google-cloud-phishing_protection 0.3.2 → 0.10.1

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: f5fe7019c727ad11cba9bea03451359cd630f7d0763c438f6b8fff99136d2ff7
4
- data.tar.gz: e03d956024b5f9813bd9f44b76ad4d75122cbadabd696a97f3900232fe029852
3
+ metadata.gz: c4db57c341799632e372591c1dfe5399aa190c6147bb072f3f7c66531365f7af
4
+ data.tar.gz: 8d590970044f8566fa8a7bf3851170c3e38e3f7e051fc8bfa4fbfc9644d4f46c
5
5
  SHA512:
6
- metadata.gz: 6969af2d2846c4816df549b8b862b9109d36d9daf9f1623d42c987b6adee2e0f26064b1678bac18c0218c09f4e0216336589e3c5ce651f3479ce7caf8bce01a6
7
- data.tar.gz: 5a00cb8c7117d4ab816ffb934da63606b039d9fabb14cbd06f886dbe1a1afceb1a41c0f81667e55f690e259239cb1efddfa31fa11319d5abf270cac1eb895047
6
+ metadata.gz: e8c43bc9fd52ff9df50fece4e7b05a78bcc7947c4db6c9199f1a7ce0965d98d551abdd896140511b89a133ea39e8f966b40d613efad68fc91afb962722d6f7f3
7
+ data.tar.gz: c00fd8c724a0e17c0efe3070d53069013f8f2b5b6442d070b7ab7f4dfb5bcfd6e7e234c70ff21e1ac5bdc9c1da9451751a095ab05d1e5a0bb26cae3242b89535
data/.yardopts CHANGED
@@ -8,4 +8,5 @@
8
8
  -
9
9
  README.md
10
10
  AUTHENTICATION.md
11
- LICENSE
11
+ MIGRATING.md
12
+ LICENSE.md
@@ -1,16 +1,17 @@
1
1
  # Authentication
2
2
 
3
- In general, the google-cloud-phishing_protection library uses [Service
4
- Account](https://cloud.google.com/iam/docs/creating-managing-service-accounts)
5
- credentials to connect to Google Cloud services. When running within [Google
6
- Cloud Platform environments](#google-cloud-platform-environments)
7
- the credentials will be discovered automatically. When running on other
3
+ In general, the google-cloud-phishing_protection library uses
4
+ [Service Account](https://cloud.google.com/iam/docs/creating-managing-service-accounts)
5
+ credentials to connect to Google Cloud services. When running within
6
+ [Google Cloud Platform environments](#google-cloud-platform-environments) the
7
+ credentials will be discovered automatically. When running on other
8
8
  environments, the Service Account credentials can be specified by providing the
9
- path to the [JSON
10
- keyfile](https://cloud.google.com/iam/docs/managing-service-account-keys) for
11
- the account (or the JSON itself) in [environment
12
- variables](#environment-variables). Additionally, Cloud SDK credentials can also
13
- be discovered automatically, but this is only recommended during development.
9
+ path to the
10
+ [JSON keyfile](https://cloud.google.com/iam/docs/managing-service-account-keys)
11
+ for the account (or the JSON itself) in
12
+ [environment variables](#environment-variables). Additionally, Cloud SDK
13
+ credentials can also be discovered automatically, but this is only recommended
14
+ during development.
14
15
 
15
16
  ## Quickstart
16
17
 
@@ -18,7 +19,7 @@ be discovered automatically, but this is only recommended during development.
18
19
  2. Set the [environment variable](#environment-variables).
19
20
 
20
21
  ```sh
21
- export PHISHING_PROTECTION_CREDENTIALS=/path/to/json`
22
+ export PHISHING_PROTECTION_CREDENTIALS=path/to/keyfile.json
22
23
  ```
23
24
 
24
25
  3. Initialize the client.
@@ -26,23 +27,14 @@ export PHISHING_PROTECTION_CREDENTIALS=/path/to/json`
26
27
  ```ruby
27
28
  require "google/cloud/phishing_protection"
28
29
 
29
- client = Google::Cloud::PhishingProtection.new
30
+ client = Google::Cloud::PhishingProtection.phishing_protection_service
30
31
  ```
31
32
 
32
- ## Project and Credential Lookup
33
+ ## Credential Lookup
33
34
 
34
35
  The google-cloud-phishing_protection library aims to make authentication
35
36
  as simple as possible, and provides several mechanisms to configure your system
36
- without providing **Project ID** and **Service Account Credentials** directly in
37
- code.
38
-
39
- **Project ID** is discovered in the following order:
40
-
41
- 1. Specify project ID in method arguments
42
- 2. Specify project ID in configuration
43
- 3. Discover project ID in environment variables
44
- 4. Discover GCP project ID
45
- 5. Discover project ID in credentials JSON
37
+ without requiring **Service Account Credentials** directly in code.
46
38
 
47
39
  **Credentials** are discovered in the following order:
48
40
 
@@ -55,28 +47,24 @@ code.
55
47
 
56
48
  ### Google Cloud Platform environments
57
49
 
58
- When running on Google Cloud Platform (GCP), including Google Compute Engine (GCE),
59
- Google Kubernetes Engine (GKE), Google App Engine (GAE), Google Cloud Functions
60
- (GCF) and Cloud Run, the **Project ID** and **Credentials** and are discovered
61
- automatically. Code should be written as if already authenticated.
50
+ When running on Google Cloud Platform (GCP), including Google Compute Engine
51
+ (GCE), Google Kubernetes Engine (GKE), Google App Engine (GAE), Google Cloud
52
+ Functions (GCF) and Cloud Run, **Credentials** are discovered automatically.
53
+ Code should be written as if already authenticated.
62
54
 
63
55
  ### Environment Variables
64
56
 
65
- The **Project ID** and **Credentials JSON** can be placed in environment
66
- variables instead of declaring them directly in code. Each service has its own
67
- environment variable, allowing for different service accounts to be used for
68
- different services. (See the READMEs for the individual service gems for
69
- details.) The path to the **Credentials JSON** file can be stored in the
70
- environment variable, or the **Credentials JSON** itself can be stored for
71
- environments such as Docker containers where writing files is difficult or not
72
- encouraged.
73
-
74
- The environment variables that google-cloud-phishing_protection checks for project ID are:
75
-
76
- 1. `PHISHING_PROTECTION_PROJECT`
77
- 2. `GOOGLE_CLOUD_PROJECT`
57
+ The **Credentials JSON** can be placed in environment variables instead of
58
+ declaring them directly in code. Each service has its own environment variable,
59
+ allowing for different service accounts to be used for different services. (See
60
+ the READMEs for the individual service gems for details.) The path to the
61
+ **Credentials JSON** file can be stored in the environment variable, or the
62
+ **Credentials JSON** itself can be stored for environments such as Docker
63
+ containers where writing files is difficult or not encouraged.
78
64
 
79
- The environment variables that google-cloud-phishing_protection checks for credentials are configured on {Google::Cloud::PhishingProtection::V1beta1::Credentials}:
65
+ The environment variables that google-cloud-phishing_protection
66
+ checks for credentials are configured on the service Credentials class (such as
67
+ `::Google::Cloud::PhishingProtection::V1beta1::PhishingProtectionService::Credentials`):
80
68
 
81
69
  1. `PHISHING_PROTECTION_CREDENTIALS` - Path to JSON file, or JSON contents
82
70
  2. `PHISHING_PROTECTION_KEYFILE` - Path to JSON file, or JSON contents
@@ -87,25 +75,34 @@ The environment variables that google-cloud-phishing_protection checks for crede
87
75
  ```ruby
88
76
  require "google/cloud/phishing_protection"
89
77
 
90
- ENV["PHISHING_PROTECTION_PROJECT"] = "my-project-id"
91
78
  ENV["PHISHING_PROTECTION_CREDENTIALS"] = "path/to/keyfile.json"
92
79
 
93
- client = Google::Cloud::PhishingProtection.new
80
+ client = Google::Cloud::PhishingProtection.phishing_protection_service
94
81
  ```
95
82
 
96
83
  ### Configuration
97
84
 
98
- The **Project ID** and **Credentials JSON** can be configured instead of placing them in environment variables or providing them as arguments.
85
+ The **Credentials JSON** can be configured instead of placing them in
86
+ environment variables. Either on an individual client initialization:
87
+
88
+ ```ruby
89
+ require "google/cloud/phishing_protection"
90
+
91
+ client = Google::Cloud::PhishingProtection.phishing_protection_service do |config|
92
+ config.credentials = "path/to/keyfile.json"
93
+ end
94
+ ```
95
+
96
+ Or configured globally for all clients:
99
97
 
100
98
  ```ruby
101
99
  require "google/cloud/phishing_protection"
102
100
 
103
101
  Google::Cloud::PhishingProtection.configure do |config|
104
- config.project_id = "my-project-id"
105
102
  config.credentials = "path/to/keyfile.json"
106
103
  end
107
104
 
108
- client = Google::Cloud::PhishingProtection.new
105
+ client = Google::Cloud::PhishingProtection.phishing_protection_service
109
106
  ```
110
107
 
111
108
  ### Cloud SDK
@@ -134,24 +131,24 @@ To configure your system for this, simply:
134
131
 
135
132
  ## Creating a Service Account
136
133
 
137
- Google Cloud requires a **Project ID** and **Service Account Credentials** to
138
- connect to the APIs. You will use the **Project ID** and **JSON key file** to
134
+ Google Cloud requires **Service Account Credentials** to
135
+ connect to the APIs. You will use the **JSON key file** to
139
136
  connect to most services with google-cloud-phishing_protection.
140
137
 
141
- If you are not running this client within [Google Cloud Platform
142
- environments](#google-cloud-platform-environments), you need a Google
143
- Developers service account.
138
+ If you are not running this client within
139
+ [Google Cloud Platform environments](#google-cloud-platform-environments), you
140
+ need a Google Developers service account.
144
141
 
145
142
  1. Visit the [Google Developers Console][dev-console].
146
- 1. Create a new project or click on an existing project.
147
- 1. Activate the slide-out navigation tray and select **API Manager**. From
143
+ 2. Create a new project or click on an existing project.
144
+ 3. Activate the slide-out navigation tray and select **API Manager**. From
148
145
  here, you will enable the APIs that your application requires.
149
146
 
150
147
  ![Enable the APIs that your application requires][enable-apis]
151
148
 
152
149
  *Note: You may need to enable billing in order to use these services.*
153
150
 
154
- 1. Select **Credentials** from the side navigation.
151
+ 4. Select **Credentials** from the side navigation.
155
152
 
156
153
  You should see a screen like one of the following.
157
154
 
@@ -170,8 +167,3 @@ Developers service account.
170
167
 
171
168
  The key file you download will be used by this library to authenticate API
172
169
  requests and should be stored in a secure location.
173
-
174
- ## Troubleshooting
175
-
176
- If you're having trouble authenticating you can ask for help by following the
177
- {file:TROUBLESHOOTING.md Troubleshooting Guide}.
@@ -0,0 +1,203 @@
1
+ Apache License
2
+ ==============
3
+
4
+ * Version 2.0, January 2004
5
+ * https://www.apache.org/licenses/
6
+
7
+ ### TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
8
+
9
+ 1. **Definitions.**
10
+
11
+ "License" shall mean the terms and conditions for use, reproduction,
12
+ and distribution as defined by Sections 1 through 9 of this document.
13
+
14
+ "Licensor" shall mean the copyright owner or entity authorized by
15
+ the copyright owner that is granting the License.
16
+
17
+ "Legal Entity" shall mean the union of the acting entity and all
18
+ other entities that control, are controlled by, or are under common
19
+ control with that entity. For the purposes of this definition,
20
+ "control" means (i) the power, direct or indirect, to cause the
21
+ direction or management of such entity, whether by contract or
22
+ otherwise, or (ii) ownership of fifty percent (50%) or more of the
23
+ outstanding shares, or (iii) beneficial ownership of such entity.
24
+
25
+ "You" (or "Your") shall mean an individual or Legal Entity
26
+ exercising permissions granted by this License.
27
+
28
+ "Source" form shall mean the preferred form for making modifications,
29
+ including but not limited to software source code, documentation
30
+ source, and configuration files.
31
+
32
+ "Object" form shall mean any form resulting from mechanical
33
+ transformation or translation of a Source form, including but
34
+ not limited to compiled object code, generated documentation,
35
+ and conversions to other media types.
36
+
37
+ "Work" shall mean the work of authorship, whether in Source or
38
+ Object form, made available under the License, as indicated by a
39
+ copyright notice that is included in or attached to the work
40
+ (an example is provided in the Appendix below).
41
+
42
+ "Derivative Works" shall mean any work, whether in Source or Object
43
+ form, that is based on (or derived from) the Work and for which the
44
+ editorial revisions, annotations, elaborations, or other modifications
45
+ represent, as a whole, an original work of authorship. For the purposes
46
+ of this License, Derivative Works shall not include works that remain
47
+ separable from, or merely link (or bind by name) to the interfaces of,
48
+ the Work and Derivative Works thereof.
49
+
50
+ "Contribution" shall mean any work of authorship, including
51
+ the original version of the Work and any modifications or additions
52
+ to that Work or Derivative Works thereof, that is intentionally
53
+ submitted to Licensor for inclusion in the Work by the copyright owner
54
+ or by an individual or Legal Entity authorized to submit on behalf of
55
+ the copyright owner. For the purposes of this definition, "submitted"
56
+ means any form of electronic, verbal, or written communication sent
57
+ to the Licensor or its representatives, including but not limited to
58
+ communication on electronic mailing lists, source code control systems,
59
+ and issue tracking systems that are managed by, or on behalf of, the
60
+ Licensor for the purpose of discussing and improving the Work, but
61
+ excluding communication that is conspicuously marked or otherwise
62
+ designated in writing by the copyright owner as "Not a Contribution."
63
+
64
+ "Contributor" shall mean Licensor and any individual or Legal Entity
65
+ on behalf of whom a Contribution has been received by Licensor and
66
+ subsequently incorporated within the Work.
67
+
68
+ 2. **Grant of Copyright License.** Subject to the terms and conditions of
69
+ this License, each Contributor hereby grants to You a perpetual,
70
+ worldwide, non-exclusive, no-charge, royalty-free, irrevocable
71
+ copyright license to reproduce, prepare Derivative Works of,
72
+ publicly display, publicly perform, sublicense, and distribute the
73
+ Work and such Derivative Works in Source or Object form.
74
+
75
+ 3. **Grant of Patent License.** Subject to the terms and conditions of
76
+ this License, each Contributor hereby grants to You a perpetual,
77
+ worldwide, non-exclusive, no-charge, royalty-free, irrevocable
78
+ (except as stated in this section) patent license to make, have made,
79
+ use, offer to sell, sell, import, and otherwise transfer the Work,
80
+ where such license applies only to those patent claims licensable
81
+ by such Contributor that are necessarily infringed by their
82
+ Contribution(s) alone or by combination of their Contribution(s)
83
+ with the Work to which such Contribution(s) was submitted. If You
84
+ institute patent litigation against any entity (including a
85
+ cross-claim or counterclaim in a lawsuit) alleging that the Work
86
+ or a Contribution incorporated within the Work constitutes direct
87
+ or contributory patent infringement, then any patent licenses
88
+ granted to You under this License for that Work shall terminate
89
+ as of the date such litigation is filed.
90
+
91
+ 4. **Redistribution.** You may reproduce and distribute copies of the
92
+ Work or Derivative Works thereof in any medium, with or without
93
+ modifications, and in Source or Object form, provided that You
94
+ meet the following conditions:
95
+
96
+ * **(a)** You must give any other recipients of the Work or
97
+ Derivative Works a copy of this License; and
98
+
99
+ * **(b)** You must cause any modified files to carry prominent notices
100
+ stating that You changed the files; and
101
+
102
+ * **(c)** You must retain, in the Source form of any Derivative Works
103
+ that You distribute, all copyright, patent, trademark, and
104
+ attribution notices from the Source form of the Work,
105
+ excluding those notices that do not pertain to any part of
106
+ the Derivative Works; and
107
+
108
+ * **(d)** If the Work includes a "NOTICE" text file as part of its
109
+ distribution, then any Derivative Works that You distribute must
110
+ include a readable copy of the attribution notices contained
111
+ within such NOTICE file, excluding those notices that do not
112
+ pertain to any part of the Derivative Works, in at least one
113
+ of the following places: within a NOTICE text file distributed
114
+ as part of the Derivative Works; within the Source form or
115
+ documentation, if provided along with the Derivative Works; or,
116
+ within a display generated by the Derivative Works, if and
117
+ wherever such third-party notices normally appear. The contents
118
+ of the NOTICE file are for informational purposes only and
119
+ do not modify the License. You may add Your own attribution
120
+ notices within Derivative Works that You distribute, alongside
121
+ or as an addendum to the NOTICE text from the Work, provided
122
+ that such additional attribution notices cannot be construed
123
+ as modifying the License.
124
+
125
+ You may add Your own copyright statement to Your modifications and
126
+ may provide additional or different license terms and conditions
127
+ for use, reproduction, or distribution of Your modifications, or
128
+ for any such Derivative Works as a whole, provided Your use,
129
+ reproduction, and distribution of the Work otherwise complies with
130
+ the conditions stated in this License.
131
+
132
+ 5. **Submission of Contributions.** Unless You explicitly state otherwise,
133
+ any Contribution intentionally submitted for inclusion in the Work
134
+ by You to the Licensor shall be under the terms and conditions of
135
+ this License, without any additional terms or conditions.
136
+ Notwithstanding the above, nothing herein shall supersede or modify
137
+ the terms of any separate license agreement you may have executed
138
+ with Licensor regarding such Contributions.
139
+
140
+ 6. **Trademarks.** This License does not grant permission to use the trade
141
+ names, trademarks, service marks, or product names of the Licensor,
142
+ except as required for reasonable and customary use in describing the
143
+ origin of the Work and reproducing the content of the NOTICE file.
144
+
145
+ 7. **Disclaimer of Warranty.** Unless required by applicable law or
146
+ agreed to in writing, Licensor provides the Work (and each
147
+ Contributor provides its Contributions) on an "AS IS" BASIS,
148
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
149
+ implied, including, without limitation, any warranties or conditions
150
+ of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
151
+ PARTICULAR PURPOSE. You are solely responsible for determining the
152
+ appropriateness of using or redistributing the Work and assume any
153
+ risks associated with Your exercise of permissions under this License.
154
+
155
+ 8. **Limitation of Liability.** In no event and under no legal theory,
156
+ whether in tort (including negligence), contract, or otherwise,
157
+ unless required by applicable law (such as deliberate and grossly
158
+ negligent acts) or agreed to in writing, shall any Contributor be
159
+ liable to You for damages, including any direct, indirect, special,
160
+ incidental, or consequential damages of any character arising as a
161
+ result of this License or out of the use or inability to use the
162
+ Work (including but not limited to damages for loss of goodwill,
163
+ work stoppage, computer failure or malfunction, or any and all
164
+ other commercial damages or losses), even if such Contributor
165
+ has been advised of the possibility of such damages.
166
+
167
+ 9. **Accepting Warranty or Additional Liability.** While redistributing
168
+ the Work or Derivative Works thereof, You may choose to offer,
169
+ and charge a fee for, acceptance of support, warranty, indemnity,
170
+ or other liability obligations and/or rights consistent with this
171
+ License. However, in accepting such obligations, You may act only
172
+ on Your own behalf and on Your sole responsibility, not on behalf
173
+ of any other Contributor, and only if You agree to indemnify,
174
+ defend, and hold each Contributor harmless for any liability
175
+ incurred by, or claims asserted against, such Contributor by reason
176
+ of your accepting any such warranty or additional liability.
177
+
178
+ _END OF TERMS AND CONDITIONS_
179
+
180
+ ### APPENDIX: How to apply the Apache License to your work.
181
+
182
+ To apply the Apache License to your work, attach the following
183
+ boilerplate notice, with the fields enclosed by brackets "`[]`"
184
+ replaced with your own identifying information. (Don't include
185
+ the brackets!) The text should be enclosed in the appropriate
186
+ comment syntax for the file format. We also recommend that a
187
+ file or class name and description of purpose be included on the
188
+ same "printed page" as the copyright notice for easier
189
+ identification within third-party archives.
190
+
191
+ Copyright [yyyy] [name of copyright owner]
192
+
193
+ Licensed under the Apache License, Version 2.0 (the "License");
194
+ you may not use this file except in compliance with the License.
195
+ You may obtain a copy of the License at
196
+
197
+ https://www.apache.org/licenses/LICENSE-2.0
198
+
199
+ Unless required by applicable law or agreed to in writing, software
200
+ distributed under the License is distributed on an "AS IS" BASIS,
201
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
202
+ See the License for the specific language governing permissions and
203
+ limitations under the License.
@@ -0,0 +1,340 @@
1
+ ## Migrating to google-cloud-phishing_protection 0.10
2
+
3
+ The 0.10 release of the google-cloud-phishing_protection client is a significant upgrade
4
+ based on a [next-gen code generator](https://github.com/googleapis/gapic-generator-ruby),
5
+ and includes substantial interface changes. Existing code written for earlier
6
+ versions of this library will likely require updates to use this version.
7
+ This document describes the changes that have been made, and what you need to
8
+ do to update your usage.
9
+
10
+ To summarize:
11
+
12
+ * The library has been broken out into two libraries. The new gem
13
+ `google-cloud-phishing_protection-v1beta1` contains the actual client classes for version
14
+ V1beta1 of the Phishing Protection service, and the gem `google-cloud-phishing_protection` now
15
+ simply provides a convenience wrapper. See
16
+ [Library Structure](#library-structure) for more info.
17
+ * The library uses a new configuration mechanism giving you closer control
18
+ over endpoint address, network timeouts, and retry. See
19
+ [Client Configuration](#client-configuration) for more info. Furthermore,
20
+ when creating a client object, you can customize its configuration in a
21
+ block rather than passing arguments to the constructor. See
22
+ [Creating Clients](#creating-clients) for more info.
23
+ * Previously, positional arguments were used to indicate required arguments.
24
+ Now, all method arguments are keyword arguments, with documentation that
25
+ specifies whether they are required or optional. Additionally, you can pass
26
+ a proto request object instead of separate arguments. See
27
+ [Passing Arguments](#passing-arguments) for more info.
28
+ * Previously, some client classes included helper methods for constructing
29
+ resource paths. These methods now take keyword rather than positional
30
+ arguments, and are also available in a separate paths module. See
31
+ [Resource Path Helpers](#resource-path-helpers) for more info.
32
+ * Previously, clients reported RPC errors by raising instances of
33
+ `Google::Gax::GaxError` and its subclasses. Now, RPC exceptions are of type
34
+ `Google::Cloud::Error` and its subclasses. See
35
+ [Handling Errors](#handling-errors) for more info.
36
+ * Some classes have moved into different namespaces. In particular, classes
37
+ that were under `Google::Cloud::Phishingprotection` were moved under
38
+ `Google::Cloud::PhishingProtection`. See
39
+ [Class Namespaces](#class-namespaces) for more info.
40
+
41
+ ### Library Structure
42
+
43
+ Older releases of the `google-cloud-phishing_protection` gem were all-in-one gems
44
+ that included potentially multiple clients for multiple versions of the
45
+ Phishing Protection service. The `Google::Cloud::PhishingProtection.new` factory method would
46
+ return you an instance of a `Google::Cloud::PhishingProtection::V1beta1::PhishingProtectionClient`
47
+ object for the V1beta1 version of the service.
48
+
49
+ With the 0.10 release, the `google-cloud-phishing_protection` gem still provides factory
50
+ methods for obtaining clients. (The method signatures will have changed. See
51
+ [Creating Clients](#creating-clients) for details.) However, the actual client
52
+ classes have been moved into separate gems, one per service version. Currently,
53
+ Phishing Protection has one version, V1beta1. The
54
+ `Google::Cloud::PhishingProtection::V1beta1::PhishingProtectionService::Client` class, along with its
55
+ helpers and data types, is now part of the `google-cloud-phishing_protection-v1beta1` gem.
56
+ If an additional version of the Phishing Protection service is released, an additional gem
57
+ may be provided for its client classes.
58
+
59
+ For normal usage, you can continue to install the `google-cloud-phishing_protection` gem
60
+ (which will bring in the versioned client gems as dependencies) and continue to
61
+ use factory methods to create clients. However, you may alternatively choose to
62
+ install only one of the versioned gems. For example, if you know you will only
63
+ use `V1beta1` of the service, you can install `google-cloud-phishing_protection-v1beta1` by
64
+ itself, and construct instances of the
65
+ `Google::Cloud::PhishingProtection::V1beta1::PhishingProtectionService::Client` client class directly.
66
+
67
+ ### Client Configuration
68
+
69
+ In older releases, if you wanted to customize performance parameters or
70
+ low-level behavior of the client (such as credentials, timeouts, or
71
+ instrumentation), you would pass a variety of keyword arguments to the client
72
+ constructor. It was also extremely difficult to customize the default settings.
73
+
74
+ With the 0.10 release, a configuration interface provides control over these
75
+ parameters, including defaults for all instances of a client, and settings for
76
+ each specific client instance. For example, to set default credentials and
77
+ timeout for all Phishing Protection V1beta1 clients:
78
+
79
+ ```
80
+ Google::Cloud::PhishingProtection::V1beta1::PhishingProtectionService::Client.configure do |config|
81
+ config.credentials = "/path/to/credentials.json"
82
+ config.timeout = 10.0
83
+ end
84
+ ```
85
+
86
+ Individual RPCs can also be configured independently. For example, to set the
87
+ timeout for the `report_phishing` call:
88
+
89
+ ```
90
+ Google::Cloud::PhishingProtection::V1beta1::PhishingProtectionService::Client.configure do |config|
91
+ config.rpcs.report_phishing.timeout = 20.0
92
+ end
93
+ ```
94
+
95
+ Defaults for certain configurations can be set for all Phishing Protection versions and
96
+ services globally:
97
+
98
+ ```
99
+ Google::Cloud::PhishingProtection.configure do |config|
100
+ config.credentials = "/path/to/credentials.json"
101
+ config.timeout = 10.0
102
+ end
103
+ ```
104
+
105
+ Finally, you can override the configuration for each client instance. See the
106
+ next section on [Creating Clients](#creating-clients) for details.
107
+
108
+ ### Creating Clients
109
+
110
+ In older releases, to create a client object, you would use the
111
+ `Google::Cloud::PhishingProtection.new` class method. Keyword arguments were available to
112
+ select a service version and to configure parameters such as credentials and
113
+ timeouts.
114
+
115
+ With the 0.10 release, use the `Google::Cloud::PhishingProtection.phishing_protection_service` class
116
+ method to create a client object. You may select a service version using the
117
+ `:version` keyword argument. However, other configuration parameters should be
118
+ set in a configuration block when you create the client.
119
+
120
+ Old:
121
+ ```
122
+ client = Google::Cloud::PhishingProtection.new credentials: "/path/to/credentials.json"
123
+ ```
124
+
125
+ New:
126
+ ```
127
+ client = Google::Cloud::PhishingProtection.phishing_protection_service do |config|
128
+ config.credentials = "/path/to/credentials.json"
129
+ end
130
+ ```
131
+
132
+ The configuration block is optional. If you do not provide it, or you do not
133
+ set some configuration parameters, then the default configuration is used. See
134
+ [Client Configuration](#client-configuration).
135
+
136
+ ### Passing Arguments
137
+
138
+ In older releases, required arguments would be passed as positional method
139
+ arguments, while most optional arguments would be passed as keyword arguments.
140
+
141
+ With the 0.10 release, all RPC arguments are passed as keyword arguments,
142
+ regardless of whether they are required or optional. For example:
143
+
144
+ Old:
145
+ ```
146
+ client = Google::Cloud::PhishingProtection.new
147
+
148
+ parent = "projects/my-project"
149
+ url = "http://example.com"
150
+
151
+ # Both required arguments are positional arguments.
152
+ response = client.report_phishing parent, url
153
+ ```
154
+
155
+ New:
156
+ ```
157
+ client = Google::Cloud::PhishingProtection.phishing_protection_service
158
+
159
+ parent = "projects/my-project"
160
+ url = "http://example.com"
161
+
162
+ # All arguments are keyword arguments
163
+ response = client.report_phishing parent: parent, url: url
164
+ ```
165
+
166
+ In the 0.10 release, it is also possible to pass a request object, either
167
+ as a hash or as a protocol buffer.
168
+
169
+ New:
170
+ ```
171
+ client = Google::Cloud::PhishingProtection.phishing_protection_service
172
+
173
+ request = Google::Cloud::PhishingProtection::V1beta1::ReportPhishingRequest.new(
174
+ parent: "projects/my-project",
175
+ url: "http://example.com"
176
+ )
177
+
178
+ # Pass a request object as a positional argument:
179
+ response = client.report_phishing request
180
+ ```
181
+
182
+ Finally, in older releases, to provide call options, you would pass a
183
+ `Google::Gax::CallOptions` object with the `:options` keyword argument. In the
184
+ 0.10 release, pass call options using a _second set_ of keyword arguments.
185
+
186
+ Old:
187
+ ```
188
+ client = Google::Cloud::PhishingProtection.new
189
+
190
+ parent = "projects/my-project"
191
+ url = "http://example.com"
192
+
193
+ options = Google::Gax::CallOptions.new timeout: 10.0
194
+
195
+ response = client.report_phishing parent, url, options: options
196
+ ```
197
+
198
+ New:
199
+ ```
200
+ client = Google::Cloud::PhishingProtection.phishing_protection_service
201
+
202
+ parent = "projects/my-project"
203
+ url = "http://example.com"
204
+
205
+ # Use a hash to wrap the normal call arguments (or pass a request object), and
206
+ # then add further keyword arguments for the call options.
207
+ response = client.report_phishing(
208
+ { parent: parent, url: url },
209
+ timeout: 10.0
210
+ )
211
+ ```
212
+
213
+ ### Resource Path Helpers
214
+
215
+ The client library includes helper methods for generating the resource path
216
+ strings passed to many calls. These helpers have changed in two ways:
217
+
218
+ * In older releases, they are both _class_ methods and _instance_ methods on
219
+ the client class. In the 0.10 release, they are _instance methods only_.
220
+ However, they are also available on a separate paths module that you can
221
+ include elsewhere for convenience.
222
+ * In older releases, arguments to a resource path helper are passed as
223
+ _positional_ arguments. In the 0.10 release, they are passed as named _keyword_
224
+ arguments.
225
+
226
+ Following is an example involving using a resource path helper.
227
+
228
+ Old:
229
+ ```
230
+ client = Google::Cloud::PhishingProtection.new
231
+
232
+ # Call the helper on the client instance
233
+ parent = client.project_path "my-project"
234
+
235
+ url = "http://example.com"
236
+
237
+ response = client.report_phishing parent, url
238
+ ```
239
+
240
+ New:
241
+ ```
242
+ client = Google::Cloud::PhishingProtection.phishing_protection_service
243
+
244
+ # Call the helper on the client instance, and use keyword arguments
245
+ parent = client.project_path project: "my-project"
246
+
247
+ url = "http://example.com"
248
+
249
+ response = client.report_phishing parent: parent, url: url
250
+ ```
251
+
252
+ In the 0.10 client, you can also use the paths module as a convenience module.
253
+
254
+ New:
255
+ ```
256
+ # Bring the path helper methods into the current class
257
+ include Google::Cloud::PhishingProtection::V1beta1::PhishingProtectionService::Paths
258
+
259
+ def foo
260
+ client = Google::Cloud::PhishingProtection.phishing_protection_service
261
+
262
+ # Call the included helper method
263
+ parent = project_path project: "my-project"
264
+
265
+ url = "http://example.com"
266
+
267
+ response = client.report_phishing parent: parent, url: url
268
+
269
+ # Do something with response...
270
+ end
271
+ ```
272
+
273
+ ### Handling Errors
274
+
275
+ The client reports standard
276
+ [gRPC error codes](https://github.com/grpc/grpc/blob/master/doc/statuscodes.md)
277
+ by raising exceptions. In older releases, these exceptions were located in the
278
+ `Google::Gax` namespace and were subclasses of the `Google::Gax::GaxError` base
279
+ exception class, defined in the `google-gax` gem. However, these classes were
280
+ different from the standard exceptions (subclasses of `Google::Cloud::Error`)
281
+ thrown by other client libraries such as `google-cloud-storage`.
282
+
283
+ The 0.10 client library now uses the `Google::Cloud::Error` exception hierarchy
284
+ for consistency across all the Google Cloud client libraries. In general, these
285
+ exceptions have the same name as their counterparts from older releases, but
286
+ are located in the `Google::Cloud` namespace rather than the `Google::Gax`
287
+ namespace.
288
+
289
+ Old:
290
+ ```
291
+ client = Google::Cloud::PhishingProtection.new
292
+
293
+ parent = "projects/my-project"
294
+ url = "http://example.com"
295
+
296
+ begin
297
+ client.report_phishing parent, url
298
+ rescue Google::Gax::Error => e
299
+ # Handle exceptions that subclass Google::Gax::Error
300
+ end
301
+ ```
302
+
303
+ New:
304
+ ```
305
+ client = Google::Cloud::PhishingProtection.phishing_protection_service
306
+
307
+ parent = "projects/my-project"
308
+ url = "http://example.com"
309
+
310
+ begin
311
+ client.report_phishing parent: parent, url: url
312
+ rescue Google::Cloud::Error => e
313
+ # Handle exceptions that subclass Google::Cloud::Error
314
+ end
315
+ ```
316
+
317
+ ### Class Namespaces
318
+
319
+ In older releases, (protobuf) data type classes were located under the module
320
+ `Google::Cloud::Phishingprotection` (note the lower-case "p" in the second
321
+ word), even though the client class and most other classes were under
322
+ `Google::Cloud::PhishingProtection` (with an upper-case "P"). In the 0.10
323
+ release, all classes, including data types, are under the module
324
+ `Google::Cloud::PhishingProtection`.
325
+
326
+ In older releases, the client object was of classes with names like:
327
+ `Google::Cloud::PhishingProtection::V1beta1::PhishingProtectionServiceClient`.
328
+ In the 0.10 release, the client object is of a different class:
329
+ `Google::Cloud::PhishingProtection::V1beta1::PhishingProtectionService::Client`.
330
+ Note that most users will use the factory methods such as
331
+ `Google::Cloud::PhishingProtection.phishing_protection_service` to create
332
+ instances of the client object, so you may not need to reference the actual
333
+ class directly. See [Creating Clients](#creating-clients).
334
+
335
+ In older releases, the credentials object was of class
336
+ `Google::Cloud::PhishingProtection::V1beta1::Credentials`.
337
+ In the 0.10 release, each service has its own credentials class, e.g.
338
+ `Google::Cloud::PhishingProtection::V1beta1::PhishingProtectionService::Credentials`.
339
+ Again, most users will not need to reference this class directly.
340
+ See [Client Configuration](#client-configuration).