google-cloud-confidential_computing-v1 1.0.0 → 1.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/lib/google/cloud/confidential_computing/v1/confidential_computing/client.rb +5 -1
- data/lib/google/cloud/confidential_computing/v1/confidential_computing/rest/client.rb +5 -1
- data/lib/google/cloud/confidential_computing/v1/version.rb +1 -1
- data/lib/google/cloud/confidentialcomputing/v1/service_pb.rb +3 -1
- data/proto_docs/google/api/client.rb +14 -10
- data/proto_docs/google/api/resource.rb +7 -2
- data/proto_docs/google/cloud/confidentialcomputing/v1/service.rb +47 -0
- metadata +2 -2
checksums.yaml
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
SHA256:
|
|
3
|
-
metadata.gz:
|
|
4
|
-
data.tar.gz:
|
|
3
|
+
metadata.gz: cbe0bbf779dbe3d5ea1307c105b44c7f0f7902be26e42904760865db758ff2c3
|
|
4
|
+
data.tar.gz: 27c53fc58d246511a8e7b14b95befd8fdadf568a775e1dcd22243e936f1d64fe
|
|
5
5
|
SHA512:
|
|
6
|
-
metadata.gz:
|
|
7
|
-
data.tar.gz:
|
|
6
|
+
metadata.gz: 271d75482b9ee9f2cf75294fcb7dfc68b13c8805f04efd9ab1e11941e3c1213176558f217b6e9ddb63c18d426a18d5eddf5bd901ccbbbf2360d7924064a54b1d
|
|
7
|
+
data.tar.gz: 458daac4cc8953f35b61c60109d1a0443dda34b2e973f17a519b7925f1c166e68d6f27670d0f8b43493fb0af45194978f2a85b9d497a6a1da615da70cdedee48
|
|
@@ -293,11 +293,15 @@ module Google
|
|
|
293
293
|
# @param options [::Gapic::CallOptions, ::Hash]
|
|
294
294
|
# Overrides the default settings for this call, e.g, timeout, retries, etc. Optional.
|
|
295
295
|
#
|
|
296
|
-
# @overload verify_attestation(challenge: nil, gcp_credentials: nil, tpm_attestation: nil, confidential_space_info: nil, token_options: nil)
|
|
296
|
+
# @overload verify_attestation(td_ccel: nil, sev_snp_attestation: nil, challenge: nil, gcp_credentials: nil, tpm_attestation: nil, confidential_space_info: nil, token_options: nil)
|
|
297
297
|
# Pass arguments to `verify_attestation` via keyword arguments. Note that at
|
|
298
298
|
# least one keyword argument is required. To specify no parameters, or to keep all
|
|
299
299
|
# the default parameter values, pass an empty Hash as a request object (see above).
|
|
300
300
|
#
|
|
301
|
+
# @param td_ccel [::Google::Cloud::ConfidentialComputing::V1::TdxCcelAttestation, ::Hash]
|
|
302
|
+
# Optional. A TDX with CCEL and RTMR Attestation Quote.
|
|
303
|
+
# @param sev_snp_attestation [::Google::Cloud::ConfidentialComputing::V1::SevSnpAttestation, ::Hash]
|
|
304
|
+
# Optional. An SEV-SNP Attestation Report.
|
|
301
305
|
# @param challenge [::String]
|
|
302
306
|
# Required. The name of the Challenge whose nonce was used to generate the
|
|
303
307
|
# attestation, in the format `projects/*/locations/*/challenges/*`. The
|
|
@@ -280,11 +280,15 @@ module Google
|
|
|
280
280
|
# @param options [::Gapic::CallOptions, ::Hash]
|
|
281
281
|
# Overrides the default settings for this call, e.g, timeout, retries etc. Optional.
|
|
282
282
|
#
|
|
283
|
-
# @overload verify_attestation(challenge: nil, gcp_credentials: nil, tpm_attestation: nil, confidential_space_info: nil, token_options: nil)
|
|
283
|
+
# @overload verify_attestation(td_ccel: nil, sev_snp_attestation: nil, challenge: nil, gcp_credentials: nil, tpm_attestation: nil, confidential_space_info: nil, token_options: nil)
|
|
284
284
|
# Pass arguments to `verify_attestation` via keyword arguments. Note that at
|
|
285
285
|
# least one keyword argument is required. To specify no parameters, or to keep all
|
|
286
286
|
# the default parameter values, pass an empty Hash as a request object (see above).
|
|
287
287
|
#
|
|
288
|
+
# @param td_ccel [::Google::Cloud::ConfidentialComputing::V1::TdxCcelAttestation, ::Hash]
|
|
289
|
+
# Optional. A TDX with CCEL and RTMR Attestation Quote.
|
|
290
|
+
# @param sev_snp_attestation [::Google::Cloud::ConfidentialComputing::V1::SevSnpAttestation, ::Hash]
|
|
291
|
+
# Optional. An SEV-SNP Attestation Report.
|
|
288
292
|
# @param challenge [::String]
|
|
289
293
|
# Required. The name of the Challenge whose nonce was used to generate the
|
|
290
294
|
# attestation, in the format `projects/*/locations/*/challenges/*`. The
|
|
@@ -12,7 +12,7 @@ require 'google/protobuf/timestamp_pb'
|
|
|
12
12
|
require 'google/rpc/status_pb'
|
|
13
13
|
|
|
14
14
|
|
|
15
|
-
descriptor_data = "\n3google/cloud/confidentialcomputing/v1/service.proto\x12%google.cloud.confidentialcomputing.v1\x1a\x1cgoogle/api/annotations.proto\x1a\x17google/api/client.proto\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\x17google/rpc/status.proto\"\xa5\x02\n\tChallenge\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12\x34\n\x0b\x63reate_time\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x34\n\x0b\x65xpire_time\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x11\n\x04used\x18\x04 \x01(\x08\x42\x03\xe0\x41\x03\x12\x16\n\ttpm_nonce\x18\x06 \x01(\tB\x03\xe0\x41\x03:n\xea\x41k\n.confidentialcomputing.googleapis.com/Challenge\x12\x39projects/{project}/locations/{location}/challenges/{uuid}\"\x9d\x01\n\x16\x43reateChallengeRequest\x12\x39\n\x06parent\x18\x01 \x01(\tB)\xe0\x41\x02\xfa\x41#\n!locations.googleapis.com/Location\x12H\n\tchallenge\x18\x02 \x01(\x0b\x32\x30.google.cloud.confidentialcomputing.v1.ChallengeB\x03\xe0\x41\x02\"\
|
|
15
|
+
descriptor_data = "\n3google/cloud/confidentialcomputing/v1/service.proto\x12%google.cloud.confidentialcomputing.v1\x1a\x1cgoogle/api/annotations.proto\x1a\x17google/api/client.proto\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\x17google/rpc/status.proto\"\xa5\x02\n\tChallenge\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12\x34\n\x0b\x63reate_time\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x34\n\x0b\x65xpire_time\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x11\n\x04used\x18\x04 \x01(\x08\x42\x03\xe0\x41\x03\x12\x16\n\ttpm_nonce\x18\x06 \x01(\tB\x03\xe0\x41\x03:n\xea\x41k\n.confidentialcomputing.googleapis.com/Challenge\x12\x39projects/{project}/locations/{location}/challenges/{uuid}\"\x9d\x01\n\x16\x43reateChallengeRequest\x12\x39\n\x06parent\x18\x01 \x01(\tB)\xe0\x41\x02\xfa\x41#\n!locations.googleapis.com/Location\x12H\n\tchallenge\x18\x02 \x01(\x0b\x32\x30.google.cloud.confidentialcomputing.v1.ChallengeB\x03\xe0\x41\x02\"\x88\x05\n\x18VerifyAttestationRequest\x12Q\n\x07td_ccel\x18\x06 \x01(\x0b\x32\x39.google.cloud.confidentialcomputing.v1.TdxCcelAttestationB\x03\xe0\x41\x01H\x00\x12\\\n\x13sev_snp_attestation\x18\x07 \x01(\x0b\x32\x38.google.cloud.confidentialcomputing.v1.SevSnpAttestationB\x03\xe0\x41\x01H\x00\x12I\n\tchallenge\x18\x01 \x01(\tB6\xe0\x41\x02\xfa\x41\x30\n.confidentialcomputing.googleapis.com/Challenge\x12S\n\x0fgcp_credentials\x18\x02 \x01(\x0b\x32\x35.google.cloud.confidentialcomputing.v1.GcpCredentialsB\x03\xe0\x41\x01\x12S\n\x0ftpm_attestation\x18\x03 \x01(\x0b\x32\x35.google.cloud.confidentialcomputing.v1.TpmAttestationB\x03\xe0\x41\x02\x12\x62\n\x17\x63onfidential_space_info\x18\x04 \x01(\x0b\x32<.google.cloud.confidentialcomputing.v1.ConfidentialSpaceInfoB\x03\xe0\x41\x01\x12O\n\rtoken_options\x18\x05 \x01(\x0b\x32\x33.google.cloud.confidentialcomputing.v1.TokenOptionsB\x03\xe0\x41\x01\x42\x11\n\x0ftee_attestation\"\x83\x01\n\x12TdxCcelAttestation\x12\x1c\n\x0f\x63\x63\x65l_acpi_table\x18\x01 \x01(\x0c\x42\x03\xe0\x41\x01\x12\x16\n\tccel_data\x18\x02 \x01(\x0c\x42\x03\xe0\x41\x01\x12 \n\x13\x63\x61nonical_event_log\x18\x03 \x01(\x0c\x42\x03\xe0\x41\x01\x12\x15\n\x08td_quote\x18\x04 \x01(\x0c\x42\x03\xe0\x41\x01\"?\n\x11SevSnpAttestation\x12\x13\n\x06report\x18\x01 \x01(\x0c\x42\x03\xe0\x41\x01\x12\x15\n\x08\x61ux_blob\x18\x02 \x01(\x0c\x42\x03\xe0\x41\x01\"l\n\x19VerifyAttestationResponse\x12\x1e\n\x11oidc_claims_token\x18\x02 \x01(\tB\x03\xe0\x41\x03\x12/\n\x0epartial_errors\x18\x03 \x03(\x0b\x32\x12.google.rpc.StatusB\x03\xe0\x41\x03\"3\n\x0eGcpCredentials\x12!\n\x19service_account_id_tokens\x18\x02 \x03(\t\"\x84\x01\n\x0cTokenOptions\x12\x15\n\x08\x61udience\x18\x01 \x01(\tB\x03\xe0\x41\x01\x12\x12\n\x05nonce\x18\x02 \x03(\tB\x03\xe0\x41\x01\x12I\n\ntoken_type\x18\x03 \x01(\x0e\x32\x30.google.cloud.confidentialcomputing.v1.TokenTypeB\x03\xe0\x41\x01\"\x8f\x03\n\x0eTpmAttestation\x12K\n\x06quotes\x18\x01 \x03(\x0b\x32;.google.cloud.confidentialcomputing.v1.TpmAttestation.Quote\x12\x15\n\rtcg_event_log\x18\x02 \x01(\x0c\x12\x1b\n\x13\x63\x61nonical_event_log\x18\x03 \x01(\x0c\x12\x0f\n\x07\x61k_cert\x18\x04 \x01(\x0c\x12\x12\n\ncert_chain\x18\x05 \x03(\x0c\x1a\xd6\x01\n\x05Quote\x12\x11\n\thash_algo\x18\x01 \x01(\x05\x12^\n\npcr_values\x18\x02 \x03(\x0b\x32J.google.cloud.confidentialcomputing.v1.TpmAttestation.Quote.PcrValuesEntry\x12\x11\n\traw_quote\x18\x03 \x01(\x0c\x12\x15\n\rraw_signature\x18\x04 \x01(\x0c\x1a\x30\n\x0ePcrValuesEntry\x12\x0b\n\x03key\x18\x01 \x01(\x05\x12\r\n\x05value\x18\x02 \x01(\x0c:\x02\x38\x01\"j\n\x15\x43onfidentialSpaceInfo\x12Q\n\x0fsigned_entities\x18\x01 \x03(\x0b\x32\x33.google.cloud.confidentialcomputing.v1.SignedEntityB\x03\xe0\x41\x01\"w\n\x0cSignedEntity\x12g\n\x1a\x63ontainer_image_signatures\x18\x01 \x03(\x0b\x32>.google.cloud.confidentialcomputing.v1.ContainerImageSignatureB\x03\xe0\x41\x01\"\xaf\x01\n\x17\x43ontainerImageSignature\x12\x14\n\x07payload\x18\x01 \x01(\x0c\x42\x03\xe0\x41\x01\x12\x16\n\tsignature\x18\x02 \x01(\x0c\x42\x03\xe0\x41\x01\x12\x17\n\npublic_key\x18\x03 \x01(\x0c\x42\x03\xe0\x41\x01\x12M\n\x07sig_alg\x18\x04 \x01(\x0e\x32\x37.google.cloud.confidentialcomputing.v1.SigningAlgorithmB\x03\xe0\x41\x01*\x7f\n\x10SigningAlgorithm\x12!\n\x1dSIGNING_ALGORITHM_UNSPECIFIED\x10\x00\x12\x15\n\x11RSASSA_PSS_SHA256\x10\x01\x12\x1a\n\x16RSASSA_PKCS1V15_SHA256\x10\x02\x12\x15\n\x11\x45\x43\x44SA_P256_SHA256\x10\x03*l\n\tTokenType\x12\x1a\n\x16TOKEN_TYPE_UNSPECIFIED\x10\x00\x12\x13\n\x0fTOKEN_TYPE_OIDC\x10\x01\x12\x12\n\x0eTOKEN_TYPE_PKI\x10\x02\x12\x1a\n\x16TOKEN_TYPE_LIMITED_AWS\x10\x03\x32\xb7\x04\n\x15\x43onfidentialComputing\x12\xd8\x01\n\x0f\x43reateChallenge\x12=.google.cloud.confidentialcomputing.v1.CreateChallengeRequest\x1a\x30.google.cloud.confidentialcomputing.v1.Challenge\"T\xda\x41\x10parent,challenge\x82\xd3\xe4\x93\x02;\"./v1/{parent=projects/*/locations/*}/challenges:\tchallenge\x12\xe8\x01\n\x11VerifyAttestation\x12?.google.cloud.confidentialcomputing.v1.VerifyAttestationRequest\x1a@.google.cloud.confidentialcomputing.v1.VerifyAttestationResponse\"P\x82\xd3\xe4\x93\x02J\"E/v1/{challenge=projects/*/locations/*/challenges/*}:verifyAttestation:\x01*\x1aX\xca\x41$confidentialcomputing.googleapis.com\xd2\x41.https://www.googleapis.com/auth/cloud-platformB\x97\x02\n)com.google.cloud.confidentialcomputing.v1B\x0cServiceProtoP\x01Z_cloud.google.com/go/confidentialcomputing/apiv1/confidentialcomputingpb;confidentialcomputingpb\xaa\x02%Google.Cloud.ConfidentialComputing.V1\xca\x02%Google\\Cloud\\ConfidentialComputing\\V1\xea\x02(Google::Cloud::ConfidentialComputing::V1b\x06proto3"
|
|
16
16
|
|
|
17
17
|
pool = Google::Protobuf::DescriptorPool.generated_pool
|
|
18
18
|
|
|
@@ -47,6 +47,8 @@ module Google
|
|
|
47
47
|
Challenge = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.confidentialcomputing.v1.Challenge").msgclass
|
|
48
48
|
CreateChallengeRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.confidentialcomputing.v1.CreateChallengeRequest").msgclass
|
|
49
49
|
VerifyAttestationRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.confidentialcomputing.v1.VerifyAttestationRequest").msgclass
|
|
50
|
+
TdxCcelAttestation = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.confidentialcomputing.v1.TdxCcelAttestation").msgclass
|
|
51
|
+
SevSnpAttestation = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.confidentialcomputing.v1.SevSnpAttestation").msgclass
|
|
50
52
|
VerifyAttestationResponse = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.confidentialcomputing.v1.VerifyAttestationResponse").msgclass
|
|
51
53
|
GcpCredentials = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.confidentialcomputing.v1.GcpCredentials").msgclass
|
|
52
54
|
TokenOptions = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("google.cloud.confidentialcomputing.v1.TokenOptions").msgclass
|
|
@@ -290,6 +290,13 @@ module Google
|
|
|
290
290
|
# @return [::String]
|
|
291
291
|
# The fully qualified name of the method, for which the options below apply.
|
|
292
292
|
# This is used to find the method to apply the options.
|
|
293
|
+
#
|
|
294
|
+
# Example:
|
|
295
|
+
#
|
|
296
|
+
# publishing:
|
|
297
|
+
# method_settings:
|
|
298
|
+
# - selector: google.storage.control.v2.StorageControl.CreateFolder
|
|
299
|
+
# # method settings for CreateFolder...
|
|
293
300
|
# @!attribute [rw] long_running
|
|
294
301
|
# @return [::Google::Api::MethodSettings::LongRunning]
|
|
295
302
|
# Describes settings to use for long-running operations when generating
|
|
@@ -298,17 +305,14 @@ module Google
|
|
|
298
305
|
#
|
|
299
306
|
# Example of a YAML configuration::
|
|
300
307
|
#
|
|
301
|
-
#
|
|
302
|
-
#
|
|
308
|
+
# publishing:
|
|
309
|
+
# method_settings:
|
|
303
310
|
# - selector: google.cloud.speech.v2.Speech.BatchRecognize
|
|
304
311
|
# long_running:
|
|
305
|
-
# initial_poll_delay:
|
|
306
|
-
# seconds: 60 # 1 minute
|
|
312
|
+
# initial_poll_delay: 60s # 1 minute
|
|
307
313
|
# poll_delay_multiplier: 1.5
|
|
308
|
-
# max_poll_delay:
|
|
309
|
-
#
|
|
310
|
-
# total_poll_timeout:
|
|
311
|
-
# seconds: 54000 # 90 minutes
|
|
314
|
+
# max_poll_delay: 360s # 6 minutes
|
|
315
|
+
# total_poll_timeout: 54000s # 90 minutes
|
|
312
316
|
# @!attribute [rw] auto_populated_fields
|
|
313
317
|
# @return [::Array<::String>]
|
|
314
318
|
# List of top-level fields of the request message, that should be
|
|
@@ -317,8 +321,8 @@ module Google
|
|
|
317
321
|
#
|
|
318
322
|
# Example of a YAML configuration:
|
|
319
323
|
#
|
|
320
|
-
#
|
|
321
|
-
#
|
|
324
|
+
# publishing:
|
|
325
|
+
# method_settings:
|
|
322
326
|
# - selector: google.example.v1.ExampleService.CreateExample
|
|
323
327
|
# auto_populated_fields:
|
|
324
328
|
# - request_id
|
|
@@ -124,8 +124,13 @@ module Google
|
|
|
124
124
|
# @return [::String]
|
|
125
125
|
# The plural name used in the resource name and permission names, such as
|
|
126
126
|
# 'projects' for the resource name of 'projects/\\{project}' and the permission
|
|
127
|
-
# name of 'cloudresourcemanager.googleapis.com/projects.get'.
|
|
128
|
-
#
|
|
127
|
+
# name of 'cloudresourcemanager.googleapis.com/projects.get'. One exception
|
|
128
|
+
# to this is for Nested Collections that have stuttering names, as defined
|
|
129
|
+
# in [AIP-122](https://google.aip.dev/122#nested-collections), where the
|
|
130
|
+
# collection ID in the resource name pattern does not necessarily directly
|
|
131
|
+
# match the `plural` value.
|
|
132
|
+
#
|
|
133
|
+
# It is the same concept of the `plural` field in k8s CRD spec
|
|
129
134
|
# https://kubernetes.io/docs/tasks/access-kubernetes-api/custom-resources/custom-resource-definitions/
|
|
130
135
|
#
|
|
131
136
|
# Note: The plural form is required even for singleton resources. See
|
|
@@ -60,6 +60,12 @@ module Google
|
|
|
60
60
|
|
|
61
61
|
# A request for an OIDC token, providing all the necessary information needed
|
|
62
62
|
# for this service to verify the plaform state of the requestor.
|
|
63
|
+
# @!attribute [rw] td_ccel
|
|
64
|
+
# @return [::Google::Cloud::ConfidentialComputing::V1::TdxCcelAttestation]
|
|
65
|
+
# Optional. A TDX with CCEL and RTMR Attestation Quote.
|
|
66
|
+
# @!attribute [rw] sev_snp_attestation
|
|
67
|
+
# @return [::Google::Cloud::ConfidentialComputing::V1::SevSnpAttestation]
|
|
68
|
+
# Optional. An SEV-SNP Attestation Report.
|
|
63
69
|
# @!attribute [rw] challenge
|
|
64
70
|
# @return [::String]
|
|
65
71
|
# Required. The name of the Challenge whose nonce was used to generate the
|
|
@@ -85,6 +91,47 @@ module Google
|
|
|
85
91
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|
|
86
92
|
end
|
|
87
93
|
|
|
94
|
+
# A TDX Attestation quote.
|
|
95
|
+
# @!attribute [rw] ccel_acpi_table
|
|
96
|
+
# @return [::String]
|
|
97
|
+
# Optional. The Confidential Computing Event Log (CCEL) ACPI table. Formatted
|
|
98
|
+
# as described in the ACPI Specification 6.5.
|
|
99
|
+
# @!attribute [rw] ccel_data
|
|
100
|
+
# @return [::String]
|
|
101
|
+
# Optional. The CCEL event log. Formatted as described in the UEFI 2.10.
|
|
102
|
+
# @!attribute [rw] canonical_event_log
|
|
103
|
+
# @return [::String]
|
|
104
|
+
# Optional. An Event Log containing additional events measured into the RTMR
|
|
105
|
+
# that are not already present in the CCEL.
|
|
106
|
+
# @!attribute [rw] td_quote
|
|
107
|
+
# @return [::String]
|
|
108
|
+
# Optional. The TDX attestation quote from the guest. It contains the RTMR
|
|
109
|
+
# values.
|
|
110
|
+
class TdxCcelAttestation
|
|
111
|
+
include ::Google::Protobuf::MessageExts
|
|
112
|
+
extend ::Google::Protobuf::MessageExts::ClassMethods
|
|
113
|
+
end
|
|
114
|
+
|
|
115
|
+
# An SEV-SNP Attestation Report.
|
|
116
|
+
# Contains the attestation report and the certificate bundle that the client
|
|
117
|
+
# collects.
|
|
118
|
+
# @!attribute [rw] report
|
|
119
|
+
# @return [::String]
|
|
120
|
+
# Optional. The SEV-SNP Attestation Report
|
|
121
|
+
# Format is in revision 1.55, §7.3 Attestation, Table 22. ATTESTATION_REPORT
|
|
122
|
+
# Structure in this document:
|
|
123
|
+
# https://www.amd.com/content/dam/amd/en/documents/epyc-technical-docs/specifications/56860.pdf
|
|
124
|
+
# @!attribute [rw] aux_blob
|
|
125
|
+
# @return [::String]
|
|
126
|
+
# Optional. Certificate bundle defined in the GHCB protocol definition
|
|
127
|
+
# Format is documented in GHCB revision 2.03, section 4.1.8.1 struct
|
|
128
|
+
# cert_table in this document:
|
|
129
|
+
# https://www.amd.com/content/dam/amd/en/documents/epyc-technical-docs/specifications/56421.pdf
|
|
130
|
+
class SevSnpAttestation
|
|
131
|
+
include ::Google::Protobuf::MessageExts
|
|
132
|
+
extend ::Google::Protobuf::MessageExts::ClassMethods
|
|
133
|
+
end
|
|
134
|
+
|
|
88
135
|
# A response once an attestation has been successfully verified, containing a
|
|
89
136
|
# signed OIDC token.
|
|
90
137
|
# @!attribute [r] oidc_claims_token
|
metadata
CHANGED
|
@@ -1,14 +1,14 @@
|
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
|
2
2
|
name: google-cloud-confidential_computing-v1
|
|
3
3
|
version: !ruby/object:Gem::Version
|
|
4
|
-
version: 1.
|
|
4
|
+
version: 1.1.0
|
|
5
5
|
platform: ruby
|
|
6
6
|
authors:
|
|
7
7
|
- Google LLC
|
|
8
8
|
autorequire:
|
|
9
9
|
bindir: bin
|
|
10
10
|
cert_chain: []
|
|
11
|
-
date: 2024-07-
|
|
11
|
+
date: 2024-07-22 00:00:00.000000000 Z
|
|
12
12
|
dependencies:
|
|
13
13
|
- !ruby/object:Gem::Dependency
|
|
14
14
|
name: gapic-common
|