google-cloud-confidential_computing-v1 0.9.0 → 1.1.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/lib/google/cloud/confidential_computing/v1/confidential_computing/client.rb +12 -3
- data/lib/google/cloud/confidential_computing/v1/confidential_computing/rest/client.rb +12 -3
- data/lib/google/cloud/confidential_computing/v1/version.rb +1 -1
- data/lib/google/cloud/confidentialcomputing/v1/service_pb.rb +3 -1
- data/proto_docs/google/api/client.rb +14 -10
- data/proto_docs/google/api/resource.rb +7 -2
- data/proto_docs/google/cloud/confidentialcomputing/v1/service.rb +47 -0
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: cbe0bbf779dbe3d5ea1307c105b44c7f0f7902be26e42904760865db758ff2c3
|
4
|
+
data.tar.gz: 27c53fc58d246511a8e7b14b95befd8fdadf568a775e1dcd22243e936f1d64fe
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 271d75482b9ee9f2cf75294fcb7dfc68b13c8805f04efd9ab1e11941e3c1213176558f217b6e9ddb63c18d426a18d5eddf5bd901ccbbbf2360d7924064a54b1d
|
7
|
+
data.tar.gz: 458daac4cc8953f35b61c60109d1a0443dda34b2e973f17a519b7925f1c166e68d6f27670d0f8b43493fb0af45194978f2a85b9d497a6a1da615da70cdedee48
|
@@ -31,6 +31,9 @@ module Google
|
|
31
31
|
# Service describing handlers for resources
|
32
32
|
#
|
33
33
|
class Client
|
34
|
+
# @private
|
35
|
+
API_VERSION = ""
|
36
|
+
|
34
37
|
# @private
|
35
38
|
DEFAULT_ENDPOINT_TEMPLATE = "confidentialcomputing.$UNIVERSE_DOMAIN$"
|
36
39
|
|
@@ -246,10 +249,11 @@ module Google
|
|
246
249
|
# Customize the options with defaults
|
247
250
|
metadata = @config.rpcs.create_challenge.metadata.to_h
|
248
251
|
|
249
|
-
# Set x-goog-api-client
|
252
|
+
# Set x-goog-api-client, x-goog-user-project and x-goog-api-version headers
|
250
253
|
metadata[:"x-goog-api-client"] ||= ::Gapic::Headers.x_goog_api_client \
|
251
254
|
lib_name: @config.lib_name, lib_version: @config.lib_version,
|
252
255
|
gapic_version: ::Google::Cloud::ConfidentialComputing::V1::VERSION
|
256
|
+
metadata[:"x-goog-api-version"] = API_VERSION unless API_VERSION.empty?
|
253
257
|
metadata[:"x-goog-user-project"] = @quota_project_id if @quota_project_id
|
254
258
|
|
255
259
|
header_params = {}
|
@@ -289,11 +293,15 @@ module Google
|
|
289
293
|
# @param options [::Gapic::CallOptions, ::Hash]
|
290
294
|
# Overrides the default settings for this call, e.g, timeout, retries, etc. Optional.
|
291
295
|
#
|
292
|
-
# @overload verify_attestation(challenge: nil, gcp_credentials: nil, tpm_attestation: nil, confidential_space_info: nil, token_options: nil)
|
296
|
+
# @overload verify_attestation(td_ccel: nil, sev_snp_attestation: nil, challenge: nil, gcp_credentials: nil, tpm_attestation: nil, confidential_space_info: nil, token_options: nil)
|
293
297
|
# Pass arguments to `verify_attestation` via keyword arguments. Note that at
|
294
298
|
# least one keyword argument is required. To specify no parameters, or to keep all
|
295
299
|
# the default parameter values, pass an empty Hash as a request object (see above).
|
296
300
|
#
|
301
|
+
# @param td_ccel [::Google::Cloud::ConfidentialComputing::V1::TdxCcelAttestation, ::Hash]
|
302
|
+
# Optional. A TDX with CCEL and RTMR Attestation Quote.
|
303
|
+
# @param sev_snp_attestation [::Google::Cloud::ConfidentialComputing::V1::SevSnpAttestation, ::Hash]
|
304
|
+
# Optional. An SEV-SNP Attestation Report.
|
297
305
|
# @param challenge [::String]
|
298
306
|
# Required. The name of the Challenge whose nonce was used to generate the
|
299
307
|
# attestation, in the format `projects/*/locations/*/challenges/*`. The
|
@@ -344,10 +352,11 @@ module Google
|
|
344
352
|
# Customize the options with defaults
|
345
353
|
metadata = @config.rpcs.verify_attestation.metadata.to_h
|
346
354
|
|
347
|
-
# Set x-goog-api-client
|
355
|
+
# Set x-goog-api-client, x-goog-user-project and x-goog-api-version headers
|
348
356
|
metadata[:"x-goog-api-client"] ||= ::Gapic::Headers.x_goog_api_client \
|
349
357
|
lib_name: @config.lib_name, lib_version: @config.lib_version,
|
350
358
|
gapic_version: ::Google::Cloud::ConfidentialComputing::V1::VERSION
|
359
|
+
metadata[:"x-goog-api-version"] = API_VERSION unless API_VERSION.empty?
|
351
360
|
metadata[:"x-goog-user-project"] = @quota_project_id if @quota_project_id
|
352
361
|
|
353
362
|
header_params = {}
|
@@ -33,6 +33,9 @@ module Google
|
|
33
33
|
# Service describing handlers for resources
|
34
34
|
#
|
35
35
|
class Client
|
36
|
+
# @private
|
37
|
+
API_VERSION = ""
|
38
|
+
|
36
39
|
# @private
|
37
40
|
DEFAULT_ENDPOINT_TEMPLATE = "confidentialcomputing.$UNIVERSE_DOMAIN$"
|
38
41
|
|
@@ -239,12 +242,13 @@ module Google
|
|
239
242
|
# Customize the options with defaults
|
240
243
|
call_metadata = @config.rpcs.create_challenge.metadata.to_h
|
241
244
|
|
242
|
-
# Set x-goog-api-client
|
245
|
+
# Set x-goog-api-client, x-goog-user-project and x-goog-api-version headers
|
243
246
|
call_metadata[:"x-goog-api-client"] ||= ::Gapic::Headers.x_goog_api_client \
|
244
247
|
lib_name: @config.lib_name, lib_version: @config.lib_version,
|
245
248
|
gapic_version: ::Google::Cloud::ConfidentialComputing::V1::VERSION,
|
246
249
|
transports_version_send: [:rest]
|
247
250
|
|
251
|
+
call_metadata[:"x-goog-api-version"] = API_VERSION unless API_VERSION.empty?
|
248
252
|
call_metadata[:"x-goog-user-project"] = @quota_project_id if @quota_project_id
|
249
253
|
|
250
254
|
options.apply_defaults timeout: @config.rpcs.create_challenge.timeout,
|
@@ -276,11 +280,15 @@ module Google
|
|
276
280
|
# @param options [::Gapic::CallOptions, ::Hash]
|
277
281
|
# Overrides the default settings for this call, e.g, timeout, retries etc. Optional.
|
278
282
|
#
|
279
|
-
# @overload verify_attestation(challenge: nil, gcp_credentials: nil, tpm_attestation: nil, confidential_space_info: nil, token_options: nil)
|
283
|
+
# @overload verify_attestation(td_ccel: nil, sev_snp_attestation: nil, challenge: nil, gcp_credentials: nil, tpm_attestation: nil, confidential_space_info: nil, token_options: nil)
|
280
284
|
# Pass arguments to `verify_attestation` via keyword arguments. Note that at
|
281
285
|
# least one keyword argument is required. To specify no parameters, or to keep all
|
282
286
|
# the default parameter values, pass an empty Hash as a request object (see above).
|
283
287
|
#
|
288
|
+
# @param td_ccel [::Google::Cloud::ConfidentialComputing::V1::TdxCcelAttestation, ::Hash]
|
289
|
+
# Optional. A TDX with CCEL and RTMR Attestation Quote.
|
290
|
+
# @param sev_snp_attestation [::Google::Cloud::ConfidentialComputing::V1::SevSnpAttestation, ::Hash]
|
291
|
+
# Optional. An SEV-SNP Attestation Report.
|
284
292
|
# @param challenge [::String]
|
285
293
|
# Required. The name of the Challenge whose nonce was used to generate the
|
286
294
|
# attestation, in the format `projects/*/locations/*/challenges/*`. The
|
@@ -330,12 +338,13 @@ module Google
|
|
330
338
|
# Customize the options with defaults
|
331
339
|
call_metadata = @config.rpcs.verify_attestation.metadata.to_h
|
332
340
|
|
333
|
-
# Set x-goog-api-client
|
341
|
+
# Set x-goog-api-client, x-goog-user-project and x-goog-api-version headers
|
334
342
|
call_metadata[:"x-goog-api-client"] ||= ::Gapic::Headers.x_goog_api_client \
|
335
343
|
lib_name: @config.lib_name, lib_version: @config.lib_version,
|
336
344
|
gapic_version: ::Google::Cloud::ConfidentialComputing::V1::VERSION,
|
337
345
|
transports_version_send: [:rest]
|
338
346
|
|
347
|
+
call_metadata[:"x-goog-api-version"] = API_VERSION unless API_VERSION.empty?
|
339
348
|
call_metadata[:"x-goog-user-project"] = @quota_project_id if @quota_project_id
|
340
349
|
|
341
350
|
options.apply_defaults timeout: @config.rpcs.verify_attestation.timeout,
|
@@ -12,7 +12,7 @@ require 'google/protobuf/timestamp_pb'
|
|
12
12
|
require 'google/rpc/status_pb'
|
13
13
|
|
14
14
|
|
15
|
-
descriptor_data = "\n3google/cloud/confidentialcomputing/v1/service.proto\x12%google.cloud.confidentialcomputing.v1\x1a\x1cgoogle/api/annotations.proto\x1a\x17google/api/client.proto\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\x17google/rpc/status.proto\"\xa5\x02\n\tChallenge\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12\x34\n\x0b\x63reate_time\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x34\n\x0b\x65xpire_time\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x11\n\x04used\x18\x04 \x01(\x08\x42\x03\xe0\x41\x03\x12\x16\n\ttpm_nonce\x18\x06 \x01(\tB\x03\xe0\x41\x03:n\xea\x41k\n.confidentialcomputing.googleapis.com/Challenge\x12\x39projects/{project}/locations/{location}/challenges/{uuid}\"\x9d\x01\n\x16\x43reateChallengeRequest\x12\x39\n\x06parent\x18\x01 \x01(\tB)\xe0\x41\x02\xfa\x41#\n!locations.googleapis.com/Location\x12H\n\tchallenge\x18\x02 \x01(\x0b\x32\x30.google.cloud.confidentialcomputing.v1.ChallengeB\x03\xe0\x41\x02\"\
|
15
|
+
descriptor_data = "\n3google/cloud/confidentialcomputing/v1/service.proto\x12%google.cloud.confidentialcomputing.v1\x1a\x1cgoogle/api/annotations.proto\x1a\x17google/api/client.proto\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\x17google/rpc/status.proto\"\xa5\x02\n\tChallenge\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12\x34\n\x0b\x63reate_time\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x34\n\x0b\x65xpire_time\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x11\n\x04used\x18\x04 \x01(\x08\x42\x03\xe0\x41\x03\x12\x16\n\ttpm_nonce\x18\x06 \x01(\tB\x03\xe0\x41\x03:n\xea\x41k\n.confidentialcomputing.googleapis.com/Challenge\x12\x39projects/{project}/locations/{location}/challenges/{uuid}\"\x9d\x01\n\x16\x43reateChallengeRequest\x12\x39\n\x06parent\x18\x01 \x01(\tB)\xe0\x41\x02\xfa\x41#\n!locations.googleapis.com/Location\x12H\n\tchallenge\x18\x02 \x01(\x0b\x32\x30.google.cloud.confidentialcomputing.v1.ChallengeB\x03\xe0\x41\x02\"\x88\x05\n\x18VerifyAttestationRequest\x12Q\n\x07td_ccel\x18\x06 \x01(\x0b\x32\x39.google.cloud.confidentialcomputing.v1.TdxCcelAttestationB\x03\xe0\x41\x01H\x00\x12\\\n\x13sev_snp_attestation\x18\x07 \x01(\x0b\x32\x38.google.cloud.confidentialcomputing.v1.SevSnpAttestationB\x03\xe0\x41\x01H\x00\x12I\n\tchallenge\x18\x01 \x01(\tB6\xe0\x41\x02\xfa\x41\x30\n.confidentialcomputing.googleapis.com/Challenge\x12S\n\x0fgcp_credentials\x18\x02 \x01(\x0b\x32\x35.google.cloud.confidentialcomputing.v1.GcpCredentialsB\x03\xe0\x41\x01\x12S\n\x0ftpm_attestation\x18\x03 \x01(\x0b\x32\x35.google.cloud.confidentialcomputing.v1.TpmAttestationB\x03\xe0\x41\x02\x12\x62\n\x17\x63onfidential_space_info\x18\x04 \x01(\x0b\x32<.google.cloud.confidentialcomputing.v1.ConfidentialSpaceInfoB\x03\xe0\x41\x01\x12O\n\rtoken_options\x18\x05 \x01(\x0b\x32\x33.google.cloud.confidentialcomputing.v1.TokenOptionsB\x03\xe0\x41\x01\x42\x11\n\x0ftee_attestation\"\x83\x01\n\x12TdxCcelAttestation\x12\x1c\n\x0f\x63\x63\x65l_acpi_table\x18\x01 \x01(\x0c\x42\x03\xe0\x41\x01\x12\x16\n\tccel_data\x18\x02 \x01(\x0c\x42\x03\xe0\x41\x01\x12 \n\x13\x63\x61nonical_event_log\x18\x03 \x01(\x0c\x42\x03\xe0\x41\x01\x12\x15\n\x08td_quote\x18\x04 \x01(\x0c\x42\x03\xe0\x41\x01\"?\n\x11SevSnpAttestation\x12\x13\n\x06report\x18\x01 \x01(\x0c\x42\x03\xe0\x41\x01\x12\x15\n\x08\x61ux_blob\x18\x02 \x01(\x0c\x42\x03\xe0\x41\x01\"l\n\x19VerifyAttestationResponse\x12\x1e\n\x11oidc_claims_token\x18\x02 \x01(\tB\x03\xe0\x41\x03\x12/\n\x0epartial_errors\x18\x03 \x03(\x0b\x32\x12.google.rpc.StatusB\x03\xe0\x41\x03\"3\n\x0eGcpCredentials\x12!\n\x19service_account_id_tokens\x18\x02 \x03(\t\"\x84\x01\n\x0cTokenOptions\x12\x15\n\x08\x61udience\x18\x01 \x01(\tB\x03\xe0\x41\x01\x12\x12\n\x05nonce\x18\x02 \x03(\tB\x03\xe0\x41\x01\x12I\n\ntoken_type\x18\x03 \x01(\x0e\x32\x30.google.cloud.confidentialcomputing.v1.TokenTypeB\x03\xe0\x41\x01\"\x8f\x03\n\x0eTpmAttestation\x12K\n\x06quotes\x18\x01 \x03(\x0b\x32;.google.cloud.confidentialcomputing.v1.TpmAttestation.Quote\x12\x15\n\rtcg_event_log\x18\x02 \x01(\x0c\x12\x1b\n\x13\x63\x61nonical_event_log\x18\x03 \x01(\x0c\x12\x0f\n\x07\x61k_cert\x18\x04 \x01(\x0c\x12\x12\n\ncert_chain\x18\x05 \x03(\x0c\x1a\xd6\x01\n\x05Quote\x12\x11\n\thash_algo\x18\x01 \x01(\x05\x12^\n\npcr_values\x18\x02 \x03(\x0b\x32J.google.cloud.confidentialcomputing.v1.TpmAttestation.Quote.PcrValuesEntry\x12\x11\n\traw_quote\x18\x03 \x01(\x0c\x12\x15\n\rraw_signature\x18\x04 \x01(\x0c\x1a\x30\n\x0ePcrValuesEntry\x12\x0b\n\x03key\x18\x01 \x01(\x05\x12\r\n\x05value\x18\x02 \x01(\x0c:\x02\x38\x01\"j\n\x15\x43onfidentialSpaceInfo\x12Q\n\x0fsigned_entities\x18\x01 \x03(\x0b\x32\x33.google.cloud.confidentialcomputing.v1.SignedEntityB\x03\xe0\x41\x01\"w\n\x0cSignedEntity\x12g\n\x1a\x63ontainer_image_signatures\x18\x01 \x03(\x0b\x32>.google.cloud.confidentialcomputing.v1.ContainerImageSignatureB\x03\xe0\x41\x01\"\xaf\x01\n\x17\x43ontainerImageSignature\x12\x14\n\x07payload\x18\x01 \x01(\x0c\x42\x03\xe0\x41\x01\x12\x16\n\tsignature\x18\x02 \x01(\x0c\x42\x03\xe0\x41\x01\x12\x17\n\npublic_key\x18\x03 \x01(\x0c\x42\x03\xe0\x41\x01\x12M\n\x07sig_alg\x18\x04 \x01(\x0e\x32\x37.google.cloud.confidentialcomputing.v1.SigningAlgorithmB\x03\xe0\x41\x01*\x7f\n\x10SigningAlgorithm\x12!\n\x1dSIGNING_ALGORITHM_UNSPECIFIED\x10\x00\x12\x15\n\x11RSASSA_PSS_SHA256\x10\x01\x12\x1a\n\x16RSASSA_PKCS1V15_SHA256\x10\x02\x12\x15\n\x11\x45\x43\x44SA_P256_SHA256\x10\x03*l\n\tTokenType\x12\x1a\n\x16TOKEN_TYPE_UNSPECIFIED\x10\x00\x12\x13\n\x0fTOKEN_TYPE_OIDC\x10\x01\x12\x12\n\x0eTOKEN_TYPE_PKI\x10\x02\x12\x1a\n\x16TOKEN_TYPE_LIMITED_AWS\x10\x03\x32\xb7\x04\n\x15\x43onfidentialComputing\x12\xd8\x01\n\x0f\x43reateChallenge\x12=.google.cloud.confidentialcomputing.v1.CreateChallengeRequest\x1a\x30.google.cloud.confidentialcomputing.v1.Challenge\"T\xda\x41\x10parent,challenge\x82\xd3\xe4\x93\x02;\"./v1/{parent=projects/*/locations/*}/challenges:\tchallenge\x12\xe8\x01\n\x11VerifyAttestation\x12?.google.cloud.confidentialcomputing.v1.VerifyAttestationRequest\x1a@.google.cloud.confidentialcomputing.v1.VerifyAttestationResponse\"P\x82\xd3\xe4\x93\x02J\"E/v1/{challenge=projects/*/locations/*/challenges/*}:verifyAttestation:\x01*\x1aX\xca\x41$confidentialcomputing.googleapis.com\xd2\x41.https://www.googleapis.com/auth/cloud-platformB\x97\x02\n)com.google.cloud.confidentialcomputing.v1B\x0cServiceProtoP\x01Z_cloud.google.com/go/confidentialcomputing/apiv1/confidentialcomputingpb;confidentialcomputingpb\xaa\x02%Google.Cloud.ConfidentialComputing.V1\xca\x02%Google\\Cloud\\ConfidentialComputing\\V1\xea\x02(Google::Cloud::ConfidentialComputing::V1b\x06proto3"
|
16
16
|
|
17
17
|
pool = Google::Protobuf::DescriptorPool.generated_pool
|
18
18
|
|
@@ -47,6 +47,8 @@ module Google
|
|
47
47
|
Challenge = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.confidentialcomputing.v1.Challenge").msgclass
|
48
48
|
CreateChallengeRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.confidentialcomputing.v1.CreateChallengeRequest").msgclass
|
49
49
|
VerifyAttestationRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.confidentialcomputing.v1.VerifyAttestationRequest").msgclass
|
50
|
+
TdxCcelAttestation = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.confidentialcomputing.v1.TdxCcelAttestation").msgclass
|
51
|
+
SevSnpAttestation = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.confidentialcomputing.v1.SevSnpAttestation").msgclass
|
50
52
|
VerifyAttestationResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.confidentialcomputing.v1.VerifyAttestationResponse").msgclass
|
51
53
|
GcpCredentials = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.confidentialcomputing.v1.GcpCredentials").msgclass
|
52
54
|
TokenOptions = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.confidentialcomputing.v1.TokenOptions").msgclass
|
@@ -290,6 +290,13 @@ module Google
|
|
290
290
|
# @return [::String]
|
291
291
|
# The fully qualified name of the method, for which the options below apply.
|
292
292
|
# This is used to find the method to apply the options.
|
293
|
+
#
|
294
|
+
# Example:
|
295
|
+
#
|
296
|
+
# publishing:
|
297
|
+
# method_settings:
|
298
|
+
# - selector: google.storage.control.v2.StorageControl.CreateFolder
|
299
|
+
# # method settings for CreateFolder...
|
293
300
|
# @!attribute [rw] long_running
|
294
301
|
# @return [::Google::Api::MethodSettings::LongRunning]
|
295
302
|
# Describes settings to use for long-running operations when generating
|
@@ -298,17 +305,14 @@ module Google
|
|
298
305
|
#
|
299
306
|
# Example of a YAML configuration::
|
300
307
|
#
|
301
|
-
#
|
302
|
-
#
|
308
|
+
# publishing:
|
309
|
+
# method_settings:
|
303
310
|
# - selector: google.cloud.speech.v2.Speech.BatchRecognize
|
304
311
|
# long_running:
|
305
|
-
# initial_poll_delay:
|
306
|
-
# seconds: 60 # 1 minute
|
312
|
+
# initial_poll_delay: 60s # 1 minute
|
307
313
|
# poll_delay_multiplier: 1.5
|
308
|
-
# max_poll_delay:
|
309
|
-
#
|
310
|
-
# total_poll_timeout:
|
311
|
-
# seconds: 54000 # 90 minutes
|
314
|
+
# max_poll_delay: 360s # 6 minutes
|
315
|
+
# total_poll_timeout: 54000s # 90 minutes
|
312
316
|
# @!attribute [rw] auto_populated_fields
|
313
317
|
# @return [::Array<::String>]
|
314
318
|
# List of top-level fields of the request message, that should be
|
@@ -317,8 +321,8 @@ module Google
|
|
317
321
|
#
|
318
322
|
# Example of a YAML configuration:
|
319
323
|
#
|
320
|
-
#
|
321
|
-
#
|
324
|
+
# publishing:
|
325
|
+
# method_settings:
|
322
326
|
# - selector: google.example.v1.ExampleService.CreateExample
|
323
327
|
# auto_populated_fields:
|
324
328
|
# - request_id
|
@@ -124,8 +124,13 @@ module Google
|
|
124
124
|
# @return [::String]
|
125
125
|
# The plural name used in the resource name and permission names, such as
|
126
126
|
# 'projects' for the resource name of 'projects/\\{project}' and the permission
|
127
|
-
# name of 'cloudresourcemanager.googleapis.com/projects.get'.
|
128
|
-
#
|
127
|
+
# name of 'cloudresourcemanager.googleapis.com/projects.get'. One exception
|
128
|
+
# to this is for Nested Collections that have stuttering names, as defined
|
129
|
+
# in [AIP-122](https://google.aip.dev/122#nested-collections), where the
|
130
|
+
# collection ID in the resource name pattern does not necessarily directly
|
131
|
+
# match the `plural` value.
|
132
|
+
#
|
133
|
+
# It is the same concept of the `plural` field in k8s CRD spec
|
129
134
|
# https://kubernetes.io/docs/tasks/access-kubernetes-api/custom-resources/custom-resource-definitions/
|
130
135
|
#
|
131
136
|
# Note: The plural form is required even for singleton resources. See
|
@@ -60,6 +60,12 @@ module Google
|
|
60
60
|
|
61
61
|
# A request for an OIDC token, providing all the necessary information needed
|
62
62
|
# for this service to verify the plaform state of the requestor.
|
63
|
+
# @!attribute [rw] td_ccel
|
64
|
+
# @return [::Google::Cloud::ConfidentialComputing::V1::TdxCcelAttestation]
|
65
|
+
# Optional. A TDX with CCEL and RTMR Attestation Quote.
|
66
|
+
# @!attribute [rw] sev_snp_attestation
|
67
|
+
# @return [::Google::Cloud::ConfidentialComputing::V1::SevSnpAttestation]
|
68
|
+
# Optional. An SEV-SNP Attestation Report.
|
63
69
|
# @!attribute [rw] challenge
|
64
70
|
# @return [::String]
|
65
71
|
# Required. The name of the Challenge whose nonce was used to generate the
|
@@ -85,6 +91,47 @@ module Google
|
|
85
91
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|
86
92
|
end
|
87
93
|
|
94
|
+
# A TDX Attestation quote.
|
95
|
+
# @!attribute [rw] ccel_acpi_table
|
96
|
+
# @return [::String]
|
97
|
+
# Optional. The Confidential Computing Event Log (CCEL) ACPI table. Formatted
|
98
|
+
# as described in the ACPI Specification 6.5.
|
99
|
+
# @!attribute [rw] ccel_data
|
100
|
+
# @return [::String]
|
101
|
+
# Optional. The CCEL event log. Formatted as described in the UEFI 2.10.
|
102
|
+
# @!attribute [rw] canonical_event_log
|
103
|
+
# @return [::String]
|
104
|
+
# Optional. An Event Log containing additional events measured into the RTMR
|
105
|
+
# that are not already present in the CCEL.
|
106
|
+
# @!attribute [rw] td_quote
|
107
|
+
# @return [::String]
|
108
|
+
# Optional. The TDX attestation quote from the guest. It contains the RTMR
|
109
|
+
# values.
|
110
|
+
class TdxCcelAttestation
|
111
|
+
include ::Google::Protobuf::MessageExts
|
112
|
+
extend ::Google::Protobuf::MessageExts::ClassMethods
|
113
|
+
end
|
114
|
+
|
115
|
+
# An SEV-SNP Attestation Report.
|
116
|
+
# Contains the attestation report and the certificate bundle that the client
|
117
|
+
# collects.
|
118
|
+
# @!attribute [rw] report
|
119
|
+
# @return [::String]
|
120
|
+
# Optional. The SEV-SNP Attestation Report
|
121
|
+
# Format is in revision 1.55, §7.3 Attestation, Table 22. ATTESTATION_REPORT
|
122
|
+
# Structure in this document:
|
123
|
+
# https://www.amd.com/content/dam/amd/en/documents/epyc-technical-docs/specifications/56860.pdf
|
124
|
+
# @!attribute [rw] aux_blob
|
125
|
+
# @return [::String]
|
126
|
+
# Optional. Certificate bundle defined in the GHCB protocol definition
|
127
|
+
# Format is documented in GHCB revision 2.03, section 4.1.8.1 struct
|
128
|
+
# cert_table in this document:
|
129
|
+
# https://www.amd.com/content/dam/amd/en/documents/epyc-technical-docs/specifications/56421.pdf
|
130
|
+
class SevSnpAttestation
|
131
|
+
include ::Google::Protobuf::MessageExts
|
132
|
+
extend ::Google::Protobuf::MessageExts::ClassMethods
|
133
|
+
end
|
134
|
+
|
88
135
|
# A response once an attestation has been successfully verified, containing a
|
89
136
|
# signed OIDC token.
|
90
137
|
# @!attribute [r] oidc_claims_token
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: google-cloud-confidential_computing-v1
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version:
|
4
|
+
version: 1.1.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Google LLC
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2024-
|
11
|
+
date: 2024-07-22 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: gapic-common
|