google-cloud-confidentialcomputing-v1 1.8.0

Google Cloud Client Libraries for Rust - Confidential Computing API
Documentation
// Copyright 2025 Google LLC
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
//     https://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
// Code generated by sidekick. DO NOT EDIT.
use crate::Result;

/// Implements a [ConfidentialComputing](super::stub::ConfidentialComputing) decorator for logging and tracing.
#[derive(Clone, Debug)]
pub struct ConfidentialComputing<T>
where
    T: super::stub::ConfidentialComputing + std::fmt::Debug + Send + Sync,
{
    inner: T,
    duration: gaxi::observability::DurationMetric,
}

impl<T> ConfidentialComputing<T>
where
    T: super::stub::ConfidentialComputing + std::fmt::Debug + Send + Sync,
{
    pub fn new(inner: T) -> Self {
        Self {
            inner,
            duration: gaxi::observability::DurationMetric::new(&info::INSTRUMENTATION_CLIENT_INFO),
        }
    }
}

impl<T> super::stub::ConfidentialComputing for ConfidentialComputing<T>
where
    T: super::stub::ConfidentialComputing + std::fmt::Debug + Send + Sync,
{
    #[tracing::instrument(level = tracing::Level::DEBUG, ret)]
    async fn create_challenge(
        &self,
        req: crate::model::CreateChallengeRequest,
        options: crate::RequestOptions,
    ) -> Result<crate::Response<crate::model::Challenge>> {
        let (_span, pending) = gaxi::client_request_signals!(
            metric: self.duration.clone(),
            info: *info::INSTRUMENTATION_CLIENT_INFO,
            method: "client::ConfidentialComputing::create_challenge",
            self.inner.create_challenge(req, options));
        pending.await
    }

    #[tracing::instrument(level = tracing::Level::DEBUG, ret)]
    async fn verify_attestation(
        &self,
        req: crate::model::VerifyAttestationRequest,
        options: crate::RequestOptions,
    ) -> Result<crate::Response<crate::model::VerifyAttestationResponse>> {
        let (_span, pending) = gaxi::client_request_signals!(
            metric: self.duration.clone(),
            info: *info::INSTRUMENTATION_CLIENT_INFO,
            method: "client::ConfidentialComputing::verify_attestation",
            self.inner.verify_attestation(req, options));
        pending.await
    }

    #[tracing::instrument(level = tracing::Level::DEBUG, ret)]
    async fn verify_confidential_space(
        &self,
        req: crate::model::VerifyConfidentialSpaceRequest,
        options: crate::RequestOptions,
    ) -> Result<crate::Response<crate::model::VerifyConfidentialSpaceResponse>> {
        let (_span, pending) = gaxi::client_request_signals!(
            metric: self.duration.clone(),
            info: *info::INSTRUMENTATION_CLIENT_INFO,
            method: "client::ConfidentialComputing::verify_confidential_space",
            self.inner.verify_confidential_space(req, options));
        pending.await
    }

    #[tracing::instrument(level = tracing::Level::DEBUG, ret)]
    async fn verify_confidential_gke(
        &self,
        req: crate::model::VerifyConfidentialGkeRequest,
        options: crate::RequestOptions,
    ) -> Result<crate::Response<crate::model::VerifyConfidentialGkeResponse>> {
        let (_span, pending) = gaxi::client_request_signals!(
            metric: self.duration.clone(),
            info: *info::INSTRUMENTATION_CLIENT_INFO,
            method: "client::ConfidentialComputing::verify_confidential_gke",
            self.inner.verify_confidential_gke(req, options));
        pending.await
    }

    #[tracing::instrument(level = tracing::Level::DEBUG, ret)]
    async fn list_locations(
        &self,
        req: google_cloud_location::model::ListLocationsRequest,
        options: crate::RequestOptions,
    ) -> Result<crate::Response<google_cloud_location::model::ListLocationsResponse>> {
        let (_span, pending) = gaxi::client_request_signals!(
            metric: self.duration.clone(),
            info: *info::INSTRUMENTATION_CLIENT_INFO,
            method: "client::ConfidentialComputing::list_locations",
            self.inner.list_locations(req, options));
        pending.await
    }

    #[tracing::instrument(level = tracing::Level::DEBUG, ret)]
    async fn get_location(
        &self,
        req: google_cloud_location::model::GetLocationRequest,
        options: crate::RequestOptions,
    ) -> Result<crate::Response<google_cloud_location::model::Location>> {
        let (_span, pending) = gaxi::client_request_signals!(
            metric: self.duration.clone(),
            info: *info::INSTRUMENTATION_CLIENT_INFO,
            method: "client::ConfidentialComputing::get_location",
            self.inner.get_location(req, options));
        pending.await
    }
}

pub(crate) mod info {
    const NAME: &str = env!("CARGO_PKG_NAME");
    const VERSION: &str = env!("CARGO_PKG_VERSION");
    pub(crate) static INSTRUMENTATION_CLIENT_INFO: std::sync::LazyLock<
        gaxi::options::InstrumentationClientInfo,
    > = std::sync::LazyLock::new(|| {
        let mut info = gaxi::options::InstrumentationClientInfo::default();
        info.service_name = "confidentialcomputing";
        info.client_version = VERSION;
        info.client_artifact = NAME;
        info.default_host = "confidentialcomputing";
        info
    });
}