/** * kameleo-local-api * You can use the following API endpoints to communicate with the local running Kameleo programmatically. * * The version of the OpenAPI document: 4.4.0 * * * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech). * https://openapi-generator.tech * Do not edit the class manually. */ /** * * @export * @interface CookieRequest */ export interface CookieRequest { /** * The domain attribute signifies the domain for which the cookie is valid and can be submitted with every request for this domain or its * subdomains. If this attribute is not specified, then the hostname of the originating server is used as the default value. * @type {string} * @memberof CookieRequest */ domain: string; /** * The name for the Cookie. * @type {string} * @memberof CookieRequest */ name: string; /** * The path attribute indicates a URL path that must exist in the requested URL in order to send the Cookie header. The %x2F ("/") character * is considered a directory separator, and subdirectories match as well. * @type {string} * @memberof CookieRequest */ path: string; /** * The value of the Cookie. * @type {string} * @memberof CookieRequest */ value: string; /** * Host Only cookie means that the cookie should be handled by the browser to the server only to the same host/server that firstly sent it to * the browser. * @type {boolean} * @memberof CookieRequest */ hostOnly?: boolean; /** * When this attribute is set, client-side scripts are not allowed to access the cookie. * @type {boolean} * @memberof CookieRequest */ httpOnly?: boolean; /** * A cookie with the Secure attribute is sent to the server only with an encrypted request over the HTTPS protocol, never with unsecured HTTP, * and therefore can't easily be accessed by a man-in-the-middle attacker. Insecure sites (with http: in the URL) can't set cookies with the * Secure attribute. * @type {boolean} * @memberof CookieRequest */ secure?: boolean; /** * The sameSite attribute lets servers require that a cookie shouldn't be sent with cross-origin requests (where Site is defined by the * registrable domain), which provides some protection against cross-site request forgery attacks (CSRF). * It takes three possible values: Strict, Lax, and None.With Strict, the cookie is sent only to the same site as the one that originated it; * Lax is similar, with an exception for when the user navigates to a URL from an external site, such as by following a link; None has no * restrictions on cross-site requests. * @type {string} * @memberof CookieRequest */ sameSite?: string | null; /** * This attribute is used to set persistent cookies. It signifies how long the browser should use the persistent cookie and when the cookie * should be deleted. * If this attribute is not specified, then the lifetime of the cookie is the same as that of browser session, i.e.it will be a non-persistent * cookie. * @type {number} * @memberof CookieRequest */ expirationDate?: number | null; } /** * Check if a given object implements the CookieRequest interface. */ export declare function instanceOfCookieRequest(value: object): value is CookieRequest; export declare function CookieRequestFromJSON(json: any): CookieRequest; export declare function CookieRequestFromJSONTyped(json: any, ignoreDiscriminator: boolean): CookieRequest; export declare function CookieRequestToJSON(json: any): CookieRequest; export declare function CookieRequestToJSONTyped(value?: CookieRequest | null, ignoreDiscriminator?: boolean): any;