build: run docs regen in synth.py (#1059)
diff --git a/docs/dyn/safebrowsing_v4.encodedFullHashes.html b/docs/dyn/safebrowsing_v4.encodedFullHashes.html
index cab608a..ce24a8c 100644
--- a/docs/dyn/safebrowsing_v4.encodedFullHashes.html
+++ b/docs/dyn/safebrowsing_v4.encodedFullHashes.html
@@ -103,18 +103,9 @@
An object of the form:
{
- "negativeCacheDuration": "A String", # For requested entities that did not match the threat list, how long to cache the response.
- "minimumWaitDuration": "A String", # The minimum duration the client must wait before issuing any find hashes request. If this field is not set, clients can issue a request as soon as they want.
"matches": [ # The full hashes that matched the requested prefixes.
{ # A match when checking a threat entry in the Safe Browsing threat lists.
- "cacheDuration": "A String", # The cache lifetime for the returned match. Clients must not cache this response for more than this duration to avoid false positives.
- "threat": { # An individual threat; for example, a malicious URL or its hash representation. Only one of these fields should be set. # The threat matching this threat.
- "hash": "A String", # A hash prefix, consisting of the most significant 4-32 bytes of a SHA256 hash. This field is in binary format. For JSON requests, hashes are base64-encoded.
- "digest": "A String", # The digest of an executable in SHA256 format. The API supports both binary and hex digests. For JSON requests, digests are base64-encoded.
- "url": "A String", # A URL.
- },
"threatType": "A String", # The threat type matching this threat.
- "platformType": "A String", # The platform type matching this threat.
"threatEntryMetadata": { # The metadata associated with a specific threat entry. The client is expected to know the metadata key/value pairs associated with each threat type. # Optional metadata associated with this threat.
"entries": [ # The metadata entries.
{ # A single metadata entry.
@@ -124,8 +115,17 @@
],
},
"threatEntryType": "A String", # The threat entry type matching this threat.
+ "threat": { # An individual threat; for example, a malicious URL or its hash representation. Only one of these fields should be set. # The threat matching this threat.
+ "digest": "A String", # The digest of an executable in SHA256 format. The API supports both binary and hex digests. For JSON requests, digests are base64-encoded.
+ "hash": "A String", # A hash prefix, consisting of the most significant 4-32 bytes of a SHA256 hash. This field is in binary format. For JSON requests, hashes are base64-encoded.
+ "url": "A String", # A URL.
+ },
+ "cacheDuration": "A String", # The cache lifetime for the returned match. Clients must not cache this response for more than this duration to avoid false positives.
+ "platformType": "A String", # The platform type matching this threat.
},
],
+ "minimumWaitDuration": "A String", # The minimum duration the client must wait before issuing any find hashes request. If this field is not set, clients can issue a request as soon as they want.
+ "negativeCacheDuration": "A String", # For requested entities that did not match the threat list, how long to cache the response.
}</pre>
</div>