Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

cdh:golang: Add support for SecureMount in the go client tool #700

Merged
merged 6 commits into from
Aug 28, 2024

Conversation

ChengyuZhu6
Copy link
Member

Add support for SecureMount in the go client tool.

ChengyuZhu6 added 6 commits August 27, 2024 17:54
support secure mount in cdh grpc client.

Signed-off-by: ChengyuZhu6 <[email protected]>
add unit tests for secure mount in grpc client.

Signed-off-by: ChengyuZhu6 <[email protected]>
support secure mount in cdh ttrpc client.

Signed-off-by: ChengyuZhu6 <[email protected]>
add unit tests for secure mount in ttrpc client.

Signed-off-by: ChengyuZhu6 <[email protected]>
Enhance the client tool to support secure mount.

Signed-off-by: ChengyuZhu6 <[email protected]>
add descriptions of Secure Mount to README.

Signed-off-by: ChengyuZhu6 <[email protected]>
@ChengyuZhu6 ChengyuZhu6 requested a review from sameo as a code owner August 27, 2024 13:23
@ChengyuZhu6 ChengyuZhu6 force-pushed the secure_mount branch 2 times, most recently from 6dd80ca to 849aa61 Compare August 27, 2024 13:53
Copy link
Member

@fitzthum fitzthum left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@ChengyuZhu6 ChengyuZhu6 force-pushed the secure_mount branch 2 times, most recently from 273614e to df46f81 Compare August 27, 2024 14:56
@Xynnn007 Xynnn007 merged commit e96d79d into confidential-containers:main Aug 28, 2024
5 checks passed
@ChengyuZhu6 ChengyuZhu6 deleted the secure_mount branch August 28, 2024 06:08
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants