google-cloud-confidentialcomputing-v1 1.8.0

Google Cloud Client Libraries for Rust - Confidential Computing API
Documentation
// Copyright 2025 Google LLC
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
//     https://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
// Code generated by sidekick. DO NOT EDIT.
#![allow(rustdoc::redundant_explicit_links)]
#![allow(rustdoc::broken_intra_doc_links)]

/// Implements a client for the Confidential Computing API.
///
/// # Example
/// ```
/// # use google_cloud_confidentialcomputing_v1::client::ConfidentialComputing;
/// use google_cloud_confidentialcomputing_v1::model::Challenge;
/// # async fn sample() -> Result<(), Box<dyn std::error::Error>> {
///     let client = ConfidentialComputing::builder().build().await?;
///     let parent = "parent_value";
///     let response = client.create_challenge()
///         .set_parent(parent)
///         .set_challenge(
///             Challenge::new()/* set fields */
///         )
///         .send().await?;
///     println!("response {:?}", response);
/// # Ok(()) }
/// ```
///
/// # Service Description
///
/// Service describing handlers for resources
///
/// # Configuration
///
/// To configure `ConfidentialComputing` use the `with_*` methods in the type returned
/// by [builder()][ConfidentialComputing::builder]. The default configuration should
/// work for most applications. Common configuration changes include
///
/// * [with_endpoint()]: by default this client uses the global default endpoint
///   (`https://confidentialcomputing.googleapis.com`). Applications using regional
///   endpoints or running in restricted networks (e.g. a network configured
//    with [Private Google Access with VPC Service Controls]) may want to
///   override this default.
/// * [with_credentials()]: by default this client uses
///   [Application Default Credentials]. Applications using custom
///   authentication may need to override this default.
///
/// [with_endpoint()]: super::builder::confidential_computing::ClientBuilder::with_endpoint
/// [with_credentials()]: super::builder::confidential_computing::ClientBuilder::with_credentials
/// [Private Google Access with VPC Service Controls]: https://cloud.google.com/vpc-service-controls/docs/private-connectivity
/// [Application Default Credentials]: https://cloud.google.com/docs/authentication#adc
///
/// # Pooling and Cloning
///
/// `ConfidentialComputing` holds a connection pool internally, it is advised to
/// create one and reuse it. You do not need to wrap `ConfidentialComputing` in
/// an [Rc](std::rc::Rc) or [Arc](std::sync::Arc) to reuse it, because it
/// already uses an `Arc` internally.
#[derive(Clone, Debug)]
pub struct ConfidentialComputing {
    inner: std::sync::Arc<dyn super::stub::dynamic::ConfidentialComputing>,
}

impl ConfidentialComputing {
    /// Returns a builder for [ConfidentialComputing].
    ///
    /// ```
    /// # async fn sample() -> google_cloud_gax::client_builder::Result<()> {
    /// # use google_cloud_confidentialcomputing_v1::client::ConfidentialComputing;
    /// let client = ConfidentialComputing::builder().build().await?;
    /// # Ok(()) }
    /// ```
    pub fn builder() -> super::builder::confidential_computing::ClientBuilder {
        crate::new_client_builder(super::builder::confidential_computing::client::Factory)
    }

    /// Creates a new client from the provided stub.
    ///
    /// The most common case for calling this function is in tests mocking the
    /// client's behavior.
    pub fn from_stub<T>(stub: T) -> Self
    where
        T: super::stub::ConfidentialComputing + 'static,
    {
        Self {
            inner: std::sync::Arc::new(stub),
        }
    }

    pub(crate) async fn new(
        config: gaxi::options::ClientConfig,
    ) -> crate::ClientBuilderResult<Self> {
        let inner = Self::build_inner(config).await?;
        Ok(Self { inner })
    }

    async fn build_inner(
        conf: gaxi::options::ClientConfig,
    ) -> crate::ClientBuilderResult<std::sync::Arc<dyn super::stub::dynamic::ConfidentialComputing>>
    {
        if gaxi::options::tracing_enabled(&conf) {
            return Ok(std::sync::Arc::new(Self::build_with_tracing(conf).await?));
        }
        Ok(std::sync::Arc::new(Self::build_transport(conf).await?))
    }

    async fn build_transport(
        conf: gaxi::options::ClientConfig,
    ) -> crate::ClientBuilderResult<impl super::stub::ConfidentialComputing> {
        super::transport::ConfidentialComputing::new(conf).await
    }

    async fn build_with_tracing(
        conf: gaxi::options::ClientConfig,
    ) -> crate::ClientBuilderResult<impl super::stub::ConfidentialComputing> {
        Self::build_transport(conf)
            .await
            .map(super::tracing::ConfidentialComputing::new)
    }

    /// Creates a new Challenge in a given project and location.
    ///
    /// # Example
    /// ```
    /// # use google_cloud_confidentialcomputing_v1::client::ConfidentialComputing;
    /// use google_cloud_confidentialcomputing_v1::model::Challenge;
    /// use google_cloud_confidentialcomputing_v1::Result;
    /// async fn sample(
    ///    client: &ConfidentialComputing, parent: &str
    /// ) -> Result<()> {
    ///     let response = client.create_challenge()
    ///         .set_parent(parent)
    ///         .set_challenge(
    ///             Challenge::new()/* set fields */
    ///         )
    ///         .send().await?;
    ///     println!("response {:?}", response);
    ///     Ok(())
    /// }
    /// ```
    pub fn create_challenge(&self) -> super::builder::confidential_computing::CreateChallenge {
        super::builder::confidential_computing::CreateChallenge::new(self.inner.clone())
    }

    /// Verifies the provided attestation info, returning a signed attestation
    /// token.
    ///
    /// # Example
    /// ```
    /// # use google_cloud_confidentialcomputing_v1::client::ConfidentialComputing;
    /// use google_cloud_confidentialcomputing_v1::Result;
    /// async fn sample(
    ///    client: &ConfidentialComputing
    /// ) -> Result<()> {
    ///     let response = client.verify_attestation()
    ///         /* set fields */
    ///         .send().await?;
    ///     println!("response {:?}", response);
    ///     Ok(())
    /// }
    /// ```
    pub fn verify_attestation(&self) -> super::builder::confidential_computing::VerifyAttestation {
        super::builder::confidential_computing::VerifyAttestation::new(self.inner.clone())
    }

    /// Verifies whether the provided attestation info is valid, returning a signed
    /// attestation token if so.
    ///
    /// # Example
    /// ```
    /// # use google_cloud_confidentialcomputing_v1::client::ConfidentialComputing;
    /// use google_cloud_confidentialcomputing_v1::Result;
    /// async fn sample(
    ///    client: &ConfidentialComputing
    /// ) -> Result<()> {
    ///     let response = client.verify_confidential_space()
    ///         /* set fields */
    ///         .send().await?;
    ///     println!("response {:?}", response);
    ///     Ok(())
    /// }
    /// ```
    pub fn verify_confidential_space(
        &self,
    ) -> super::builder::confidential_computing::VerifyConfidentialSpace {
        super::builder::confidential_computing::VerifyConfidentialSpace::new(self.inner.clone())
    }

    /// Verifies the provided Confidential GKE attestation info, returning a signed
    /// OIDC token.
    ///
    /// # Example
    /// ```
    /// # use google_cloud_confidentialcomputing_v1::client::ConfidentialComputing;
    /// use google_cloud_confidentialcomputing_v1::Result;
    /// async fn sample(
    ///    client: &ConfidentialComputing
    /// ) -> Result<()> {
    ///     let response = client.verify_confidential_gke()
    ///         /* set fields */
    ///         .send().await?;
    ///     println!("response {:?}", response);
    ///     Ok(())
    /// }
    /// ```
    pub fn verify_confidential_gke(
        &self,
    ) -> super::builder::confidential_computing::VerifyConfidentialGke {
        super::builder::confidential_computing::VerifyConfidentialGke::new(self.inner.clone())
    }

    /// Lists information about the supported locations for this service.
    /// This method can be called in two ways:
    ///
    /// * **List all public locations:** Use the path `GET /v1/locations`.
    /// * **List project-visible locations:** Use the path
    ///   `GET /v1/projects/{project_id}/locations`. This may include public
    ///   locations as well as private or other locations specifically visible
    ///   to the project.
    ///
    /// # Example
    /// ```
    /// # use google_cloud_confidentialcomputing_v1::client::ConfidentialComputing;
    /// use google_cloud_gax::paginator::ItemPaginator as _;
    /// use google_cloud_confidentialcomputing_v1::Result;
    /// async fn sample(
    ///    client: &ConfidentialComputing
    /// ) -> Result<()> {
    ///     let mut list = client.list_locations()
    ///         /* set fields */
    ///         .by_item();
    ///     while let Some(item) = list.next().await.transpose()? {
    ///         println!("{:?}", item);
    ///     }
    ///     Ok(())
    /// }
    /// ```
    pub fn list_locations(&self) -> super::builder::confidential_computing::ListLocations {
        super::builder::confidential_computing::ListLocations::new(self.inner.clone())
    }

    /// Gets information about a location.
    ///
    /// # Example
    /// ```
    /// # use google_cloud_confidentialcomputing_v1::client::ConfidentialComputing;
    /// use google_cloud_confidentialcomputing_v1::Result;
    /// async fn sample(
    ///    client: &ConfidentialComputing
    /// ) -> Result<()> {
    ///     let response = client.get_location()
    ///         /* set fields */
    ///         .send().await?;
    ///     println!("response {:?}", response);
    ///     Ok(())
    /// }
    /// ```
    pub fn get_location(&self) -> super::builder::confidential_computing::GetLocation {
        super::builder::confidential_computing::GetLocation::new(self.inner.clone())
    }
}