Skip to content

Commit

Permalink
feat: [confidentialcomputing] Add a new field partial_errors to `Ve…
Browse files Browse the repository at this point in the history
…rifyAttestationResponse` proto (#9750)

- [ ] Regenerate this pull request now.

PiperOrigin-RevId: 555313726

Source-Link: https://togithub.com/googleapis/googleapis/commit/3289e4c494eb0eede9635e68bd9cd24bae39016a

Source-Link: https://togithub.com/googleapis/googleapis-gen/commit/6f46f15c4af36eb55fd96093c5fe17def23e21cf
Copy-Tag: eyJwIjoiamF2YS1jb25maWRlbnRpYWxjb21wdXRpbmcvLk93bEJvdC55YW1sIiwiaCI6IjZmNDZmMTVjNGFmMzZlYjU1ZmQ5NjA5M2M1ZmUxN2RlZjIzZTIxY2YifQ==
  • Loading branch information
gcf-owl-bot[bot] committed Aug 30, 2023
1 parent b3fbe12 commit b898dcd
Show file tree
Hide file tree
Showing 8 changed files with 729 additions and 75 deletions.
4 changes: 2 additions & 2 deletions java-confidentialcomputing/README.md
Expand Up @@ -23,7 +23,7 @@ If you are using Maven with [BOM][libraries-bom], add this to your pom.xml file:
<dependency>
<groupId>com.google.cloud</groupId>
<artifactId>libraries-bom</artifactId>
<version>26.21.0</version>
<version>26.22.0</version>
<type>pom</type>
<scope>import</scope>
</dependency>
Expand Down Expand Up @@ -201,7 +201,7 @@ Java is a registered trademark of Oracle and/or its affiliates.
[kokoro-badge-link-5]: http://storage.googleapis.com/cloud-devrel-public/java/badges/java-confidentialcomputing/java11.html
[stability-image]: https://img.shields.io/badge/stability-preview-yellow
[maven-version-image]: https://img.shields.io/maven-central/v/com.google.cloud/google-cloud-confidentialcomputing.svg
[maven-version-link]: https://central.sonatype.com/artifact/com.google.cloud/google-cloud-confidentialcomputing/0.8.0
[maven-version-link]: https://central.sonatype.com/artifact/com.google.cloud/google-cloud-confidentialcomputing/0.9.0
[authentication]: https://github.com/googleapis/google-cloud-java#authentication
[auth-scopes]: https://developers.google.com/identity/protocols/oauth2/scopes
[predefined-iam-roles]: https://cloud.google.com/iam/docs/understanding-roles#predefined_roles
Expand Down
Expand Up @@ -1303,5 +1303,23 @@
"allPublicMethods": true,
"allDeclaredClasses": true,
"allPublicClasses": true
},
{
"name": "com.google.rpc.Status",
"queryAllDeclaredConstructors": true,
"queryAllPublicConstructors": true,
"queryAllDeclaredMethods": true,
"allPublicMethods": true,
"allDeclaredClasses": true,
"allPublicClasses": true
},
{
"name": "com.google.rpc.Status$Builder",
"queryAllDeclaredConstructors": true,
"queryAllPublicConstructors": true,
"queryAllDeclaredMethods": true,
"allPublicMethods": true,
"allDeclaredClasses": true,
"allPublicClasses": true
}
]
Expand Up @@ -35,7 +35,9 @@
import com.google.common.collect.Lists;
import com.google.protobuf.Any;
import com.google.protobuf.Timestamp;
import com.google.rpc.Status;
import java.io.IOException;
import java.util.ArrayList;
import java.util.Arrays;
import java.util.HashMap;
import java.util.List;
Expand Down Expand Up @@ -187,6 +189,7 @@ public void verifyAttestationTest() throws Exception {
VerifyAttestationResponse expectedResponse =
VerifyAttestationResponse.newBuilder()
.setOidcClaimsToken("oidcClaimsToken-566980887")
.addAllPartialErrors(new ArrayList<Status>())
.build();
mockService.addResponse(expectedResponse);

Expand Down
Expand Up @@ -33,8 +33,10 @@
import com.google.protobuf.AbstractMessage;
import com.google.protobuf.Any;
import com.google.protobuf.Timestamp;
import com.google.rpc.Status;
import io.grpc.StatusRuntimeException;
import java.io.IOException;
import java.util.ArrayList;
import java.util.Arrays;
import java.util.HashMap;
import java.util.List;
Expand Down Expand Up @@ -183,6 +185,7 @@ public void verifyAttestationTest() throws Exception {
VerifyAttestationResponse expectedResponse =
VerifyAttestationResponse.newBuilder()
.setOidcClaimsToken("oidcClaimsToken-566980887")
.addAllPartialErrors(new ArrayList<Status>())
.build();
mockConfidentialComputing.addResponse(expectedResponse);

Expand Down
Expand Up @@ -90,79 +90,81 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
+ "to\032\027google/api/client.proto\032\037google/api/"
+ "field_behavior.proto\032\031google/api/resourc"
+ "e.proto\032\037google/protobuf/timestamp.proto"
+ "\"\252\002\n\tChallenge\022\022\n\004name\030\001 \001(\tB\004\342A\001\003\0225\n\013cr"
+ "eate_time\030\002 \001(\0132\032.google.protobuf.Timest"
+ "ampB\004\342A\001\003\0225\n\013expire_time\030\003 \001(\0132\032.google."
+ "protobuf.TimestampB\004\342A\001\003\022\022\n\004used\030\004 \001(\010B\004"
+ "\342A\001\003\022\027\n\ttpm_nonce\030\006 \001(\tB\004\342A\001\003:n\352Ak\n.conf"
+ "identialcomputing.googleapis.com/Challen"
+ "ge\0229projects/{project}/locations/{locati"
+ "on}/challenges/{uuid}\"\237\001\n\026CreateChalleng"
+ "eRequest\022:\n\006parent\030\001 \001(\tB*\342A\001\002\372A#\n!locat"
+ "ions.googleapis.com/Location\022I\n\tchalleng"
+ "e\030\002 \001(\01320.google.cloud.confidentialcompu"
+ "ting.v1.ChallengeB\004\342A\001\002\"\311\003\n\030VerifyAttest"
+ "ationRequest\022J\n\tchallenge\030\001 \001(\tB7\342A\001\002\372A0"
+ "\n.confidentialcomputing.googleapis.com/C"
+ "hallenge\022T\n\017gcp_credentials\030\002 \001(\01325.goog"
+ "le.cloud.confidentialcomputing.v1.GcpCre"
+ "dentialsB\004\342A\001\001\022T\n\017tpm_attestation\030\003 \001(\0132"
+ "5.google.cloud.confidentialcomputing.v1."
+ "TpmAttestationB\004\342A\001\002\022c\n\027confidential_spa"
+ "ce_info\030\004 \001(\0132<.google.cloud.confidentia"
+ "lcomputing.v1.ConfidentialSpaceInfoB\004\342A\001"
+ "\001\022P\n\rtoken_options\030\005 \001(\01323.google.cloud."
+ "confidentialcomputing.v1.TokenOptionsB\004\342"
+ "A\001\001\"<\n\031VerifyAttestationResponse\022\037\n\021oidc"
+ "_claims_token\030\002 \001(\tB\004\342A\001\003\"3\n\016GcpCredenti"
+ "als\022!\n\031service_account_id_tokens\030\002 \003(\t\";"
+ "\n\014TokenOptions\022\026\n\010audience\030\001 \001(\tB\004\342A\001\001\022\023"
+ "\n\005nonce\030\002 \003(\tB\004\342A\001\001\"\217\003\n\016TpmAttestation\022K"
+ "\n\006quotes\030\001 \003(\0132;.google.cloud.confidenti"
+ "alcomputing.v1.TpmAttestation.Quote\022\025\n\rt"
+ "cg_event_log\030\002 \001(\014\022\033\n\023canonical_event_lo"
+ "g\030\003 \001(\014\022\017\n\007ak_cert\030\004 \001(\014\022\022\n\ncert_chain\030\005"
+ " \003(\014\032\326\001\n\005Quote\022\021\n\thash_algo\030\001 \001(\005\022^\n\npcr"
+ "_values\030\002 \003(\0132J.google.cloud.confidentia"
+ "lcomputing.v1.TpmAttestation.Quote.PcrVa"
+ "luesEntry\022\021\n\traw_quote\030\003 \001(\014\022\025\n\rraw_sign"
+ "ature\030\004 \001(\014\0320\n\016PcrValuesEntry\022\013\n\003key\030\001 \001"
+ "(\005\022\r\n\005value\030\002 \001(\014:\0028\001\"k\n\025ConfidentialSpa"
+ "ceInfo\022R\n\017signed_entities\030\001 \003(\01323.google"
+ ".cloud.confidentialcomputing.v1.SignedEn"
+ "tityB\004\342A\001\001\"x\n\014SignedEntity\022h\n\032container_"
+ "image_signatures\030\001 \003(\0132>.google.cloud.co"
+ "nfidentialcomputing.v1.ContainerImageSig"
+ "natureB\004\342A\001\001\"\263\001\n\027ContainerImageSignature"
+ "\022\025\n\007payload\030\001 \001(\014B\004\342A\001\001\022\027\n\tsignature\030\002 \001"
+ "(\014B\004\342A\001\001\022\030\n\npublic_key\030\003 \001(\014B\004\342A\001\001\022N\n\007si"
+ "g_alg\030\004 \001(\01627.google.cloud.confidentialc"
+ "omputing.v1.SigningAlgorithmB\004\342A\001\001*\177\n\020Si"
+ "gningAlgorithm\022!\n\035SIGNING_ALGORITHM_UNSP"
+ "ECIFIED\020\000\022\025\n\021RSASSA_PSS_SHA256\020\001\022\032\n\026RSAS"
+ "SA_PKCS1V15_SHA256\020\002\022\025\n\021ECDSA_P256_SHA25"
+ "6\020\0032\267\004\n\025ConfidentialComputing\022\330\001\n\017Create"
+ "Challenge\022=.google.cloud.confidentialcom"
+ "puting.v1.CreateChallengeRequest\0320.googl"
+ "\032\027google/rpc/status.proto\"\252\002\n\tChallenge\022"
+ "\022\n\004name\030\001 \001(\tB\004\342A\001\003\0225\n\013create_time\030\002 \001(\013"
+ "2\032.google.protobuf.TimestampB\004\342A\001\003\0225\n\013ex"
+ "pire_time\030\003 \001(\0132\032.google.protobuf.Timest"
+ "ampB\004\342A\001\003\022\022\n\004used\030\004 \001(\010B\004\342A\001\003\022\027\n\ttpm_non"
+ "ce\030\006 \001(\tB\004\342A\001\003:n\352Ak\n.confidentialcomputi"
+ "ng.googleapis.com/Challenge\0229projects/{p"
+ "roject}/locations/{location}/challenges/"
+ "{uuid}\"\237\001\n\026CreateChallengeRequest\022:\n\006par"
+ "ent\030\001 \001(\tB*\342A\001\002\372A#\n!locations.googleapis"
+ ".com/Location\022I\n\tchallenge\030\002 \001(\01320.googl"
+ "e.cloud.confidentialcomputing.v1.Challen"
+ "ge\"T\332A\020parent,challenge\202\323\344\223\002;\"./v1/{pare"
+ "nt=projects/*/locations/*}/challenges:\tc"
+ "hallenge\022\350\001\n\021VerifyAttestation\022?.google."
+ "cloud.confidentialcomputing.v1.VerifyAtt"
+ "estationRequest\032@.google.cloud.confident"
+ "ialcomputing.v1.VerifyAttestationRespons"
+ "e\"P\202\323\344\223\002J\"E/v1/{challenge=projects/*/loc"
+ "ations/*/challenges/*}:verifyAttestation"
+ ":\001*\032X\312A$confidentialcomputing.googleapis"
+ ".com\322A.https://www.googleapis.com/auth/c"
+ "loud-platformB\227\002\n)com.google.cloud.confi"
+ "dentialcomputing.v1B\014ServiceProtoP\001Z_clo"
+ "ud.google.com/go/confidentialcomputing/a"
+ "piv1/confidentialcomputingpb;confidentia"
+ "lcomputingpb\252\002%Google.Cloud.Confidential"
+ "Computing.V1\312\002%Google\\Cloud\\Confidential"
+ "Computing\\V1\352\002(Google::Cloud::Confidenti"
+ "alComputing::V1b\006proto3"
+ "geB\004\342A\001\002\"\311\003\n\030VerifyAttestationRequest\022J\n"
+ "\tchallenge\030\001 \001(\tB7\342A\001\002\372A0\n.confidentialc"
+ "omputing.googleapis.com/Challenge\022T\n\017gcp"
+ "_credentials\030\002 \001(\01325.google.cloud.confid"
+ "entialcomputing.v1.GcpCredentialsB\004\342A\001\001\022"
+ "T\n\017tpm_attestation\030\003 \001(\01325.google.cloud."
+ "confidentialcomputing.v1.TpmAttestationB"
+ "\004\342A\001\002\022c\n\027confidential_space_info\030\004 \001(\0132<"
+ ".google.cloud.confidentialcomputing.v1.C"
+ "onfidentialSpaceInfoB\004\342A\001\001\022P\n\rtoken_opti"
+ "ons\030\005 \001(\01323.google.cloud.confidentialcom"
+ "puting.v1.TokenOptionsB\004\342A\001\001\"n\n\031VerifyAt"
+ "testationResponse\022\037\n\021oidc_claims_token\030\002"
+ " \001(\tB\004\342A\001\003\0220\n\016partial_errors\030\003 \003(\0132\022.goo"
+ "gle.rpc.StatusB\004\342A\001\003\"3\n\016GcpCredentials\022!"
+ "\n\031service_account_id_tokens\030\002 \003(\t\";\n\014Tok"
+ "enOptions\022\026\n\010audience\030\001 \001(\tB\004\342A\001\001\022\023\n\005non"
+ "ce\030\002 \003(\tB\004\342A\001\001\"\217\003\n\016TpmAttestation\022K\n\006quo"
+ "tes\030\001 \003(\0132;.google.cloud.confidentialcom"
+ "puting.v1.TpmAttestation.Quote\022\025\n\rtcg_ev"
+ "ent_log\030\002 \001(\014\022\033\n\023canonical_event_log\030\003 \001"
+ "(\014\022\017\n\007ak_cert\030\004 \001(\014\022\022\n\ncert_chain\030\005 \003(\014\032"
+ "\326\001\n\005Quote\022\021\n\thash_algo\030\001 \001(\005\022^\n\npcr_valu"
+ "es\030\002 \003(\0132J.google.cloud.confidentialcomp"
+ "uting.v1.TpmAttestation.Quote.PcrValuesE"
+ "ntry\022\021\n\traw_quote\030\003 \001(\014\022\025\n\rraw_signature"
+ "\030\004 \001(\014\0320\n\016PcrValuesEntry\022\013\n\003key\030\001 \001(\005\022\r\n"
+ "\005value\030\002 \001(\014:\0028\001\"k\n\025ConfidentialSpaceInf"
+ "o\022R\n\017signed_entities\030\001 \003(\01323.google.clou"
+ "d.confidentialcomputing.v1.SignedEntityB"
+ "\004\342A\001\001\"x\n\014SignedEntity\022h\n\032container_image"
+ "_signatures\030\001 \003(\0132>.google.cloud.confide"
+ "ntialcomputing.v1.ContainerImageSignatur"
+ "eB\004\342A\001\001\"\263\001\n\027ContainerImageSignature\022\025\n\007p"
+ "ayload\030\001 \001(\014B\004\342A\001\001\022\027\n\tsignature\030\002 \001(\014B\004\342"
+ "A\001\001\022\030\n\npublic_key\030\003 \001(\014B\004\342A\001\001\022N\n\007sig_alg"
+ "\030\004 \001(\01627.google.cloud.confidentialcomput"
+ "ing.v1.SigningAlgorithmB\004\342A\001\001*\177\n\020Signing"
+ "Algorithm\022!\n\035SIGNING_ALGORITHM_UNSPECIFI"
+ "ED\020\000\022\025\n\021RSASSA_PSS_SHA256\020\001\022\032\n\026RSASSA_PK"
+ "CS1V15_SHA256\020\002\022\025\n\021ECDSA_P256_SHA256\020\0032\267"
+ "\004\n\025ConfidentialComputing\022\330\001\n\017CreateChall"
+ "enge\022=.google.cloud.confidentialcomputin"
+ "g.v1.CreateChallengeRequest\0320.google.clo"
+ "ud.confidentialcomputing.v1.Challenge\"T\332"
+ "A\020parent,challenge\202\323\344\223\002;\"./v1/{parent=pr"
+ "ojects/*/locations/*}/challenges:\tchalle"
+ "nge\022\350\001\n\021VerifyAttestation\022?.google.cloud"
+ ".confidentialcomputing.v1.VerifyAttestat"
+ "ionRequest\032@.google.cloud.confidentialco"
+ "mputing.v1.VerifyAttestationResponse\"P\202\323"
+ "\344\223\002J\"E/v1/{challenge=projects/*/location"
+ "s/*/challenges/*}:verifyAttestation:\001*\032X"
+ "\312A$confidentialcomputing.googleapis.com\322"
+ "A.https://www.googleapis.com/auth/cloud-"
+ "platformB\227\002\n)com.google.cloud.confidenti"
+ "alcomputing.v1B\014ServiceProtoP\001Z_cloud.go"
+ "ogle.com/go/confidentialcomputing/apiv1/"
+ "confidentialcomputingpb;confidentialcomp"
+ "utingpb\252\002%Google.Cloud.ConfidentialCompu"
+ "ting.V1\312\002%Google\\Cloud\\ConfidentialCompu"
+ "ting\\V1\352\002(Google::Cloud::ConfidentialCom"
+ "puting::V1b\006proto3"
};
descriptor =
com.google.protobuf.Descriptors.FileDescriptor.internalBuildGeneratedFileFrom(
Expand All @@ -173,6 +175,7 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
com.google.api.FieldBehaviorProto.getDescriptor(),
com.google.api.ResourceProto.getDescriptor(),
com.google.protobuf.TimestampProto.getDescriptor(),
com.google.rpc.StatusProto.getDescriptor(),
});
internal_static_google_cloud_confidentialcomputing_v1_Challenge_descriptor =
getDescriptor().getMessageTypes().get(0);
Expand Down Expand Up @@ -208,7 +211,7 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
new com.google.protobuf.GeneratedMessageV3.FieldAccessorTable(
internal_static_google_cloud_confidentialcomputing_v1_VerifyAttestationResponse_descriptor,
new java.lang.String[] {
"OidcClaimsToken",
"OidcClaimsToken", "PartialErrors",
});
internal_static_google_cloud_confidentialcomputing_v1_GcpCredentials_descriptor =
getDescriptor().getMessageTypes().get(4);
Expand Down Expand Up @@ -294,6 +297,7 @@ public static com.google.protobuf.Descriptors.FileDescriptor getDescriptor() {
com.google.api.FieldBehaviorProto.getDescriptor();
com.google.api.ResourceProto.getDescriptor();
com.google.protobuf.TimestampProto.getDescriptor();
com.google.rpc.StatusProto.getDescriptor();
}

// @@protoc_insertion_point(outer_class_scope)
Expand Down

0 comments on commit b898dcd

Please sign in to comment.