google-cloud-confidential_computing-v1 1.6.0 → 1.6.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 5d00cb8396de3c9bdfb7ec061c35950f0f2a789c5dc2fd3627547a681c2d76df
4
- data.tar.gz: 8529a9b97f04c83d2a05d32bc81bb013eb893afc8153a04ef02fa6c1c154ea0c
3
+ metadata.gz: 5c69f3bb1cdca783e42b9248559897fd42cab5bc655fc19d5449543dd61b61ab
4
+ data.tar.gz: aa7f8f5dd2f353ed66898f0962cc675d3824997bbf1e8e9e475ae93ae013c713
5
5
  SHA512:
6
- metadata.gz: 3d662f9bc2c764129fdad6cfa795b03de0ed72eecc9f2ff904f2256598399953b88d7686b4a06087a347c033f3ebab74d01fe8f557ca1007dd6116d2aaa324c9
7
- data.tar.gz: d65e4b3536310bf3e4ad32f0ccb9d26f90de4ea5f47411e60c18474cd6a59f16b972ef13980f7fab3227c9d661c2f3478de88329276138543a58cb9c0edec5c4
6
+ metadata.gz: 497baf54d0cbcbdd08dc4dd26a09baff2867421e0817641f39ec7ae6af8cfae748aef52640f7ce4d64fbb345f274c0185467dcfdde44eceb601e2a933ea83139
7
+ data.tar.gz: dc5d7db2959e03dcacd4ef87669a83e4883fb1e235e1bacb533a5b56698731a791bbf7cfc68d9407e1ccdba190b85c95309f90fc5bf35224cefcc5a55ad863ed
@@ -321,11 +321,11 @@ module Google
321
321
  # @param td_ccel [::Google::Cloud::ConfidentialComputing::V1::TdxCcelAttestation, ::Hash]
322
322
  # Optional. A TDX with CCEL and RTMR Attestation Quote.
323
323
  #
324
- # Note: The following fields are mutually exclusive: `td_ccel`, `sev_snp_attestation`. If a field in that set is populated, all other fields in the set will automatically be cleared.
324
+ # Note: The following parameters are mutually exclusive: `td_ccel`, `sev_snp_attestation`. At most one of these parameters can be set. If more than one is set, only one will be used, and it is not defined which one.
325
325
  # @param sev_snp_attestation [::Google::Cloud::ConfidentialComputing::V1::SevSnpAttestation, ::Hash]
326
326
  # Optional. An SEV-SNP Attestation Report.
327
327
  #
328
- # Note: The following fields are mutually exclusive: `sev_snp_attestation`, `td_ccel`. If a field in that set is populated, all other fields in the set will automatically be cleared.
328
+ # Note: The following parameters are mutually exclusive: `sev_snp_attestation`, `td_ccel`. At most one of these parameters can be set. If more than one is set, only one will be used, and it is not defined which one.
329
329
  # @param challenge [::String]
330
330
  # Required. The name of the Challenge whose nonce was used to generate the
331
331
  # attestation, in the format `projects/*/locations/*/challenges/*`. The
@@ -308,11 +308,11 @@ module Google
308
308
  # @param td_ccel [::Google::Cloud::ConfidentialComputing::V1::TdxCcelAttestation, ::Hash]
309
309
  # Optional. A TDX with CCEL and RTMR Attestation Quote.
310
310
  #
311
- # Note: The following fields are mutually exclusive: `td_ccel`, `sev_snp_attestation`. If a field in that set is populated, all other fields in the set will automatically be cleared.
311
+ # Note: The following parameters are mutually exclusive: `td_ccel`, `sev_snp_attestation`. At most one of these parameters can be set. If more than one is set, only one will be used, and it is not defined which one.
312
312
  # @param sev_snp_attestation [::Google::Cloud::ConfidentialComputing::V1::SevSnpAttestation, ::Hash]
313
313
  # Optional. An SEV-SNP Attestation Report.
314
314
  #
315
- # Note: The following fields are mutually exclusive: `sev_snp_attestation`, `td_ccel`. If a field in that set is populated, all other fields in the set will automatically be cleared.
315
+ # Note: The following parameters are mutually exclusive: `sev_snp_attestation`, `td_ccel`. At most one of these parameters can be set. If more than one is set, only one will be used, and it is not defined which one.
316
316
  # @param challenge [::String]
317
317
  # Required. The name of the Challenge whose nonce was used to generate the
318
318
  # attestation, in the format `projects/*/locations/*/challenges/*`. The
@@ -21,7 +21,7 @@ module Google
21
21
  module Cloud
22
22
  module ConfidentialComputing
23
23
  module V1
24
- VERSION = "1.6.0"
24
+ VERSION = "1.6.1"
25
25
  end
26
26
  end
27
27
  end
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: google-cloud-confidential_computing-v1
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.6.0
4
+ version: 1.6.1
5
5
  platform: ruby
6
6
  authors:
7
7
  - Google LLC
@@ -106,7 +106,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
106
106
  - !ruby/object:Gem::Version
107
107
  version: '0'
108
108
  requirements: []
109
- rubygems_version: 3.6.8
109
+ rubygems_version: 3.6.9
110
110
  specification_version: 4
111
111
  summary: Attestation verifier for Confidential Space.
112
112
  test_files: []