Package com.google.webrisk.v1
Class WebRiskServiceGrpc.WebRiskServiceBlockingStub
- java.lang.Object
-
- io.grpc.stub.AbstractStub<S>
-
- io.grpc.stub.AbstractBlockingStub<WebRiskServiceGrpc.WebRiskServiceBlockingStub>
-
- com.google.webrisk.v1.WebRiskServiceGrpc.WebRiskServiceBlockingStub
-
- Enclosing class:
- WebRiskServiceGrpc
public static final class WebRiskServiceGrpc.WebRiskServiceBlockingStub extends io.grpc.stub.AbstractBlockingStub<WebRiskServiceGrpc.WebRiskServiceBlockingStub>
A stub to allow clients to do synchronous rpc calls to service WebRiskService.Web Risk API defines an interface to detect malicious URLs on your website and in client applications.
-
-
Method Summary
All Methods Instance Methods Concrete Methods Modifier and Type Method Description protected WebRiskServiceGrpc.WebRiskServiceBlockingStub
build(io.grpc.Channel channel, io.grpc.CallOptions callOptions)
ComputeThreatListDiffResponse
computeThreatListDiff(ComputeThreatListDiffRequest request)
Gets the most recent threat list diffs.Submission
createSubmission(CreateSubmissionRequest request)
Creates a Submission of a URI suspected of containing phishing content to be reviewed.SearchHashesResponse
searchHashes(SearchHashesRequest request)
Gets the full hashes that match the requested hash prefix.SearchUrisResponse
searchUris(SearchUrisRequest request)
This method is used to check whether a URI is on a given threatList.com.google.longrunning.Operation
submitUri(SubmitUriRequest request)
Submits a URI suspected of containing malicious content to be reviewed.
-
-
-
Method Detail
-
build
protected WebRiskServiceGrpc.WebRiskServiceBlockingStub build(io.grpc.Channel channel, io.grpc.CallOptions callOptions)
- Specified by:
build
in classio.grpc.stub.AbstractStub<WebRiskServiceGrpc.WebRiskServiceBlockingStub>
-
computeThreatListDiff
public ComputeThreatListDiffResponse computeThreatListDiff(ComputeThreatListDiffRequest request)
Gets the most recent threat list diffs. These diffs should be applied to a local database of hashes to keep it up-to-date. If the local database is empty or excessively out-of-date, a complete snapshot of the database will be returned. This Method only updates a single ThreatList at a time. To update multiple ThreatList databases, this method needs to be called once for each list.
-
searchUris
public SearchUrisResponse searchUris(SearchUrisRequest request)
This method is used to check whether a URI is on a given threatList. Multiple threatLists may be searched in a single query. The response will list all requested threatLists the URI was found to match. If the URI is not found on any of the requested ThreatList an empty response will be returned.
-
searchHashes
public SearchHashesResponse searchHashes(SearchHashesRequest request)
Gets the full hashes that match the requested hash prefix. This is used after a hash prefix is looked up in a threatList and there is a match. The client side threatList only holds partial hashes so the client must query this method to determine if there is a full hash match of a threat.
-
createSubmission
public Submission createSubmission(CreateSubmissionRequest request)
Creates a Submission of a URI suspected of containing phishing content to be reviewed. If the result verifies the existence of malicious phishing content, the site will be added to the [Google's Social Engineering lists](https://support.google.com/webmasters/answer/6350487/) in order to protect users that could get exposed to this threat in the future. Only allowlisted projects can use this method during Early Access. Please reach out to Sales or your customer engineer to obtain access.
-
submitUri
public com.google.longrunning.Operation submitUri(SubmitUriRequest request)
Submits a URI suspected of containing malicious content to be reviewed. Returns a google.longrunning.Operation which, once the review is complete, is updated with its result. You can use the [Pub/Sub API] (https://cloud.google.com/pubsub) to receive notifications for the returned Operation. If the result verifies the existence of malicious content, the site will be added to the [Google's Social Engineering lists] (https://support.google.com/webmasters/answer/6350487/) in order to protect users that could get exposed to this threat in the future. Only allowlisted projects can use this method during Early Access. Please reach out to Sales or your customer engineer to obtain access.
-
-