Class: CloudmersiveVirusScanApiClient::VirusScanAdvancedResult
- Inherits:
-
Object
- Object
- CloudmersiveVirusScanApiClient::VirusScanAdvancedResult
- Defined in:
- lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb
Overview
Result of running an advanced virus scan
Instance Attribute Summary collapse
-
#clean_result ⇒ Object
True if the scan contained no viruses, false otherwise.
-
#contains_executable ⇒ Object
True if the scan contained an executable (application code), which can be a significant risk factor.
-
#contains_html ⇒ Object
True if the uploaded file contains HTML, which can be a significant risk factor.
-
#contains_insecure_deserialization ⇒ Object
True if the uploaded file contains embedded Insecure Deserialization threats of other embedded threats within the document, which can be a significant risk factor.
-
#contains_invalid_file ⇒ Object
True if the scan contained an invalid file (such as a PDF that is not a valid PDF, Word Document that is not a valid Word Document, etc.), which can be a significant risk factor.
-
#contains_macros ⇒ Object
True if the uploaded file contains embedded Macros of other embedded threats within the document, which can be a significant risk factor.
-
#contains_ole_embedded_object ⇒ Object
True if the uploaded file contains an OLE embedded object, which can be a significant risk factor.
-
#contains_password_protected_file ⇒ Object
True if the scan contained a password protected or encrypted file, which can be a significant risk factor.
-
#contains_restricted_file_format ⇒ Object
True if the uploaded file is of a type that is not allowed based on the optional restrictFileTypes parameter, false otherwise; if restrictFileTypes is not set, this will always be false.
-
#contains_script ⇒ Object
True if the scan contained a script (such as a PHP script, Python script, etc.) which can be a significant risk factor.
-
#contains_unsafe_archive ⇒ Object
True if the uploaded file contains unsafe archive (e.g. zip) content, such as a Zip Bomb, or other configurations of a zip file that could lead to an unsafe extraction.
-
#contains_xml_external_entities ⇒ Object
True if the uploaded file contains embedded XML External Entity threats of other embedded threats within the document, which can be a significant risk factor.
-
#content_information ⇒ Object
Contains additional non-threat content verification information.
-
#found_viruses ⇒ Object
Array of viruses found, if any.
-
#verified_file_format ⇒ Object
For file format verification-supported file formats, the contents-verified file format of the file.
Class Method Summary collapse
-
.attribute_map ⇒ Object
Attribute mapping from ruby-style variable name to JSON key.
-
.swagger_types ⇒ Object
Attribute type mapping.
Instance Method Summary collapse
-
#==(o) ⇒ Object
Checks equality by comparing each attribute.
-
#_deserialize(type, value) ⇒ Object
Deserializes the data based on type.
-
#_to_hash(value) ⇒ Hash
Outputs non-array value in the form of hash For object, use to_hash.
-
#build_from_hash(attributes) ⇒ Object
Builds the object from hash.
- #eql?(o) ⇒ Boolean
-
#hash ⇒ Fixnum
Calculates hash code according to all attributes.
-
#initialize(attributes = {}) ⇒ VirusScanAdvancedResult
constructor
Initializes the object.
-
#list_invalid_properties ⇒ Object
Show invalid properties with the reasons.
-
#to_body ⇒ Hash
to_body is an alias to to_hash (backward compatibility).
-
#to_hash ⇒ Hash
Returns the object in the form of hash.
-
#to_s ⇒ String
Returns the string representation of the object.
-
#valid? ⇒ Boolean
Check to see if the all the properties in the model are valid.
Constructor Details
#initialize(attributes = {}) ⇒ VirusScanAdvancedResult
Initializes the object
107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 |
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 107 def initialize(attributes = {}) return unless attributes.is_a?(Hash) # convert string to symbol for hash key attributes = attributes.each_with_object({}) { |(k, v), h| h[k.to_sym] = v } if attributes.has_key?(:'CleanResult') self.clean_result = attributes[:'CleanResult'] end if attributes.has_key?(:'ContainsExecutable') self.contains_executable = attributes[:'ContainsExecutable'] end if attributes.has_key?(:'ContainsInvalidFile') self.contains_invalid_file = attributes[:'ContainsInvalidFile'] end if attributes.has_key?(:'ContainsScript') self.contains_script = attributes[:'ContainsScript'] end if attributes.has_key?(:'ContainsPasswordProtectedFile') self.contains_password_protected_file = attributes[:'ContainsPasswordProtectedFile'] end if attributes.has_key?(:'ContainsRestrictedFileFormat') self.contains_restricted_file_format = attributes[:'ContainsRestrictedFileFormat'] end if attributes.has_key?(:'ContainsMacros') self.contains_macros = attributes[:'ContainsMacros'] end if attributes.has_key?(:'ContainsXmlExternalEntities') self.contains_xml_external_entities = attributes[:'ContainsXmlExternalEntities'] end if attributes.has_key?(:'ContainsInsecureDeserialization') self.contains_insecure_deserialization = attributes[:'ContainsInsecureDeserialization'] end if attributes.has_key?(:'ContainsHtml') self.contains_html = attributes[:'ContainsHtml'] end if attributes.has_key?(:'ContainsUnsafeArchive') self.contains_unsafe_archive = attributes[:'ContainsUnsafeArchive'] end if attributes.has_key?(:'ContainsOleEmbeddedObject') self. = attributes[:'ContainsOleEmbeddedObject'] end if attributes.has_key?(:'VerifiedFileFormat') self.verified_file_format = attributes[:'VerifiedFileFormat'] end if attributes.has_key?(:'FoundViruses') if (value = attributes[:'FoundViruses']).is_a?(Array) self.found_viruses = value end end if attributes.has_key?(:'ContentInformation') self.content_information = attributes[:'ContentInformation'] end end |
Instance Attribute Details
#clean_result ⇒ Object
True if the scan contained no viruses, false otherwise
19 20 21 |
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 19 def clean_result @clean_result end |
#contains_executable ⇒ Object
True if the scan contained an executable (application code), which can be a significant risk factor
22 23 24 |
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 22 def contains_executable @contains_executable end |
#contains_html ⇒ Object
True if the uploaded file contains HTML, which can be a significant risk factor
46 47 48 |
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 46 def contains_html @contains_html end |
#contains_insecure_deserialization ⇒ Object
True if the uploaded file contains embedded Insecure Deserialization threats of other embedded threats within the document, which can be a significant risk factor
43 44 45 |
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 43 def contains_insecure_deserialization @contains_insecure_deserialization end |
#contains_invalid_file ⇒ Object
True if the scan contained an invalid file (such as a PDF that is not a valid PDF, Word Document that is not a valid Word Document, etc.), which can be a significant risk factor
25 26 27 |
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 25 def contains_invalid_file @contains_invalid_file end |
#contains_macros ⇒ Object
True if the uploaded file contains embedded Macros of other embedded threats within the document, which can be a significant risk factor
37 38 39 |
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 37 def contains_macros @contains_macros end |
#contains_ole_embedded_object ⇒ Object
True if the uploaded file contains an OLE embedded object, which can be a significant risk factor
52 53 54 |
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 52 def @contains_ole_embedded_object end |
#contains_password_protected_file ⇒ Object
True if the scan contained a password protected or encrypted file, which can be a significant risk factor
31 32 33 |
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 31 def contains_password_protected_file @contains_password_protected_file end |
#contains_restricted_file_format ⇒ Object
True if the uploaded file is of a type that is not allowed based on the optional restrictFileTypes parameter, false otherwise; if restrictFileTypes is not set, this will always be false
34 35 36 |
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 34 def contains_restricted_file_format @contains_restricted_file_format end |
#contains_script ⇒ Object
True if the scan contained a script (such as a PHP script, Python script, etc.) which can be a significant risk factor
28 29 30 |
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 28 def contains_script @contains_script end |
#contains_unsafe_archive ⇒ Object
True if the uploaded file contains unsafe archive (e.g. zip) content, such as a Zip Bomb, or other configurations of a zip file that could lead to an unsafe extraction
49 50 51 |
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 49 def contains_unsafe_archive @contains_unsafe_archive end |
#contains_xml_external_entities ⇒ Object
True if the uploaded file contains embedded XML External Entity threats of other embedded threats within the document, which can be a significant risk factor
40 41 42 |
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 40 def contains_xml_external_entities @contains_xml_external_entities end |
#content_information ⇒ Object
Contains additional non-threat content verification information
61 62 63 |
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 61 def content_information @content_information end |
#found_viruses ⇒ Object
Array of viruses found, if any
58 59 60 |
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 58 def found_viruses @found_viruses end |
#verified_file_format ⇒ Object
For file format verification-supported file formats, the contents-verified file format of the file. Null indicates that the file format is not supported for contents verification. If a Virus or Malware is found, this field will always be set to Null.
55 56 57 |
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 55 def verified_file_format @verified_file_format end |
Class Method Details
.attribute_map ⇒ Object
Attribute mapping from ruby-style variable name to JSON key.
64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 |
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 64 def self.attribute_map { :'clean_result' => :'CleanResult', :'contains_executable' => :'ContainsExecutable', :'contains_invalid_file' => :'ContainsInvalidFile', :'contains_script' => :'ContainsScript', :'contains_password_protected_file' => :'ContainsPasswordProtectedFile', :'contains_restricted_file_format' => :'ContainsRestrictedFileFormat', :'contains_macros' => :'ContainsMacros', :'contains_xml_external_entities' => :'ContainsXmlExternalEntities', :'contains_insecure_deserialization' => :'ContainsInsecureDeserialization', :'contains_html' => :'ContainsHtml', :'contains_unsafe_archive' => :'ContainsUnsafeArchive', :'contains_ole_embedded_object' => :'ContainsOleEmbeddedObject', :'verified_file_format' => :'VerifiedFileFormat', :'found_viruses' => :'FoundViruses', :'content_information' => :'ContentInformation' } end |
.swagger_types ⇒ Object
Attribute type mapping.
85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 |
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 85 def self.swagger_types { :'clean_result' => :'BOOLEAN', :'contains_executable' => :'BOOLEAN', :'contains_invalid_file' => :'BOOLEAN', :'contains_script' => :'BOOLEAN', :'contains_password_protected_file' => :'BOOLEAN', :'contains_restricted_file_format' => :'BOOLEAN', :'contains_macros' => :'BOOLEAN', :'contains_xml_external_entities' => :'BOOLEAN', :'contains_insecure_deserialization' => :'BOOLEAN', :'contains_html' => :'BOOLEAN', :'contains_unsafe_archive' => :'BOOLEAN', :'contains_ole_embedded_object' => :'BOOLEAN', :'verified_file_format' => :'String', :'found_viruses' => :'Array<VirusFound>', :'content_information' => :'AdditionalAdvancedScanInformation' } end |
Instance Method Details
#==(o) ⇒ Object
Checks equality by comparing each attribute.
191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 |
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 191 def ==(o) return true if self.equal?(o) self.class == o.class && clean_result == o.clean_result && contains_executable == o.contains_executable && contains_invalid_file == o.contains_invalid_file && contains_script == o.contains_script && contains_password_protected_file == o.contains_password_protected_file && contains_restricted_file_format == o.contains_restricted_file_format && contains_macros == o.contains_macros && contains_xml_external_entities == o.contains_xml_external_entities && contains_insecure_deserialization == o.contains_insecure_deserialization && contains_html == o.contains_html && contains_unsafe_archive == o.contains_unsafe_archive && == o. && verified_file_format == o.verified_file_format && found_viruses == o.found_viruses && content_information == o.content_information end |
#_deserialize(type, value) ⇒ Object
Deserializes the data based on type
247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 |
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 247 def _deserialize(type, value) case type.to_sym when :DateTime DateTime.parse(value) when :Date Date.parse(value) when :String value.to_s when :Integer value.to_i when :Float value.to_f when :BOOLEAN if value.to_s =~ /\A(true|t|yes|y|1)\z/i true else false end when :Object # generic object (usually a Hash), return directly value when /\AArray<(?<inner_type>.+)>\z/ inner_type = Regexp.last_match[:inner_type] value.map { |v| _deserialize(inner_type, v) } when /\AHash<(?<k_type>.+?), (?<v_type>.+)>\z/ k_type = Regexp.last_match[:k_type] v_type = Regexp.last_match[:v_type] {}.tap do |hash| value.each do |k, v| hash[_deserialize(k_type, k)] = _deserialize(v_type, v) end end else # model temp_model = CloudmersiveVirusScanApiClient.const_get(type).new temp_model.build_from_hash(value) end end |
#_to_hash(value) ⇒ Hash
Outputs non-array value in the form of hash For object, use to_hash. Otherwise, just return the value
313 314 315 316 317 318 319 320 321 322 323 324 325 |
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 313 def _to_hash(value) if value.is_a?(Array) value.compact.map { |v| _to_hash(v) } elsif value.is_a?(Hash) {}.tap do |hash| value.each { |k, v| hash[k] = _to_hash(v) } end elsif value.respond_to? :to_hash value.to_hash else value end end |
#build_from_hash(attributes) ⇒ Object
Builds the object from hash
226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 |
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 226 def build_from_hash(attributes) return nil unless attributes.is_a?(Hash) self.class.swagger_types.each_pair do |key, type| if type =~ /\AArray<(.*)>/i # check to ensure the input is an array given that the attribute # is documented as an array but the input is not if attributes[self.class.attribute_map[key]].is_a?(Array) self.send("#{key}=", attributes[self.class.attribute_map[key]].map { |v| _deserialize($1, v) }) end elsif !attributes[self.class.attribute_map[key]].nil? self.send("#{key}=", _deserialize(type, attributes[self.class.attribute_map[key]])) end # or else data not found in attributes(hash), not an issue as the data can be optional end self end |
#eql?(o) ⇒ Boolean
213 214 215 |
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 213 def eql?(o) self == o end |
#hash ⇒ Fixnum
Calculates hash code according to all attributes.
219 220 221 |
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 219 def hash [clean_result, contains_executable, contains_invalid_file, contains_script, contains_password_protected_file, contains_restricted_file_format, contains_macros, contains_xml_external_entities, contains_insecure_deserialization, contains_html, contains_unsafe_archive, , verified_file_format, found_viruses, content_information].hash end |
#list_invalid_properties ⇒ Object
Show invalid properties with the reasons. Usually used together with valid?
178 179 180 181 |
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 178 def list_invalid_properties invalid_properties = Array.new invalid_properties end |
#to_body ⇒ Hash
to_body is an alias to to_hash (backward compatibility)
293 294 295 |
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 293 def to_body to_hash end |
#to_hash ⇒ Hash
Returns the object in the form of hash
299 300 301 302 303 304 305 306 307 |
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 299 def to_hash hash = {} self.class.attribute_map.each_pair do |attr, param| value = self.send(attr) next if value.nil? hash[param] = _to_hash(value) end hash end |
#to_s ⇒ String
Returns the string representation of the object
287 288 289 |
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 287 def to_s to_hash.to_s end |
#valid? ⇒ Boolean
Check to see if the all the properties in the model are valid
185 186 187 |
# File 'lib/cloudmersive-virus-scan-api-client/models/virus_scan_advanced_result.rb', line 185 def valid? true end |