google-cloud-confidential_computing-v1 1.3.0 → 1.5.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/README.md +1 -1
- data/lib/google/cloud/confidential_computing/v1/confidential_computing/client.rb +15 -1
- data/lib/google/cloud/confidential_computing/v1/confidential_computing/rest/client.rb +15 -1
- data/lib/google/cloud/confidential_computing/v1/version.rb +1 -1
- data/lib/google/cloud/confidentialcomputing/v1/service_pb.rb +1 -1
- data/proto_docs/google/api/client.rb +14 -0
- data/proto_docs/google/cloud/confidentialcomputing/v1/service.rb +9 -1
- metadata +6 -9
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 78781d4e0181191d30a932f9a02c41a2a959ea127814f55e68cf6665a6a358f9
|
4
|
+
data.tar.gz: fe6b3b0150c507fd5b29d5ddffbbf9d26e89de4b397b0e3e6fdb5e4fa102ce9a
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: d700026e8627bb2f472e9e0d0ae9f78659e8ce7a178f810c739467c5c1ee9af26d8337aaabc8ea18b2e630d18f83e9ef3548f454222063d9b07fce5bdf131d5e
|
7
|
+
data.tar.gz: 20ab25f291b104dc17846fcb8947623745c7418492977bb7847d2e7f39b5481b8ad44b0f2ee0f4600905329897cc0fa9b2c53ca40d3e3f75f6bb01c6e6c41fd6
|
data/README.md
CHANGED
@@ -85,7 +85,7 @@ To browse ready to use code samples check [Google Cloud Samples](https://cloud.g
|
|
85
85
|
|
86
86
|
## Supported Ruby Versions
|
87
87
|
|
88
|
-
This library is supported on Ruby
|
88
|
+
This library is supported on Ruby 3.0+.
|
89
89
|
|
90
90
|
Google provides official support for Ruby versions that are actively supported
|
91
91
|
by Ruby Core—that is, Ruby versions that are either in normal maintenance or
|
@@ -313,15 +313,19 @@ module Google
|
|
313
313
|
# @param options [::Gapic::CallOptions, ::Hash]
|
314
314
|
# Overrides the default settings for this call, e.g, timeout, retries, etc. Optional.
|
315
315
|
#
|
316
|
-
# @overload verify_attestation(td_ccel: nil, sev_snp_attestation: nil, challenge: nil, gcp_credentials: nil, tpm_attestation: nil, confidential_space_info: nil, token_options: nil)
|
316
|
+
# @overload verify_attestation(td_ccel: nil, sev_snp_attestation: nil, challenge: nil, gcp_credentials: nil, tpm_attestation: nil, confidential_space_info: nil, token_options: nil, attester: nil)
|
317
317
|
# Pass arguments to `verify_attestation` via keyword arguments. Note that at
|
318
318
|
# least one keyword argument is required. To specify no parameters, or to keep all
|
319
319
|
# the default parameter values, pass an empty Hash as a request object (see above).
|
320
320
|
#
|
321
321
|
# @param td_ccel [::Google::Cloud::ConfidentialComputing::V1::TdxCcelAttestation, ::Hash]
|
322
322
|
# Optional. A TDX with CCEL and RTMR Attestation Quote.
|
323
|
+
#
|
324
|
+
# Note: The following fields are mutually exclusive: `td_ccel`, `sev_snp_attestation`. If a field in that set is populated, all other fields in the set will automatically be cleared.
|
323
325
|
# @param sev_snp_attestation [::Google::Cloud::ConfidentialComputing::V1::SevSnpAttestation, ::Hash]
|
324
326
|
# Optional. An SEV-SNP Attestation Report.
|
327
|
+
#
|
328
|
+
# Note: The following fields are mutually exclusive: `sev_snp_attestation`, `td_ccel`. If a field in that set is populated, all other fields in the set will automatically be cleared.
|
325
329
|
# @param challenge [::String]
|
326
330
|
# Required. The name of the Challenge whose nonce was used to generate the
|
327
331
|
# attestation, in the format `projects/*/locations/*/challenges/*`. The
|
@@ -337,6 +341,9 @@ module Google
|
|
337
341
|
# @param token_options [::Google::Cloud::ConfidentialComputing::V1::TokenOptions, ::Hash]
|
338
342
|
# Optional. A collection of optional, workload-specified claims that modify
|
339
343
|
# the token output.
|
344
|
+
# @param attester [::String]
|
345
|
+
# Optional. An optional indicator of the attester, only applies to certain
|
346
|
+
# products.
|
340
347
|
#
|
341
348
|
# @yield [response, operation] Access the result along with the RPC operation
|
342
349
|
# @yieldparam response [::Google::Cloud::ConfidentialComputing::V1::VerifyAttestationResponse]
|
@@ -446,6 +453,13 @@ module Google
|
|
446
453
|
# * (`GRPC::Core::Channel`) a gRPC channel with included credentials
|
447
454
|
# * (`GRPC::Core::ChannelCredentials`) a gRPC credentails object
|
448
455
|
# * (`nil`) indicating no credentials
|
456
|
+
#
|
457
|
+
# Warning: If you accept a credential configuration (JSON file or Hash) from an
|
458
|
+
# external source for authentication to Google Cloud, you must validate it before
|
459
|
+
# providing it to a Google API client library. Providing an unvalidated credential
|
460
|
+
# configuration to Google APIs can compromise the security of your systems and data.
|
461
|
+
# For more information, refer to [Validate credential configurations from external
|
462
|
+
# sources](https://cloud.google.com/docs/authentication/external/externally-sourced-credentials).
|
449
463
|
# @return [::Object]
|
450
464
|
# @!attribute [rw] scope
|
451
465
|
# The OAuth scopes
|
@@ -300,15 +300,19 @@ module Google
|
|
300
300
|
# @param options [::Gapic::CallOptions, ::Hash]
|
301
301
|
# Overrides the default settings for this call, e.g, timeout, retries etc. Optional.
|
302
302
|
#
|
303
|
-
# @overload verify_attestation(td_ccel: nil, sev_snp_attestation: nil, challenge: nil, gcp_credentials: nil, tpm_attestation: nil, confidential_space_info: nil, token_options: nil)
|
303
|
+
# @overload verify_attestation(td_ccel: nil, sev_snp_attestation: nil, challenge: nil, gcp_credentials: nil, tpm_attestation: nil, confidential_space_info: nil, token_options: nil, attester: nil)
|
304
304
|
# Pass arguments to `verify_attestation` via keyword arguments. Note that at
|
305
305
|
# least one keyword argument is required. To specify no parameters, or to keep all
|
306
306
|
# the default parameter values, pass an empty Hash as a request object (see above).
|
307
307
|
#
|
308
308
|
# @param td_ccel [::Google::Cloud::ConfidentialComputing::V1::TdxCcelAttestation, ::Hash]
|
309
309
|
# Optional. A TDX with CCEL and RTMR Attestation Quote.
|
310
|
+
#
|
311
|
+
# Note: The following fields are mutually exclusive: `td_ccel`, `sev_snp_attestation`. If a field in that set is populated, all other fields in the set will automatically be cleared.
|
310
312
|
# @param sev_snp_attestation [::Google::Cloud::ConfidentialComputing::V1::SevSnpAttestation, ::Hash]
|
311
313
|
# Optional. An SEV-SNP Attestation Report.
|
314
|
+
#
|
315
|
+
# Note: The following fields are mutually exclusive: `sev_snp_attestation`, `td_ccel`. If a field in that set is populated, all other fields in the set will automatically be cleared.
|
312
316
|
# @param challenge [::String]
|
313
317
|
# Required. The name of the Challenge whose nonce was used to generate the
|
314
318
|
# attestation, in the format `projects/*/locations/*/challenges/*`. The
|
@@ -324,6 +328,9 @@ module Google
|
|
324
328
|
# @param token_options [::Google::Cloud::ConfidentialComputing::V1::TokenOptions, ::Hash]
|
325
329
|
# Optional. A collection of optional, workload-specified claims that modify
|
326
330
|
# the token output.
|
331
|
+
# @param attester [::String]
|
332
|
+
# Optional. An optional indicator of the attester, only applies to certain
|
333
|
+
# products.
|
327
334
|
# @yield [result, operation] Access the result along with the TransportOperation object
|
328
335
|
# @yieldparam result [::Google::Cloud::ConfidentialComputing::V1::VerifyAttestationResponse]
|
329
336
|
# @yieldparam operation [::Gapic::Rest::TransportOperation]
|
@@ -424,6 +431,13 @@ module Google
|
|
424
431
|
# * (`Signet::OAuth2::Client`) A signet oauth2 client object
|
425
432
|
# (see the [signet docs](https://rubydoc.info/gems/signet/Signet/OAuth2/Client))
|
426
433
|
# * (`nil`) indicating no credentials
|
434
|
+
#
|
435
|
+
# Warning: If you accept a credential configuration (JSON file or Hash) from an
|
436
|
+
# external source for authentication to Google Cloud, you must validate it before
|
437
|
+
# providing it to a Google API client library. Providing an unvalidated credential
|
438
|
+
# configuration to Google APIs can compromise the security of your systems and data.
|
439
|
+
# For more information, refer to [Validate credential configurations from external
|
440
|
+
# sources](https://cloud.google.com/docs/authentication/external/externally-sourced-credentials).
|
427
441
|
# @return [::Object]
|
428
442
|
# @!attribute [rw] scope
|
429
443
|
# The OAuth scopes
|
@@ -12,7 +12,7 @@ require 'google/protobuf/timestamp_pb'
|
|
12
12
|
require 'google/rpc/status_pb'
|
13
13
|
|
14
14
|
|
15
|
-
descriptor_data = "\n3google/cloud/confidentialcomputing/v1/service.proto\x12%google.cloud.confidentialcomputing.v1\x1a\x1cgoogle/api/annotations.proto\x1a\x17google/api/client.proto\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\x17google/rpc/status.proto\"\xa5\x02\n\tChallenge\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12\x34\n\x0b\x63reate_time\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x34\n\x0b\x65xpire_time\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x11\n\x04used\x18\x04 \x01(\x08\x42\x03\xe0\x41\x03\x12\x16\n\ttpm_nonce\x18\x06 \x01(\tB\x03\xe0\x41\x03:n\xea\x41k\n.confidentialcomputing.googleapis.com/Challenge\x12\x39projects/{project}/locations/{location}/challenges/{uuid}\"\x9d\x01\n\x16\x43reateChallengeRequest\x12\x39\n\x06parent\x18\x01 \x01(\tB)\xe0\x41\x02\xfa\x41#\n!locations.googleapis.com/Location\x12H\n\tchallenge\x18\x02 \x01(\x0b\x32\x30.google.cloud.confidentialcomputing.v1.ChallengeB\x03\xe0\x41\x02\"\
|
15
|
+
descriptor_data = "\n3google/cloud/confidentialcomputing/v1/service.proto\x12%google.cloud.confidentialcomputing.v1\x1a\x1cgoogle/api/annotations.proto\x1a\x17google/api/client.proto\x1a\x1fgoogle/api/field_behavior.proto\x1a\x19google/api/resource.proto\x1a\x1fgoogle/protobuf/timestamp.proto\x1a\x17google/rpc/status.proto\"\xa5\x02\n\tChallenge\x12\x11\n\x04name\x18\x01 \x01(\tB\x03\xe0\x41\x03\x12\x34\n\x0b\x63reate_time\x18\x02 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x34\n\x0b\x65xpire_time\x18\x03 \x01(\x0b\x32\x1a.google.protobuf.TimestampB\x03\xe0\x41\x03\x12\x11\n\x04used\x18\x04 \x01(\x08\x42\x03\xe0\x41\x03\x12\x16\n\ttpm_nonce\x18\x06 \x01(\tB\x03\xe0\x41\x03:n\xea\x41k\n.confidentialcomputing.googleapis.com/Challenge\x12\x39projects/{project}/locations/{location}/challenges/{uuid}\"\x9d\x01\n\x16\x43reateChallengeRequest\x12\x39\n\x06parent\x18\x01 \x01(\tB)\xe0\x41\x02\xfa\x41#\n!locations.googleapis.com/Location\x12H\n\tchallenge\x18\x02 \x01(\x0b\x32\x30.google.cloud.confidentialcomputing.v1.ChallengeB\x03\xe0\x41\x02\"\x9f\x05\n\x18VerifyAttestationRequest\x12Q\n\x07td_ccel\x18\x06 \x01(\x0b\x32\x39.google.cloud.confidentialcomputing.v1.TdxCcelAttestationB\x03\xe0\x41\x01H\x00\x12\\\n\x13sev_snp_attestation\x18\x07 \x01(\x0b\x32\x38.google.cloud.confidentialcomputing.v1.SevSnpAttestationB\x03\xe0\x41\x01H\x00\x12I\n\tchallenge\x18\x01 \x01(\tB6\xe0\x41\x02\xfa\x41\x30\n.confidentialcomputing.googleapis.com/Challenge\x12S\n\x0fgcp_credentials\x18\x02 \x01(\x0b\x32\x35.google.cloud.confidentialcomputing.v1.GcpCredentialsB\x03\xe0\x41\x01\x12S\n\x0ftpm_attestation\x18\x03 \x01(\x0b\x32\x35.google.cloud.confidentialcomputing.v1.TpmAttestationB\x03\xe0\x41\x02\x12\x62\n\x17\x63onfidential_space_info\x18\x04 \x01(\x0b\x32<.google.cloud.confidentialcomputing.v1.ConfidentialSpaceInfoB\x03\xe0\x41\x01\x12O\n\rtoken_options\x18\x05 \x01(\x0b\x32\x33.google.cloud.confidentialcomputing.v1.TokenOptionsB\x03\xe0\x41\x01\x12\x15\n\x08\x61ttester\x18\x08 \x01(\tB\x03\xe0\x41\x01\x42\x11\n\x0ftee_attestation\"\x83\x01\n\x12TdxCcelAttestation\x12\x1c\n\x0f\x63\x63\x65l_acpi_table\x18\x01 \x01(\x0c\x42\x03\xe0\x41\x01\x12\x16\n\tccel_data\x18\x02 \x01(\x0c\x42\x03\xe0\x41\x01\x12 \n\x13\x63\x61nonical_event_log\x18\x03 \x01(\x0c\x42\x03\xe0\x41\x01\x12\x15\n\x08td_quote\x18\x04 \x01(\x0c\x42\x03\xe0\x41\x01\"?\n\x11SevSnpAttestation\x12\x13\n\x06report\x18\x01 \x01(\x0c\x42\x03\xe0\x41\x01\x12\x15\n\x08\x61ux_blob\x18\x02 \x01(\x0c\x42\x03\xe0\x41\x01\"l\n\x19VerifyAttestationResponse\x12\x1e\n\x11oidc_claims_token\x18\x02 \x01(\tB\x03\xe0\x41\x03\x12/\n\x0epartial_errors\x18\x03 \x03(\x0b\x32\x12.google.rpc.StatusB\x03\xe0\x41\x03\"3\n\x0eGcpCredentials\x12!\n\x19service_account_id_tokens\x18\x02 \x03(\t\"\xa6\x05\n\x0cTokenOptions\x12v\n\x1a\x61ws_principal_tags_options\x18\x04 \x01(\x0b\x32K.google.cloud.confidentialcomputing.v1.TokenOptions.AwsPrincipalTagsOptionsB\x03\xe0\x41\x01H\x00\x12\x15\n\x08\x61udience\x18\x01 \x01(\tB\x03\xe0\x41\x01\x12\x12\n\x05nonce\x18\x02 \x03(\tB\x03\xe0\x41\x01\x12I\n\ntoken_type\x18\x03 \x01(\x0e\x32\x30.google.cloud.confidentialcomputing.v1.TokenTypeB\x03\xe0\x41\x01\x1a\x91\x03\n\x17\x41wsPrincipalTagsOptions\x12\x85\x01\n\x16\x61llowed_principal_tags\x18\x01 \x01(\x0b\x32`.google.cloud.confidentialcomputing.v1.TokenOptions.AwsPrincipalTagsOptions.AllowedPrincipalTagsB\x03\xe0\x41\x01\x1a\xed\x01\n\x14\x41llowedPrincipalTags\x12\xa2\x01\n\x1a\x63ontainer_image_signatures\x18\x01 \x01(\x0b\x32y.google.cloud.confidentialcomputing.v1.TokenOptions.AwsPrincipalTagsOptions.AllowedPrincipalTags.ContainerImageSignaturesB\x03\xe0\x41\x01\x1a\x30\n\x18\x43ontainerImageSignatures\x12\x14\n\x07key_ids\x18\x01 \x03(\tB\x03\xe0\x41\x01\x42\x14\n\x12token_type_options\"\x8f\x03\n\x0eTpmAttestation\x12K\n\x06quotes\x18\x01 \x03(\x0b\x32;.google.cloud.confidentialcomputing.v1.TpmAttestation.Quote\x12\x15\n\rtcg_event_log\x18\x02 \x01(\x0c\x12\x1b\n\x13\x63\x61nonical_event_log\x18\x03 \x01(\x0c\x12\x0f\n\x07\x61k_cert\x18\x04 \x01(\x0c\x12\x12\n\ncert_chain\x18\x05 \x03(\x0c\x1a\xd6\x01\n\x05Quote\x12\x11\n\thash_algo\x18\x01 \x01(\x05\x12^\n\npcr_values\x18\x02 \x03(\x0b\x32J.google.cloud.confidentialcomputing.v1.TpmAttestation.Quote.PcrValuesEntry\x12\x11\n\traw_quote\x18\x03 \x01(\x0c\x12\x15\n\rraw_signature\x18\x04 \x01(\x0c\x1a\x30\n\x0ePcrValuesEntry\x12\x0b\n\x03key\x18\x01 \x01(\x05\x12\r\n\x05value\x18\x02 \x01(\x0c:\x02\x38\x01\"j\n\x15\x43onfidentialSpaceInfo\x12Q\n\x0fsigned_entities\x18\x01 \x03(\x0b\x32\x33.google.cloud.confidentialcomputing.v1.SignedEntityB\x03\xe0\x41\x01\"w\n\x0cSignedEntity\x12g\n\x1a\x63ontainer_image_signatures\x18\x01 \x03(\x0b\x32>.google.cloud.confidentialcomputing.v1.ContainerImageSignatureB\x03\xe0\x41\x01\"\xaf\x01\n\x17\x43ontainerImageSignature\x12\x14\n\x07payload\x18\x01 \x01(\x0c\x42\x03\xe0\x41\x01\x12\x16\n\tsignature\x18\x02 \x01(\x0c\x42\x03\xe0\x41\x01\x12\x17\n\npublic_key\x18\x03 \x01(\x0c\x42\x03\xe0\x41\x01\x12M\n\x07sig_alg\x18\x04 \x01(\x0e\x32\x37.google.cloud.confidentialcomputing.v1.SigningAlgorithmB\x03\xe0\x41\x01*\x7f\n\x10SigningAlgorithm\x12!\n\x1dSIGNING_ALGORITHM_UNSPECIFIED\x10\x00\x12\x15\n\x11RSASSA_PSS_SHA256\x10\x01\x12\x1a\n\x16RSASSA_PKCS1V15_SHA256\x10\x02\x12\x15\n\x11\x45\x43\x44SA_P256_SHA256\x10\x03*\x8e\x01\n\tTokenType\x12\x1a\n\x16TOKEN_TYPE_UNSPECIFIED\x10\x00\x12\x13\n\x0fTOKEN_TYPE_OIDC\x10\x01\x12\x12\n\x0eTOKEN_TYPE_PKI\x10\x02\x12\x1a\n\x16TOKEN_TYPE_LIMITED_AWS\x10\x03\x12 \n\x1cTOKEN_TYPE_AWS_PRINCIPALTAGS\x10\x04\x32\xb7\x04\n\x15\x43onfidentialComputing\x12\xd8\x01\n\x0f\x43reateChallenge\x12=.google.cloud.confidentialcomputing.v1.CreateChallengeRequest\x1a\x30.google.cloud.confidentialcomputing.v1.Challenge\"T\xda\x41\x10parent,challenge\x82\xd3\xe4\x93\x02;\"./v1/{parent=projects/*/locations/*}/challenges:\tchallenge\x12\xe8\x01\n\x11VerifyAttestation\x12?.google.cloud.confidentialcomputing.v1.VerifyAttestationRequest\x1a@.google.cloud.confidentialcomputing.v1.VerifyAttestationResponse\"P\x82\xd3\xe4\x93\x02J\"E/v1/{challenge=projects/*/locations/*/challenges/*}:verifyAttestation:\x01*\x1aX\xca\x41$confidentialcomputing.googleapis.com\xd2\x41.https://www.googleapis.com/auth/cloud-platformB\x97\x02\n)com.google.cloud.confidentialcomputing.v1B\x0cServiceProtoP\x01Z_cloud.google.com/go/confidentialcomputing/apiv1/confidentialcomputingpb;confidentialcomputingpb\xaa\x02%Google.Cloud.ConfidentialComputing.V1\xca\x02%Google\\Cloud\\ConfidentialComputing\\V1\xea\x02(Google::Cloud::ConfidentialComputing::V1b\x06proto3"
|
16
16
|
|
17
17
|
pool = Google::Protobuf::DescriptorPool.generated_pool
|
18
18
|
|
@@ -221,6 +221,12 @@ module Google
|
|
221
221
|
# Pythonic which are included in `protobuf>=5.29.x`. This feature will be
|
222
222
|
# enabled by default 1 month after launching the feature in preview
|
223
223
|
# packages.
|
224
|
+
# @!attribute [rw] unversioned_package_disabled
|
225
|
+
# @return [::Boolean]
|
226
|
+
# Disables generation of an unversioned Python package for this client
|
227
|
+
# library. This means that the module names will need to be versioned in
|
228
|
+
# import statements. For example `import google.cloud.library_v2` instead
|
229
|
+
# of `import google.cloud.library`.
|
224
230
|
class ExperimentalFeatures
|
225
231
|
include ::Google::Protobuf::MessageExts
|
226
232
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|
@@ -409,6 +415,14 @@ module Google
|
|
409
415
|
# @return [::Array<::String>]
|
410
416
|
# An allowlist of the fully qualified names of RPCs that should be included
|
411
417
|
# on public client surfaces.
|
418
|
+
# @!attribute [rw] generate_omitted_as_internal
|
419
|
+
# @return [::Boolean]
|
420
|
+
# Setting this to true indicates to the client generators that methods
|
421
|
+
# that would be excluded from the generation should instead be generated
|
422
|
+
# in a way that indicates these methods should not be consumed by
|
423
|
+
# end users. How this is expressed is up to individual language
|
424
|
+
# implementations to decide. Some examples may be: added annotations,
|
425
|
+
# obfuscated identifiers, or other language idiomatic patterns.
|
412
426
|
class SelectiveGapicGeneration
|
413
427
|
include ::Google::Protobuf::MessageExts
|
414
428
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|
@@ -59,13 +59,17 @@ module Google
|
|
59
59
|
end
|
60
60
|
|
61
61
|
# A request for an OIDC token, providing all the necessary information needed
|
62
|
-
# for this service to verify the
|
62
|
+
# for this service to verify the platform state of the requestor.
|
63
63
|
# @!attribute [rw] td_ccel
|
64
64
|
# @return [::Google::Cloud::ConfidentialComputing::V1::TdxCcelAttestation]
|
65
65
|
# Optional. A TDX with CCEL and RTMR Attestation Quote.
|
66
|
+
#
|
67
|
+
# Note: The following fields are mutually exclusive: `td_ccel`, `sev_snp_attestation`. If a field in that set is populated, all other fields in the set will automatically be cleared.
|
66
68
|
# @!attribute [rw] sev_snp_attestation
|
67
69
|
# @return [::Google::Cloud::ConfidentialComputing::V1::SevSnpAttestation]
|
68
70
|
# Optional. An SEV-SNP Attestation Report.
|
71
|
+
#
|
72
|
+
# Note: The following fields are mutually exclusive: `sev_snp_attestation`, `td_ccel`. If a field in that set is populated, all other fields in the set will automatically be cleared.
|
69
73
|
# @!attribute [rw] challenge
|
70
74
|
# @return [::String]
|
71
75
|
# Required. The name of the Challenge whose nonce was used to generate the
|
@@ -86,6 +90,10 @@ module Google
|
|
86
90
|
# @return [::Google::Cloud::ConfidentialComputing::V1::TokenOptions]
|
87
91
|
# Optional. A collection of optional, workload-specified claims that modify
|
88
92
|
# the token output.
|
93
|
+
# @!attribute [rw] attester
|
94
|
+
# @return [::String]
|
95
|
+
# Optional. An optional indicator of the attester, only applies to certain
|
96
|
+
# products.
|
89
97
|
class VerifyAttestationRequest
|
90
98
|
include ::Google::Protobuf::MessageExts
|
91
99
|
extend ::Google::Protobuf::MessageExts::ClassMethods
|
metadata
CHANGED
@@ -1,14 +1,13 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: google-cloud-confidential_computing-v1
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.5.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Google LLC
|
8
|
-
autorequire:
|
9
8
|
bindir: bin
|
10
9
|
cert_chain: []
|
11
|
-
date:
|
10
|
+
date: 2025-02-25 00:00:00.000000000 Z
|
12
11
|
dependencies:
|
13
12
|
- !ruby/object:Gem::Dependency
|
14
13
|
name: gapic-common
|
@@ -16,7 +15,7 @@ dependencies:
|
|
16
15
|
requirements:
|
17
16
|
- - ">="
|
18
17
|
- !ruby/object:Gem::Version
|
19
|
-
version: 0.
|
18
|
+
version: 0.25.0
|
20
19
|
- - "<"
|
21
20
|
- !ruby/object:Gem::Version
|
22
21
|
version: 2.a
|
@@ -26,7 +25,7 @@ dependencies:
|
|
26
25
|
requirements:
|
27
26
|
- - ">="
|
28
27
|
- !ruby/object:Gem::Version
|
29
|
-
version: 0.
|
28
|
+
version: 0.25.0
|
30
29
|
- - "<"
|
31
30
|
- !ruby/object:Gem::Version
|
32
31
|
version: 2.a
|
@@ -105,7 +104,6 @@ homepage: https://github.com/googleapis/google-cloud-ruby
|
|
105
104
|
licenses:
|
106
105
|
- Apache-2.0
|
107
106
|
metadata: {}
|
108
|
-
post_install_message:
|
109
107
|
rdoc_options: []
|
110
108
|
require_paths:
|
111
109
|
- lib
|
@@ -113,15 +111,14 @@ required_ruby_version: !ruby/object:Gem::Requirement
|
|
113
111
|
requirements:
|
114
112
|
- - ">="
|
115
113
|
- !ruby/object:Gem::Version
|
116
|
-
version: '
|
114
|
+
version: '3.0'
|
117
115
|
required_rubygems_version: !ruby/object:Gem::Requirement
|
118
116
|
requirements:
|
119
117
|
- - ">="
|
120
118
|
- !ruby/object:Gem::Version
|
121
119
|
version: '0'
|
122
120
|
requirements: []
|
123
|
-
rubygems_version: 3.5
|
124
|
-
signing_key:
|
121
|
+
rubygems_version: 3.6.5
|
125
122
|
specification_version: 4
|
126
123
|
summary: Attestation verifier for Confidential Space.
|
127
124
|
test_files: []
|