Skip to content

Commit

Permalink
1.7.7
Browse files Browse the repository at this point in the history
  • Loading branch information
Cloudmersive committed Apr 28, 2021
1 parent a4b958c commit ad0f823
Show file tree
Hide file tree
Showing 13 changed files with 781 additions and 14 deletions.
6 changes: 4 additions & 2 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ The validation APIs help you validate data. Check if an E-mail address is real.
[Cloudmersive Validation API](https://www.cloudmersive.com/validate-api) provides data validation capabilities for validating email addresses, phone numbers, IP addresses, and many other types of business data.

- API version: v1
- Package version: 1.7.6
- Package version: 1.7.7


## Requirements
Expand Down Expand Up @@ -106,7 +106,7 @@ Class | Method | HTTP request | Description
*DateTimeApi* | [**dateTimeParseStandardDateTime**](docs/Api/DateTimeApi.md#datetimeparsestandarddatetime) | **POST** /validate/date-time/parse/date-time/structured | Parses a standardized date and time string into a date and time
*DomainApi* | [**domainCheck**](docs/Api/DomainApi.md#domaincheck) | **POST** /validate/domain/check | Validate a domain name
*DomainApi* | [**domainGetTopLevelDomainFromUrl**](docs/Api/DomainApi.md#domaingettopleveldomainfromurl) | **POST** /validate/domain/url/get-top-level-domain | Get top-level domain name from URL
*DomainApi* | [**domainIsAdminPath**](docs/Api/DomainApi.md#domainisadminpath) | **POST** /validate/domain/url/is-admin-path | Check if path is a high-risk server administration path
*DomainApi* | [**domainIsAdminPath**](docs/Api/DomainApi.md#domainisadminpath) | **POST** /validate/domain/url/is-admin-path | Check if path is a high-risk or vulnerable server administration path
*DomainApi* | [**domainPhishingCheck**](docs/Api/DomainApi.md#domainphishingcheck) | **POST** /validate/domain/url/phishing-threat-check | Check a URL for Phishing threats
*DomainApi* | [**domainPost**](docs/Api/DomainApi.md#domainpost) | **POST** /validate/domain/whois | Get WHOIS information for a domain
*DomainApi* | [**domainQualityScore**](docs/Api/DomainApi.md#domainqualityscore) | **POST** /validate/domain/quality-score | Validate a domain name's quality score
Expand All @@ -132,6 +132,7 @@ Class | Method | HTTP request | Description
*NameApi* | [**nameValidateFullName**](docs/Api/NameApi.md#namevalidatefullname) | **POST** /validate/name/full-name | Parse and validate a full name
*NameApi* | [**nameValidateLastName**](docs/Api/NameApi.md#namevalidatelastname) | **POST** /validate/name/last | Validate a last name
*PhoneNumberApi* | [**phoneNumberSyntaxOnly**](docs/Api/PhoneNumberApi.md#phonenumbersyntaxonly) | **POST** /validate/phonenumber/basic | Validate phone number (basic)
*TextInputApi* | [**textInputCheckHtmlSsrf**](docs/Api/TextInputApi.md#textinputcheckhtmlssrf) | **POST** /validate/text-input/html/check/ssrf | Protect html input from Server-side Request Forgery (SSRF) attacks
*TextInputApi* | [**textInputCheckSqlInjection**](docs/Api/TextInputApi.md#textinputchecksqlinjection) | **POST** /validate/text-input/check/sql-injection | Check text input for SQL Injection (SQLI) attacks
*TextInputApi* | [**textInputCheckSqlInjectionBatch**](docs/Api/TextInputApi.md#textinputchecksqlinjectionbatch) | **POST** /validate/text-input/check/sql-injection/batch | Check and protect multiple text inputs for SQL Injection (SQLI) attacks in batch
*TextInputApi* | [**textInputCheckXss**](docs/Api/TextInputApi.md#textinputcheckxss) | **POST** /validate/text-input/check/xss | Check text input for Cross-Site-Scripting (XSS) attacks
Expand Down Expand Up @@ -168,6 +169,7 @@ Class | Method | HTTP request | Description
- [GetPublicHolidaysRequest](docs/Model/GetPublicHolidaysRequest.md)
- [GetTimezonesRequest](docs/Model/GetTimezonesRequest.md)
- [GetTimezonesResponse](docs/Model/GetTimezonesResponse.md)
- [HtmlSsrfDetectionResult](docs/Model/HtmlSsrfDetectionResult.md)
- [IPIntelligenceResponse](docs/Model/IPIntelligenceResponse.md)
- [IPReverseDNSLookupResponse](docs/Model/IPReverseDNSLookupResponse.md)
- [IPThreatResponse](docs/Model/IPThreatResponse.md)
Expand Down
2 changes: 1 addition & 1 deletion composer.json
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
{
"name": "cloudmersive/cloudmersive_validate_api_client",
"version": "1.7.6",
"version": "1.7.7",
"description": "",
"keywords": [
"swagger",
Expand Down
6 changes: 3 additions & 3 deletions docs/Api/DomainApi.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ Method | HTTP request | Description
------------- | ------------- | -------------
[**domainCheck**](DomainApi.md#domainCheck) | **POST** /validate/domain/check | Validate a domain name
[**domainGetTopLevelDomainFromUrl**](DomainApi.md#domainGetTopLevelDomainFromUrl) | **POST** /validate/domain/url/get-top-level-domain | Get top-level domain name from URL
[**domainIsAdminPath**](DomainApi.md#domainIsAdminPath) | **POST** /validate/domain/url/is-admin-path | Check if path is a high-risk server administration path
[**domainIsAdminPath**](DomainApi.md#domainIsAdminPath) | **POST** /validate/domain/url/is-admin-path | Check if path is a high-risk or vulnerable server administration path
[**domainPhishingCheck**](DomainApi.md#domainPhishingCheck) | **POST** /validate/domain/url/phishing-threat-check | Check a URL for Phishing threats
[**domainPost**](DomainApi.md#domainPost) | **POST** /validate/domain/whois | Get WHOIS information for a domain
[**domainQualityScore**](DomainApi.md#domainQualityScore) | **POST** /validate/domain/quality-score | Validate a domain name's quality score
Expand Down Expand Up @@ -130,9 +130,9 @@ Name | Type | Description | Notes
# **domainIsAdminPath**
> \Swagger\Client\Model\IsAdminPathResponse domainIsAdminPath($value)
Check if path is a high-risk server administration path
Check if path is a high-risk or vulnerable server administration path

Check if the input URL or relative path is a server Administration Path, and therefore a risk for remote access.
Check if the input URL or relative path is a server Administration Path, and therefore a risk or vulnerability for remote access.

### Example
```php
Expand Down
56 changes: 56 additions & 0 deletions docs/Api/TextInputApi.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,7 @@ All URIs are relative to *https://api.cloudmersive.com*

Method | HTTP request | Description
------------- | ------------- | -------------
[**textInputCheckHtmlSsrf**](TextInputApi.md#textInputCheckHtmlSsrf) | **POST** /validate/text-input/html/check/ssrf | Protect html input from Server-side Request Forgery (SSRF) attacks
[**textInputCheckSqlInjection**](TextInputApi.md#textInputCheckSqlInjection) | **POST** /validate/text-input/check/sql-injection | Check text input for SQL Injection (SQLI) attacks
[**textInputCheckSqlInjectionBatch**](TextInputApi.md#textInputCheckSqlInjectionBatch) | **POST** /validate/text-input/check/sql-injection/batch | Check and protect multiple text inputs for SQL Injection (SQLI) attacks in batch
[**textInputCheckXss**](TextInputApi.md#textInputCheckXss) | **POST** /validate/text-input/check/xss | Check text input for Cross-Site-Scripting (XSS) attacks
Expand All @@ -13,6 +14,61 @@ Method | HTTP request | Description
[**textInputProtectXss**](TextInputApi.md#textInputProtectXss) | **POST** /validate/text-input/protect/xss | Protect text input from Cross-Site-Scripting (XSS) attacks through normalization


# **textInputCheckHtmlSsrf**
> \Swagger\Client\Model\HtmlSsrfDetectionResult textInputCheckHtmlSsrf($value)
Protect html input from Server-side Request Forgery (SSRF) attacks

Detects SSRF (Server-side request forgery) attacks and unsafe URL attacks from HTML text input, where attackers can attempt to access unsafe local or network paths in the server environment by injecting them into HTML.

### Example
```php
<?php
require_once(__DIR__ . '/vendor/autoload.php');

// Configure API key authorization: Apikey
$config = Swagger\Client\Configuration::getDefaultConfiguration()->setApiKey('Apikey', 'YOUR_API_KEY');
// Uncomment below to setup prefix (e.g. Bearer) for API key, if needed
// $config = Swagger\Client\Configuration::getDefaultConfiguration()->setApiKeyPrefix('Apikey', 'Bearer');

$apiInstance = new Swagger\Client\Api\TextInputApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client(),
$config
);
$value = "value_example"; // string | User-facing HTML input.

try {
$result = $apiInstance->textInputCheckHtmlSsrf($value);
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling TextInputApi->textInputCheckHtmlSsrf: ', $e->getMessage(), PHP_EOL;
}
?>
```

### Parameters

Name | Type | Description | Notes
------------- | ------------- | ------------- | -------------
**value** | **string**| User-facing HTML input. |

### Return type

[**\Swagger\Client\Model\HtmlSsrfDetectionResult**](../Model/HtmlSsrfDetectionResult.md)

### Authorization

[Apikey](../../README.md#Apikey)

### HTTP request headers

- **Content-Type**: application/json, text/json
- **Accept**: application/json, text/json, application/xml, text/xml

[[Back to top]](#) [[Back to API list]](../../README.md#documentation-for-api-endpoints) [[Back to Model list]](../../README.md#documentation-for-models) [[Back to README]](../../README.md)

# **textInputCheckSqlInjection**
> \Swagger\Client\Model\SqlInjectionDetectionResult textInputCheckSqlInjection($value, $detection_level)
Expand Down
11 changes: 11 additions & 0 deletions docs/Model/HtmlSsrfDetectionResult.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,11 @@
# HtmlSsrfDetectionResult

## Properties
Name | Type | Description | Notes
------------ | ------------- | ------------- | -------------
**successful** | **bool** | True if the operation was successful, false otherwise | [optional]
**contained_threats** | **bool** | True if the input contained SSRF threats, false otherwise | [optional]

[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md)


8 changes: 4 additions & 4 deletions lib/Api/DomainApi.php
Original file line number Diff line number Diff line change
Expand Up @@ -609,7 +609,7 @@ protected function domainGetTopLevelDomainFromUrlRequest($request)
/**
* Operation domainIsAdminPath
*
* Check if path is a high-risk server administration path
* Check if path is a high-risk or vulnerable server administration path
*
* @param string $value URL or relative path to check, e.g. \&quot;/admin/login\&quot;. The input is a string so be sure to enclose it in double-quotes. (required)
*
Expand All @@ -626,7 +626,7 @@ public function domainIsAdminPath($value)
/**
* Operation domainIsAdminPathWithHttpInfo
*
* Check if path is a high-risk server administration path
* Check if path is a high-risk or vulnerable server administration path
*
* @param string $value URL or relative path to check, e.g. \&quot;/admin/login\&quot;. The input is a string so be sure to enclose it in double-quotes. (required)
*
Expand Down Expand Up @@ -701,7 +701,7 @@ public function domainIsAdminPathWithHttpInfo($value)
/**
* Operation domainIsAdminPathAsync
*
* Check if path is a high-risk server administration path
* Check if path is a high-risk or vulnerable server administration path
*
* @param string $value URL or relative path to check, e.g. \&quot;/admin/login\&quot;. The input is a string so be sure to enclose it in double-quotes. (required)
*
Expand All @@ -721,7 +721,7 @@ function ($response) {
/**
* Operation domainIsAdminPathAsyncWithHttpInfo
*
* Check if path is a high-risk server administration path
* Check if path is a high-risk or vulnerable server administration path
*
* @param string $value URL or relative path to check, e.g. \&quot;/admin/login\&quot;. The input is a string so be sure to enclose it in double-quotes. (required)
*
Expand Down
Loading

0 comments on commit ad0f823

Please sign in to comment.