google-cloud-confidential_computing-v1 0.7.0 → 0.7.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/lib/google/cloud/confidential_computing/v1/confidential_computing/client.rb +7 -7
- data/lib/google/cloud/confidential_computing/v1/confidential_computing/rest/client.rb +8 -8
- data/lib/google/cloud/confidential_computing/v1/confidential_computing/rest/service_stub.rb +9 -0
- data/lib/google/cloud/confidential_computing/v1/version.rb +1 -1
- data/lib/google/cloud/confidentialcomputing/v1/service_pb.rb +2 -2
- data/proto_docs/google/protobuf/any.rb +2 -1
- metadata +2 -2
checksums.yaml
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
SHA256:
|
|
3
|
-
metadata.gz:
|
|
4
|
-
data.tar.gz:
|
|
3
|
+
metadata.gz: d089fad681c467a99114015df16bee5e4e6cfd8e9f83b4831b31c375b17a6ee1
|
|
4
|
+
data.tar.gz: 5ac962c11e1497b58d6365245aa69ed81b295692051ab5e82dae98171bd04371
|
|
5
5
|
SHA512:
|
|
6
|
-
metadata.gz:
|
|
7
|
-
data.tar.gz:
|
|
6
|
+
metadata.gz: fb664da26efd5e154c48581099a1dd93671ec56ee6eacfd51548ec7d2233f2393ff99f6461b207f79ab8f1e96e985388867f16cc526369c6cddc93ca3cd07b4d
|
|
7
|
+
data.tar.gz: e61e93fe9c2e810d5eeacd1e3795bf9e537df7edda1918e47c96ae4163c43a45f0b3ebbf8e32649ab97028183017c06f173a31e29469b5cd463e1b05ae8ef0f5
|
|
@@ -159,13 +159,6 @@ module Google
|
|
|
159
159
|
@quota_project_id = @config.quota_project
|
|
160
160
|
@quota_project_id ||= credentials.quota_project_id if credentials.respond_to? :quota_project_id
|
|
161
161
|
|
|
162
|
-
@location_client = Google::Cloud::Location::Locations::Client.new do |config|
|
|
163
|
-
config.credentials = credentials
|
|
164
|
-
config.quota_project = @quota_project_id
|
|
165
|
-
config.endpoint = @config.endpoint
|
|
166
|
-
config.universe_domain = @config.universe_domain
|
|
167
|
-
end
|
|
168
|
-
|
|
169
162
|
@confidential_computing_stub = ::Gapic::ServiceStub.new(
|
|
170
163
|
::Google::Cloud::ConfidentialComputing::V1::ConfidentialComputing::Stub,
|
|
171
164
|
credentials: credentials,
|
|
@@ -176,6 +169,13 @@ module Google
|
|
|
176
169
|
interceptors: @config.interceptors,
|
|
177
170
|
channel_pool_config: @config.channel_pool
|
|
178
171
|
)
|
|
172
|
+
|
|
173
|
+
@location_client = Google::Cloud::Location::Locations::Client.new do |config|
|
|
174
|
+
config.credentials = credentials
|
|
175
|
+
config.quota_project = @quota_project_id
|
|
176
|
+
config.endpoint = @confidential_computing_stub.endpoint
|
|
177
|
+
config.universe_domain = @confidential_computing_stub.universe_domain
|
|
178
|
+
end
|
|
179
179
|
end
|
|
180
180
|
|
|
181
181
|
##
|
|
@@ -156,20 +156,20 @@ module Google
|
|
|
156
156
|
@quota_project_id = @config.quota_project
|
|
157
157
|
@quota_project_id ||= credentials.quota_project_id if credentials.respond_to? :quota_project_id
|
|
158
158
|
|
|
159
|
-
@location_client = Google::Cloud::Location::Locations::Rest::Client.new do |config|
|
|
160
|
-
config.credentials = credentials
|
|
161
|
-
config.quota_project = @quota_project_id
|
|
162
|
-
config.endpoint = @config.endpoint
|
|
163
|
-
config.universe_domain = @config.universe_domain
|
|
164
|
-
config.bindings_override = @config.bindings_override
|
|
165
|
-
end
|
|
166
|
-
|
|
167
159
|
@confidential_computing_stub = ::Google::Cloud::ConfidentialComputing::V1::ConfidentialComputing::Rest::ServiceStub.new(
|
|
168
160
|
endpoint: @config.endpoint,
|
|
169
161
|
endpoint_template: DEFAULT_ENDPOINT_TEMPLATE,
|
|
170
162
|
universe_domain: @config.universe_domain,
|
|
171
163
|
credentials: credentials
|
|
172
164
|
)
|
|
165
|
+
|
|
166
|
+
@location_client = Google::Cloud::Location::Locations::Rest::Client.new do |config|
|
|
167
|
+
config.credentials = credentials
|
|
168
|
+
config.quota_project = @quota_project_id
|
|
169
|
+
config.endpoint = @confidential_computing_stub.endpoint
|
|
170
|
+
config.universe_domain = @confidential_computing_stub.universe_domain
|
|
171
|
+
config.bindings_override = @config.bindings_override
|
|
172
|
+
end
|
|
173
173
|
end
|
|
174
174
|
|
|
175
175
|
##
|
|
@@ -52,6 +52,15 @@ module Google
|
|
|
52
52
|
@client_stub.universe_domain
|
|
53
53
|
end
|
|
54
54
|
|
|
55
|
+
##
|
|
56
|
+
# The effective endpoint
|
|
57
|
+
#
|
|
58
|
+
# @return [String]
|
|
59
|
+
#
|
|
60
|
+
def endpoint
|
|
61
|
+
@client_stub.endpoint
|
|
62
|
+
end
|
|
63
|
+
|
|
55
64
|
##
|
|
56
65
|
# Baseline implementation for the create_challenge REST call
|
|
57
66
|
#
|
|
@@ -12,13 +12,13 @@ require 'google/protobuf/timestamp_pb'
|
|
|
12
12
|
require 'google/rpc/status_pb'
|
|
13
13
|
|
|
14
14
|
|
|
15
|
-
descriptor_data = "\n3google/cloud/confidentialcomputing/v1/service.proto\x12%google.cloud.confidentialcomputing.v1\x1a\x1cgoogle/api/annotations.proto\x1a\x17google/api/client.proto\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\x17google/rpc/status.proto\"\
|
|
15
|
+
descriptor_data = "\n3google/cloud/confidentialcomputing/v1/service.proto\x12%google.cloud.confidentialcomputing.v1\x1a\x1cgoogle/api/annotations.proto\x1a\x17google/api/client.proto\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\x17google/rpc/status.proto\"\xaa\x02\n\tChallenge\x12\x12\n\x04name\x18\x01 \x01(\tB\x04\xe2\x41\x01\x03\x12\x35\n\x0b\x63reate_time\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x04\xe2\x41\x01\x03\x12\x35\n\x0b\x65xpire_time\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x04\xe2\x41\x01\x03\x12\x12\n\x04used\x18\x04 \x01(\x08\x42\x04\xe2\x41\x01\x03\x12\x17\n\ttpm_nonce\x18\x06 \x01(\tB\x04\xe2\x41\x01\x03:n\xea\x41k\n.confidentialcomputing.googleapis.com/Challenge\x12\x39projects/{project}/locations/{location}/challenges/{uuid}\"\x9f\x01\n\x16\x43reateChallengeRequest\x12:\n\x06parent\x18\x01 \x01(\tB*\xe2\x41\x01\x02\xfa\x41#\n!locations.googleapis.com/Location\x12I\n\tchallenge\x18\x02 \x01(\x0b\x32\x30.google.cloud.confidentialcomputing.v1.ChallengeB\x04\xe2\x41\x01\x02\"\xc9\x03\n\x18VerifyAttestationRequest\x12J\n\tchallenge\x18\x01 \x01(\tB7\xe2\x41\x01\x02\xfa\x41\x30\n.confidentialcomputing.googleapis.com/Challenge\x12T\n\x0fgcp_credentials\x18\x02 \x01(\x0b\x32\x35.google.cloud.confidentialcomputing.v1.GcpCredentialsB\x04\xe2\x41\x01\x01\x12T\n\x0ftpm_attestation\x18\x03 \x01(\x0b\x32\x35.google.cloud.confidentialcomputing.v1.TpmAttestationB\x04\xe2\x41\x01\x02\x12\x63\n\x17\x63onfidential_space_info\x18\x04 \x01(\x0b\x32<.google.cloud.confidentialcomputing.v1.ConfidentialSpaceInfoB\x04\xe2\x41\x01\x01\x12P\n\rtoken_options\x18\x05 \x01(\x0b\x32\x33.google.cloud.confidentialcomputing.v1.TokenOptionsB\x04\xe2\x41\x01\x01\"n\n\x19VerifyAttestationResponse\x12\x1f\n\x11oidc_claims_token\x18\x02 \x01(\tB\x04\xe2\x41\x01\x03\x12\x30\n\x0epartial_errors\x18\x03 \x03(\x0b\x32\x12.google.rpc.StatusB\x04\xe2\x41\x01\x03\"3\n\x0eGcpCredentials\x12!\n\x19service_account_id_tokens\x18\x02 \x03(\t\"\x87\x01\n\x0cTokenOptions\x12\x16\n\x08\x61udience\x18\x01 \x01(\tB\x04\xe2\x41\x01\x01\x12\x13\n\x05nonce\x18\x02 \x03(\tB\x04\xe2\x41\x01\x01\x12J\n\ntoken_type\x18\x03 \x01(\x0e\x32\x30.google.cloud.confidentialcomputing.v1.TokenTypeB\x04\xe2\x41\x01\x01\"\x8f\x03\n\x0eTpmAttestation\x12K\n\x06quotes\x18\x01 \x03(\x0b\x32;.google.cloud.confidentialcomputing.v1.TpmAttestation.Quote\x12\x15\n\rtcg_event_log\x18\x02 \x01(\x0c\x12\x1b\n\x13\x63\x61nonical_event_log\x18\x03 \x01(\x0c\x12\x0f\n\x07\x61k_cert\x18\x04 \x01(\x0c\x12\x12\n\ncert_chain\x18\x05 \x03(\x0c\x1a\xd6\x01\n\x05Quote\x12\x11\n\thash_algo\x18\x01 \x01(\x05\x12^\n\npcr_values\x18\x02 \x03(\x0b\x32J.google.cloud.confidentialcomputing.v1.TpmAttestation.Quote.PcrValuesEntry\x12\x11\n\traw_quote\x18\x03 \x01(\x0c\x12\x15\n\rraw_signature\x18\x04 \x01(\x0c\x1a\x30\n\x0ePcrValuesEntry\x12\x0b\n\x03key\x18\x01 \x01(\x05\x12\r\n\x05value\x18\x02 \x01(\x0c:\x02\x38\x01\"k\n\x15\x43onfidentialSpaceInfo\x12R\n\x0fsigned_entities\x18\x01 \x03(\x0b\x32\x33.google.cloud.confidentialcomputing.v1.SignedEntityB\x04\xe2\x41\x01\x01\"x\n\x0cSignedEntity\x12h\n\x1a\x63ontainer_image_signatures\x18\x01 \x03(\x0b\x32>.google.cloud.confidentialcomputing.v1.ContainerImageSignatureB\x04\xe2\x41\x01\x01\"\xb3\x01\n\x17\x43ontainerImageSignature\x12\x15\n\x07payload\x18\x01 \x01(\x0c\x42\x04\xe2\x41\x01\x01\x12\x17\n\tsignature\x18\x02 \x01(\x0c\x42\x04\xe2\x41\x01\x01\x12\x18\n\npublic_key\x18\x03 \x01(\x0c\x42\x04\xe2\x41\x01\x01\x12N\n\x07sig_alg\x18\x04 \x01(\x0e\x32\x37.google.cloud.confidentialcomputing.v1.SigningAlgorithmB\x04\xe2\x41\x01\x01*\x7f\n\x10SigningAlgorithm\x12!\n\x1dSIGNING_ALGORITHM_UNSPECIFIED\x10\x00\x12\x15\n\x11RSASSA_PSS_SHA256\x10\x01\x12\x1a\n\x16RSASSA_PKCS1V15_SHA256\x10\x02\x12\x15\n\x11\x45\x43\x44SA_P256_SHA256\x10\x03*<\n\tTokenType\x12\x1a\n\x16TOKEN_TYPE_UNSPECIFIED\x10\x00\x12\x13\n\x0fTOKEN_TYPE_OIDC\x10\x01\x32\xb7\x04\n\x15\x43onfidentialComputing\x12\xd8\x01\n\x0f\x43reateChallenge\x12=.google.cloud.confidentialcomputing.v1.CreateChallengeRequest\x1a\x30.google.cloud.confidentialcomputing.v1.Challenge\"T\xda\x41\x10parent,challenge\x82\xd3\xe4\x93\x02;\"./v1/{parent=projects/*/locations/*}/challenges:\tchallenge\x12\xe8\x01\n\x11VerifyAttestation\x12?.google.cloud.confidentialcomputing.v1.VerifyAttestationRequest\x1a@.google.cloud.confidentialcomputing.v1.VerifyAttestationResponse\"P\x82\xd3\xe4\x93\x02J\"E/v1/{challenge=projects/*/locations/*/challenges/*}:verifyAttestation:\x01*\x1aX\xca\x41$confidentialcomputing.googleapis.com\xd2\x41.https://www.googleapis.com/auth/cloud-platformB\x97\x02\n)com.google.cloud.confidentialcomputing.v1B\x0cServiceProtoP\x01Z_cloud.google.com/go/confidentialcomputing/apiv1/confidentialcomputingpb;confidentialcomputingpb\xaa\x02%Google.Cloud.ConfidentialComputing.V1\xca\x02%Google\\Cloud\\ConfidentialComputing\\V1\xea\x02(Google::Cloud::ConfidentialComputing::V1b\x06proto3"
|
|
16
16
|
|
|
17
17
|
pool = Google::Protobuf::DescriptorPool.generated_pool
|
|
18
18
|
|
|
19
19
|
begin
|
|
20
20
|
pool.add_serialized_file(descriptor_data)
|
|
21
|
-
rescue TypeError
|
|
21
|
+
rescue TypeError
|
|
22
22
|
# Compatibility code: will be removed in the next major version.
|
|
23
23
|
require 'google/protobuf/descriptor_pb'
|
|
24
24
|
parsed = Google::Protobuf::FileDescriptorProto.decode(descriptor_data)
|
|
@@ -129,7 +129,8 @@ module Google
|
|
|
129
129
|
#
|
|
130
130
|
# Note: this functionality is not currently available in the official
|
|
131
131
|
# protobuf release, and it is not used for type URLs beginning with
|
|
132
|
-
# type.googleapis.com.
|
|
132
|
+
# type.googleapis.com. As of May 2023, there are no widely used type server
|
|
133
|
+
# implementations and no plans to implement one.
|
|
133
134
|
#
|
|
134
135
|
# Schemes other than `http`, `https` (or the empty scheme) might be
|
|
135
136
|
# used with implementation specific semantics.
|
metadata
CHANGED
|
@@ -1,14 +1,14 @@
|
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
|
2
2
|
name: google-cloud-confidential_computing-v1
|
|
3
3
|
version: !ruby/object:Gem::Version
|
|
4
|
-
version: 0.7.
|
|
4
|
+
version: 0.7.2
|
|
5
5
|
platform: ruby
|
|
6
6
|
authors:
|
|
7
7
|
- Google LLC
|
|
8
8
|
autorequire:
|
|
9
9
|
bindir: bin
|
|
10
10
|
cert_chain: []
|
|
11
|
-
date: 2024-01
|
|
11
|
+
date: 2024-02-01 00:00:00.000000000 Z
|
|
12
12
|
dependencies:
|
|
13
13
|
- !ruby/object:Gem::Dependency
|
|
14
14
|
name: gapic-common
|