You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Jan 22, 2026. It is now read-only.
Until now, we used a hacky patching mechanism to update the attestation policy of the MAA to disable secure boot checking. With my PR to the Azure Terraform provider, this can be replaced with using a corresponding field in the Terraform resource.
Proposed change(s)
Replace the policy patching by directly specifying the attestation policy when creating / migrating a cluster.
provider_installation {
# Use /home/developer/go/bin as an overridden package directory# for the hashicorp/azurerm provider. This disables the version and checksum# verifications for this provider and forces Terraform to look for the# azurerm provider plugin in the given directory.dev_overrides {
"hashicorp/azurerm" = "/home/developer/go/bin"# Or whatever other path theTerraform provider binary you've built in step 2 lives in. (usually $GOBIN)
}
# For all other providers, install them directly from their origin provider# registries as normal. If you omit this, Terraform will _only_ use# the dev_overrides block, and so no other providers will be available.direct {}
}
Check out this branch in your Constellation workspace and create a cluster on Azure.
Remember to revert the changes to ~/.terraformrc when you're done testing.
@msanft The PR and issue were merged/fixed yesterday.
Judging by the schedule of their past releases, we should hopefully see a release with your changes in the next 3-4 days.
@msanft The PR and issue were merged/fixed yesterday. Judging by the schedule of their past releases, we should hopefully see a release with your changes in the next 3-4 days.
Yes, unfortunately they only merged support for the SEV-SNP attestation type though, we need to wait for Azure/azure-rest-api-specs#24635 to get merged before then again suggesting a change to the Terraform provider.. :(
If better suited, I can convert this to a draft until then
@msanft The PR and issue were merged/fixed yesterday. Judging by the schedule of their past releases, we should hopefully see a release with your changes in the next 3-4 days.
Yes, unfortunately they only merged support for the SEV-SNP attestation type though, we need to wait for Azure/azure-rest-api-specs#24635 to get merged before then again suggesting a change to the Terraform provider.. :( If better suited, I can convert this to a draft until then
This issue is still open, so I think this is still blocked? (Asking since I was requested for review)
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Labels
holdThis cannot be merged right nowno changelogChange won't be listed in release changelog
4 participants
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Context
Until now, we used a hacky patching mechanism to update the attestation policy of the MAA to disable secure boot checking. With my PR to the Azure Terraform provider, this can be replaced with using a corresponding field in the Terraform resource.
Proposed change(s)
Related issue
azurerm_attestation_provider- add AzureVM and SEV-SNP attestation types hashicorp/terraform-provider-azurerm#22229Additional info
To test:
make build~/.terraformrc:~/.terraformrcwhen you're done testing.Checklist