Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(376)

Side by Side Diff: generated/googleapis/lib/safebrowsing/v4.dart

Issue 3003493002: Api-Roll 53: 2017-08-21 (Closed)
Patch Set: Created 3 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « generated/googleapis/lib/runtimeconfig/v1.dart ('k') | generated/googleapis/lib/script/v1.dart » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // This is a generated file (see the discoveryapis_generator project). 1 // This is a generated file (see the discoveryapis_generator project).
2 2
3 library googleapis.safebrowsing.v4; 3 library googleapis.safebrowsing.v4;
4 4
5 import 'dart:core' as core; 5 import 'dart:core' as core;
6 import 'dart:async' as async; 6 import 'dart:async' as async;
7 import 'dart:convert' as convert; 7 import 'dart:convert' as convert;
8 8
9 import 'package:_discoveryapis_commons/_discoveryapis_commons.dart' as commons; 9 import 'package:_discoveryapis_commons/_discoveryapis_commons.dart' as commons;
10 import 'package:http/http.dart' as http; 10 import 'package:http/http.dart' as http;
11 11
12 export 'package:_discoveryapis_commons/_discoveryapis_commons.dart' show 12 export 'package:_discoveryapis_commons/_discoveryapis_commons.dart' show
13 ApiRequestError, DetailedApiRequestError; 13 ApiRequestError, DetailedApiRequestError;
14 14
15 const core.String USER_AGENT = 'dart-api-client safebrowsing/v4'; 15 const core.String USER_AGENT = 'dart-api-client safebrowsing/v4';
16 16
17 /** 17 /**
18 * The Safe Browsing API is an experimental API that allows client applications 18 * Enables client applications to check web resources (most commonly URLs)
19 * to check URLs against Google's constantly-updated blacklists of suspected 19 * against Google-generated lists of unsafe web resources.
20 * phishing and malware pages. Your client application can use the API to
21 * download an encrypted table for local, client-side lookups of URLs.
22 */ 20 */
23 class SafebrowsingApi { 21 class SafebrowsingApi {
24 22
25 final commons.ApiRequester _requester; 23 final commons.ApiRequester _requester;
26 24
27 EncodedFullHashesResourceApi get encodedFullHashes => new EncodedFullHashesRes ourceApi(_requester); 25 EncodedFullHashesResourceApi get encodedFullHashes => new EncodedFullHashesRes ourceApi(_requester);
28 EncodedUpdatesResourceApi get encodedUpdates => new EncodedUpdatesResourceApi( _requester); 26 EncodedUpdatesResourceApi get encodedUpdates => new EncodedUpdatesResourceApi( _requester);
29 FullHashesResourceApi get fullHashes => new FullHashesResourceApi(_requester); 27 FullHashesResourceApi get fullHashes => new FullHashesResourceApi(_requester);
30 ThreatListUpdatesResourceApi get threatListUpdates => new ThreatListUpdatesRes ourceApi(_requester); 28 ThreatListUpdatesResourceApi get threatListUpdates => new ThreatListUpdatesRes ourceApi(_requester);
31 ThreatListsResourceApi get threatLists => new ThreatListsResourceApi(_requeste r); 29 ThreatListsResourceApi get threatLists => new ThreatListsResourceApi(_requeste r);
32 ThreatMatchesResourceApi get threatMatches => new ThreatMatchesResourceApi(_re quester); 30 ThreatMatchesResourceApi get threatMatches => new ThreatMatchesResourceApi(_re quester);
33 31
34 SafebrowsingApi(http.Client client, {core.String rootUrl: "https://safebrowsin g.googleapis.com/", core.String servicePath: ""}) : 32 SafebrowsingApi(http.Client client, {core.String rootUrl: "https://safebrowsin g.googleapis.com/", core.String servicePath: ""}) :
35 _requester = new commons.ApiRequester(client, rootUrl, servicePath, USER_A GENT); 33 _requester = new commons.ApiRequester(client, rootUrl, servicePath, USER_A GENT);
36 } 34 }
37 35
38 36
39 class EncodedFullHashesResourceApi { 37 class EncodedFullHashesResourceApi {
40 final commons.ApiRequester _requester; 38 final commons.ApiRequester _requester;
41 39
42 EncodedFullHashesResourceApi(commons.ApiRequester client) : 40 EncodedFullHashesResourceApi(commons.ApiRequester client) :
43 _requester = client; 41 _requester = client;
44 42
45 /** 43 /**
46 * Request parameters: 44 * Request parameters:
47 * 45 *
48 * [encodedRequest] - A serialized FindFullHashesRequest proto. 46 * [encodedRequest] - A serialized FindFullHashesRequest proto.
49 * 47 *
50 * [clientVersion] - The version of the client implementation.
51 *
52 * [clientId] - A client ID that (hopefully) uniquely identifies the client 48 * [clientId] - A client ID that (hopefully) uniquely identifies the client
53 * implementation 49 * implementation
54 * of the Safe Browsing API. 50 * of the Safe Browsing API.
55 * 51 *
52 * [clientVersion] - The version of the client implementation.
53 *
56 * Completes with a [FindFullHashesResponse]. 54 * Completes with a [FindFullHashesResponse].
57 * 55 *
58 * Completes with a [commons.ApiRequestError] if the API endpoint returned an 56 * Completes with a [commons.ApiRequestError] if the API endpoint returned an
59 * error. 57 * error.
60 * 58 *
61 * If the used [http.Client] completes with an error when making a REST call, 59 * If the used [http.Client] completes with an error when making a REST call,
62 * this method will complete with the same error. 60 * this method will complete with the same error.
63 */ 61 */
64 async.Future<FindFullHashesResponse> get(core.String encodedRequest, {core.Str ing clientVersion, core.String clientId}) { 62 async.Future<FindFullHashesResponse> get(core.String encodedRequest, {core.Str ing clientId, core.String clientVersion}) {
65 var _url = null; 63 var _url = null;
66 var _queryParams = new core.Map(); 64 var _queryParams = new core.Map();
67 var _uploadMedia = null; 65 var _uploadMedia = null;
68 var _uploadOptions = null; 66 var _uploadOptions = null;
69 var _downloadOptions = commons.DownloadOptions.Metadata; 67 var _downloadOptions = commons.DownloadOptions.Metadata;
70 var _body = null; 68 var _body = null;
71 69
72 if (encodedRequest == null) { 70 if (encodedRequest == null) {
73 throw new core.ArgumentError("Parameter encodedRequest is required."); 71 throw new core.ArgumentError("Parameter encodedRequest is required.");
74 } 72 }
73 if (clientId != null) {
74 _queryParams["clientId"] = [clientId];
75 }
75 if (clientVersion != null) { 76 if (clientVersion != null) {
76 _queryParams["clientVersion"] = [clientVersion]; 77 _queryParams["clientVersion"] = [clientVersion];
77 } 78 }
78 if (clientId != null) {
79 _queryParams["clientId"] = [clientId];
80 }
81 79
82 _url = 'v4/encodedFullHashes/' + commons.Escaper.ecapeVariable('$encodedRequ est'); 80 _url = 'v4/encodedFullHashes/' + commons.Escaper.ecapeVariable('$encodedRequ est');
83 81
84 var _response = _requester.request(_url, 82 var _response = _requester.request(_url,
85 "GET", 83 "GET",
86 body: _body, 84 body: _body,
87 queryParams: _queryParams, 85 queryParams: _queryParams,
88 uploadOptions: _uploadOptions, 86 uploadOptions: _uploadOptions,
89 uploadMedia: _uploadMedia, 87 uploadMedia: _uploadMedia,
90 downloadOptions: _downloadOptions); 88 downloadOptions: _downloadOptions);
91 return _response.then((data) => new FindFullHashesResponse.fromJson(data)); 89 return _response.then((data) => new FindFullHashesResponse.fromJson(data));
92 } 90 }
93 91
94 } 92 }
95 93
96 94
97 class EncodedUpdatesResourceApi { 95 class EncodedUpdatesResourceApi {
98 final commons.ApiRequester _requester; 96 final commons.ApiRequester _requester;
99 97
100 EncodedUpdatesResourceApi(commons.ApiRequester client) : 98 EncodedUpdatesResourceApi(commons.ApiRequester client) :
101 _requester = client; 99 _requester = client;
102 100
103 /** 101 /**
104 * Request parameters: 102 * Request parameters:
105 * 103 *
106 * [encodedRequest] - A serialized FetchThreatListUpdatesRequest proto. 104 * [encodedRequest] - A serialized FetchThreatListUpdatesRequest proto.
107 * 105 *
108 * [clientVersion] - The version of the client implementation.
109 *
110 * [clientId] - A client ID that uniquely identifies the client implementation 106 * [clientId] - A client ID that uniquely identifies the client implementation
111 * of the Safe 107 * of the Safe
112 * Browsing API. 108 * Browsing API.
113 * 109 *
110 * [clientVersion] - The version of the client implementation.
111 *
114 * Completes with a [FetchThreatListUpdatesResponse]. 112 * Completes with a [FetchThreatListUpdatesResponse].
115 * 113 *
116 * Completes with a [commons.ApiRequestError] if the API endpoint returned an 114 * Completes with a [commons.ApiRequestError] if the API endpoint returned an
117 * error. 115 * error.
118 * 116 *
119 * If the used [http.Client] completes with an error when making a REST call, 117 * If the used [http.Client] completes with an error when making a REST call,
120 * this method will complete with the same error. 118 * this method will complete with the same error.
121 */ 119 */
122 async.Future<FetchThreatListUpdatesResponse> get(core.String encodedRequest, { core.String clientVersion, core.String clientId}) { 120 async.Future<FetchThreatListUpdatesResponse> get(core.String encodedRequest, { core.String clientId, core.String clientVersion}) {
123 var _url = null; 121 var _url = null;
124 var _queryParams = new core.Map(); 122 var _queryParams = new core.Map();
125 var _uploadMedia = null; 123 var _uploadMedia = null;
126 var _uploadOptions = null; 124 var _uploadOptions = null;
127 var _downloadOptions = commons.DownloadOptions.Metadata; 125 var _downloadOptions = commons.DownloadOptions.Metadata;
128 var _body = null; 126 var _body = null;
129 127
130 if (encodedRequest == null) { 128 if (encodedRequest == null) {
131 throw new core.ArgumentError("Parameter encodedRequest is required."); 129 throw new core.ArgumentError("Parameter encodedRequest is required.");
132 } 130 }
131 if (clientId != null) {
132 _queryParams["clientId"] = [clientId];
133 }
133 if (clientVersion != null) { 134 if (clientVersion != null) {
134 _queryParams["clientVersion"] = [clientVersion]; 135 _queryParams["clientVersion"] = [clientVersion];
135 } 136 }
136 if (clientId != null) {
137 _queryParams["clientId"] = [clientId];
138 }
139 137
140 _url = 'v4/encodedUpdates/' + commons.Escaper.ecapeVariable('$encodedRequest '); 138 _url = 'v4/encodedUpdates/' + commons.Escaper.ecapeVariable('$encodedRequest ');
141 139
142 var _response = _requester.request(_url, 140 var _response = _requester.request(_url,
143 "GET", 141 "GET",
144 body: _body, 142 body: _body,
145 queryParams: _queryParams, 143 queryParams: _queryParams,
146 uploadOptions: _uploadOptions, 144 uploadOptions: _uploadOptions,
147 uploadMedia: _uploadMedia, 145 uploadMedia: _uploadMedia,
148 downloadOptions: _downloadOptions); 146 downloadOptions: _downloadOptions);
(...skipping 591 matching lines...) Expand 10 before | Expand all | Expand 10 after
740 core.String threatEntryType; 738 core.String threatEntryType;
741 /** 739 /**
742 * The type of threat posed by entries present in the list. 740 * The type of threat posed by entries present in the list.
743 * Possible string values are: 741 * Possible string values are:
744 * - "THREAT_TYPE_UNSPECIFIED" : Unknown. 742 * - "THREAT_TYPE_UNSPECIFIED" : Unknown.
745 * - "MALWARE" : Malware threat type. 743 * - "MALWARE" : Malware threat type.
746 * - "SOCIAL_ENGINEERING" : Social engineering threat type. 744 * - "SOCIAL_ENGINEERING" : Social engineering threat type.
747 * - "UNWANTED_SOFTWARE" : Unwanted software threat type. 745 * - "UNWANTED_SOFTWARE" : Unwanted software threat type.
748 * - "POTENTIALLY_HARMFUL_APPLICATION" : Potentially harmful application 746 * - "POTENTIALLY_HARMFUL_APPLICATION" : Potentially harmful application
749 * threat type. 747 * threat type.
748 * - "SOCIAL_ENGINEERING_INTERNAL" : Social engineering threat type for
749 * internal use.
750 * - "API_ABUSE" : API abuse threat type.
750 * - "MALICIOUS_BINARY" : Malicious binary threat type. 751 * - "MALICIOUS_BINARY" : Malicious binary threat type.
752 * - "CSD_WHITELIST" : Client side detection whitelist threat type.
753 * - "CSD_DOWNLOAD_WHITELIST" : Client side download detection whitelist
754 * threat type.
755 * - "CLIENT_INCIDENT" : Client incident threat type.
756 * - "CLIENT_INCIDENT_WHITELIST" : Whitelist used when detecting client
757 * incident threats.
758 * This enum was never launched and should be re-used for the next list.
759 * - "APK_MALWARE_OFFLINE" : List used for offline APK checks in PAM.
760 * - "SUBRESOURCE_FILTER" : Patterns to be used for activating the subresource
761 * filter. Interstitial
762 * will not be shown for patterns from this list.
751 */ 763 */
752 core.String threatType; 764 core.String threatType;
753 765
754 ListUpdateRequest(); 766 ListUpdateRequest();
755 767
756 ListUpdateRequest.fromJson(core.Map _json) { 768 ListUpdateRequest.fromJson(core.Map _json) {
757 if (_json.containsKey("constraints")) { 769 if (_json.containsKey("constraints")) {
758 constraints = new Constraints.fromJson(_json["constraints"]); 770 constraints = new Constraints.fromJson(_json["constraints"]);
759 } 771 }
760 if (_json.containsKey("platformType")) { 772 if (_json.containsKey("platformType")) {
(...skipping 101 matching lines...) Expand 10 before | Expand all | Expand 10 after
862 core.String threatEntryType; 874 core.String threatEntryType;
863 /** 875 /**
864 * The threat type for which data is returned. 876 * The threat type for which data is returned.
865 * Possible string values are: 877 * Possible string values are:
866 * - "THREAT_TYPE_UNSPECIFIED" : Unknown. 878 * - "THREAT_TYPE_UNSPECIFIED" : Unknown.
867 * - "MALWARE" : Malware threat type. 879 * - "MALWARE" : Malware threat type.
868 * - "SOCIAL_ENGINEERING" : Social engineering threat type. 880 * - "SOCIAL_ENGINEERING" : Social engineering threat type.
869 * - "UNWANTED_SOFTWARE" : Unwanted software threat type. 881 * - "UNWANTED_SOFTWARE" : Unwanted software threat type.
870 * - "POTENTIALLY_HARMFUL_APPLICATION" : Potentially harmful application 882 * - "POTENTIALLY_HARMFUL_APPLICATION" : Potentially harmful application
871 * threat type. 883 * threat type.
884 * - "SOCIAL_ENGINEERING_INTERNAL" : Social engineering threat type for
885 * internal use.
886 * - "API_ABUSE" : API abuse threat type.
872 * - "MALICIOUS_BINARY" : Malicious binary threat type. 887 * - "MALICIOUS_BINARY" : Malicious binary threat type.
888 * - "CSD_WHITELIST" : Client side detection whitelist threat type.
889 * - "CSD_DOWNLOAD_WHITELIST" : Client side download detection whitelist
890 * threat type.
891 * - "CLIENT_INCIDENT" : Client incident threat type.
892 * - "CLIENT_INCIDENT_WHITELIST" : Whitelist used when detecting client
893 * incident threats.
894 * This enum was never launched and should be re-used for the next list.
895 * - "APK_MALWARE_OFFLINE" : List used for offline APK checks in PAM.
896 * - "SUBRESOURCE_FILTER" : Patterns to be used for activating the subresource
897 * filter. Interstitial
898 * will not be shown for patterns from this list.
873 */ 899 */
874 core.String threatType; 900 core.String threatType;
875 901
876 ListUpdateResponse(); 902 ListUpdateResponse();
877 903
878 ListUpdateResponse.fromJson(core.Map _json) { 904 ListUpdateResponse.fromJson(core.Map _json) {
879 if (_json.containsKey("additions")) { 905 if (_json.containsKey("additions")) {
880 additions = _json["additions"].map((value) => new ThreatEntrySet.fromJson( value)).toList(); 906 additions = _json["additions"].map((value) => new ThreatEntrySet.fromJson( value)).toList();
881 } 907 }
882 if (_json.containsKey("checksum")) { 908 if (_json.containsKey("checksum")) {
(...skipping 477 matching lines...) Expand 10 before | Expand all | Expand 10 after
1360 core.String threatEntryType; 1386 core.String threatEntryType;
1361 /** 1387 /**
1362 * The threat type posed by the list's entries. 1388 * The threat type posed by the list's entries.
1363 * Possible string values are: 1389 * Possible string values are:
1364 * - "THREAT_TYPE_UNSPECIFIED" : Unknown. 1390 * - "THREAT_TYPE_UNSPECIFIED" : Unknown.
1365 * - "MALWARE" : Malware threat type. 1391 * - "MALWARE" : Malware threat type.
1366 * - "SOCIAL_ENGINEERING" : Social engineering threat type. 1392 * - "SOCIAL_ENGINEERING" : Social engineering threat type.
1367 * - "UNWANTED_SOFTWARE" : Unwanted software threat type. 1393 * - "UNWANTED_SOFTWARE" : Unwanted software threat type.
1368 * - "POTENTIALLY_HARMFUL_APPLICATION" : Potentially harmful application 1394 * - "POTENTIALLY_HARMFUL_APPLICATION" : Potentially harmful application
1369 * threat type. 1395 * threat type.
1396 * - "SOCIAL_ENGINEERING_INTERNAL" : Social engineering threat type for
1397 * internal use.
1398 * - "API_ABUSE" : API abuse threat type.
1370 * - "MALICIOUS_BINARY" : Malicious binary threat type. 1399 * - "MALICIOUS_BINARY" : Malicious binary threat type.
1400 * - "CSD_WHITELIST" : Client side detection whitelist threat type.
1401 * - "CSD_DOWNLOAD_WHITELIST" : Client side download detection whitelist
1402 * threat type.
1403 * - "CLIENT_INCIDENT" : Client incident threat type.
1404 * - "CLIENT_INCIDENT_WHITELIST" : Whitelist used when detecting client
1405 * incident threats.
1406 * This enum was never launched and should be re-used for the next list.
1407 * - "APK_MALWARE_OFFLINE" : List used for offline APK checks in PAM.
1408 * - "SUBRESOURCE_FILTER" : Patterns to be used for activating the subresource
1409 * filter. Interstitial
1410 * will not be shown for patterns from this list.
1371 */ 1411 */
1372 core.String threatType; 1412 core.String threatType;
1373 1413
1374 ThreatListDescriptor(); 1414 ThreatListDescriptor();
1375 1415
1376 ThreatListDescriptor.fromJson(core.Map _json) { 1416 ThreatListDescriptor.fromJson(core.Map _json) {
1377 if (_json.containsKey("platformType")) { 1417 if (_json.containsKey("platformType")) {
1378 platformType = _json["platformType"]; 1418 platformType = _json["platformType"];
1379 } 1419 }
1380 if (_json.containsKey("threatEntryType")) { 1420 if (_json.containsKey("threatEntryType")) {
(...skipping 58 matching lines...) Expand 10 before | Expand all | Expand 10 after
1439 core.String threatEntryType; 1479 core.String threatEntryType;
1440 /** 1480 /**
1441 * The threat type matching this threat. 1481 * The threat type matching this threat.
1442 * Possible string values are: 1482 * Possible string values are:
1443 * - "THREAT_TYPE_UNSPECIFIED" : Unknown. 1483 * - "THREAT_TYPE_UNSPECIFIED" : Unknown.
1444 * - "MALWARE" : Malware threat type. 1484 * - "MALWARE" : Malware threat type.
1445 * - "SOCIAL_ENGINEERING" : Social engineering threat type. 1485 * - "SOCIAL_ENGINEERING" : Social engineering threat type.
1446 * - "UNWANTED_SOFTWARE" : Unwanted software threat type. 1486 * - "UNWANTED_SOFTWARE" : Unwanted software threat type.
1447 * - "POTENTIALLY_HARMFUL_APPLICATION" : Potentially harmful application 1487 * - "POTENTIALLY_HARMFUL_APPLICATION" : Potentially harmful application
1448 * threat type. 1488 * threat type.
1489 * - "SOCIAL_ENGINEERING_INTERNAL" : Social engineering threat type for
1490 * internal use.
1491 * - "API_ABUSE" : API abuse threat type.
1449 * - "MALICIOUS_BINARY" : Malicious binary threat type. 1492 * - "MALICIOUS_BINARY" : Malicious binary threat type.
1493 * - "CSD_WHITELIST" : Client side detection whitelist threat type.
1494 * - "CSD_DOWNLOAD_WHITELIST" : Client side download detection whitelist
1495 * threat type.
1496 * - "CLIENT_INCIDENT" : Client incident threat type.
1497 * - "CLIENT_INCIDENT_WHITELIST" : Whitelist used when detecting client
1498 * incident threats.
1499 * This enum was never launched and should be re-used for the next list.
1500 * - "APK_MALWARE_OFFLINE" : List used for offline APK checks in PAM.
1501 * - "SUBRESOURCE_FILTER" : Patterns to be used for activating the subresource
1502 * filter. Interstitial
1503 * will not be shown for patterns from this list.
1450 */ 1504 */
1451 core.String threatType; 1505 core.String threatType;
1452 1506
1453 ThreatMatch(); 1507 ThreatMatch();
1454 1508
1455 ThreatMatch.fromJson(core.Map _json) { 1509 ThreatMatch.fromJson(core.Map _json) {
1456 if (_json.containsKey("cacheDuration")) { 1510 if (_json.containsKey("cacheDuration")) {
1457 cacheDuration = _json["cacheDuration"]; 1511 cacheDuration = _json["cacheDuration"];
1458 } 1512 }
1459 if (_json.containsKey("platformType")) { 1513 if (_json.containsKey("platformType")) {
(...skipping 29 matching lines...) Expand all
1489 } 1543 }
1490 if (threatEntryType != null) { 1544 if (threatEntryType != null) {
1491 _json["threatEntryType"] = threatEntryType; 1545 _json["threatEntryType"] = threatEntryType;
1492 } 1546 }
1493 if (threatType != null) { 1547 if (threatType != null) {
1494 _json["threatType"] = threatType; 1548 _json["threatType"] = threatType;
1495 } 1549 }
1496 return _json; 1550 return _json;
1497 } 1551 }
1498 } 1552 }
OLDNEW
« no previous file with comments | « generated/googleapis/lib/runtimeconfig/v1.dart ('k') | generated/googleapis/lib/script/v1.dart » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698