Skip to content

Commit

Permalink
1.7.3
Browse files Browse the repository at this point in the history
  • Loading branch information
Cloudmersive committed Apr 3, 2021
1 parent 676e25e commit a587e85
Show file tree
Hide file tree
Showing 19 changed files with 2,389 additions and 6 deletions.
8 changes: 7 additions & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ The validation APIs help you validate data. Check if an E-mail address is real.
[Cloudmersive Validation API](https://www.cloudmersive.com/validate-api) provides data validation capabilities for validating email addresses, phone numbers, IP addresses, and many other types of business data.

- API version: v1
- Package version: 1.7.2
- Package version: 1.7.3


## Requirements
Expand Down Expand Up @@ -131,6 +131,8 @@ Class | Method | HTTP request | Description
*NameApi* | [**nameValidateFullName**](docs/Api/NameApi.md#namevalidatefullname) | **POST** /validate/name/full-name | Parse and validate a full name
*NameApi* | [**nameValidateLastName**](docs/Api/NameApi.md#namevalidatelastname) | **POST** /validate/name/last | Validate a last name
*PhoneNumberApi* | [**phoneNumberSyntaxOnly**](docs/Api/PhoneNumberApi.md#phonenumbersyntaxonly) | **POST** /validate/phonenumber/basic | Validate phone number (basic)
*TextInputApi* | [**textInputCheckSqlInjection**](docs/Api/TextInputApi.md#textinputchecksqlinjection) | **POST** /validate/text-input/check/sql-injection | Check text input for SQL Injection (SQLI) attacks
*TextInputApi* | [**textInputCheckSqlInjectionBatch**](docs/Api/TextInputApi.md#textinputchecksqlinjectionbatch) | **POST** /validate/text-input/check/sql-injection/batch | Check and protect multiple text inputs for SQL Injection (SQLI) attacks in batch
*TextInputApi* | [**textInputCheckXss**](docs/Api/TextInputApi.md#textinputcheckxss) | **POST** /validate/text-input/check/xss | Check text input for Cross-Site-Scripting (XSS) attacks
*TextInputApi* | [**textInputCheckXssBatch**](docs/Api/TextInputApi.md#textinputcheckxssbatch) | **POST** /validate/text-input/check-and-protect/xss/batch | Check and protect multiple text inputs for Cross-Site-Scripting (XSS) attacks in batch
*TextInputApi* | [**textInputProtectXss**](docs/Api/TextInputApi.md#textinputprotectxss) | **POST** /validate/text-input/protect/xss | Protect text input from Cross-Site-Scripting (XSS) attacks through normalization
Expand Down Expand Up @@ -181,6 +183,10 @@ Class | Method | HTTP request | Description
- [PublicHolidaysResponse](docs/Model/PublicHolidaysResponse.md)
- [ReverseGeocodeAddressRequest](docs/Model/ReverseGeocodeAddressRequest.md)
- [ReverseGeocodeAddressResponse](docs/Model/ReverseGeocodeAddressResponse.md)
- [SqlInjectionCheckBatchRequest](docs/Model/SqlInjectionCheckBatchRequest.md)
- [SqlInjectionCheckBatchResponse](docs/Model/SqlInjectionCheckBatchResponse.md)
- [SqlInjectionCheckRequestItem](docs/Model/SqlInjectionCheckRequestItem.md)
- [SqlInjectionDetectionResult](docs/Model/SqlInjectionDetectionResult.md)
- [Timezone](docs/Model/Timezone.md)
- [TorNodeResponse](docs/Model/TorNodeResponse.md)
- [UrlSafetyCheckRequestFull](docs/Model/UrlSafetyCheckRequestFull.md)
Expand Down
2 changes: 1 addition & 1 deletion composer.json
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
{
"name": "cloudmersive/cloudmersive_validate_api_client",
"version": "1.7.2",
"version": "1.7.3",
"description": "",
"keywords": [
"swagger",
Expand Down
116 changes: 115 additions & 1 deletion docs/Api/TextInputApi.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,11 +4,125 @@ All URIs are relative to *https://api.cloudmersive.com*

Method | HTTP request | Description
------------- | ------------- | -------------
[**textInputCheckSqlInjection**](TextInputApi.md#textInputCheckSqlInjection) | **POST** /validate/text-input/check/sql-injection | Check text input for SQL Injection (SQLI) attacks
[**textInputCheckSqlInjectionBatch**](TextInputApi.md#textInputCheckSqlInjectionBatch) | **POST** /validate/text-input/check/sql-injection/batch | Check and protect multiple text inputs for SQL Injection (SQLI) attacks in batch
[**textInputCheckXss**](TextInputApi.md#textInputCheckXss) | **POST** /validate/text-input/check/xss | Check text input for Cross-Site-Scripting (XSS) attacks
[**textInputCheckXssBatch**](TextInputApi.md#textInputCheckXssBatch) | **POST** /validate/text-input/check-and-protect/xss/batch | Check and protect multiple text inputs for Cross-Site-Scripting (XSS) attacks in batch
[**textInputProtectXss**](TextInputApi.md#textInputProtectXss) | **POST** /validate/text-input/protect/xss | Protect text input from Cross-Site-Scripting (XSS) attacks through normalization


# **textInputCheckSqlInjection**
> \Swagger\Client\Model\SqlInjectionDetectionResult textInputCheckSqlInjection($value, $detection_level)
Check text input for SQL Injection (SQLI) attacks

Detects SQL Injection (SQLI) attacks from text input.

### Example
```php
<?php
require_once(__DIR__ . '/vendor/autoload.php');

// Configure API key authorization: Apikey
$config = Swagger\Client\Configuration::getDefaultConfiguration()->setApiKey('Apikey', 'YOUR_API_KEY');
// Uncomment below to setup prefix (e.g. Bearer) for API key, if needed
// $config = Swagger\Client\Configuration::getDefaultConfiguration()->setApiKeyPrefix('Apikey', 'Bearer');

$apiInstance = new Swagger\Client\Api\TextInputApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client(),
$config
);
$value = "value_example"; // string | User-facing text input.
$detection_level = "detection_level_example"; // string | Set to Normal to target a high-security SQL Injection detection level with a very low false positive rate; select High to target a very-high security SQL Injection detection level with higher false positives. Default is Normal (recommended).

try {
$result = $apiInstance->textInputCheckSqlInjection($value, $detection_level);
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling TextInputApi->textInputCheckSqlInjection: ', $e->getMessage(), PHP_EOL;
}
?>
```

### Parameters

Name | Type | Description | Notes
------------- | ------------- | ------------- | -------------
**value** | **string**| User-facing text input. |
**detection_level** | **string**| Set to Normal to target a high-security SQL Injection detection level with a very low false positive rate; select High to target a very-high security SQL Injection detection level with higher false positives. Default is Normal (recommended). | [optional]

### Return type

[**\Swagger\Client\Model\SqlInjectionDetectionResult**](../Model/SqlInjectionDetectionResult.md)

### Authorization

[Apikey](../../README.md#Apikey)

### HTTP request headers

- **Content-Type**: application/json, text/json
- **Accept**: application/json, text/json, application/xml, text/xml

[[Back to top]](#) [[Back to API list]](../../README.md#documentation-for-api-endpoints) [[Back to Model list]](../../README.md#documentation-for-models) [[Back to README]](../../README.md)

# **textInputCheckSqlInjectionBatch**
> \Swagger\Client\Model\SqlInjectionCheckBatchResponse textInputCheckSqlInjectionBatch($value)
Check and protect multiple text inputs for SQL Injection (SQLI) attacks in batch

Detects SQL Injection (SQLI) attacks from multiple text inputs. Output preverses order of input items.

### Example
```php
<?php
require_once(__DIR__ . '/vendor/autoload.php');

// Configure API key authorization: Apikey
$config = Swagger\Client\Configuration::getDefaultConfiguration()->setApiKey('Apikey', 'YOUR_API_KEY');
// Uncomment below to setup prefix (e.g. Bearer) for API key, if needed
// $config = Swagger\Client\Configuration::getDefaultConfiguration()->setApiKeyPrefix('Apikey', 'Bearer');

$apiInstance = new Swagger\Client\Api\TextInputApi(
// If you want use custom http client, pass your client which implements `GuzzleHttp\ClientInterface`.
// This is optional, `GuzzleHttp\Client` will be used as default.
new GuzzleHttp\Client(),
$config
);
$value = new \Swagger\Client\Model\SqlInjectionCheckBatchRequest(); // \Swagger\Client\Model\SqlInjectionCheckBatchRequest | User-facing text input.

try {
$result = $apiInstance->textInputCheckSqlInjectionBatch($value);
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling TextInputApi->textInputCheckSqlInjectionBatch: ', $e->getMessage(), PHP_EOL;
}
?>
```

### Parameters

Name | Type | Description | Notes
------------- | ------------- | ------------- | -------------
**value** | [**\Swagger\Client\Model\SqlInjectionCheckBatchRequest**](../Model/SqlInjectionCheckBatchRequest.md)| User-facing text input. |

### Return type

[**\Swagger\Client\Model\SqlInjectionCheckBatchResponse**](../Model/SqlInjectionCheckBatchResponse.md)

### Authorization

[Apikey](../../README.md#Apikey)

### HTTP request headers

- **Content-Type**: application/json, text/json
- **Accept**: application/json, text/json, application/xml, text/xml

[[Back to top]](#) [[Back to API list]](../../README.md#documentation-for-api-endpoints) [[Back to Model list]](../../README.md#documentation-for-models) [[Back to README]](../../README.md)

# **textInputCheckXss**
> \Swagger\Client\Model\XssProtectionResult textInputCheckXss($value)
Expand Down Expand Up @@ -69,7 +183,7 @@ Name | Type | Description | Notes
Check and protect multiple text inputs for Cross-Site-Scripting (XSS) attacks in batch

Detects XSS (Cross-Site-Scripting) attacks from multiple text input. Output preverses order of input items.
Detects XSS (Cross-Site-Scripting) attacks from multiple text inputs. Output preverses order of input items.

### Example
```php
Expand Down
11 changes: 11 additions & 0 deletions docs/Model/SqlInjectionCheckBatchRequest.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,11 @@
# SqlInjectionCheckBatchRequest

## Properties
Name | Type | Description | Notes
------------ | ------------- | ------------- | -------------
**request_items** | [**\Swagger\Client\Model\SqlInjectionCheckRequestItem[]**](SqlInjectionCheckRequestItem.md) | Multiple items to detect for SQL Injection | [optional]
**detection_level** | **string** | Set to Normal to target a high-security SQL Injection detection level with a very low false positive rate; select High to target a very-high security SQL Injection detection level with higher false positives. Default is Normal (recommended). | [optional]

[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md)


10 changes: 10 additions & 0 deletions docs/Model/SqlInjectionCheckBatchResponse.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
# SqlInjectionCheckBatchResponse

## Properties
Name | Type | Description | Notes
------------ | ------------- | ------------- | -------------
**result_items** | [**\Swagger\Client\Model\SqlInjectionDetectionResult[]**](SqlInjectionDetectionResult.md) | Results from performing a batch SQL Injection detection operation; order is preserved from input data | [optional]

[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md)


10 changes: 10 additions & 0 deletions docs/Model/SqlInjectionCheckRequestItem.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
# SqlInjectionCheckRequestItem

## Properties
Name | Type | Description | Notes
------------ | ------------- | ------------- | -------------
**input_text** | **string** | Individual input text item to check for SQL Injection | [optional]

[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md)


12 changes: 12 additions & 0 deletions docs/Model/SqlInjectionDetectionResult.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
# SqlInjectionDetectionResult

## Properties
Name | Type | Description | Notes
------------ | ------------- | ------------- | -------------
**successful** | **bool** | True if the operation was successful, false otherwise | [optional]
**contained_sql_injection_attack** | **bool** | True if the input contained SQL Injection attacks, false otherwise | [optional]
**original_input** | **string** | Original input string | [optional]

[[Back to Model list]](../README.md#documentation-for-models) [[Back to API list]](../README.md#documentation-for-api-endpoints) [[Back to README]](../README.md)


Loading

0 comments on commit a587e85

Please sign in to comment.