google-cloud-confidential_computing-v1 0.9.0 → 1.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/lib/google/cloud/confidential_computing/v1/confidential_computing/client.rb +12 -3
- data/lib/google/cloud/confidential_computing/v1/confidential_computing/rest/client.rb +12 -3
- data/lib/google/cloud/confidential_computing/v1/version.rb +1 -1
- data/lib/google/cloud/confidentialcomputing/v1/service_pb.rb +3 -1
- data/proto_docs/google/api/client.rb +14 -10
- data/proto_docs/google/api/resource.rb +7 -2
- data/proto_docs/google/cloud/confidentialcomputing/v1/service.rb +47 -0
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: cbe0bbf779dbe3d5ea1307c105b44c7f0f7902be26e42904760865db758ff2c3
|
4
|
+
data.tar.gz: 27c53fc58d246511a8e7b14b95befd8fdadf568a775e1dcd22243e936f1d64fe
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 271d75482b9ee9f2cf75294fcb7dfc68b13c8805f04efd9ab1e11941e3c1213176558f217b6e9ddb63c18d426a18d5eddf5bd901ccbbbf2360d7924064a54b1d
|
7
|
+
data.tar.gz: 458daac4cc8953f35b61c60109d1a0443dda34b2e973f17a519b7925f1c166e68d6f27670d0f8b43493fb0af45194978f2a85b9d497a6a1da615da70cdedee48
|
@@ -31,6 +31,9 @@ module Google
|
|
31
31
|
# Service describing handlers for resources
|
32
32
|
#
|
33
33
|
class Client
|
34
|
+
# @private
|
35
|
+
API_VERSION = ""
|
36
|
+
|
34
37
|
# @private
|
35
38
|
DEFAULT_ENDPOINT_TEMPLATE = "confidentialcomputing.$UNIVERSE_DOMAIN$"
|
36
39
|
|
@@ -246,10 +249,11 @@ module Google
|
|
246
249
|
# Customize the options with defaults
|
247
250
|
metadata = @config.rpcs.create_challenge.metadata.to_h
|
248
251
|
|
249
|
-
# Set x-goog-api-client
|
252
|
+
# Set x-goog-api-client, x-goog-user-project and x-goog-api-version headers
|
250
253
|
metadata[:"x-goog-api-client"] ||= ::Gapic::Headers.x_goog_api_client \
|
251
254
|
lib_name: @config.lib_name, lib_version: @config.lib_version,
|
252
255
|
gapic_version: ::Google::Cloud::ConfidentialComputing::V1::VERSION
|
256
|
+
metadata[:"x-goog-api-version"] = API_VERSION unless API_VERSION.empty?
|
253
257
|
metadata[:"x-goog-user-project"] = @quota_project_id if @quota_project_id
|
254
258
|
|
255
259
|
header_params = {}
|
@@ -289,11 +293,15 @@ module Google
|
|
289
293
|
# @param options [::Gapic::CallOptions, ::Hash]
|
290
294
|
# Overrides the default settings for this call, e.g, timeout, retries, etc. Optional.
|
291
295
|
#
|
292
|
-
# @overload verify_attestation(challenge: nil, gcp_credentials: nil, tpm_attestation: nil, confidential_space_info: nil, token_options: nil)
|
296
|
+
# @overload verify_attestation(td_ccel: nil, sev_snp_attestation: nil, challenge: nil, gcp_credentials: nil, tpm_attestation: nil, confidential_space_info: nil, token_options: nil)
|
293
297
|
# Pass arguments to `verify_attestation` via keyword arguments. Note that at
|
294
298
|
# least one keyword argument is required. To specify no parameters, or to keep all
|
295
299
|
# the default parameter values, pass an empty Hash as a request object (see above).
|
296
300
|
#
|
301
|
+
# @param td_ccel [::Google::Cloud::ConfidentialComputing::V1::TdxCcelAttestation, ::Hash]
|
302
|
+
# Optional. A TDX with CCEL and RTMR Attestation Quote.
|
303
|
+
# @param sev_snp_attestation [::Google::Cloud::ConfidentialComputing::V1::SevSnpAttestation, ::Hash]
|
304
|
+
# Optional. An SEV-SNP Attestation Report.
|
297
305
|
# @param challenge [::String]
|
298
306
|
# Required. The name of the Challenge whose nonce was used to generate the
|
299
307
|
# attestation, in the format `projects/*/locations/*/challenges/*`. The
|
@@ -344,10 +352,11 @@ module Google
|
|
344
352
|
# Customize the options with defaults
|
345
353
|
metadata = @config.rpcs.verify_attestation.metadata.to_h
|
346
354
|
|
347
|
-
# Set x-goog-api-client
|
355
|
+
# Set x-goog-api-client, x-goog-user-project and x-goog-api-version headers
|
348
356
|
metadata[:"x-goog-api-client"] ||= ::Gapic::Headers.x_goog_api_client \
|
349
357
|
lib_name: @config.lib_name, lib_version: @config.lib_version,
|
350
358
|
gapic_version: ::Google::Cloud::ConfidentialComputing::V1::VERSION
|
359
|
+
metadata[:"x-goog-api-version"] = API_VERSION unless API_VERSION.empty?
|
351
360
|
metadata[:"x-goog-user-project"] = @quota_project_id if @quota_project_id
|
352
361
|
|
353
362
|
header_params = {}
|
@@ -33,6 +33,9 @@ module Google
|
|
33
33
|
# Service describing handlers for resources
|
34
34
|
#
|
35
35
|
class Client
|
36
|
+
# @private
|
37
|
+
API_VERSION = ""
|
38
|
+
|
36
39
|
# @private
|
37
40
|
DEFAULT_ENDPOINT_TEMPLATE = "confidentialcomputing.$UNIVERSE_DOMAIN$"
|
38
41
|
|
@@ -239,12 +242,13 @@ module Google
|
|
239
242
|
# Customize the options with defaults
|
240
243
|
call_metadata = @config.rpcs.create_challenge.metadata.to_h
|
241
244
|
|
242
|
-
# Set x-goog-api-client
|
245
|
+
# Set x-goog-api-client, x-goog-user-project and x-goog-api-version headers
|
243
246
|
call_metadata[:"x-goog-api-client"] ||= ::Gapic::Headers.x_goog_api_client \
|
244
247
|
lib_name: @config.lib_name, lib_version: @config.lib_version,
|
245
248
|
gapic_version: ::Google::Cloud::ConfidentialComputing::V1::VERSION,
|
246
249
|
transports_version_send: [:rest]
|
247
250
|
|
251
|
+
call_metadata[:"x-goog-api-version"] = API_VERSION unless API_VERSION.empty?
|
248
252
|
call_metadata[:"x-goog-user-project"] = @quota_project_id if @quota_project_id
|
249
253
|
|
250
254
|
options.apply_defaults timeout: @config.rpcs.create_challenge.timeout,
|
@@ -276,11 +280,15 @@ module Google
|
|
276
280
|
# @param options [::Gapic::CallOptions, ::Hash]
|
277
281
|
# Overrides the default settings for this call, e.g, timeout, retries etc. Optional.
|
278
282
|
#
|
279
|
-
# @overload verify_attestation(challenge: nil, gcp_credentials: nil, tpm_attestation: nil, confidential_space_info: nil, token_options: nil)
|
283
|
+
# @overload verify_attestation(td_ccel: nil, sev_snp_attestation: nil, challenge: nil, gcp_credentials: nil, tpm_attestation: nil, confidential_space_info: nil, token_options: nil)
|
280
284
|
# Pass arguments to `verify_attestation` via keyword arguments. Note that at
|
281
285
|
# least one keyword argument is required. To specify no parameters, or to keep all
|
282
286
|
# the default parameter values, pass an empty Hash as a request object (see above).
|
283
287
|
#
|
288
|
+
# @param td_ccel [::Google::Cloud::ConfidentialComputing::V1::TdxCcelAttestation, ::Hash]
|
289
|
+
# Optional. A TDX with CCEL and RTMR Attestation Quote.
|
290
|
+
# @param sev_snp_attestation [::Google::Cloud::ConfidentialComputing::V1::SevSnpAttestation, ::Hash]
|
291
|
+
# Optional. An SEV-SNP Attestation Report.
|
284
292
|
# @param challenge [::String]
|
285
293
|
# Required. The name of the Challenge whose nonce was used to generate the
|
286
294
|
# attestation, in the format `projects/*/locations/*/challenges/*`. The
|
@@ -330,12 +338,13 @@ module Google
|
|
330
338
|
# Customize the options with defaults
|
331
339
|
call_metadata = @config.rpcs.verify_attestation.metadata.to_h
|
332
340
|
|
333
|
-
# Set x-goog-api-client
|
341
|
+
# Set x-goog-api-client, x-goog-user-project and x-goog-api-version headers
|
334
342
|
call_metadata[:"x-goog-api-client"] ||= ::Gapic::Headers.x_goog_api_client \
|
335
343
|
lib_name: @config.lib_name, lib_version: @config.lib_version,
|
336
344
|
gapic_version: ::Google::Cloud::ConfidentialComputing::V1::VERSION,
|
337
345
|
transports_version_send: [:rest]
|
338
346
|
|
347
|
+
call_metadata[:"x-goog-api-version"] = API_VERSION unless API_VERSION.empty?
|
339
348
|
call_metadata[:"x-goog-user-project"] = @quota_project_id if @quota_project_id
|
340
349
|
|
341
350
|
options.apply_defaults timeout: @config.rpcs.verify_attestation.timeout,
|
@@ -12,7 +12,7 @@ require 'google/protobuf/timestamp_pb'
|
|
12
12
|
require 'google/rpc/status_pb'
|
13
13
|
|
14
14
|
|
15
|
-
descriptor_data = "\n3google/cloud/confidentialcomputing/v1/service.proto\x12%google.cloud.confidentialcomputing.v1\x1a\x1cgoogle/api/annotations.proto\x1a\x17google/api/client.proto\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\x17google/rpc/status.proto\"\xa5\x02\n\tChallenge\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12\x34\n\x0b\x63reate_time\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x34\n\x0b\x65xpire_time\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x11\n\x04used\x18\x04 \x01(\x08\x42\x03\xe0\x41\x03\x12\x16\n\ttpm_nonce\x18\x06 \x01(\tB\x03\xe0\x41\x03:n\xea\x41k\n.confidentialcomputing.googleapis.com/Challenge\x12\x39projects/{project}/locations/{location}/challenges/{uuid}\"\x9d\x01\n\x16\x43reateChallengeRequest\x12\x39\n\x06parent\x18\x01 \x01(\tB)\xe0\x41\x02\xfa\x41#\n!locations.googleapis.com/Location\x12H\n\tchallenge\x18\x02 \x01(\x0b\x32\x30.google.cloud.confidentialcomputing.v1.ChallengeB\x03\xe0\x41\x02\"\
|
15
|
+
descriptor_data = "\n3google/cloud/confidentialcomputing/v1/service.proto\x12%google.cloud.confidentialcomputing.v1\x1a\x1cgoogle/api/annotations.proto\x1a\x17google/api/client.proto\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\x17google/rpc/status.proto\"\xa5\x02\n\tChallenge\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12\x34\n\x0b\x63reate_time\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x34\n\x0b\x65xpire_time\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x11\n\x04used\x18\x04 \x01(\x08\x42\x03\xe0\x41\x03\x12\x16\n\ttpm_nonce\x18\x06 \x01(\tB\x03\xe0\x41\x03:n\xea\x41k\n.confidentialcomputing.googleapis.com/Challenge\x12\x39projects/{project}/locations/{location}/challenges/{uuid}\"\x9d\x01\n\x16\x43reateChallengeRequest\x12\x39\n\x06parent\x18\x01 \x01(\tB)\xe0\x41\x02\xfa\x41#\n!locations.googleapis.com/Location\x12H\n\tchallenge\x18\x02 \x01(\x0b\x32\x30.google.cloud.confidentialcomputing.v1.ChallengeB\x03\xe0\x41\x02\"\x88\x05\n\x18VerifyAttestationRequest\x12Q\n\x07td_ccel\x18\x06 \x01(\x0b\x32\x39.google.cloud.confidentialcomputing.v1.TdxCcelAttestationB\x03\xe0\x41\x01H\x00\x12\\\n\x13sev_snp_attestation\x18\x07 \x01(\x0b\x32\x38.google.cloud.confidentialcomputing.v1.SevSnpAttestationB\x03\xe0\x41\x01H\x00\x12I\n\tchallenge\x18\x01 \x01(\tB6\xe0\x41\x02\xfa\x41\x30\n.confidentialcomputing.googleapis.com/Challenge\x12S\n\x0fgcp_credentials\x18\x02 \x01(\x0b\x32\x35.google.cloud.confidentialcomputing.v1.GcpCredentialsB\x03\xe0\x41\x01\x12S\n\x0ftpm_attestation\x18\x03 \x01(\x0b\x32\x35.google.cloud.confidentialcomputing.v1.TpmAttestationB\x03\xe0\x41\x02\x12\x62\n\x17\x63onfidential_space_info\x18\x04 \x01(\x0b\x32<.google.cloud.confidentialcomputing.v1.ConfidentialSpaceInfoB\x03\xe0\x41\x01\x12O\n\rtoken_options\x18\x05 \x01(\x0b\x32\x33.google.cloud.confidentialcomputing.v1.TokenOptionsB\x03\xe0\x41\x01\x42\x11\n\x0ftee_attestation\"\x83\x01\n\x12TdxCcelAttestation\x12\x1c\n\x0f\x63\x63\x65l_acpi_table\x18\x01 \x01(\x0c\x42\x03\xe0\x41\x01\x12\x16\n\tccel_data\x18\x02 \x01(\x0c\x42\x03\xe0\x41\x01\x12 \n\x13\x63\x61nonical_event_log\x18\x03 \x01(\x0c\x42\x03\xe0\x41\x01\x12\x15\n\x08td_quote\x18\x04 \x01(\x0c\x42\x03\xe0\x41\x01\"?\n\x11SevSnpAttestation\x12\x13\n\x06report\x18\x01 \x01(\x0c\x42\x03\xe0\x41\x01\x12\x15\n\x08\x61ux_blob\x18\x02 \x01(\x0c\x42\x03\xe0\x41\x01\"l\n\x19VerifyAttestationResponse\x12\x1e\n\x11oidc_claims_token\x18\x02 \x01(\tB\x03\xe0\x41\x03\x12/\n\x0epartial_errors\x18\x03 \x03(\x0b\x32\x12.google.rpc.StatusB\x03\xe0\x41\x03\"3\n\x0eGcpCredentials\x12!\n\x19service_account_id_tokens\x18\x02 \x03(\t\"\x84\x01\n\x0cTokenOptions\x12\x15\n\x08\x61udience\x18\x01 \x01(\tB\x03\xe0\x41\x01\x12\x12\n\x05nonce\x18\x02 \x03(\tB\x03\xe0\x41\x01\x12I\n\ntoken_type\x18\x03 \x01(\x0e\x32\x30.google.cloud.confidentialcomputing.v1.TokenTypeB\x03\xe0\x41\x01\"\x8f\x03\n\x0eTpmAttestation\x12K\n\x06quotes\x18\x01 \x03(\x0b\x32;.google.cloud.confidentialcomputing.v1.TpmAttestation.Quote\x12\x15\n\rtcg_event_log\x18\x02 \x01(\x0c\x12\x1b\n\x13\x63\x61nonical_event_log\x18\x03 \x01(\x0c\x12\x0f\n\x07\x61k_cert\x18\x04 \x01(\x0c\x12\x12\n\ncert_chain\x18\x05 \x03(\x0c\x1a\xd6\x01\n\x05Quote\x12\x11\n\thash_algo\x18\x01 \x01(\x05\x12^\n\npcr_values\x18\x02 \x03(\x0b\x32J.google.cloud.confidentialcomputing.v1.TpmAttestation.Quote.PcrValuesEntry\x12\x11\n\traw_quote\x18\x03 \x01(\x0c\x12\x15\n\rraw_signature\x18\x04 \x01(\x0c\x1a\x30\n\x0ePcrValuesEntry\x12\x0b\n\x03key\x18\x01 \x01(\x05\x12\r\n\x05value\x18\x02 \x01(\x0c:\x02\x38\x01\"j\n\x15\x43onfidentialSpaceInfo\x12Q\n\x0fsigned_entities\x18\x01 \x03(\x0b\x32\x33.google.cloud.confidentialcomputing.v1.SignedEntityB\x03\xe0\x41\x01\"w\n\x0cSignedEntity\x12g\n\x1a\x63ontainer_image_signatures\x18\x01 \x03(\x0b\x32>.google.cloud.confidentialcomputing.v1.ContainerImageSignatureB\x03\xe0\x41\x01\"\xaf\x01\n\x17\x43ontainerImageSignature\x12\x14\n\x07payload\x18\x01 \x01(\x0c\x42\x03\xe0\x41\x01\x12\x16\n\tsignature\x18\x02 \x01(\x0c\x42\x03\xe0\x41\x01\x12\x17\n\npublic_key\x18\x03 \x01(\x0c\x42\x03\xe0\x41\x01\x12M\n\x07sig_alg\x18\x04 \x01(\x0e\x32\x37.google.cloud.confidentialcomputing.v1.SigningAlgorithmB\x03\xe0\x41\x01*\x7f\n\x10SigningAlgorithm\x12!\n\x1dSIGNING_ALGORITHM_UNSPECIFIED\x10\x00\x12\x15\n\x11RSASSA_PSS_SHA256\x10\x01\x12\x1a\n\x16RSASSA_PKCS1V15_SHA256\x10\x02\x12\x15\n\x11\x45\x43\x44SA_P256_SHA256\x10\x03*l\n\tTokenType\x12\x1a\n\x16TOKEN_TYPE_UNSPECIFIED\x10\x00\x12\x13\n\x0fTOKEN_TYPE_OIDC\x10\x01\x12\x12\n\x0eTOKEN_TYPE_PKI\x10\x02\x12\x1a\n\x16TOKEN_TYPE_LIMITED_AWS\x10\x03\x32\xb7\x04\n\x15\x43onfidentialComputing\x12\xd8\x01\n\x0f\x43reateChallenge\x12=.google.cloud.confidentialcomputing.v1.CreateChallengeRequest\x1a\x30.google.cloud.confidentialcomputing.v1.Challenge\"T\xda\x41\x10parent,challenge\x82\xd3\xe4\x93\x02;\"./v1/{parent=projects/*/locations/*}/challenges:\tchallenge\x12\xe8\x01\n\x11VerifyAttestation\x12?.google.cloud.confidentialcomputing.v1.VerifyAttestationRequest\x1a@.google.cloud.confidentialcomputing.v1.VerifyAttestationResponse\"P\x82\xd3\xe4\x93\x02J\"E/v1/{challenge=projects/*/locations/*/challenges/*}:verifyAttestation:\x01*\x1aX\xca\x41$confidentialcomputing.googleapis.com\xd2\x41.https://www.googleapis.com/auth/cloud-platformB\x97\x02\n)com.google.cloud.confidentialcomputing.v1B\x0cServiceProtoP\x01Z_cloud.google.com/go/confidentialcomputing/apiv1/confidentialcomputingpb;confidentialcomputingpb\xaa\x02%Google.Cloud.ConfidentialComputing.V1\xca\x02%Google\\Cloud\\ConfidentialComputing\\V1\xea\x02(Google::Cloud::ConfidentialComputing::V1b\x06proto3"
|
16
16
|
|
17
17
|
pool = Google::Protobuf::DescriptorPool.generated_pool
|
18
18
|
|
@@ -47,6 +47,8 @@ module Google
|
|
47
47
|
Challenge = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.confidentialcomputing.v1.Challenge").msgclass
|
48
48
|
CreateChallengeRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.confidentialcomputing.v1.CreateChallengeRequest").msgclass
|
49
49
|
VerifyAttestationRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.confidentialcomputing.v1.VerifyAttestationRequest").msgclass
|
50
|
+
TdxCcelAttestation = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.confidentialcomputing.v1.TdxCcelAttestation").msgclass
|
51
|
+
SevSnpAttestation = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.confidentialcomputing.v1.SevSnpAttestation").msgclass
|
50
52
|
VerifyAttestationResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.confidentialcomputing.v1.VerifyAttestationResponse").msgclass
|
51
53
|
GcpCredentials = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.confidentialcomputing.v1.GcpCredentials").msgclass
|
52
54
|
TokenOptions = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.confidentialcomputing.v1.TokenOptions").msgclass
|
@@ -290,6 +290,13 @@ module Google
|
|
290
290
|
# @return [::String]
|
291
291
|
# The fully qualified name of the method, for which the options below apply.
|
292
292
|
# This is used to find the method to apply the options.
|
293
|
+
#
|
294
|
+
# Example:
|
295
|
+
#
|
296
|
+
# publishing:
|
297
|
+
# method_settings:
|
298
|
+
# - selector: google.storage.control.v2.StorageControl.CreateFolder
|
299
|
+
# # method settings for CreateFolder...
|
293
300
|
# @!attribute [rw] long_running
|
294
301
|
# @return [::Google::Api::MethodSettings::LongRunning]
|
295
302
|
# Describes settings to use for long-running operations when generating
|
@@ -298,17 +305,14 @@ module Google
|
|
298
305
|
#
|
299
306
|
# Example of a YAML configuration::
|
300
307
|
#
|
301
|
-
#
|
302
|
-
#
|
308
|
+
# publishing:
|
309
|
+
# method_settings:
|
303
310
|
# - selector: google.cloud.speech.v2.Speech.BatchRecognize
|
304
311
|
# long_running:
|
305
|
-
# initial_poll_delay:
|
306
|
-
# seconds: 60 # 1 minute
|
312
|
+
# initial_poll_delay: 60s # 1 minute
|
307
313
|
# poll_delay_multiplier: 1.5
|
308
|
-
# max_poll_delay:
|
309
|
-
#
|
310
|
-
# total_poll_timeout:
|
311
|
-
# seconds: 54000 # 90 minutes
|
314
|
+
# max_poll_delay: 360s # 6 minutes
|
315
|
+
# total_poll_timeout: 54000s # 90 minutes
|
312
316
|
# @!attribute [rw] auto_populated_fields
|
313
317
|
# @return [::Array<::String>]
|
314
318
|
# List of top-level fields of the request message, that should be
|
@@ -317,8 +321,8 @@ module Google
|
|
317
321
|
#
|
318
322
|
# Example of a YAML configuration:
|
319
323
|
#
|
320
|
-
#
|
321
|
-
#
|
324
|
+
# publishing:
|
325
|
+
# method_settings:
|
322
326
|
# - selector: google.example.v1.ExampleService.CreateExample
|
323
327
|
# auto_populated_fields:
|
324
328
|
# - request_id
|
@@ -124,8 +124,13 @@ module Google
|
|
124
124
|
# @return [::String]
|
125
125
|
# The plural name used in the resource name and permission names, such as
|
126
126
|
# 'projects' for the resource name of 'projects/\\{project}' and the permission
|
127
|
-
# name of 'cloudresourcemanager.googleapis.com/projects.get'.
|
128
|
-
#
|
127
|
+
# name of 'cloudresourcemanager.googleapis.com/projects.get'. One exception
|
128
|
+
# to this is for Nested Collections that have stuttering names, as defined
|
129
|
+
# in [AIP-122](https://google.aip.dev/122#nested-collections), where the
|
130
|
+
# collection ID in the resource name pattern does not necessarily directly
|
131
|
+
# match the `plural` value.
|
132
|
+
#
|
133
|
+
# It is the same concept of the `plural` field in k8s CRD spec
|
129
134
|
# https://kubernetes.io/docs/tasks/access-kubernetes-api/custom-resources/custom-resource-definitions/
|
130
135
|
#
|
131
136
|
# Note: The plural form is required even for singleton resources. See
|
@@ -60,6 +60,12 @@ module Google
|
|
60
60
|
|
61
61
|
# A request for an OIDC token, providing all the necessary information needed
|
62
62
|
# for this service to verify the plaform state of the requestor.
|
63
|
+
# @!attribute [rw] td_ccel
|
64
|
+
# @return [::Google::Cloud::ConfidentialComputing::V1::TdxCcelAttestation]
|
65
|
+
# Optional. A TDX with CCEL and RTMR Attestation Quote.
|
66
|
+
# @!attribute [rw] sev_snp_attestation
|
67
|
+
# @return [::Google::Cloud::ConfidentialComputing::V1::SevSnpAttestation]
|
68
|
+
# Optional. An SEV-SNP Attestation Report.
|
63
69
|
# @!attribute [rw] challenge
|
64
70
|
# @return [::String]
|
65
71
|
# Required. The name of the Challenge whose nonce was used to generate the
|
@@ -85,6 +91,47 @@ module Google
|
|
85
91
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|
86
92
|
end
|
87
93
|
|
94
|
+
# A TDX Attestation quote.
|
95
|
+
# @!attribute [rw] ccel_acpi_table
|
96
|
+
# @return [::String]
|
97
|
+
# Optional. The Confidential Computing Event Log (CCEL) ACPI table. Formatted
|
98
|
+
# as described in the ACPI Specification 6.5.
|
99
|
+
# @!attribute [rw] ccel_data
|
100
|
+
# @return [::String]
|
101
|
+
# Optional. The CCEL event log. Formatted as described in the UEFI 2.10.
|
102
|
+
# @!attribute [rw] canonical_event_log
|
103
|
+
# @return [::String]
|
104
|
+
# Optional. An Event Log containing additional events measured into the RTMR
|
105
|
+
# that are not already present in the CCEL.
|
106
|
+
# @!attribute [rw] td_quote
|
107
|
+
# @return [::String]
|
108
|
+
# Optional. The TDX attestation quote from the guest. It contains the RTMR
|
109
|
+
# values.
|
110
|
+
class TdxCcelAttestation
|
111
|
+
include ::Google::Protobuf::MessageExts
|
112
|
+
extend ::Google::Protobuf::MessageExts::ClassMethods
|
113
|
+
end
|
114
|
+
|
115
|
+
# An SEV-SNP Attestation Report.
|
116
|
+
# Contains the attestation report and the certificate bundle that the client
|
117
|
+
# collects.
|
118
|
+
# @!attribute [rw] report
|
119
|
+
# @return [::String]
|
120
|
+
# Optional. The SEV-SNP Attestation Report
|
121
|
+
# Format is in revision 1.55, §7.3 Attestation, Table 22. ATTESTATION_REPORT
|
122
|
+
# Structure in this document:
|
123
|
+
# https://www.amd.com/content/dam/amd/en/documents/epyc-technical-docs/specifications/56860.pdf
|
124
|
+
# @!attribute [rw] aux_blob
|
125
|
+
# @return [::String]
|
126
|
+
# Optional. Certificate bundle defined in the GHCB protocol definition
|
127
|
+
# Format is documented in GHCB revision 2.03, section 4.1.8.1 struct
|
128
|
+
# cert_table in this document:
|
129
|
+
# https://www.amd.com/content/dam/amd/en/documents/epyc-technical-docs/specifications/56421.pdf
|
130
|
+
class SevSnpAttestation
|
131
|
+
include ::Google::Protobuf::MessageExts
|
132
|
+
extend ::Google::Protobuf::MessageExts::ClassMethods
|
133
|
+
end
|
134
|
+
|
88
135
|
# A response once an attestation has been successfully verified, containing a
|
89
136
|
# signed OIDC token.
|
90
137
|
# @!attribute [r] oidc_claims_token
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: google-cloud-confidential_computing-v1
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version:
|
4
|
+
version: 1.1.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Google LLC
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2024-
|
11
|
+
date: 2024-07-22 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: gapic-common
|