Skip to content

Commit f5e744f

Browse files
committed
feat: add check to enable disabling secure boot for windows nodes
- For testing drivers w/ windows secure boot must be disabled
1 parent 69866f6 commit f5e744f

File tree

1 file changed

+9
-1
lines changed

1 file changed

+9
-1
lines changed

e2e/windows/e2e-scenario.sh

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -146,6 +146,13 @@ WINDOWS_LOADBALANCER=$(jq -c '.parameters | with_entries( select(.key|contains("
146146
WINDOWS_IDENTITY=$(jq -c '.resources[0] | with_entries( select(.key|contains("identity")))' test.json)
147147
WINDOWS_SKU=$(jq -c '.resources[0] | with_entries( select(.key|contains("sku")))' test.json)
148148
WINDOWS_OSDISK=$(jq -c '.resources[0].properties.virtualMachineProfile.storageProfile | with_entries( select(.key|contains("osDisk")))' test.json)
149+
150+
# Testing Windows Drivers requires SecureBoot to be disabled in-order to enable kernel debugging and installing drivers
151+
ENABLE_SECURE_BOOT="true"
152+
if [ -n "$ALLOW_TEST_WINDOWS_DRIVERS" ]; then
153+
ENABLE_SECURE_BOOT="false"
154+
fi
155+
149156
NETWORK_PROPERTIES=$(jq -c '.resources[0].properties.virtualMachineProfile.networkProfile.networkInterfaceConfigurations[0] | with_entries( select(.key|contains("properties")))' test.json)
150157
CUSTOM_DATA=$(cat scenarios/$SCENARIO_NAME/$WINDOWS_E2E_IMAGE-$SCENARIO_NAME-cloud-init.txt)
151158
CSE_CMD=$(cat scenarios/$SCENARIO_NAME/$WINDOWS_E2E_IMAGE-$SCENARIO_NAME-cseCmd)
@@ -161,7 +168,8 @@ jq --argjson JsonForVnet "$WINDOWS_VNET" \
161168
--arg ValueForCustomData "$CUSTOM_DATA" \
162169
--arg ValueForCSECmd "$CSE_CMD" \
163170
--arg ValueForVMSS "$DEPLOYMENT_VMSS_NAME" \
164-
'.parameters += $JsonForVnet | .parameters += $JsonForLB | .resources[0] += $JsonForIdentity | .resources[0] += $JsonForSKU | .resources[0].properties.virtualMachineProfile.storageProfile+=$JsonForOSDisk | .resources[0].properties.virtualMachineProfile.networkProfile.networkInterfaceConfigurations[0] += $JsonForNetwork | .resources[0].properties.virtualMachineProfile.storageProfile.imageReference.id=$ValueForImageReference | .resources[0].properties.virtualMachineProfile.osProfile.adminPassword=$ValueForAdminPassword | .resources[0].properties.virtualMachineProfile.osProfile.customData=$ValueForCustomData | .resources[0].properties.virtualMachineProfile.extensionProfile.extensions[0].properties.settings.commandToExecute=$ValueForCSECmd | .parameters.virtualMachineScaleSets_akswin30_name.defaultValue=$ValueForVMSS' \
171+
--arg ValueForEnableSecureBoot "$ENABLE_SECURE_BOOT" \
172+
'.parameters += $JsonForVnet | .parameters += $JsonForLB | .resources[0] += $JsonForIdentity | .resources[0] += $JsonForSKU | .resources[0].properties.virtualMachineProfile.storageProfile+=$JsonForOSDisk | .resources[0].properties.virtualMachineProfile.networkProfile.networkInterfaceConfigurations[0] += $JsonForNetwork | .resources[0].properties.virtualMachineProfile.storageProfile.imageReference.id=$ValueForImageReference | .resources[0].properties.virtualMachineProfile.osProfile.adminPassword=$ValueForAdminPassword | .resources[0].properties.virtualMachineProfile.osProfile.customData=$ValueForCustomData | .resources[0].properties.virtualMachineProfile.extensionProfile.extensions[0].properties.settings.commandToExecute=$ValueForCSECmd | .parameters.virtualMachineScaleSets_akswin30_name.defaultValue=$ValueForVMSS | .resources[0].properties.virtualMachineProfile.securityProfile.uefiSettings.secureBootEnabled=$ValueForEnableSecureBoot' \
165173
windows_vmss_template.json > $DEPLOYMENT_VMSS_NAME-deployment.json
166174

167175
retval=0

0 commit comments

Comments
 (0)