Rename swagger (3).json to swagger.json

This commit is contained in:
ms-OrionCox 2017-09-21 15:22:56 -07:00 коммит произвёл GitHub
Родитель 19a6557efd
Коммит bed67a650f
1 изменённых файлов: 1 добавлений и 1 удалений

Просмотреть файл

@ -92,4 +92,4 @@
"example": "{\n \"reporterInfo\": {\n \"reporterEmail\": \"reporter_email@email.com\",\n \"reporterName\": \"John Smith\",\n \"reporterPhone\": \"555-555-5555\",\n \"reporterOrg\": \"Contoso\",\n \"discloseEmail\": \"TRUE||FALSE\",\n \"reporterNotes\": \"Sources are at liberty to elaborate on what their organization does if it's relevant to their reports as a whole.\"\n },\n \"reports\": [\n {\n \"report\": {\n \"batchID\": \"Group/Campaign Identifier\",\n \"relatedCases\": [ \"ID\", \"ID\", \"...\" ],\n \"reportNotes\": \"This is a brief summary of what I have found...\",\n \"TLP\": \"AMBER||GREEN||WHITE\",\n \"disclosureNotes\": \"Sources are at liberty to specify additional intended limits of the sharing: these must be adhered to.\",\n \"threats\": [\n {\n \"threat\": {\n \"threatType\": \"Activity||Content\",\n \"threatSubType\": \"CNC||FRAUD||DOS||SPAM||MALWARE||INTRUSION_ATTEMPT||PORT_SCAN||WEB_CRAWL||PHISHING||THREAT_TYPE_UNSPECIFIED\",\n \"sampleType\":\"Base64\",\n \"sourceIp\": \"1.1.1.1\",\n \"destinationIp\": \"2.2.2.2\",\n \"sourcePort\": \"PORT\",\n \"destinationPort\": \"PORT\",\n \"sourceUrl\": \"URL\",\n \"destinationUrl\": \"URL\",\n \"protocol\": \"PROTOCOL_NUMBER\",\n \"byteCount\": \"BYTES\",\n \"packetCount\": \"PACKETS\",\n \"date\": \"yyyy-mm-dd\",\n \"time\": \"00:00:00\",\n \"timeZone\": \"-0000\",\n \"sample\": \"logs of observed activity; must be of type specified above\"\n }\n }\n ]\n }\n }\n ]\n}" "example": "{\n \"reporterInfo\": {\n \"reporterEmail\": \"reporter_email@email.com\",\n \"reporterName\": \"John Smith\",\n \"reporterPhone\": \"555-555-5555\",\n \"reporterOrg\": \"Contoso\",\n \"discloseEmail\": \"TRUE||FALSE\",\n \"reporterNotes\": \"Sources are at liberty to elaborate on what their organization does if it's relevant to their reports as a whole.\"\n },\n \"reports\": [\n {\n \"report\": {\n \"batchID\": \"Group/Campaign Identifier\",\n \"relatedCases\": [ \"ID\", \"ID\", \"...\" ],\n \"reportNotes\": \"This is a brief summary of what I have found...\",\n \"TLP\": \"AMBER||GREEN||WHITE\",\n \"disclosureNotes\": \"Sources are at liberty to specify additional intended limits of the sharing: these must be adhered to.\",\n \"threats\": [\n {\n \"threat\": {\n \"threatType\": \"Activity||Content\",\n \"threatSubType\": \"CNC||FRAUD||DOS||SPAM||MALWARE||INTRUSION_ATTEMPT||PORT_SCAN||WEB_CRAWL||PHISHING||THREAT_TYPE_UNSPECIFIED\",\n \"sampleType\":\"Base64\",\n \"sourceIp\": \"1.1.1.1\",\n \"destinationIp\": \"2.2.2.2\",\n \"sourcePort\": \"PORT\",\n \"destinationPort\": \"PORT\",\n \"sourceUrl\": \"URL\",\n \"destinationUrl\": \"URL\",\n \"protocol\": \"PROTOCOL_NUMBER\",\n \"byteCount\": \"BYTES\",\n \"packetCount\": \"PACKETS\",\n \"date\": \"yyyy-mm-dd\",\n \"time\": \"00:00:00\",\n \"timeZone\": \"-0000\",\n \"sample\": \"logs of observed activity; must be of type specified above\"\n }\n }\n ]\n }\n }\n ]\n}"
} }
} }
} }