains embedded XML External Entity threats of other embedded threats within the document, which can be a significant risk factor



40
41
42
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 40

def contains_xml_external_entities
  @contains_xml_external_entities
end

#content_informationObject

Contains additional non-threat content verification information



61
62
63
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 61

def 
  @content_information
end

#found_virusesObject

Array of viruses found, if any



58
59
60
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 58

def found_viruses
  @found_viruses
end

#verified_file_formatObject

For file format verification-supported file formats, the contents-verified file format of the file. Null indicates that the file format is not supported for contents verification. If a Virus or Malware is found, this field will always be set to Null.



55
56
57
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 55

def verified_file_format
  @verified_file_format
end

Class Method Details

.attribute_mapObject

Attribute mapping from ruby-style variable name to JSON key.



64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 64

def self.attribute_map
  {
    :'clean_result' => :'CleanResult',
    :'contains_executable' => :'ContainsExecutable',
    :'contains_invalid_file' => :'ContainsInvalidFile',
    :'contains_script' => :'ContainsScript',
    :'contains_password_protected_file' => :'ContainsPasswordProtectedFile',
    :'contains_restricted_file_format' => :'ContainsRestrictedFileFormat',
    :'contains_macros' => :'ContainsMacros',
    :'contains_xml_external_entities' => :'ContainsXmlExternalEntities',
    :'contains_insecure_deserialization' => :'ContainsInsecureDeserialization',
    :'contains_html' => :'ContainsHtml',
    :'contains_unsafe_archive' => :'ContainsUnsafeArchive',
    :'contains_ole_embedded_object' => :'ContainsOleEmbeddedObject',
    :'verified_file_format' => :'VerifiedFileFormat',
    :'found_viruses' => :'FoundViruses',
    :'content_information' => :'ContentInformation'
  }
end

.swagger_typesObject

Attribute type mapping.



85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 85

def self.swagger_types
  {
    :'clean_result' => :'BOOLEAN',
    :'contains_executable' => :'BOOLEAN',
    :'contains_invalid_file' => :'BOOLEAN',
    :'contains_script' => :'BOOLEAN',
    :'contains_password_protected_file' => :'BOOLEAN',
    :'contains_restricted_file_format' => :'BOOLEAN',
    :'contains_macros' => :'BOOLEAN',
    :'contains_xml_external_entities' => :'BOOLEAN',
    :'contains_insecure_deserialization' => :'BOOLEAN',
    :'contains_html' => :'BOOLEAN',
    :'contains_unsafe_archive' => :'BOOLEAN',
    :'contains_ole_embedded_object' => :'BOOLEAN',
    :'verified_file_format' => :'String',
    :'found_viruses' => :'Array<VirusFound>',
    :'content_information' => :'AdditionalAdvancedScanInformation'
  }
end

Instance Method Details

#==(o) ⇒ Object

Checks equality by comparing each attribute.

Parameters:

  • Object (Object)

    to be compared



191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 191

def ==(o)
  return true if self.equal?(o)
  self.class == o.class &&
      clean_result == o.clean_result &&
      contains_executable == o.contains_executable &&
      contains_invalid_file == o.contains_invalid_file &&
      contains_script == o.contains_script &&
      contains_password_protected_file == o.contains_password_protected_file &&
      contains_restricted_file_format == o.contains_restricted_file_format &&
      contains_macros == o.contains_macros &&
      contains_xml_external_entities == o.contains_xml_external_entities &&
      contains_insecure_deserialization == o.contains_insecure_deserialization &&
      contains_html == o.contains_html &&
      contains_unsafe_archive == o.contains_unsafe_archive &&
      contains_ole_embedded_object == o.contains_ole_embedded_object &&
      verified_file_format == o.verified_file_format &&
      found_viruses == o.found_viruses &&
       == o.
end

#_deserialize(type, value) ⇒ Object

Deserializes the data based on type

Parameters:

  • string

    type Data type

  • string

    value Value to be deserialized

Returns:

  • (Object)

    Deserialized data



247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 247

def _deserialize(type, value)
  case type.to_sym
  when :DateTime
    DateTime.parse(value)
  when :Date
    Date.parse(value)
  when :String
    value.to_s
  when :Integer
    value.to_i
  when :Float
    value.to_f
  when :BOOLEAN
    if value.to_s =~ /\A(true|t|yes|y|1)\z/i
      true
    else
      false
    end
  when :Object
    # generic object (usually a Hash), return directly
    value
  when /\AArray<(?<inner_type>.+)>\z/
    inner_type = Regexp.last_match[:inner_type]
    value.map { |v| _deserialize(inner_type, v) }
  when /\AHash<(?<k_type>.+?), (?<v_type>.+)>\z/
    k_type = Regexp.last_match[:k_type]
    v_type = Regexp.last_match[:v_type]
    {}.tap do |hash|
      value.each do |k, v|
        hash[_deserialize(k_type, k)] = _deserialize(v_type, v)
      end
    end
  else # model
    temp_model = CloudmersiveVirusScanApiClient.const_get(type).new
    temp_model.build_from_hash(value)
  end
end

#_to_hash(value) ⇒ Hash

Outputs non-array value in the form of hash For object, use to_hash. Otherwise, just return the value

Parameters:

  • value (Object)

    Any valid value

Returns:

  • (Hash)

    Returns the value in the form of hash



313
314
315
316
317
318
319
320
321
322
323
324
325
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 313

def _to_hash(value)
  if value.is_a?(Array)
    value.compact.map { |v| _to_hash(v) }
  elsif value.is_a?(Hash)
    {}.tap do |hash|
      value.each { |k, v| hash[k] = _to_hash(v) }
    end
  elsif value.respond_to? :to_hash
    value.to_hash
  else
    value
  end
end

#build_from_hash(attributes) ⇒ Object

Builds the object from hash

Parameters:

  • attributes (Hash)

    Model attributes in the form of hash

Returns:

  • (Object)

    Returns the model itself



226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 226

def build_from_hash(attributes)
  return nil unless attributes.is_a?(Hash)
  self.class.swagger_types.each_pair do |key, type|
    if type =~ /\AArray<(.*)>/i
      # check to ensure the input is an array given that the attribute
      # is documented as an array but the input is not
      if attributes[self.class.attribute_map[key]].is_a?(Array)
        self.send("#{key}=", attributes[self.class.attribute_map[key]].map { |v| _deserialize($1, v) })
      end
    elsif !attributes[self.class.attribute_map[key]].nil?
      self.send("#{key}=", _deserialize(type, attributes[self.class.attribute_map[key]]))
    end # or else data not found in attributes(hash), not an issue as the data can be optional
  end

  self
end

#eql?(o) ⇒ Boolean

Parameters:

  • Object (Object)

    to be compared

Returns:

  • (Boolean)

See Also:

  • `==` method


213
214
215
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 213

def eql?(o)
  self == o
end

#hashFixnum

Calculates hash code according to all attributes.

Returns:

  • (Fixnum)

    Hash code



219
220
221
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 219

def hash
  [clean_result, contains_executable, contains_invalid_file, contains_script, contains_password_protected_file, contains_restricted_file_format, contains_macros, contains_xml_external_entities, contains_insecure_deserialization, contains_html, contains_unsafe_archive, contains_ole_embedded_object, verified_file_format, found_viruses, ].hash
end

#list_invalid_propertiesObject

Show invalid properties with the reasons. Usually used together with valid?

Returns:

  • Array for valid properties with the reasons



178
179
180
181
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 178

def list_invalid_properties
  invalid_properties = Array.new
  invalid_properties
end

#to_bodyHash

to_body is an alias to to_hash (backward compatibility)

Returns:

  • (Hash)

    Returns the object in the form of hash



293
294
295
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 293

def to_body
  to_hash
end

#to_hashHash

Returns the object in the form of hash

Returns:

  • (Hash)

    Returns the object in the form of hash



299
300
301
302
303
304
305
306
307
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 299

def to_hash
  hash = {}
  self.class.attribute_map.each_pair do |attr, param|
    value = self.send(attr)
    next if value.nil?
    hash[param] = _to_hash(value)
  end
  hash
end

#to_sString

Returns the string representation of the object

Returns:

  • (String)

    String presentation of the object



287
288
289
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 287

def to_s
  to_hash.to_s
end

#valid?Boolean

Check to see if the all the properties in the model are valid

Returns:

  • (Boolean)

    true if the model is valid



185
186
187
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 185

def valid?
  true
end