parent
541b1ded4a
commit
fd5b3b8238
|
|
@ -0,0 +1,352 @@
|
|||
// Copyright 2020 Google LLC
|
||||
//
|
||||
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||
// you may not use this file except in compliance with the License.
|
||||
// You may obtain a copy of the License at
|
||||
//
|
||||
// http://www.apache.org/licenses/LICENSE-2.0
|
||||
//
|
||||
// Unless required by applicable law or agreed to in writing, software
|
||||
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
// See the License for the specific language governing permissions and
|
||||
// limitations under the License.
|
||||
|
||||
syntax = "proto3";
|
||||
|
||||
package google.cloud.webrisk.v1;
|
||||
|
||||
import "google/api/annotations.proto";
|
||||
import "google/api/client.proto";
|
||||
import "google/api/field_behavior.proto";
|
||||
import "google/api/resource.proto";
|
||||
import "google/protobuf/timestamp.proto";
|
||||
|
||||
option csharp_namespace = "Google.Cloud.WebRisk.V1";
|
||||
option go_package = "google.golang.org/genproto/googleapis/cloud/webrisk/v1;webrisk";
|
||||
option java_multiple_files = true;
|
||||
option java_outer_classname = "WebRiskProto";
|
||||
option java_package = "com.google.webrisk.v1";
|
||||
option objc_class_prefix = "GCWR";
|
||||
option php_namespace = "Google\\Cloud\\WebRisk\\V1";
|
||||
|
||||
// Web Risk API defines an interface to detect malicious URLs on your
|
||||
// website and in client applications.
|
||||
service WebRiskService {
|
||||
option (google.api.default_host) = "webrisk.googleapis.com";
|
||||
option (google.api.oauth_scopes) = "https://www.googleapis.com/auth/cloud-platform";
|
||||
|
||||
// Gets the most recent threat list diffs. These diffs should be applied to
|
||||
// a local database of hashes to keep it up-to-date. If the local database is
|
||||
// empty or excessively out-of-date, a complete snapshot of the database will
|
||||
// be returned. This Method only updates a single ThreatList at a time. To
|
||||
// update multiple ThreatList databases, this method needs to be called once
|
||||
// for each list.
|
||||
rpc ComputeThreatListDiff(ComputeThreatListDiffRequest) returns (ComputeThreatListDiffResponse) {
|
||||
option (google.api.http) = {
|
||||
get: "/v1/threatLists:computeDiff"
|
||||
};
|
||||
option (google.api.method_signature) = "threat_type,version_token,constraints";
|
||||
}
|
||||
|
||||
// This method is used to check whether a URI is on a given threatList.
|
||||
// Multiple threatLists may be searched in a single query.
|
||||
// The response will list all requested threatLists the URI was found to
|
||||
// match. If the URI is not found on any of the requested ThreatList an
|
||||
// empty response will be returned.
|
||||
rpc SearchUris(SearchUrisRequest) returns (SearchUrisResponse) {
|
||||
option (google.api.http) = {
|
||||
get: "/v1/uris:search"
|
||||
};
|
||||
option (google.api.method_signature) = "uri,threat_types";
|
||||
}
|
||||
|
||||
// Gets the full hashes that match the requested hash prefix.
|
||||
// This is used after a hash prefix is looked up in a threatList
|
||||
// and there is a match. The client side threatList only holds partial hashes
|
||||
// so the client must query this method to determine if there is a full
|
||||
// hash match of a threat.
|
||||
rpc SearchHashes(SearchHashesRequest) returns (SearchHashesResponse) {
|
||||
option (google.api.http) = {
|
||||
get: "/v1/hashes:search"
|
||||
};
|
||||
option (google.api.method_signature) = "hash_prefix,threat_types";
|
||||
}
|
||||
|
||||
// Creates a Submission of a URI suspected of containing phishing content to
|
||||
// be reviewed. If the result verifies the existence of malicious phishing
|
||||
// content, the site will be added to the [Google's Social Engineering
|
||||
// lists](https://support.google.com/webmasters/answer/6350487/) in order to
|
||||
// protect users that could get exposed to this threat in the future. Only
|
||||
// projects with CREATE_SUBMISSION_USERS visibility can use this method.
|
||||
rpc CreateSubmission(CreateSubmissionRequest) returns (Submission) {
|
||||
option (google.api.http) = {
|
||||
post: "/v1/{parent=projects/*}/submissions"
|
||||
body: "submission"
|
||||
};
|
||||
option (google.api.method_signature) = "parent,submission";
|
||||
}
|
||||
}
|
||||
|
||||
// Describes an API diff request.
|
||||
message ComputeThreatListDiffRequest {
|
||||
// The constraints for this diff.
|
||||
message Constraints {
|
||||
// The maximum size in number of entries. The diff will not contain more
|
||||
// entries than this value. This should be a power of 2 between 2**10 and
|
||||
// 2**20. If zero, no diff size limit is set.
|
||||
int32 max_diff_entries = 1;
|
||||
|
||||
// Sets the maximum number of entries that the client is willing to have
|
||||
// in the local database. This should be a power of 2 between 2**10 and
|
||||
// 2**20. If zero, no database size limit is set.
|
||||
int32 max_database_entries = 2;
|
||||
|
||||
// The compression types supported by the client.
|
||||
repeated CompressionType supported_compressions = 3;
|
||||
}
|
||||
|
||||
// Required. The threat list to update. Only a single ThreatType should be specified.
|
||||
ThreatType threat_type = 1 [(google.api.field_behavior) = REQUIRED];
|
||||
|
||||
// The current version token of the client for the requested list (the
|
||||
// client version that was received from the last successful diff).
|
||||
// If the client does not have a version token (this is the first time calling
|
||||
// ComputeThreatListDiff), this may be left empty and a full database
|
||||
// snapshot will be returned.
|
||||
bytes version_token = 2;
|
||||
|
||||
// Required. The constraints associated with this request.
|
||||
Constraints constraints = 3 [(google.api.field_behavior) = REQUIRED];
|
||||
}
|
||||
|
||||
message ComputeThreatListDiffResponse {
|
||||
// The expected state of a client's local database.
|
||||
message Checksum {
|
||||
// The SHA256 hash of the client state; that is, of the sorted list of all
|
||||
// hashes present in the database.
|
||||
bytes sha256 = 1;
|
||||
}
|
||||
|
||||
// The type of response sent to the client.
|
||||
enum ResponseType {
|
||||
// Unknown.
|
||||
RESPONSE_TYPE_UNSPECIFIED = 0;
|
||||
|
||||
// Partial updates are applied to the client's existing local database.
|
||||
DIFF = 1;
|
||||
|
||||
// Full updates resets the client's entire local database. This means
|
||||
// that either the client had no state, was seriously out-of-date,
|
||||
// or the client is believed to be corrupt.
|
||||
RESET = 2;
|
||||
}
|
||||
|
||||
// The type of response. This may indicate that an action must be taken by the
|
||||
// client when the response is received.
|
||||
ResponseType response_type = 4;
|
||||
|
||||
// A set of entries to add to a local threat type's list.
|
||||
ThreatEntryAdditions additions = 5;
|
||||
|
||||
// A set of entries to remove from a local threat type's list.
|
||||
// This field may be empty.
|
||||
ThreatEntryRemovals removals = 6;
|
||||
|
||||
// The new opaque client version token. This should be retained by the client
|
||||
// and passed into the next call of ComputeThreatListDiff as 'version_token'.
|
||||
// A separate version token should be stored and used for each threatList.
|
||||
bytes new_version_token = 7;
|
||||
|
||||
// The expected SHA256 hash of the client state; that is, of the sorted list
|
||||
// of all hashes present in the database after applying the provided diff.
|
||||
// If the client state doesn't match the expected state, the client must
|
||||
// discard this diff and retry later.
|
||||
Checksum checksum = 8;
|
||||
|
||||
// The soonest the client should wait before issuing any diff
|
||||
// request. Querying sooner is unlikely to produce a meaningful diff.
|
||||
// Waiting longer is acceptable considering the use case.
|
||||
// If this field is not set clients may update as soon as they want.
|
||||
google.protobuf.Timestamp recommended_next_diff = 2;
|
||||
}
|
||||
|
||||
// Request to check URI entries against threatLists.
|
||||
message SearchUrisRequest {
|
||||
// Required. The URI to be checked for matches.
|
||||
string uri = 1 [(google.api.field_behavior) = REQUIRED];
|
||||
|
||||
// Required. The ThreatLists to search in. Multiple ThreatLists may be specified.
|
||||
repeated ThreatType threat_types = 2 [(google.api.field_behavior) = REQUIRED];
|
||||
}
|
||||
|
||||
message SearchUrisResponse {
|
||||
// Contains threat information on a matching uri.
|
||||
message ThreatUri {
|
||||
// The ThreatList this threat belongs to.
|
||||
repeated ThreatType threat_types = 1;
|
||||
|
||||
// The cache lifetime for the returned match. Clients must not cache this
|
||||
// response past this timestamp to avoid false positives.
|
||||
google.protobuf.Timestamp expire_time = 2;
|
||||
}
|
||||
|
||||
// The threat list matches. This may be empty if the URI is on no list.
|
||||
ThreatUri threat = 1;
|
||||
}
|
||||
|
||||
// Request to return full hashes matched by the provided hash prefixes.
|
||||
message SearchHashesRequest {
|
||||
// A hash prefix, consisting of the most significant 4-32 bytes of a SHA256
|
||||
// hash. For JSON requests, this field is base64-encoded.
|
||||
bytes hash_prefix = 1;
|
||||
|
||||
// Required. The ThreatLists to search in. Multiple ThreatLists may be specified.
|
||||
repeated ThreatType threat_types = 2 [(google.api.field_behavior) = REQUIRED];
|
||||
}
|
||||
|
||||
message SearchHashesResponse {
|
||||
// Contains threat information on a matching hash.
|
||||
message ThreatHash {
|
||||
// The ThreatList this threat belongs to.
|
||||
// This must contain at least one entry.
|
||||
repeated ThreatType threat_types = 1;
|
||||
|
||||
// A 32 byte SHA256 hash. This field is in binary format. For JSON
|
||||
// requests, hashes are base64-encoded.
|
||||
bytes hash = 2;
|
||||
|
||||
// The cache lifetime for the returned match. Clients must not cache this
|
||||
// response past this timestamp to avoid false positives.
|
||||
google.protobuf.Timestamp expire_time = 3;
|
||||
}
|
||||
|
||||
// The full hashes that matched the requested prefixes.
|
||||
// The hash will be populated in the key.
|
||||
repeated ThreatHash threats = 1;
|
||||
|
||||
// For requested entities that did not match the threat list, how long to
|
||||
// cache the response until.
|
||||
google.protobuf.Timestamp negative_expire_time = 2;
|
||||
}
|
||||
|
||||
// Contains the set of entries to add to a local database.
|
||||
// May contain a combination of compressed and raw data in a single response.
|
||||
message ThreatEntryAdditions {
|
||||
// The raw SHA256-formatted entries.
|
||||
// Repeated to allow returning sets of hashes with different prefix sizes.
|
||||
repeated RawHashes raw_hashes = 1;
|
||||
|
||||
// The encoded 4-byte prefixes of SHA256-formatted entries, using a
|
||||
// Golomb-Rice encoding. The hashes are converted to uint32, sorted in
|
||||
// ascending order, then delta encoded and stored as encoded_data.
|
||||
RiceDeltaEncoding rice_hashes = 2;
|
||||
}
|
||||
|
||||
// Contains the set of entries to remove from a local database.
|
||||
message ThreatEntryRemovals {
|
||||
// The raw removal indices for a local list.
|
||||
RawIndices raw_indices = 1;
|
||||
|
||||
// The encoded local, lexicographically-sorted list indices, using a
|
||||
// Golomb-Rice encoding. Used for sending compressed removal indices. The
|
||||
// removal indices (uint32) are sorted in ascending order, then delta encoded
|
||||
// and stored as encoded_data.
|
||||
RiceDeltaEncoding rice_indices = 2;
|
||||
}
|
||||
|
||||
// The type of threat. This maps dirrectly to the threat list a threat may
|
||||
// belong to.
|
||||
enum ThreatType {
|
||||
// Unknown.
|
||||
THREAT_TYPE_UNSPECIFIED = 0;
|
||||
|
||||
// Malware targeting any platform.
|
||||
MALWARE = 1;
|
||||
|
||||
// Social engineering targeting any platform.
|
||||
SOCIAL_ENGINEERING = 2;
|
||||
|
||||
// Unwanted software targeting any platform.
|
||||
UNWANTED_SOFTWARE = 3;
|
||||
}
|
||||
|
||||
// The ways in which threat entry sets can be compressed.
|
||||
enum CompressionType {
|
||||
// Unknown.
|
||||
COMPRESSION_TYPE_UNSPECIFIED = 0;
|
||||
|
||||
// Raw, uncompressed data.
|
||||
RAW = 1;
|
||||
|
||||
// Rice-Golomb encoded data.
|
||||
RICE = 2;
|
||||
}
|
||||
|
||||
// A set of raw indices to remove from a local list.
|
||||
message RawIndices {
|
||||
// The indices to remove from a lexicographically-sorted local list.
|
||||
repeated int32 indices = 1;
|
||||
}
|
||||
|
||||
// The uncompressed threat entries in hash format.
|
||||
// Hashes can be anywhere from 4 to 32 bytes in size. A large majority are 4
|
||||
// bytes, but some hashes are lengthened if they collide with the hash of a
|
||||
// popular URI.
|
||||
//
|
||||
// Used for sending ThreatEntryAdditons to clients that do not support
|
||||
// compression, or when sending non-4-byte hashes to clients that do support
|
||||
// compression.
|
||||
message RawHashes {
|
||||
// The number of bytes for each prefix encoded below. This field can be
|
||||
// anywhere from 4 (shortest prefix) to 32 (full SHA256 hash).
|
||||
// In practice this is almost always 4, except in exceptional circumstances.
|
||||
int32 prefix_size = 1;
|
||||
|
||||
// The hashes, in binary format, concatenated into one long string. Hashes are
|
||||
// sorted in lexicographic order. For JSON API users, hashes are
|
||||
// base64-encoded.
|
||||
bytes raw_hashes = 2;
|
||||
}
|
||||
|
||||
// The Rice-Golomb encoded data. Used for sending compressed 4-byte hashes or
|
||||
// compressed removal indices.
|
||||
message RiceDeltaEncoding {
|
||||
// The offset of the first entry in the encoded data, or, if only a single
|
||||
// integer was encoded, that single integer's value. If the field is empty or
|
||||
// missing, assume zero.
|
||||
int64 first_value = 1;
|
||||
|
||||
// The Golomb-Rice parameter, which is a number between 2 and 28. This field
|
||||
// is missing (that is, zero) if `num_entries` is zero.
|
||||
int32 rice_parameter = 2;
|
||||
|
||||
// The number of entries that are delta encoded in the encoded data. If only a
|
||||
// single integer was encoded, this will be zero and the single value will be
|
||||
// stored in `first_value`.
|
||||
int32 entry_count = 3;
|
||||
|
||||
// The encoded deltas that are encoded using the Golomb-Rice coder.
|
||||
bytes encoded_data = 4;
|
||||
}
|
||||
|
||||
// Wraps a URI that might be displaying phishing content.
|
||||
message Submission {
|
||||
// Required. The URI that is being reported for phishing content to be analyzed.
|
||||
string uri = 1 [(google.api.field_behavior) = REQUIRED];
|
||||
}
|
||||
|
||||
// Request to send a potentially phishy URI to WebRisk.
|
||||
message CreateSubmissionRequest {
|
||||
// Required. The name of the project that is making the submission. This string is in
|
||||
// the format "projects/{project_number}".
|
||||
string parent = 1 [
|
||||
(google.api.field_behavior) = REQUIRED,
|
||||
(google.api.resource_reference) = {
|
||||
type: "cloudresourcemanager.googleapis.com/Project"
|
||||
}
|
||||
];
|
||||
|
||||
// Required. The submission that contains the content of the phishing report.
|
||||
Submission submission = 2 [(google.api.field_behavior) = REQUIRED];
|
||||
}
|
||||
|
|
@ -0,0 +1,30 @@
|
|||
{
|
||||
"methodConfig": [
|
||||
{
|
||||
"name": [
|
||||
{
|
||||
"service": "google.cloud.webrisk.v1.WebRiskService",
|
||||
"method": "ComputeThreatListDiff"
|
||||
},
|
||||
{
|
||||
"service": "google.cloud.webrisk.v1.WebRiskService",
|
||||
"method": "SearchUris"
|
||||
},
|
||||
{
|
||||
"service": "google.cloud.webrisk.v1.WebRiskService",
|
||||
"method": "SearchHashes"
|
||||
}
|
||||
],
|
||||
"timeout": "600s",
|
||||
"retryPolicy": {
|
||||
"initialBackoff": "0.100s",
|
||||
"maxBackoff": "60s",
|
||||
"backoffMultiplier": 1.3,
|
||||
"retryableStatusCodes": [
|
||||
"DEADLINE_EXCEEDED",
|
||||
"UNAVAILABLE"
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
|
|
@ -0,0 +1,14 @@
|
|||
type: google.api.Service
|
||||
config_version: 3
|
||||
name: webrisk.googleapis.com
|
||||
title: Web Risk API
|
||||
|
||||
apis:
|
||||
- name: google.cloud.webrisk.v1.WebRiskService
|
||||
|
||||
authentication:
|
||||
rules:
|
||||
- selector: 'google.cloud.webrisk.v1.WebRiskService.*'
|
||||
oauth:
|
||||
canonical_scopes: |-
|
||||
https://www.googleapis.com/auth/cloud-platform
|
||||
Loading…
Reference in New Issue