From 24449fd1ad9085808efbc8c872df1c63c4b4baa9 Mon Sep 17 00:00:00 2001 From: Cloudmersive <35204726+Cloudmersive@users.noreply.github.com> Date: Sun, 29 May 2022 18:59:52 -0700 Subject: [PATCH] 1.2.6 --- README.md | 2 +- client/README.md | 2 +- .../docs/AdditionalAdvancedScanInformation.md | 1 + .../CloudStorageAdvancedVirusScanResult.md | 1 + client/docs/CloudStorageVirusScanResult.md | 1 + client/docs/ScanApi.md | 2 +- client/docs/ScanCloudStorageApi.md | 32 +++++++++---------- client/package.json | 2 +- client/src/ApiClient.js | 2 +- client/src/api/ScanApi.js | 4 +-- client/src/api/ScanCloudStorageApi.js | 18 +++++------ client/src/index.js | 2 +- .../AdditionalAdvancedScanInformation.js | 11 ++++++- .../CloudStorageAdvancedVirusScanResult.js | 19 ++++++++--- client/src/model/CloudStorageVirusFound.js | 2 +- .../src/model/CloudStorageVirusScanResult.js | 11 ++++++- client/src/model/VirusFound.js | 2 +- client/src/model/VirusScanAdvancedResult.js | 2 +- client/src/model/VirusScanResult.js | 2 +- client/src/model/WebsiteScanRequest.js | 2 +- client/src/model/WebsiteScanResult.js | 2 +- .../AdditionalAdvancedScanInformation.spec.js | 6 ++++ ...loudStorageAdvancedVirusScanResult.spec.js | 6 ++++ .../model/CloudStorageVirusScanResult.spec.js | 6 ++++ packageconfig.json | 2 +- 25 files changed, 95 insertions(+), 47 deletions(-) diff --git a/README.md b/README.md index 417c6ce..9600ff1 100644 --- a/README.md +++ b/README.md @@ -5,7 +5,7 @@ The Cloudmersive Virus Scan API lets you scan files and content for viruses and [Cloudmersive Virus Scan API](https://www.cloudmersive.com/virus-api) provides advanced virus scanning capabilities. - API version: v1 -- Package version: 1.2.5 +- Package version: 1.2.6 ## Installation diff --git a/client/README.md b/client/README.md index 417c6ce..9600ff1 100644 --- a/client/README.md +++ b/client/README.md @@ -5,7 +5,7 @@ The Cloudmersive Virus Scan API lets you scan files and content for viruses and [Cloudmersive Virus Scan API](https://www.cloudmersive.com/virus-api) provides advanced virus scanning capabilities. - API version: v1 -- Package version: 1.2.5 +- Package version: 1.2.6 ## Installation diff --git a/client/docs/AdditionalAdvancedScanInformation.md b/client/docs/AdditionalAdvancedScanInformation.md index 6ebc10b..f81306e 100644 --- a/client/docs/AdditionalAdvancedScanInformation.md +++ b/client/docs/AdditionalAdvancedScanInformation.md @@ -5,5 +5,6 @@ Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **containsJSON** | **Boolean** | True if the input file contains JSON data, false otherwise; this is not a threat signal | [optional] **containsXML** | **Boolean** | True if the input file contains XML data, false otherwise; this is not a threat signal | [optional] +**containsImage** | **Boolean** | True if the input file contains an image | [optional] diff --git a/client/docs/CloudStorageAdvancedVirusScanResult.md b/client/docs/CloudStorageAdvancedVirusScanResult.md index 5770b18..dd02f3f 100644 --- a/client/docs/CloudStorageAdvancedVirusScanResult.md +++ b/client/docs/CloudStorageAdvancedVirusScanResult.md @@ -15,5 +15,6 @@ Name | Type | Description | Notes **foundViruses** | [**[CloudStorageVirusFound]**](CloudStorageVirusFound.md) | Array of viruses found, if any | [optional] **errorDetailedDescription** | **String** | Detailed error message if the operation was not successful | [optional] **fileSize** | **Number** | Size in bytes of the file that was retrieved and scanned | [optional] +**contentInformation** | [**AdditionalAdvancedScanInformation**](AdditionalAdvancedScanInformation.md) | Contains additional non-threat content verification information | [optional] diff --git a/client/docs/CloudStorageVirusScanResult.md b/client/docs/CloudStorageVirusScanResult.md index e63b635..b969527 100644 --- a/client/docs/CloudStorageVirusScanResult.md +++ b/client/docs/CloudStorageVirusScanResult.md @@ -8,5 +8,6 @@ Name | Type | Description | Notes **foundViruses** | [**[CloudStorageVirusFound]**](CloudStorageVirusFound.md) | Array of viruses found, if any | [optional] **errorDetailedDescription** | **String** | Detailed error message if the operation was not successful | [optional] **fileSize** | **Number** | Size in bytes of the file that was retrieved and scanned | [optional] +**containsContentModerationRejection** | **Boolean** | Set to true when using NSFW Content Moderation in the Cloudmersive Storage Protect product (disabled by default) | [optional] diff --git a/client/docs/ScanApi.md b/client/docs/ScanApi.md index 2dfa706..b46abf3 100644 --- a/client/docs/ScanApi.md +++ b/client/docs/ScanApi.md @@ -68,7 +68,7 @@ Name | Type | Description | Notes Advanced Scan a file for viruses -Advanced Scan files with 360-degree Content Protection across Viruses and Malware, executables, invalid files, scripts, and even restrictions on accepted file types with complete content verification. Customize threat rules to your needs. Leverage continuously updated signatures for millions of threats, and advanced high-performance scanning capabilities. Over 17 million virus and malware signatures. Continuous cloud-based updates. Block threats beyond viruses including executables, scripts, invalid files, and more. Optionally limit input files to a specific set of file types (e.g. PDF and Word Documents only). Wide file format support including Office, PDF, HTML, Flash. Zip support including .Zip, .Rar, .DMG, .Tar, and other archive formats. Multi-threat scanning across viruses, malware, trojans, ransomware, and spyware. High-speed in-memory scanning delivers subsecond typical response time. +Advanced Scan files with 360-degree Content Protection across Viruses and Malware, executables, invalid files, scripts, and even restrictions on accepted file types with complete content verification. Customize threat rules to your needs. Leverage continuously updated signatures for millions of threats, and advanced high-performance scanning capabilities. Over 17 million virus and malware signatures. Continuous cloud-based updates. Block threats beyond viruses including executables, scripts, invalid files, and more. Optionally limit input files to a specific set of file types (e.g. PDF and Word Documents only). Wide file format support including Office, PDF, HTML, Flash, MSG, and a wide range of image file formats. Zip support including .Zip, .Rar, .DMG, .Tar, and other archive formats. Multi-threat scanning across viruses, malware, trojans, ransomware, and spyware. High-speed in-memory scanning delivers subsecond typical response time. ### Example ```javascript diff --git a/client/docs/ScanCloudStorageApi.md b/client/docs/ScanCloudStorageApi.md index 483ae63..504caa1 100644 --- a/client/docs/ScanCloudStorageApi.md +++ b/client/docs/ScanCloudStorageApi.md @@ -43,7 +43,7 @@ var bucketRegion = "bucketRegion_example"; // String | Name of the region of the var bucketName = "bucketName_example"; // String | Name of the S3 bucket -var keyName = "keyName_example"; // String | Key name (also called file name) of the file in S3 that you wish to scan for viruses +var keyName = "keyName_example"; // String | Key name (also called file name) of the file in S3 that you wish to scan for viruses. If the key name contains Unicode characters, you must base64 encode the key name and prepend it with 'base64:', such as: 'base64:6ZWV6ZWV6ZWV6ZWV6ZWV6ZWV'. var callback = function(error, data, response) { @@ -64,7 +64,7 @@ Name | Type | Description | Notes **secretKey** | **String**| AWS S3 secret key for the S3 bucket; you can get this from My Security Credentials in the AWS console | **bucketRegion** | **String**| Name of the region of the S3 bucket, such as 'US-East-1' | **bucketName** | **String**| Name of the S3 bucket | - **keyName** | **String**| Key name (also called file name) of the file in S3 that you wish to scan for viruses | + **keyName** | **String**| Key name (also called file name) of the file in S3 that you wish to scan for viruses. If the key name contains Unicode characters, you must base64 encode the key name and prepend it with 'base64:', such as: 'base64:6ZWV6ZWV6ZWV6ZWV6ZWV6ZWV'. | ### Return type @@ -108,7 +108,7 @@ var bucketRegion = "bucketRegion_example"; // String | Name of the region of the var bucketName = "bucketName_example"; // String | Name of the S3 bucket -var keyName = "keyName_example"; // String | Key name (also called file name) of the file in S3 that you wish to scan for viruses +var keyName = "keyName_example"; // String | Key name (also called file name) of the file in S3 that you wish to scan for viruses. If the key name contains Unicode characters, you must base64 encode the key name and prepend it with 'base64:', such as: 'base64:6ZWV6ZWV6ZWV6ZWV6ZWV6ZWV'. var opts = { 'allowExecutables': true, // Boolean | Set to false to block executable files (program code) from being allowed in the input file. Default is false (recommended). @@ -138,7 +138,7 @@ Name | Type | Description | Notes **secretKey** | **String**| AWS S3 secret key for the S3 bucket; you can get this from My Security Credentials in the AWS console | **bucketRegion** | **String**| Name of the region of the S3 bucket, such as 'US-East-1' | **bucketName** | **String**| Name of the S3 bucket | - **keyName** | **String**| Key name (also called file name) of the file in S3 that you wish to scan for viruses | + **keyName** | **String**| Key name (also called file name) of the file in S3 that you wish to scan for viruses. If the key name contains Unicode characters, you must base64 encode the key name and prepend it with 'base64:', such as: 'base64:6ZWV6ZWV6ZWV6ZWV6ZWV6ZWV'. | **allowExecutables** | **Boolean**| Set to false to block executable files (program code) from being allowed in the input file. Default is false (recommended). | [optional] **allowInvalidFiles** | **Boolean**| Set to false to block invalid files, such as a PDF file that is not really a valid PDF file, or a Word Document that is not a valid Word Document. Default is false (recommended). | [optional] **allowScripts** | **Boolean**| Set to false to block script files, such as a PHP files, Python scripts, and other malicious content or security threats that can be embedded in the file. Set to true to allow these file types. Default is false (recommended). | [optional] @@ -185,7 +185,7 @@ var connectionString = "connectionString_example"; // String | Connection string var containerName = "containerName_example"; // String | Name of the Blob container within the Azure Blob Storage account -var blobPath = "blobPath_example"; // String | Path to the blob within the container, such as 'hello.pdf' or '/folder/subfolder/world.pdf' +var blobPath = "blobPath_example"; // String | Path to the blob within the container, such as 'hello.pdf' or '/folder/subfolder/world.pdf'. If the blob path contains Unicode characters, you must base64 encode the blob path and prepend it with 'base64:', such as: 'base64:6ZWV6ZWV6ZWV6ZWV6ZWV6ZWV'. var callback = function(error, data, response) { @@ -204,7 +204,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **connectionString** | **String**| Connection string for the Azure Blob Storage Account; you can get this connection string from the Access Keys tab of the Storage Account blade in the Azure Portal. | **containerName** | **String**| Name of the Blob container within the Azure Blob Storage account | - **blobPath** | **String**| Path to the blob within the container, such as 'hello.pdf' or '/folder/subfolder/world.pdf' | + **blobPath** | **String**| Path to the blob within the container, such as 'hello.pdf' or '/folder/subfolder/world.pdf'. If the blob path contains Unicode characters, you must base64 encode the blob path and prepend it with 'base64:', such as: 'base64:6ZWV6ZWV6ZWV6ZWV6ZWV6ZWV'. | ### Return type @@ -244,7 +244,7 @@ var connectionString = "connectionString_example"; // String | Connection string var containerName = "containerName_example"; // String | Name of the Blob container within the Azure Blob Storage account -var blobPath = "blobPath_example"; // String | Path to the blob within the container, such as 'hello.pdf' or '/folder/subfolder/world.pdf' +var blobPath = "blobPath_example"; // String | Path to the blob within the container, such as 'hello.pdf' or '/folder/subfolder/world.pdf'. If the blob path contains Unicode characters, you must base64 encode the blob path and prepend it with 'base64:', such as: 'base64:6ZWV6ZWV6ZWV6ZWV6ZWV6ZWV'. var opts = { 'allowExecutables': true, // Boolean | Set to false to block executable files (program code) from being allowed in the input file. Default is false (recommended). @@ -272,7 +272,7 @@ Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **connectionString** | **String**| Connection string for the Azure Blob Storage Account; you can get this connection string from the Access Keys tab of the Storage Account blade in the Azure Portal. | **containerName** | **String**| Name of the Blob container within the Azure Blob Storage account | - **blobPath** | **String**| Path to the blob within the container, such as 'hello.pdf' or '/folder/subfolder/world.pdf' | + **blobPath** | **String**| Path to the blob within the container, such as 'hello.pdf' or '/folder/subfolder/world.pdf'. If the blob path contains Unicode characters, you must base64 encode the blob path and prepend it with 'base64:', such as: 'base64:6ZWV6ZWV6ZWV6ZWV6ZWV6ZWV'. | **allowExecutables** | **Boolean**| Set to false to block executable files (program code) from being allowed in the input file. Default is false (recommended). | [optional] **allowInvalidFiles** | **Boolean**| Set to false to block invalid files, such as a PDF file that is not really a valid PDF file, or a Word Document that is not a valid Word Document. Default is false (recommended). | [optional] **allowScripts** | **Boolean**| Set to false to block script files, such as a PHP files, Python scripts, and other malicious content or security threats that can be embedded in the file. Set to true to allow these file types. Default is false (recommended). | [optional] @@ -317,7 +317,7 @@ var apiInstance = new CloudmersiveVirusApiClient.ScanCloudStorageApi(); var bucketName = "bucketName_example"; // String | Name of the bucket in Google Cloud Storage -var objectName = "objectName_example"; // String | Name of the object or file in Google Cloud Storage +var objectName = "objectName_example"; // String | Name of the object or file in Google Cloud Storage. If the object name contains Unicode characters, you must base64 encode the object name and prepend it with 'base64:', such as: 'base64:6ZWV6ZWV6ZWV6ZWV6ZWV6ZWV'. var jsonCredentialFile = "/path/to/file.txt"; // File | Service Account credential for Google Cloud stored in a JSON file. @@ -337,7 +337,7 @@ apiInstance.scanCloudStorageScanGcpStorageFile(bucketName, objectName, jsonCrede Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **bucketName** | **String**| Name of the bucket in Google Cloud Storage | - **objectName** | **String**| Name of the object or file in Google Cloud Storage | + **objectName** | **String**| Name of the object or file in Google Cloud Storage. If the object name contains Unicode characters, you must base64 encode the object name and prepend it with 'base64:', such as: 'base64:6ZWV6ZWV6ZWV6ZWV6ZWV6ZWV'. | **jsonCredentialFile** | **File**| Service Account credential for Google Cloud stored in a JSON file. | ### Return type @@ -376,7 +376,7 @@ var apiInstance = new CloudmersiveVirusApiClient.ScanCloudStorageApi(); var bucketName = "bucketName_example"; // String | Name of the bucket in Google Cloud Storage -var objectName = "objectName_example"; // String | Name of the object or file in Google Cloud Storage +var objectName = "objectName_example"; // String | Name of the object or file in Google Cloud Storage. If the object name contains Unicode characters, you must base64 encode the object name and prepend it with 'base64:', such as: 'base64:6ZWV6ZWV6ZWV6ZWV6ZWV6ZWV'. var jsonCredentialFile = "/path/to/file.txt"; // File | Service Account credential for Google Cloud stored in a JSON file. @@ -405,7 +405,7 @@ apiInstance.scanCloudStorageScanGcpStorageFileAdvanced(bucketName, objectName, j Name | Type | Description | Notes ------------- | ------------- | ------------- | ------------- **bucketName** | **String**| Name of the bucket in Google Cloud Storage | - **objectName** | **String**| Name of the object or file in Google Cloud Storage | + **objectName** | **String**| Name of the object or file in Google Cloud Storage. If the object name contains Unicode characters, you must base64 encode the object name and prepend it with 'base64:', such as: 'base64:6ZWV6ZWV6ZWV6ZWV6ZWV6ZWV'. | **jsonCredentialFile** | **File**| Service Account credential for Google Cloud stored in a JSON file. | **allowExecutables** | **Boolean**| Set to false to block executable files (program code) from being allowed in the input file. Default is false (recommended). | [optional] **allowInvalidFiles** | **Boolean**| Set to false to block invalid files, such as a PDF file that is not really a valid PDF file, or a Word Document that is not a valid Word Document. Default is false (recommended). | [optional] @@ -457,7 +457,7 @@ var sharepointDomainName = "sharepointDomainName_example"; // String | SharePoin var siteID = "siteID_example"; // String | Site ID (GUID) of the SharePoint site you wish to retrieve the file from -var filePath = "filePath_example"; // String | Path to the file within the drive, such as 'hello.pdf' or '/folder/subfolder/world.pdf' +var filePath = "filePath_example"; // String | Path to the file within the drive, such as 'hello.pdf' or '/folder/subfolder/world.pdf'. If the file path contains Unicode characters, you must base64 encode the file path and prepend it with 'base64:', such as: 'base64:6ZWV6ZWV6ZWV6ZWV6ZWV6ZWV'. var opts = { 'tenantID': "tenantID_example", // String | Optional; Tenant ID of your Azure Active Directory @@ -482,7 +482,7 @@ Name | Type | Description | Notes **clientSecret** | **String**| Client Secret access credentials; see description above for instructions on how to get the Client Secret from the Azure Active Directory portal | **sharepointDomainName** | **String**| SharePoint Online domain name, such as mydomain.sharepoint.com | **siteID** | **String**| Site ID (GUID) of the SharePoint site you wish to retrieve the file from | - **filePath** | **String**| Path to the file within the drive, such as 'hello.pdf' or '/folder/subfolder/world.pdf' | + **filePath** | **String**| Path to the file within the drive, such as 'hello.pdf' or '/folder/subfolder/world.pdf'. If the file path contains Unicode characters, you must base64 encode the file path and prepend it with 'base64:', such as: 'base64:6ZWV6ZWV6ZWV6ZWV6ZWV6ZWV'. | **tenantID** | **String**| Optional; Tenant ID of your Azure Active Directory | [optional] **itemID** | **String**| SharePoint itemID, such as a DriveItem Id | [optional] @@ -530,7 +530,7 @@ var siteID = "siteID_example"; // String | Site ID (GUID) of the SharePoint site var opts = { 'tenantID': "tenantID_example", // String | Optional; Tenant ID of your Azure Active Directory - 'filePath': "filePath_example", // String | Path to the file within the drive, such as 'hello.pdf' or '/folder/subfolder/world.pdf' + 'filePath': "filePath_example", // String | Path to the file within the drive, such as 'hello.pdf' or '/folder/subfolder/world.pdf'. If the file path contains Unicode characters, you must base64 encode the file path and prepend it with 'base64:', such as: 'base64:6ZWV6ZWV6ZWV6ZWV6ZWV6ZWV'. 'itemID': "itemID_example", // String | SharePoint itemID, such as a DriveItem Id 'allowExecutables': true, // Boolean | Set to false to block executable files (program code) from being allowed in the input file. Default is false (recommended). 'allowInvalidFiles': true, // Boolean | Set to false to block invalid files, such as a PDF file that is not really a valid PDF file, or a Word Document that is not a valid Word Document. Default is false (recommended). @@ -560,7 +560,7 @@ Name | Type | Description | Notes **sharepointDomainName** | **String**| SharePoint Online domain name, such as mydomain.sharepoint.com | **siteID** | **String**| Site ID (GUID) of the SharePoint site you wish to retrieve the file from | **tenantID** | **String**| Optional; Tenant ID of your Azure Active Directory | [optional] - **filePath** | **String**| Path to the file within the drive, such as 'hello.pdf' or '/folder/subfolder/world.pdf' | [optional] + **filePath** | **String**| Path to the file within the drive, such as 'hello.pdf' or '/folder/subfolder/world.pdf'. If the file path contains Unicode characters, you must base64 encode the file path and prepend it with 'base64:', such as: 'base64:6ZWV6ZWV6ZWV6ZWV6ZWV6ZWV'. | [optional] **itemID** | **String**| SharePoint itemID, such as a DriveItem Id | [optional] **allowExecutables** | **Boolean**| Set to false to block executable files (program code) from being allowed in the input file. Default is false (recommended). | [optional] **allowInvalidFiles** | **Boolean**| Set to false to block invalid files, such as a PDF file that is not really a valid PDF file, or a Word Document that is not a valid Word Document. Default is false (recommended). | [optional] diff --git a/client/package.json b/client/package.json index bb0e203..ac02505 100644 --- a/client/package.json +++ b/client/package.json @@ -1,6 +1,6 @@ { "name": "cloudmersive-virus-api-client", - "version": "1.2.5", + "version": "1.2.6", "description": "The_Cloudmersive_Virus_Scan_API_lets_you_scan_files_and_content_for_viruses_and_identify_security_issues_with_content_", "license": "Apache-2.0", "main": "src/index.js", diff --git a/client/src/ApiClient.js b/client/src/ApiClient.js index b71031a..4e75bd9 100644 --- a/client/src/ApiClient.js +++ b/client/src/ApiClient.js @@ -32,7 +32,7 @@ /** * @module ApiClient - * @version 1.2.5 + * @version 1.2.6 */ /** diff --git a/client/src/api/ScanApi.js b/client/src/api/ScanApi.js index 9a4ed9f..df38b2d 100644 --- a/client/src/api/ScanApi.js +++ b/client/src/api/ScanApi.js @@ -33,7 +33,7 @@ /** * Scan service. * @module api/ScanApi - * @version 1.2.5 + * @version 1.2.6 */ /** @@ -105,7 +105,7 @@ /** * Advanced Scan a file for viruses - * Advanced Scan files with 360-degree Content Protection across Viruses and Malware, executables, invalid files, scripts, and even restrictions on accepted file types with complete content verification. Customize threat rules to your needs. Leverage continuously updated signatures for millions of threats, and advanced high-performance scanning capabilities. Over 17 million virus and malware signatures. Continuous cloud-based updates. Block threats beyond viruses including executables, scripts, invalid files, and more. Optionally limit input files to a specific set of file types (e.g. PDF and Word Documents only). Wide file format support including Office, PDF, HTML, Flash. Zip support including .Zip, .Rar, .DMG, .Tar, and other archive formats. Multi-threat scanning across viruses, malware, trojans, ransomware, and spyware. High-speed in-memory scanning delivers subsecond typical response time. + * Advanced Scan files with 360-degree Content Protection across Viruses and Malware, executables, invalid files, scripts, and even restrictions on accepted file types with complete content verification. Customize threat rules to your needs. Leverage continuously updated signatures for millions of threats, and advanced high-performance scanning capabilities. Over 17 million virus and malware signatures. Continuous cloud-based updates. Block threats beyond viruses including executables, scripts, invalid files, and more. Optionally limit input files to a specific set of file types (e.g. PDF and Word Documents only). Wide file format support including Office, PDF, HTML, Flash, MSG, and a wide range of image file formats. Zip support including .Zip, .Rar, .DMG, .Tar, and other archive formats. Multi-threat scanning across viruses, malware, trojans, ransomware, and spyware. High-speed in-memory scanning delivers subsecond typical response time. * @param {File} inputFile Input file to perform the operation on. * @param {Object} opts Optional parameters * @param {Boolean} opts.allowExecutables Set to false to block executable files (program code) from being allowed in the input file. Default is false (recommended). diff --git a/client/src/api/ScanCloudStorageApi.js b/client/src/api/ScanCloudStorageApi.js index 03050d4..0d7540a 100644 --- a/client/src/api/ScanCloudStorageApi.js +++ b/client/src/api/ScanCloudStorageApi.js @@ -33,7 +33,7 @@ /** * ScanCloudStorage service. * @module api/ScanCloudStorageApi - * @version 1.2.5 + * @version 1.2.6 */ /** @@ -62,7 +62,7 @@ * @param {String} secretKey AWS S3 secret key for the S3 bucket; you can get this from My Security Credentials in the AWS console * @param {String} bucketRegion Name of the region of the S3 bucket, such as 'US-East-1' * @param {String} bucketName Name of the S3 bucket - * @param {String} keyName Key name (also called file name) of the file in S3 that you wish to scan for viruses + * @param {String} keyName Key name (also called file name) of the file in S3 that you wish to scan for viruses. If the key name contains Unicode characters, you must base64 encode the key name and prepend it with 'base64:', such as: 'base64:6ZWV6ZWV6ZWV6ZWV6ZWV6ZWV'. * @param {module:api/ScanCloudStorageApi~scanCloudStorageScanAwsS3FileCallback} callback The callback function, accepting three arguments: error, data, response * data is of type: {@link module:model/CloudStorageVirusScanResult} */ @@ -138,7 +138,7 @@ * @param {String} secretKey AWS S3 secret key for the S3 bucket; you can get this from My Security Credentials in the AWS console * @param {String} bucketRegion Name of the region of the S3 bucket, such as 'US-East-1' * @param {String} bucketName Name of the S3 bucket - * @param {String} keyName Key name (also called file name) of the file in S3 that you wish to scan for viruses + * @param {String} keyName Key name (also called file name) of the file in S3 that you wish to scan for viruses. If the key name contains Unicode characters, you must base64 encode the key name and prepend it with 'base64:', such as: 'base64:6ZWV6ZWV6ZWV6ZWV6ZWV6ZWV'. * @param {Object} opts Optional parameters * @param {Boolean} opts.allowExecutables Set to false to block executable files (program code) from being allowed in the input file. Default is false (recommended). * @param {Boolean} opts.allowInvalidFiles Set to false to block invalid files, such as a PDF file that is not really a valid PDF file, or a Word Document that is not a valid Word Document. Default is false (recommended). @@ -228,7 +228,7 @@ * Scan the contents of a single Azure Blob and its content for viruses. Leverage continuously updated signatures for millions of threats, and advanced high-performance scanning capabilities. Over 17 million virus and malware signatures. Continuous cloud-based updates. Wide file format support including Office, PDF, HTML, Flash. Zip support including .Zip, .Rar, .DMG, .Tar, and other archive formats. Multi-threat scanning across viruses, malware, trojans, ransomware, and spyware. High-speed in-memory scanning delivers subsecond typical response time. * @param {String} connectionString Connection string for the Azure Blob Storage Account; you can get this connection string from the Access Keys tab of the Storage Account blade in the Azure Portal. * @param {String} containerName Name of the Blob container within the Azure Blob Storage account - * @param {String} blobPath Path to the blob within the container, such as 'hello.pdf' or '/folder/subfolder/world.pdf' + * @param {String} blobPath Path to the blob within the container, such as 'hello.pdf' or '/folder/subfolder/world.pdf'. If the blob path contains Unicode characters, you must base64 encode the blob path and prepend it with 'base64:', such as: 'base64:6ZWV6ZWV6ZWV6ZWV6ZWV6ZWV'. * @param {module:api/ScanCloudStorageApi~scanCloudStorageScanAzureBlobCallback} callback The callback function, accepting three arguments: error, data, response * data is of type: {@link module:model/CloudStorageVirusScanResult} */ @@ -290,7 +290,7 @@ * Advanced Scan the contents of a single Azure Blob and its content for viruses and threats. Advanced Scan files with 360-degree Content Protection across Viruses and Malware, executables, invalid files, scripts, and even restrictions on accepted file types with complete content verification. Customize threat rules to your needs. Leverage continuously updated signatures for millions of threats, and advanced high-performance scanning capabilities. Over 17 million virus and malware signatures. Continuous cloud-based updates. Block threats beyond viruses including executables, scripts, invalid files, and more. Optionally limit input files to a specific set of file types (e.g. PDF and Word Documents only). Wide file format support including Office, PDF, HTML, Flash. Zip support including .Zip, .Rar, .DMG, .Tar, and other archive formats. Multi-threat scanning across viruses, malware, trojans, ransomware, and spyware. High-speed in-memory scanning delivers subsecond typical response time. * @param {String} connectionString Connection string for the Azure Blob Storage Account; you can get this connection string from the Access Keys tab of the Storage Account blade in the Azure Portal. * @param {String} containerName Name of the Blob container within the Azure Blob Storage account - * @param {String} blobPath Path to the blob within the container, such as 'hello.pdf' or '/folder/subfolder/world.pdf' + * @param {String} blobPath Path to the blob within the container, such as 'hello.pdf' or '/folder/subfolder/world.pdf'. If the blob path contains Unicode characters, you must base64 encode the blob path and prepend it with 'base64:', such as: 'base64:6ZWV6ZWV6ZWV6ZWV6ZWV6ZWV'. * @param {Object} opts Optional parameters * @param {Boolean} opts.allowExecutables Set to false to block executable files (program code) from being allowed in the input file. Default is false (recommended). * @param {Boolean} opts.allowInvalidFiles Set to false to block invalid files, such as a PDF file that is not really a valid PDF file, or a Word Document that is not a valid Word Document. Default is false (recommended). @@ -367,7 +367,7 @@ * Scan an Google Cloud Platform (GCP) Storage file for viruses * Scan the contents of a single Google Cloud Platform (GCP) Storage file and its content for viruses. Leverage continuously updated signatures for millions of threats, and advanced high-performance scanning capabilities. Over 17 million virus and malware signatures. Continuous cloud-based updates. Wide file format support including Office, PDF, HTML, Flash. Zip support including .Zip, .Rar, .DMG, .Tar, and other archive formats. Multi-threat scanning across viruses, malware, trojans, ransomware, and spyware. High-speed in-memory scanning delivers subsecond typical response time. * @param {String} bucketName Name of the bucket in Google Cloud Storage - * @param {String} objectName Name of the object or file in Google Cloud Storage + * @param {String} objectName Name of the object or file in Google Cloud Storage. If the object name contains Unicode characters, you must base64 encode the object name and prepend it with 'base64:', such as: 'base64:6ZWV6ZWV6ZWV6ZWV6ZWV6ZWV'. * @param {File} jsonCredentialFile Service Account credential for Google Cloud stored in a JSON file. * @param {module:api/ScanCloudStorageApi~scanCloudStorageScanGcpStorageFileCallback} callback The callback function, accepting three arguments: error, data, response * data is of type: {@link module:model/CloudStorageVirusScanResult} @@ -429,7 +429,7 @@ * Advanced Scan an Google Cloud Platform (GCP) Storage file for viruses * Advanced Scan the contents of a single Google Cloud Platform (GCP) Storage file and its content for viruses and threats. Advanced Scan files with 360-degree Content Protection across Viruses and Malware, executables, invalid files, scripts, and even restrictions on accepted file types with complete content verification. Customize threat rules to your needs. Leverage continuously updated signatures for millions of threats, and advanced high-performance scanning capabilities. Over 17 million virus and malware signatures. Continuous cloud-based updates. Block threats beyond viruses including executables, scripts, invalid files, and more. Optionally limit input files to a specific set of file types (e.g. PDF and Word Documents only). Wide file format support including Office, PDF, HTML, Flash. Zip support including .Zip, .Rar, .DMG, .Tar, and other archive formats. Multi-threat scanning across viruses, malware, trojans, ransomware, and spyware. High-speed in-memory scanning delivers subsecond typical response time. * @param {String} bucketName Name of the bucket in Google Cloud Storage - * @param {String} objectName Name of the object or file in Google Cloud Storage + * @param {String} objectName Name of the object or file in Google Cloud Storage. If the object name contains Unicode characters, you must base64 encode the object name and prepend it with 'base64:', such as: 'base64:6ZWV6ZWV6ZWV6ZWV6ZWV6ZWV'. * @param {File} jsonCredentialFile Service Account credential for Google Cloud stored in a JSON file. * @param {Object} opts Optional parameters * @param {Boolean} opts.allowExecutables Set to false to block executable files (program code) from being allowed in the input file. Default is false (recommended). @@ -510,7 +510,7 @@ * @param {String} clientSecret Client Secret access credentials; see description above for instructions on how to get the Client Secret from the Azure Active Directory portal * @param {String} sharepointDomainName SharePoint Online domain name, such as mydomain.sharepoint.com * @param {String} siteID Site ID (GUID) of the SharePoint site you wish to retrieve the file from - * @param {String} filePath Path to the file within the drive, such as 'hello.pdf' or '/folder/subfolder/world.pdf' + * @param {String} filePath Path to the file within the drive, such as 'hello.pdf' or '/folder/subfolder/world.pdf'. If the file path contains Unicode characters, you must base64 encode the file path and prepend it with 'base64:', such as: 'base64:6ZWV6ZWV6ZWV6ZWV6ZWV6ZWV'. * @param {Object} opts Optional parameters * @param {String} opts.tenantID Optional; Tenant ID of your Azure Active Directory * @param {String} opts.itemID SharePoint itemID, such as a DriveItem Id @@ -594,7 +594,7 @@ * @param {String} siteID Site ID (GUID) of the SharePoint site you wish to retrieve the file from * @param {Object} opts Optional parameters * @param {String} opts.tenantID Optional; Tenant ID of your Azure Active Directory - * @param {String} opts.filePath Path to the file within the drive, such as 'hello.pdf' or '/folder/subfolder/world.pdf' + * @param {String} opts.filePath Path to the file within the drive, such as 'hello.pdf' or '/folder/subfolder/world.pdf'. If the file path contains Unicode characters, you must base64 encode the file path and prepend it with 'base64:', such as: 'base64:6ZWV6ZWV6ZWV6ZWV6ZWV6ZWV'. * @param {String} opts.itemID SharePoint itemID, such as a DriveItem Id * @param {Boolean} opts.allowExecutables Set to false to block executable files (program code) from being allowed in the input file. Default is false (recommended). * @param {Boolean} opts.allowInvalidFiles Set to false to block invalid files, such as a PDF file that is not really a valid PDF file, or a Word Document that is not a valid Word Document. Default is false (recommended). diff --git a/client/src/index.js b/client/src/index.js index a34ba03..9bec5fe 100644 --- a/client/src/index.js +++ b/client/src/index.js @@ -53,7 +53,7 @@ * *

* @module index - * @version 1.2.5 + * @version 1.2.6 */ var exports = { /** diff --git a/client/src/model/AdditionalAdvancedScanInformation.js b/client/src/model/AdditionalAdvancedScanInformation.js index 0546888..035d1bb 100644 --- a/client/src/model/AdditionalAdvancedScanInformation.js +++ b/client/src/model/AdditionalAdvancedScanInformation.js @@ -36,7 +36,7 @@ /** * The AdditionalAdvancedScanInformation model module. * @module model/AdditionalAdvancedScanInformation - * @version 1.2.5 + * @version 1.2.6 */ /** @@ -50,6 +50,7 @@ + }; /** @@ -69,6 +70,9 @@ if (data.hasOwnProperty('ContainsXML')) { obj['ContainsXML'] = ApiClient.convertToType(data['ContainsXML'], 'Boolean'); } + if (data.hasOwnProperty('ContainsImage')) { + obj['ContainsImage'] = ApiClient.convertToType(data['ContainsImage'], 'Boolean'); + } } return obj; } @@ -83,6 +87,11 @@ * @member {Boolean} ContainsXML */ exports.prototype['ContainsXML'] = undefined; + /** + * True if the input file contains an image + * @member {Boolean} ContainsImage + */ + exports.prototype['ContainsImage'] = undefined; diff --git a/client/src/model/CloudStorageAdvancedVirusScanResult.js b/client/src/model/CloudStorageAdvancedVirusScanResult.js index 96de6ce..e67470b 100644 --- a/client/src/model/CloudStorageAdvancedVirusScanResult.js +++ b/client/src/model/CloudStorageAdvancedVirusScanResult.js @@ -16,18 +16,18 @@ (function(root, factory) { if (typeof define === 'function' && define.amd) { // AMD. Register as an anonymous module. - define(['ApiClient', 'model/CloudStorageVirusFound'], factory); + define(['ApiClient', 'model/AdditionalAdvancedScanInformation', 'model/CloudStorageVirusFound'], factory); } else if (typeof module === 'object' && module.exports) { // CommonJS-like environments that support module.exports, like Node. - module.exports = factory(require('../ApiClient'), require('./CloudStorageVirusFound')); + module.exports = factory(require('../ApiClient'), require('./AdditionalAdvancedScanInformation'), require('./CloudStorageVirusFound')); } else { // Browser globals (root is window) if (!root.CloudmersiveVirusApiClient) { root.CloudmersiveVirusApiClient = {}; } - root.CloudmersiveVirusApiClient.CloudStorageAdvancedVirusScanResult = factory(root.CloudmersiveVirusApiClient.ApiClient, root.CloudmersiveVirusApiClient.CloudStorageVirusFound); + root.CloudmersiveVirusApiClient.CloudStorageAdvancedVirusScanResult = factory(root.CloudmersiveVirusApiClient.ApiClient, root.CloudmersiveVirusApiClient.AdditionalAdvancedScanInformation, root.CloudmersiveVirusApiClient.CloudStorageVirusFound); } -}(this, function(ApiClient, CloudStorageVirusFound) { +}(this, function(ApiClient, AdditionalAdvancedScanInformation, CloudStorageVirusFound) { 'use strict'; @@ -36,7 +36,7 @@ /** * The CloudStorageAdvancedVirusScanResult model module. * @module model/CloudStorageAdvancedVirusScanResult - * @version 1.2.5 + * @version 1.2.6 */ /** @@ -60,6 +60,7 @@ + }; /** @@ -109,6 +110,9 @@ if (data.hasOwnProperty('FileSize')) { obj['FileSize'] = ApiClient.convertToType(data['FileSize'], 'Number'); } + if (data.hasOwnProperty('ContentInformation')) { + obj['ContentInformation'] = AdditionalAdvancedScanInformation.constructFromObject(data['ContentInformation']); + } } return obj; } @@ -173,6 +177,11 @@ * @member {Number} FileSize */ exports.prototype['FileSize'] = undefined; + /** + * Contains additional non-threat content verification information + * @member {module:model/AdditionalAdvancedScanInformation} ContentInformation + */ + exports.prototype['ContentInformation'] = undefined; diff --git a/client/src/model/CloudStorageVirusFound.js b/client/src/model/CloudStorageVirusFound.js index 5970bc2..813d66c 100644 --- a/client/src/model/CloudStorageVirusFound.js +++ b/client/src/model/CloudStorageVirusFound.js @@ -36,7 +36,7 @@ /** * The CloudStorageVirusFound model module. * @module model/CloudStorageVirusFound - * @version 1.2.5 + * @version 1.2.6 */ /** diff --git a/client/src/model/CloudStorageVirusScanResult.js b/client/src/model/CloudStorageVirusScanResult.js index e0a3219..cac8fc4 100644 --- a/client/src/model/CloudStorageVirusScanResult.js +++ b/client/src/model/CloudStorageVirusScanResult.js @@ -36,7 +36,7 @@ /** * The CloudStorageVirusScanResult model module. * @module model/CloudStorageVirusScanResult - * @version 1.2.5 + * @version 1.2.6 */ /** @@ -53,6 +53,7 @@ + }; /** @@ -81,6 +82,9 @@ if (data.hasOwnProperty('FileSize')) { obj['FileSize'] = ApiClient.convertToType(data['FileSize'], 'Number'); } + if (data.hasOwnProperty('ContainsContentModerationRejection')) { + obj['ContainsContentModerationRejection'] = ApiClient.convertToType(data['ContainsContentModerationRejection'], 'Boolean'); + } } return obj; } @@ -110,6 +114,11 @@ * @member {Number} FileSize */ exports.prototype['FileSize'] = undefined; + /** + * Set to true when using NSFW Content Moderation in the Cloudmersive Storage Protect product (disabled by default) + * @member {Boolean} ContainsContentModerationRejection + */ + exports.prototype['ContainsContentModerationRejection'] = undefined; diff --git a/client/src/model/VirusFound.js b/client/src/model/VirusFound.js index 42f5496..8a2ea49 100644 --- a/client/src/model/VirusFound.js +++ b/client/src/model/VirusFound.js @@ -36,7 +36,7 @@ /** * The VirusFound model module. * @module model/VirusFound - * @version 1.2.5 + * @version 1.2.6 */ /** diff --git a/client/src/model/VirusScanAdvancedResult.js b/client/src/model/VirusScanAdvancedResult.js index 21ce348..4f960a5 100644 --- a/client/src/model/VirusScanAdvancedResult.js +++ b/client/src/model/VirusScanAdvancedResult.js @@ -36,7 +36,7 @@ /** * The VirusScanAdvancedResult model module. * @module model/VirusScanAdvancedResult - * @version 1.2.5 + * @version 1.2.6 */ /** diff --git a/client/src/model/VirusScanResult.js b/client/src/model/VirusScanResult.js index d328384..c5f5e37 100644 --- a/client/src/model/VirusScanResult.js +++ b/client/src/model/VirusScanResult.js @@ -36,7 +36,7 @@ /** * The VirusScanResult model module. * @module model/VirusScanResult - * @version 1.2.5 + * @version 1.2.6 */ /** diff --git a/client/src/model/WebsiteScanRequest.js b/client/src/model/WebsiteScanRequest.js index 0a2856e..dd57aca 100644 --- a/client/src/model/WebsiteScanRequest.js +++ b/client/src/model/WebsiteScanRequest.js @@ -36,7 +36,7 @@ /** * The WebsiteScanRequest model module. * @module model/WebsiteScanRequest - * @version 1.2.5 + * @version 1.2.6 */ /** diff --git a/client/src/model/WebsiteScanResult.js b/client/src/model/WebsiteScanResult.js index 4690963..63cbf02 100644 --- a/client/src/model/WebsiteScanResult.js +++ b/client/src/model/WebsiteScanResult.js @@ -36,7 +36,7 @@ /** * The WebsiteScanResult model module. * @module model/WebsiteScanResult - * @version 1.2.5 + * @version 1.2.6 */ /** diff --git a/client/test/model/AdditionalAdvancedScanInformation.spec.js b/client/test/model/AdditionalAdvancedScanInformation.spec.js index 96474b6..e1f8676 100644 --- a/client/test/model/AdditionalAdvancedScanInformation.spec.js +++ b/client/test/model/AdditionalAdvancedScanInformation.spec.js @@ -68,6 +68,12 @@ //expect(instance).to.be(); }); + it('should have the property containsImage (base name: "ContainsImage")', function() { + // uncomment below and update the code to test the property containsImage + //var instane = new CloudmersiveVirusApiClient.AdditionalAdvancedScanInformation(); + //expect(instance).to.be(); + }); + }); })); diff --git a/client/test/model/CloudStorageAdvancedVirusScanResult.spec.js b/client/test/model/CloudStorageAdvancedVirusScanResult.spec.js index 52974b5..04cf761 100644 --- a/client/test/model/CloudStorageAdvancedVirusScanResult.spec.js +++ b/client/test/model/CloudStorageAdvancedVirusScanResult.spec.js @@ -128,6 +128,12 @@ //expect(instance).to.be(); }); + it('should have the property contentInformation (base name: "ContentInformation")', function() { + // uncomment below and update the code to test the property contentInformation + //var instane = new CloudmersiveVirusApiClient.CloudStorageAdvancedVirusScanResult(); + //expect(instance).to.be(); + }); + }); })); diff --git a/client/test/model/CloudStorageVirusScanResult.spec.js b/client/test/model/CloudStorageVirusScanResult.spec.js index 3f8b650..0a86cb2 100644 --- a/client/test/model/CloudStorageVirusScanResult.spec.js +++ b/client/test/model/CloudStorageVirusScanResult.spec.js @@ -86,6 +86,12 @@ //expect(instance).to.be(); }); + it('should have the property containsContentModerationRejection (base name: "ContainsContentModerationRejection")', function() { + // uncomment below and update the code to test the property containsContentModerationRejection + //var instane = new CloudmersiveVirusApiClient.CloudStorageVirusScanResult(); + //expect(instance).to.be(); + }); + }); })); diff --git a/packageconfig.json b/packageconfig.json index 05f28fb..943dabb 100644 --- a/packageconfig.json +++ b/packageconfig.json @@ -1,6 +1,6 @@ { "projectName": "cloudmersive-virus-api-client", - "projectVersion": "1.2.5", + "projectVersion": "1.2.6", "licenseName": "Apache-2.0" } \ No newline at end of file