Skip to content

Commit

Permalink
1.8.0
Browse files Browse the repository at this point in the history
  • Loading branch information
Cloudmersive committed Jun 3, 2023
1 parent 8f0fdb6 commit e5503b3
Show file tree
Hide file tree
Showing 6 changed files with 27 additions and 16 deletions.
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ The validation APIs help you validate data. Check if an E-mail address is real.
[Cloudmersive Validation API](https://www.cloudmersive.com/validate-api) provides data validation capabilities for validating email addresses, phone numbers, IP addresses, and many other types of business data.

- API version: v1
- Package version: 1.7.9
- Package version: 1.8.0


## Requirements
Expand Down
2 changes: 1 addition & 1 deletion composer.json
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
{
"name": "cloudmersive/cloudmersive_validate_api_client",
"version": "1.7.9",
"version": "1.8.0",
"description": "",
"keywords": [
"swagger",
Expand Down
6 changes: 4 additions & 2 deletions docs/Api/TextInputApi.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ Method | HTTP request | Description


# **textInputCheckHtmlSsrf**
> \Swagger\Client\Model\HtmlSsrfDetectionResult textInputCheckHtmlSsrf($value)
> \Swagger\Client\Model\HtmlSsrfDetectionResult textInputCheckHtmlSsrf($value, $allow_cid_scheme)
Protect html input from Server-side Request Forgery (SSRF) attacks

Expand All @@ -38,9 +38,10 @@ $apiInstance = new Swagger\Client\Api\TextInputApi(
$config
);
$value = "value_example"; // string | User-facing HTML input.
$allow_cid_scheme = true; // bool | Optional: Set to true to allow cid: scheme URLs for email message attachments. Default is false.

try {
$result = $apiInstance->textInputCheckHtmlSsrf($value);
$result = $apiInstance->textInputCheckHtmlSsrf($value, $allow_cid_scheme);
print_r($result);
} catch (Exception $e) {
echo 'Exception when calling TextInputApi->textInputCheckHtmlSsrf: ', $e->getMessage(), PHP_EOL;
Expand All @@ -53,6 +54,7 @@ try {
Name | Type | Description | Notes
------------- | ------------- | ------------- | -------------
**value** | **string**| User-facing HTML input. |
**allow_cid_scheme** | **bool**| Optional: Set to true to allow cid: scheme URLs for email message attachments. Default is false. | [optional]

### Return type

Expand Down
27 changes: 18 additions & 9 deletions lib/Api/TextInputApi.php
Original file line number Diff line number Diff line change
Expand Up @@ -88,14 +88,15 @@ public function getConfig()
* Protect html input from Server-side Request Forgery (SSRF) attacks
*
* @param string $value User-facing HTML input. (required)
* @param bool $allow_cid_scheme Optional: Set to true to allow cid: scheme URLs for email message attachments. Default is false. (optional)
*
* @throws \Swagger\Client\ApiException on non-2xx response
* @throws \InvalidArgumentException
* @return \Swagger\Client\Model\HtmlSsrfDetectionResult
*/
public function textInputCheckHtmlSsrf($value)
public function textInputCheckHtmlSsrf($value, $allow_cid_scheme = null)
{
list($response) = $this->textInputCheckHtmlSsrfWithHttpInfo($value);
list($response) = $this->textInputCheckHtmlSsrfWithHttpInfo($value, $allow_cid_scheme);
return $response;
}

Expand All @@ -105,15 +106,16 @@ public function textInputCheckHtmlSsrf($value)
* Protect html input from Server-side Request Forgery (SSRF) attacks
*
* @param string $value User-facing HTML input. (required)
* @param bool $allow_cid_scheme Optional: Set to true to allow cid: scheme URLs for email message attachments. Default is false. (optional)
*
* @throws \Swagger\Client\ApiException on non-2xx response
* @throws \InvalidArgumentException
* @return array of \Swagger\Client\Model\HtmlSsrfDetectionResult, HTTP status code, HTTP response headers (array of strings)
*/
public function textInputCheckHtmlSsrfWithHttpInfo($value)
public function textInputCheckHtmlSsrfWithHttpInfo($value, $allow_cid_scheme = null)
{
$returnType = '\Swagger\Client\Model\HtmlSsrfDetectionResult';
$request = $this->textInputCheckHtmlSsrfRequest($value);
$request = $this->textInputCheckHtmlSsrfRequest($value, $allow_cid_scheme);

try {
$options = $this->createHttpClientOption();
Expand Down Expand Up @@ -180,13 +182,14 @@ public function textInputCheckHtmlSsrfWithHttpInfo($value)
* Protect html input from Server-side Request Forgery (SSRF) attacks
*
* @param string $value User-facing HTML input. (required)
* @param bool $allow_cid_scheme Optional: Set to true to allow cid: scheme URLs for email message attachments. Default is false. (optional)
*
* @throws \InvalidArgumentException
* @return \GuzzleHttp\Promise\PromiseInterface
*/
public function textInputCheckHtmlSsrfAsync($value)
public function textInputCheckHtmlSsrfAsync($value, $allow_cid_scheme = null)
{
return $this->textInputCheckHtmlSsrfAsyncWithHttpInfo($value)
return $this->textInputCheckHtmlSsrfAsyncWithHttpInfo($value, $allow_cid_scheme)
->then(
function ($response) {
return $response[0];
Expand All @@ -200,14 +203,15 @@ function ($response) {
* Protect html input from Server-side Request Forgery (SSRF) attacks
*
* @param string $value User-facing HTML input. (required)
* @param bool $allow_cid_scheme Optional: Set to true to allow cid: scheme URLs for email message attachments. Default is false. (optional)
*
* @throws \InvalidArgumentException
* @return \GuzzleHttp\Promise\PromiseInterface
*/
public function textInputCheckHtmlSsrfAsyncWithHttpInfo($value)
public function textInputCheckHtmlSsrfAsyncWithHttpInfo($value, $allow_cid_scheme = null)
{
$returnType = '\Swagger\Client\Model\HtmlSsrfDetectionResult';
$request = $this->textInputCheckHtmlSsrfRequest($value);
$request = $this->textInputCheckHtmlSsrfRequest($value, $allow_cid_scheme);

return $this->client
->sendAsync($request, $this->createHttpClientOption())
Expand Down Expand Up @@ -250,11 +254,12 @@ function ($exception) {
* Create request for operation 'textInputCheckHtmlSsrf'
*
* @param string $value User-facing HTML input. (required)
* @param bool $allow_cid_scheme Optional: Set to true to allow cid: scheme URLs for email message attachments. Default is false. (optional)
*
* @throws \InvalidArgumentException
* @return \GuzzleHttp\Psr7\Request
*/
protected function textInputCheckHtmlSsrfRequest($value)
protected function textInputCheckHtmlSsrfRequest($value, $allow_cid_scheme = null)
{
// verify the required parameter 'value' is set
if ($value === null) {
Expand All @@ -270,6 +275,10 @@ protected function textInputCheckHtmlSsrfRequest($value)
$httpBody = '';
$multipart = false;

// header params
if ($allow_cid_scheme !== null) {
$headerParams['allowCidScheme'] = ObjectSerializer::toHeaderValue($allow_cid_scheme);
}


// body params
Expand Down
4 changes: 2 additions & 2 deletions lib/Configuration.php
Original file line number Diff line number Diff line change
Expand Up @@ -88,7 +88,7 @@ class Configuration
*
* @var string
*/
protected $userAgent = 'Swagger-Codegen/1.7.9/php';
protected $userAgent = 'Swagger-Codegen/1.8.0/php';

/**
* Debug switch (default set to false)
Expand Down Expand Up @@ -397,7 +397,7 @@ public static function toDebugReport()
$report .= ' OS: ' . php_uname() . PHP_EOL;
$report .= ' PHP Version: ' . PHP_VERSION . PHP_EOL;
$report .= ' OpenAPI Spec Version: v1' . PHP_EOL;
$report .= ' SDK Package Version: 1.7.9' . PHP_EOL;
$report .= ' SDK Package Version: 1.8.0' . PHP_EOL;
$report .= ' Temp Folder Path: ' . self::getDefaultConfiguration()->getTempFolderPath() . PHP_EOL;

return $report;
Expand Down
2 changes: 1 addition & 1 deletion packageconfig.json
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
{
"artifactVersion": "1.7.9",
"artifactVersion": "1.8.0",
"gitUserId": "Cloudmersive",
"gitRepoId": "Cloudmersive.APIClient.PHP.Validate",
"composerVendorName": "cloudmersive",
Expand Down

0 comments on commit e5503b3

Please sign in to comment.