Suggested-by: Daniel Kral <[email protected]>
Signed-off-by: Fiona Ebner <[email protected]>
---
New in v4.
src/PVE/CLI/qm.pm | 3 ++-
src/PVE/QemuServer.pm | 11 ++++++-----
src/PVE/QemuServer/Drive.pm | 4 ++--
3 files changed, 10 insertions(+), 8 deletions(-)
diff --git a/src/PVE/CLI/qm.pm b/src/PVE/CLI/qm.pm
index 5326db5f..f1867337 100755
--- a/src/PVE/CLI/qm.pm
+++ b/src/PVE/CLI/qm.pm
@@ -700,7 +700,8 @@ __PACKAGE__->register_method({
method => 'POST',
description =>
"Enroll important updated certificates to the EFI disk with
pre-enrolled-keys. Currently,"
- . " this is only the Microsoft UEFI CA 2023. Must be called while the
VM is shut down.",
+ . " these are UEFI 2023 certificates from Microsoft. Must be called
while the VM is shut"
+ . " down.",
parameters => {
additionalProperties => 0,
properties => {
diff --git a/src/PVE/QemuServer.pm b/src/PVE/QemuServer.pm
index 03354e31..d103731c 100644
--- a/src/PVE/QemuServer.pm
+++ b/src/PVE/QemuServer.pm
@@ -5406,11 +5406,12 @@ my sub check_efi_vars {
my $efidisk = parse_drive('efidisk0', $conf->{efidisk0});
if (PVE::QemuServer::OVMF::should_enroll_ms_2023_cert($efidisk)) {
# TODO: make the first print a log_warn with PVE 9.2 to make it more
noticeable!
- print "EFI disk without 'ms-cert=2023w' option, suggesting that the
Microsoft UEFI 2023\n";
- print "certificate is not enrolled yet. The UEFI 2011 certificate
expires in June 2026!\n";
- print "The new certificate is required for secure boot update for
Windows and common\n";
- print "Linux distributions. Use 'Disk Action > Enroll Updated
Certificates' in the UI\n";
- print "or, while the VM is shut down, run 'qm enroll-efi-keys $vmid'
to enroll it.\n\n";
+ print "EFI disk without 'ms-cert=2023w' option, suggesting that not
all UEFI 2023\n";
+ print "certificates from Microsoft are enrolled yet. The UEFI 2011
certificates expire\n";
+ print "in June 2026! The new certificate are required for secure boot
update for Windows\n";
+ print "and common Linux distributions. Use 'Disk Action > Enroll
Updated Certificates'\n";
+ print "in the UI or, while the VM is shut down, run 'qm
enroll-efi-keys $vmid' to enroll\n";
+ print "the new certificates.\n\n";
print "For Windows with BitLocker, run the following command inside
Powershell:\n";
print " manage-bde -protectors -disable <drive>\n";
print "for each drive with BitLocker (for example, <drive> could be
'C:').\n";
diff --git a/src/PVE/QemuServer/Drive.pm b/src/PVE/QemuServer/Drive.pm
index ae907b5c..fa70ee6b 100644
--- a/src/PVE/QemuServer/Drive.pm
+++ b/src/PVE/QemuServer/Drive.pm
@@ -525,8 +525,8 @@ my %efitype_fmt = (
type => 'string',
enum => [qw(2011 2023 2023w)],
description =>
- "Informational marker indicating the version of the latest
Microsoft UEFI certificate"
- . " that has been enrolled by Proxmox VE. The value '2023w' means
that both the"
+ "Informational marker indicating the version of the latest
Microsoft UEFI certificates"
+ . " that have been enrolled by Proxmox VE. The value '2023w' means
that both the"
. " 'Microsoft UEFI CA 2023' and the 'Windows UEFI CA 2023'
certificates are included."
. " The value '2023' is deprecated and for compatibility only.",
optional => 1,
--
2.47.3