| Index: generated/googleapis/lib/safebrowsing/v4.dart
|
| diff --git a/generated/googleapis/lib/safebrowsing/v4.dart b/generated/googleapis/lib/safebrowsing/v4.dart
|
| index 300226c5cec25808ec75c035d9f793b66844b57a..75ac1a0ea60638d9fca7a274f855c7e026e2220c 100644
|
| --- a/generated/googleapis/lib/safebrowsing/v4.dart
|
| +++ b/generated/googleapis/lib/safebrowsing/v4.dart
|
| @@ -15,10 +15,8 @@ export 'package:_discoveryapis_commons/_discoveryapis_commons.dart' show
|
| const core.String USER_AGENT = 'dart-api-client safebrowsing/v4';
|
|
|
| /**
|
| - * The Safe Browsing API is an experimental API that allows client applications
|
| - * to check URLs against Google's constantly-updated blacklists of suspected
|
| - * phishing and malware pages. Your client application can use the API to
|
| - * download an encrypted table for local, client-side lookups of URLs.
|
| + * Enables client applications to check web resources (most commonly URLs)
|
| + * against Google-generated lists of unsafe web resources.
|
| */
|
| class SafebrowsingApi {
|
|
|
| @@ -47,12 +45,12 @@ class EncodedFullHashesResourceApi {
|
| *
|
| * [encodedRequest] - A serialized FindFullHashesRequest proto.
|
| *
|
| - * [clientVersion] - The version of the client implementation.
|
| - *
|
| * [clientId] - A client ID that (hopefully) uniquely identifies the client
|
| * implementation
|
| * of the Safe Browsing API.
|
| *
|
| + * [clientVersion] - The version of the client implementation.
|
| + *
|
| * Completes with a [FindFullHashesResponse].
|
| *
|
| * Completes with a [commons.ApiRequestError] if the API endpoint returned an
|
| @@ -61,7 +59,7 @@ class EncodedFullHashesResourceApi {
|
| * If the used [http.Client] completes with an error when making a REST call,
|
| * this method will complete with the same error.
|
| */
|
| - async.Future<FindFullHashesResponse> get(core.String encodedRequest, {core.String clientVersion, core.String clientId}) {
|
| + async.Future<FindFullHashesResponse> get(core.String encodedRequest, {core.String clientId, core.String clientVersion}) {
|
| var _url = null;
|
| var _queryParams = new core.Map();
|
| var _uploadMedia = null;
|
| @@ -72,12 +70,12 @@ class EncodedFullHashesResourceApi {
|
| if (encodedRequest == null) {
|
| throw new core.ArgumentError("Parameter encodedRequest is required.");
|
| }
|
| - if (clientVersion != null) {
|
| - _queryParams["clientVersion"] = [clientVersion];
|
| - }
|
| if (clientId != null) {
|
| _queryParams["clientId"] = [clientId];
|
| }
|
| + if (clientVersion != null) {
|
| + _queryParams["clientVersion"] = [clientVersion];
|
| + }
|
|
|
| _url = 'v4/encodedFullHashes/' + commons.Escaper.ecapeVariable('$encodedRequest');
|
|
|
| @@ -105,12 +103,12 @@ class EncodedUpdatesResourceApi {
|
| *
|
| * [encodedRequest] - A serialized FetchThreatListUpdatesRequest proto.
|
| *
|
| - * [clientVersion] - The version of the client implementation.
|
| - *
|
| * [clientId] - A client ID that uniquely identifies the client implementation
|
| * of the Safe
|
| * Browsing API.
|
| *
|
| + * [clientVersion] - The version of the client implementation.
|
| + *
|
| * Completes with a [FetchThreatListUpdatesResponse].
|
| *
|
| * Completes with a [commons.ApiRequestError] if the API endpoint returned an
|
| @@ -119,7 +117,7 @@ class EncodedUpdatesResourceApi {
|
| * If the used [http.Client] completes with an error when making a REST call,
|
| * this method will complete with the same error.
|
| */
|
| - async.Future<FetchThreatListUpdatesResponse> get(core.String encodedRequest, {core.String clientVersion, core.String clientId}) {
|
| + async.Future<FetchThreatListUpdatesResponse> get(core.String encodedRequest, {core.String clientId, core.String clientVersion}) {
|
| var _url = null;
|
| var _queryParams = new core.Map();
|
| var _uploadMedia = null;
|
| @@ -130,12 +128,12 @@ class EncodedUpdatesResourceApi {
|
| if (encodedRequest == null) {
|
| throw new core.ArgumentError("Parameter encodedRequest is required.");
|
| }
|
| - if (clientVersion != null) {
|
| - _queryParams["clientVersion"] = [clientVersion];
|
| - }
|
| if (clientId != null) {
|
| _queryParams["clientId"] = [clientId];
|
| }
|
| + if (clientVersion != null) {
|
| + _queryParams["clientVersion"] = [clientVersion];
|
| + }
|
|
|
| _url = 'v4/encodedUpdates/' + commons.Escaper.ecapeVariable('$encodedRequest');
|
|
|
| @@ -747,7 +745,21 @@ class ListUpdateRequest {
|
| * - "UNWANTED_SOFTWARE" : Unwanted software threat type.
|
| * - "POTENTIALLY_HARMFUL_APPLICATION" : Potentially harmful application
|
| * threat type.
|
| + * - "SOCIAL_ENGINEERING_INTERNAL" : Social engineering threat type for
|
| + * internal use.
|
| + * - "API_ABUSE" : API abuse threat type.
|
| * - "MALICIOUS_BINARY" : Malicious binary threat type.
|
| + * - "CSD_WHITELIST" : Client side detection whitelist threat type.
|
| + * - "CSD_DOWNLOAD_WHITELIST" : Client side download detection whitelist
|
| + * threat type.
|
| + * - "CLIENT_INCIDENT" : Client incident threat type.
|
| + * - "CLIENT_INCIDENT_WHITELIST" : Whitelist used when detecting client
|
| + * incident threats.
|
| + * This enum was never launched and should be re-used for the next list.
|
| + * - "APK_MALWARE_OFFLINE" : List used for offline APK checks in PAM.
|
| + * - "SUBRESOURCE_FILTER" : Patterns to be used for activating the subresource
|
| + * filter. Interstitial
|
| + * will not be shown for patterns from this list.
|
| */
|
| core.String threatType;
|
|
|
| @@ -869,7 +881,21 @@ class ListUpdateResponse {
|
| * - "UNWANTED_SOFTWARE" : Unwanted software threat type.
|
| * - "POTENTIALLY_HARMFUL_APPLICATION" : Potentially harmful application
|
| * threat type.
|
| + * - "SOCIAL_ENGINEERING_INTERNAL" : Social engineering threat type for
|
| + * internal use.
|
| + * - "API_ABUSE" : API abuse threat type.
|
| * - "MALICIOUS_BINARY" : Malicious binary threat type.
|
| + * - "CSD_WHITELIST" : Client side detection whitelist threat type.
|
| + * - "CSD_DOWNLOAD_WHITELIST" : Client side download detection whitelist
|
| + * threat type.
|
| + * - "CLIENT_INCIDENT" : Client incident threat type.
|
| + * - "CLIENT_INCIDENT_WHITELIST" : Whitelist used when detecting client
|
| + * incident threats.
|
| + * This enum was never launched and should be re-used for the next list.
|
| + * - "APK_MALWARE_OFFLINE" : List used for offline APK checks in PAM.
|
| + * - "SUBRESOURCE_FILTER" : Patterns to be used for activating the subresource
|
| + * filter. Interstitial
|
| + * will not be shown for patterns from this list.
|
| */
|
| core.String threatType;
|
|
|
| @@ -1367,7 +1393,21 @@ class ThreatListDescriptor {
|
| * - "UNWANTED_SOFTWARE" : Unwanted software threat type.
|
| * - "POTENTIALLY_HARMFUL_APPLICATION" : Potentially harmful application
|
| * threat type.
|
| + * - "SOCIAL_ENGINEERING_INTERNAL" : Social engineering threat type for
|
| + * internal use.
|
| + * - "API_ABUSE" : API abuse threat type.
|
| * - "MALICIOUS_BINARY" : Malicious binary threat type.
|
| + * - "CSD_WHITELIST" : Client side detection whitelist threat type.
|
| + * - "CSD_DOWNLOAD_WHITELIST" : Client side download detection whitelist
|
| + * threat type.
|
| + * - "CLIENT_INCIDENT" : Client incident threat type.
|
| + * - "CLIENT_INCIDENT_WHITELIST" : Whitelist used when detecting client
|
| + * incident threats.
|
| + * This enum was never launched and should be re-used for the next list.
|
| + * - "APK_MALWARE_OFFLINE" : List used for offline APK checks in PAM.
|
| + * - "SUBRESOURCE_FILTER" : Patterns to be used for activating the subresource
|
| + * filter. Interstitial
|
| + * will not be shown for patterns from this list.
|
| */
|
| core.String threatType;
|
|
|
| @@ -1446,7 +1486,21 @@ class ThreatMatch {
|
| * - "UNWANTED_SOFTWARE" : Unwanted software threat type.
|
| * - "POTENTIALLY_HARMFUL_APPLICATION" : Potentially harmful application
|
| * threat type.
|
| + * - "SOCIAL_ENGINEERING_INTERNAL" : Social engineering threat type for
|
| + * internal use.
|
| + * - "API_ABUSE" : API abuse threat type.
|
| * - "MALICIOUS_BINARY" : Malicious binary threat type.
|
| + * - "CSD_WHITELIST" : Client side detection whitelist threat type.
|
| + * - "CSD_DOWNLOAD_WHITELIST" : Client side download detection whitelist
|
| + * threat type.
|
| + * - "CLIENT_INCIDENT" : Client incident threat type.
|
| + * - "CLIENT_INCIDENT_WHITELIST" : Whitelist used when detecting client
|
| + * incident threats.
|
| + * This enum was never launched and should be re-used for the next list.
|
| + * - "APK_MALWARE_OFFLINE" : List used for offline APK checks in PAM.
|
| + * - "SUBRESOURCE_FILTER" : Patterns to be used for activating the subresource
|
| + * filter. Interstitial
|
| + * will not be shown for patterns from this list.
|
| */
|
| core.String threatType;
|
|
|
|
|