8000 [Cloud Client Library] Use V1 SDK in client by yawangwang · Pull Request #305 · google/go-tpm-tools · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

[Cloud Client Library] Use V1 SDK in client #305

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 8 commits into from
Sep 8, 2023

Conversation

yawangwang
Copy link
Collaborator

Update the old version of client with the V1 cloud client library.

Use go get cloud.google.com/go/confidentialcomputing/apiv1 to install the package.

@yawangwang yawangwang marked this pull request as draft May 4, 2023 00:43
@yawangwang yawangwang marked this pull request as ready for review May 4, 2023 00:45
@yawangwang yawangwang changed the title Client library [Cloud Client Library] Use V1 SDK in client May 4, 2023
@jkl73
Copy link
Contributor
jkl73 commented May 4, 2023

/gcbrun

@JoshuaKrstic JoshuaKrstic requested review from alexmwu and jkl73 May 4, 2023 21:38
@alexmwu
Copy link
Contributor
alexmwu commented May 5, 2023

/gcbrun

@yawangwang
Copy link
Collaborator Author

/gcbrun

Copy link
Contributor
@alexmwu alexmwu left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@jkl73 @yawangwang do we want experiment gating?

@yawangwang
Copy link
Collaborator Author
yawangwang commented May 23, 2023

@jkl73 @yawangwang do we want experiment gating?

Yes, I think experiment gating will give us more confidence in V1 sdk when rolling out changes. Waiting for @jkl73 's thoughts on this.

Copy link
Contributor
@jkl73 jkl73 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lgtm, we can talk about put this behind an experiment next.

RawSignature: encoding.EncodeToString(quote.GetRawSig()),
HashAlgo: int64(quote.GetPcrs().GetHash()),
quotes[i] = &confidentialcomputingpb.TpmAttestation_Quote{
RawQuote: quote.GetQuote(),
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hmmm, here (and other places) it used to be using the base64 encoding, did we change the encoding on the service side?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes, following https://google.aip.dev/140#string-vs-bytes since the bytes are already base 64 encoded

@alexmwu
Copy link
Contributor
alexmwu commented May 30, 2023

lgtm, we can talk about put this behind an experiment next.

If we want it behind an experiment, we should probably make this change additive instead of also deleting the old client. Perhaps introduce a new client in restv1.go and remove the old one in a separate PR once we have completed experiment rollout.

@yawangwang
Copy link
Collaborator Author

lgtm, we can talk about put this behind an experiment next.

If we want it behind an experiment, we should probably make this change additive instead of also deleting the old client. Perhaps introduce a new client in restv1.go and remove the old one in a separate PR once we have completed experiment rollout.

Yes, there will be additional changes to this PR to ensure this client SDK change is behind an experiment. But for now this PR is blocked because it is dependent on Josh's client experiment changes.

@alexmwu alexmwu merged commit 51e5a28 into google:master Sep 8, 2023
alexmwu added a commit to alexmwu/go-tpm-tools that referenced this pull request Sep 15, 2023
New Features:
[launcher] Verify FS and mount before launch google#311
Integration of go-tpm-tools with go-tdx-guest google#347

Intra-version Breaking Changes:
Add launcherfile package for path and file consts google#356 breaks google#333
Bug Fixes:
[launcher] Update the token refresh logic google#325
[launcher] Fix logging blocking issue google#338

Other Changes:
[launcher] Add a new metadata flag of signedImageRepos google#320
Update go-sev-guest to v0.7.0 google#329
[launcher] Add SSH test for image. google#314
Add supported architectures to ci.yml google#330
Fix the go version number error google#326
[launcher] Signature discovery: fetch a signed image manifest at for parsing google#324
[launcher] Export attestation token filepath and filename google#333
[launcher] Increase the max file descriptor google#339
[launcher] Add a signature interface and a library to parse signature from image manifest google#328
Rename TdxVerify function to TdxQuote in server package. google#353
[launcher] Use V1 SDK in launcher verifier client google#305
Update and tidy dependencies google#344
@alexmwu alexmwu mentioned this pull request Sep 15, 2023
alexmwu added a commit that referenced this pull request Sep 15, 2023
New Features:
[launcher] Verify FS and mount before launch #311
Integration of go-tpm-tools with go-tdx-guest #347

Intra-version Breaking Changes:
Add launcherfile package for path and file consts #356 breaks #333
Bug Fixes:
[launcher] Update the token refresh logic #325
[launcher] Fix logging blocking issue #338

Other Changes:
[launcher] Add a new metadata flag of signedImageRepos #320
Update go-sev-guest to v0.7.0 #329
[launcher] Add SSH test for image. #314
Add supported architectures to ci.yml #330
Fix the go version number error #326
[launcher] Signature discovery: fetch a signed image manifest at for parsing #324
[launcher] Export attestation token filepath and filename #333
[launcher] Increase the max file descriptor #339
[launcher] Add a signature interface and a library to parse signature from image manifest #328
Rename TdxVerify function to TdxQuote in server package. #353
[launcher] Use V1 SDK in launcher verifier client #305
Update and tidy dependencies #344
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants
0