-
Notifications
You must be signed in to change notification settings - Fork 1.1k
Data protection template using Protegrity #210
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Data protection template using Protegrity #210
Conversation
…taflowTemplates into ProtegrityIntegrationTemplate
# Conflicts: # v2/pom.xml
* Added bigtable changes * Moved BigTable related IO ops to separate package
…lement to FIleSystem in CSV format
|
All (the pull request submitter and all commit authors) CLAs are signed, but one or more commits were authored or co-authored by someone other than the pull request submitter. We need to confirm that all authors are ok with their commits being contributed to this project. Please have them confirm that by leaving a comment that contains only Note to project maintainer: There may be cases where the author cannot leave a comment, or the comment is not properly detected as consent. In those cases, you can manually confirm consent of the commit author(s), and set the ℹ️ Googlers: Go here for more info. |
|
All (the pull request submitter and all commit authors) CLAs are signed, but one or more commits were authored or co-authored by someone other than the pull request submitter. We need to confirm that all authors are ok with their commits being contributed to this project. Please have them confirm that by leaving a comment that contains only Note to project maintainer: There may be cases where the author cannot leave a comment, or the comment is not properly detected as consent. In those cases, you can manually confirm consent of the commit author(s), and set the ℹ️ Googlers: Go here for more info. |
1 similar comment
|
All (the pull request submitter and all commit authors) CLAs are signed, but one or more commits were authored or co-authored by someone other than the pull request submitter. We need to confirm that all authors are ok with their commits being contributed to this project. Please have them confirm that by leaving a comment that contains only Note to project maintainer: There may be cases where the author cannot leave a comment, or the comment is not properly detected as consent. In those cases, you can manually confirm consent of the commit author(s), and set the ℹ️ Googlers: Go here for more info. |
|
@googlebot I consent. |
|
All (the pull request submitter and all commit authors) CLAs are signed, but one or more commits were authored or co-authored by someone other than the pull request submitter. We need to confirm that all authors are ok with their commits being contributed to this project. Please have them confirm that by leaving a comment that contains only Note to project maintainer: There may be cases where the author cannot leave a comment, or the comment is not properly detected as consent. In those cases, you can manually confirm consent of the commit author(s), and set the ℹ️ Googlers: Go here for more info. |
* add nullable option support into fromJson * resolve comments * fix comments
|
@prathapreddy123 We've refactored modules and classes to common that you suggest and changed our code/docs based on your suggestions. Could you please review the changes? |
|
Hi @prathapreddy12. Did you have a chance to review our changes? |
Hi @ilya-kozyrev - We were currently undergoing through design & refactoring process. It would be helpful to review the template post completion of our design to share latest updates. Expected ETA 2 - 4 weeks. |
|
Hi @prathapreddy123 could you please review this PR? If any help from our side is required please let us know. |
@an2x - Can you take care of this request. For context, please refer to earlier comments |
Will do, probably early next week. |
|
Hi @an2x, @prathapreddy123. Did you have a chance to review this PR? Can we help with it somehow? |
Hi ilya - Sorry for the delay. Several things has changed recently in terms of module structure etc. We will start reviewing in next few days but may take a while to complete(ETA: couple of weeks). |
|
Hi @prathapreddy123 @an2x. We are looking forward to your reviewing. We believe that our improvements could be helpful for the community. If we can help somehow with merging this PR, please free to ask. |
|
This pull request has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
|
Hi @ilya-kozyrev -- thanks for your contribution here. Unfortunately we ran behind on reviews, and the structure of the project changed a bit. Is there still interest in pursuing this template? We can work together on a plan to resolve conflicts + review the code. |
|
Closing this because it got stale for a few months. Please rebase / file a new one to bring it up to the top of the stack. |
Some users may want to protect their sensitive data using tokenization.
We propose to create a template that will provide integration with protection RPC server using Beam transform to protect sensitive data using tokenization.
At a high level, a template that will:
More details and the proposed design are available in the design doc.