- 0.84.0 (latest)
- 0.83.0
- 0.82.0
- 0.80.0
- 0.79.0
- 0.78.0
- 0.77.0
- 0.76.0
- 0.75.0
- 0.74.0
- 0.73.0
- 0.72.0
- 0.71.0
- 0.70.0
- 0.68.0
- 0.67.0
- 0.66.0
- 0.65.0
- 0.64.0
- 0.63.0
- 0.62.0
- 0.61.0
- 0.60.0
- 0.59.0
- 0.58.0
- 0.55.0
- 0.54.0
- 0.53.0
- 0.52.0
- 0.51.0
- 0.50.0
- 0.49.0
- 0.48.0
- 0.47.0
- 0.46.0
- 0.45.0
- 0.44.0
- 0.43.0
- 0.42.0
- 0.40.0
- 0.39.0
- 0.38.0
- 0.37.0
- 0.36.0
- 0.35.0
- 0.34.6
- 0.33.1
- 0.32.11
The interfaces provided are listed below, along with usage samples.
PhishingProtectionServiceV1Beta1Client
Service Description: Service to report phishing URIs.
Sample for PhishingProtectionServiceV1Beta1Client:
try (PhishingProtectionServiceV1Beta1Client phishingProtectionServiceV1Beta1Client =
PhishingProtectionServiceV1Beta1Client.create()) {
ProjectName parent = ProjectName.of("[PROJECT]");
String uri = "uri116076";
ReportPhishingResponse response =
phishingProtectionServiceV1Beta1Client.reportPhishing(parent, uri);
}
Classes
PhishingProtectionServiceV1Beta1Client
Service Description: Service to report phishing URIs.
This class provides the ability to make remote calls to the backing service through method calls that map to API methods. Sample code to get started:
try (PhishingProtectionServiceV1Beta1Client phishingProtectionServiceV1Beta1Client =
PhishingProtectionServiceV1Beta1Client.create()) {
ProjectName parent = ProjectName.of("[PROJECT]");
String uri = "uri116076";
ReportPhishingResponse response =
phishingProtectionServiceV1Beta1Client.reportPhishing(parent, uri);
}
Note: close() needs to be called on the PhishingProtectionServiceV1Beta1Client object to clean up resources such as threads. In the example above, try-with-resources is used, which automatically calls close().
The surface of this class includes several types of Java methods for each of the API's methods:
- A "flattened" method. With this type of method, the fields of the request type have been converted into function parameters. It may be the case that not all fields are available as parameters, and not every API method will have a flattened method entry point.
- A "request object" method. This type of method only takes one parameter, a request object, which must be constructed before the call. Not every API method will have a request object method.
- A "callable" method. This type of method takes no parameters and returns an immutable API callable object, which can be used to initiate calls to the service.
See the individual methods for example code.
Many parameters require resource names to be formatted in a particular way. To assist with these names, this class includes a format method for each type of name, and additionally a parse method to extract the individual identifiers contained within names that are returned.
This class can be customized by passing in a custom instance of PhishingProtectionServiceV1Beta1Settings to create(). For example:
To customize credentials:
PhishingProtectionServiceV1Beta1Settings phishingProtectionServiceV1Beta1Settings =
PhishingProtectionServiceV1Beta1Settings.newBuilder()
.setCredentialsProvider(FixedCredentialsProvider.create(myCredentials))
.build();
PhishingProtectionServiceV1Beta1Client phishingProtectionServiceV1Beta1Client =
PhishingProtectionServiceV1Beta1Client.create(phishingProtectionServiceV1Beta1Settings);
To customize the endpoint:
PhishingProtectionServiceV1Beta1Settings phishingProtectionServiceV1Beta1Settings =
PhishingProtectionServiceV1Beta1Settings.newBuilder().setEndpoint(myEndpoint).build();
PhishingProtectionServiceV1Beta1Client phishingProtectionServiceV1Beta1Client =
PhishingProtectionServiceV1Beta1Client.create(phishingProtectionServiceV1Beta1Settings);
Please refer to the GitHub repository's samples for more quickstart code snippets.
PhishingProtectionServiceV1Beta1Settings
Settings class to configure an instance of PhishingProtectionServiceV1Beta1Client.
The default instance has everything set to sensible defaults:
- The default service address (phishingprotection.googleapis.com) and default port (443) are used.
- Credentials are acquired automatically through Application Default Credentials.
- Retries are configured for idempotent methods but not for non-idempotent methods.
The builder of this class is recursive, so contained classes are themselves builders. When build() is called, the tree of builders is called to create the complete settings object.
For example, to set the total timeout of reportPhishing to 30 seconds:
PhishingProtectionServiceV1Beta1Settings.Builder
phishingProtectionServiceV1Beta1SettingsBuilder =
PhishingProtectionServiceV1Beta1Settings.newBuilder();
phishingProtectionServiceV1Beta1SettingsBuilder
.reportPhishingSettings()
.setRetrySettings(
phishingProtectionServiceV1Beta1SettingsBuilder
.reportPhishingSettings()
.getRetrySettings()
.toBuilder()
.setTotalTimeout(Duration.ofSeconds(30))
.build());
PhishingProtectionServiceV1Beta1Settings phishingProtectionServiceV1Beta1Settings =
phishingProtectionServiceV1Beta1SettingsBuilder.build();
PhishingProtectionServiceV1Beta1Settings.Builder
Builder for PhishingProtectionServiceV1Beta1Settings.