Skip to content

Conversation

@tjones60
Copy link
Contributor

To prevent unintentional migration of VMGS encryption methods, disable higher encryption sources when encryption policy is configured to Auto and the VMGS has already been provisioned.

@tjones60 tjones60 requested a review from a team as a code owner October 27, 2025 22:43
Copilot AI review requested due to automatic review settings October 27, 2025 22:43
Copy link
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull Request Overview

This PR prevents unintentional VMGS encryption method upgrades when the encryption policy is set to "Auto" by tracking whether the VMGS was provisioned during the current boot and using this information to disable higher-level encryption sources for pre-existing VMGS files.

Key changes:

  • Added provisioned_this_boot field to track VMGS provisioning state
  • Modified encryption source selection logic to respect Auto policy for existing VMGS files
  • Enhanced logging to show availability vs. active status of encryption sources

Reviewed Changes

Copilot reviewed 2 out of 2 changed files in this pull request and generated 1 comment.

File Description
vm/vmgs/vmgs/src/vmgs_impl.rs Adds provisioned_this_boot field and accessor method to track VMGS provisioning state
openhcl/underhill_attestation/src/lib.rs Updates encryption source selection logic to check provisioning state and prevent auto-upgrades for existing VMGS files

@github-actions
Copy link

stunes-ms
stunes-ms previously approved these changes Oct 29, 2025
@github-actions
Copy link

@mebersol mebersol added the backport_2505 Change should be backported to the release/2505 branch label Oct 30, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

backport_2505 Change should be backported to the release/2505 branch

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants