public static final class WebRiskServiceGrpc.WebRiskServiceBlockingStub extends AbstractBlockingStub<WebRiskServiceGrpc.WebRiskServiceBlockingStub>
A stub to allow clients to do synchronous rpc calls to service WebRiskService.
Web Risk API defines an interface to detect malicious URLs on your
website and in client applications.
Inheritance
java.lang.Object >
io.grpc.stub.AbstractStub >
io.grpc.stub.AbstractBlockingStub >
WebRiskServiceGrpc.WebRiskServiceBlockingStub
Inherited Members
io.grpc.stub.AbstractBlockingStub.<T>newStub(io.grpc.stub.AbstractStub.StubFactory<T>,io.grpc.Channel)
io.grpc.stub.AbstractBlockingStub.<T>newStub(io.grpc.stub.AbstractStub.StubFactory<T>,io.grpc.Channel,io.grpc.CallOptions)
io.grpc.stub.AbstractStub.<T>withOption(io.grpc.CallOptions.Key<T>,T)
io.grpc.stub.AbstractStub.build(io.grpc.Channel,io.grpc.CallOptions)
io.grpc.stub.AbstractStub.getCallOptions()
io.grpc.stub.AbstractStub.getChannel()
io.grpc.stub.AbstractStub.withCallCredentials(io.grpc.CallCredentials)
io.grpc.stub.AbstractStub.withChannel(io.grpc.Channel)
io.grpc.stub.AbstractStub.withCompression(java.lang.String)
io.grpc.stub.AbstractStub.withDeadline(io.grpc.Deadline)
io.grpc.stub.AbstractStub.withDeadlineAfter(long,java.util.concurrent.TimeUnit)
io.grpc.stub.AbstractStub.withExecutor(java.util.concurrent.Executor)
io.grpc.stub.AbstractStub.withInterceptors(io.grpc.ClientInterceptor...)
io.grpc.stub.AbstractStub.withMaxInboundMessageSize(int)
io.grpc.stub.AbstractStub.withMaxOutboundMessageSize(int)
io.grpc.stub.AbstractStub.withWaitForReady()
Methods
build(Channel channel, CallOptions callOptions)
protected WebRiskServiceGrpc.WebRiskServiceBlockingStub build(Channel channel, CallOptions callOptions)
Parameters |
Name |
Description |
channel |
io.grpc.Channel
|
callOptions |
io.grpc.CallOptions
|
Overrides
io.grpc.stub.AbstractStub.build(io.grpc.Channel,io.grpc.CallOptions)
computeThreatListDiff(ComputeThreatListDiffRequest request)
public ComputeThreatListDiffResponse computeThreatListDiff(ComputeThreatListDiffRequest request)
Gets the most recent threat list diffs. These diffs should be applied to
a local database of hashes to keep it up-to-date. If the local database is
empty or excessively out-of-date, a complete snapshot of the database will
be returned. This Method only updates a single ThreatList at a time. To
update multiple ThreatList databases, this method needs to be called once
for each list.
createSubmission(CreateSubmissionRequest request)
public Submission createSubmission(CreateSubmissionRequest request)
Creates a Submission of a URI suspected of containing phishing content to
be reviewed. If the result verifies the existence of malicious phishing
content, the site will be added to the Google's Social Engineering
lists in order to
protect users that could get exposed to this threat in the future. Only
allowlisted projects can use this method during Early Access. Please reach
out to Sales or your customer engineer to obtain access.
searchHashes(SearchHashesRequest request)
public SearchHashesResponse searchHashes(SearchHashesRequest request)
Gets the full hashes that match the requested hash prefix.
This is used after a hash prefix is looked up in a threatList
and there is a match. The client side threatList only holds partial hashes
so the client must query this method to determine if there is a full
hash match of a threat.
searchUris(SearchUrisRequest request)
public SearchUrisResponse searchUris(SearchUrisRequest request)
This method is used to check whether a URI is on a given threatList.
Multiple threatLists may be searched in a single query.
The response will list all requested threatLists the URI was found to
match. If the URI is not found on any of the requested ThreatList an
empty response will be returned.
submitUri(SubmitUriRequest request)
public Operation submitUri(SubmitUriRequest request)
Submits a URI suspected of containing malicious content to be reviewed.
Returns a google.longrunning.Operation which, once the review is complete,
is updated with its result. You can use the Pub/Sub API to receive notifications for the returned
Operation. If the result verifies the existence of malicious content, the
site will be added to the Google's Social Engineering lists in order to
protect users that could get exposed to this threat in the future. Only
allowlisted projects can use this method during Early Access. Please reach
out to Sales or your customer engineer to obtain access.