Skip to content

Commit

Permalink
feat: add check to enable disabling secure boot for windows nodes
Browse files Browse the repository at this point in the history
- For testing drivers w/ windows secure boot must be disabled
  • Loading branch information
juliusl committed Jun 19, 2024
1 parent 69866f6 commit f5e744f
Showing 1 changed file with 9 additions and 1 deletion.
10 changes: 9 additions & 1 deletion e2e/windows/e2e-scenario.sh
Original file line number Diff line number Diff line change
Expand Up @@ -146,6 +146,13 @@ WINDOWS_LOADBALANCER=$(jq -c '.parameters | with_entries( select(.key|contains("
WINDOWS_IDENTITY=$(jq -c '.resources[0] | with_entries( select(.key|contains("identity")))' test.json)
WINDOWS_SKU=$(jq -c '.resources[0] | with_entries( select(.key|contains("sku")))' test.json)
WINDOWS_OSDISK=$(jq -c '.resources[0].properties.virtualMachineProfile.storageProfile | with_entries( select(.key|contains("osDisk")))' test.json)

# Testing Windows Drivers requires SecureBoot to be disabled in-order to enable kernel debugging and installing drivers
ENABLE_SECURE_BOOT="true"
if [ -n "$ALLOW_TEST_WINDOWS_DRIVERS" ]; then
ENABLE_SECURE_BOOT="false"
fi

NETWORK_PROPERTIES=$(jq -c '.resources[0].properties.virtualMachineProfile.networkProfile.networkInterfaceConfigurations[0] | with_entries( select(.key|contains("properties")))' test.json)
CUSTOM_DATA=$(cat scenarios/$SCENARIO_NAME/$WINDOWS_E2E_IMAGE-$SCENARIO_NAME-cloud-init.txt)
CSE_CMD=$(cat scenarios/$SCENARIO_NAME/$WINDOWS_E2E_IMAGE-$SCENARIO_NAME-cseCmd)
Expand All @@ -161,7 +168,8 @@ jq --argjson JsonForVnet "$WINDOWS_VNET" \
--arg ValueForCustomData "$CUSTOM_DATA" \
--arg ValueForCSECmd "$CSE_CMD" \
--arg ValueForVMSS "$DEPLOYMENT_VMSS_NAME" \
'.parameters += $JsonForVnet | .parameters += $JsonForLB | .resources[0] += $JsonForIdentity | .resources[0] += $JsonForSKU | .resources[0].properties.virtualMachineProfile.storageProfile+=$JsonForOSDisk | .resources[0].properties.virtualMachineProfile.networkProfile.networkInterfaceConfigurations[0] += $JsonForNetwork | .resources[0].properties.virtualMachineProfile.storageProfile.imageReference.id=$ValueForImageReference | .resources[0].properties.virtualMachineProfile.osProfile.adminPassword=$ValueForAdminPassword | .resources[0].properties.virtualMachineProfile.osProfile.customData=$ValueForCustomData | .resources[0].properties.virtualMachineProfile.extensionProfile.extensions[0].properties.settings.commandToExecute=$ValueForCSECmd | .parameters.virtualMachineScaleSets_akswin30_name.defaultValue=$ValueForVMSS' \
--arg ValueForEnableSecureBoot "$ENABLE_SECURE_BOOT" \
'.parameters += $JsonForVnet | .parameters += $JsonForLB | .resources[0] += $JsonForIdentity | .resources[0] += $JsonForSKU | .resources[0].properties.virtualMachineProfile.storageProfile+=$JsonForOSDisk | .resources[0].properties.virtualMachineProfile.networkProfile.networkInterfaceConfigurations[0] += $JsonForNetwork | .resources[0].properties.virtualMachineProfile.storageProfile.imageReference.id=$ValueForImageReference | .resources[0].properties.virtualMachineProfile.osProfile.adminPassword=$ValueForAdminPassword | .resources[0].properties.virtualMachineProfile.osProfile.customData=$ValueForCustomData | .resources[0].properties.virtualMachineProfile.extensionProfile.extensions[0].properties.settings.commandToExecute=$ValueForCSECmd | .parameters.virtualMachineScaleSets_akswin30_name.defaultValue=$ValueForVMSS | .resources[0].properties.virtualMachineProfile.securityProfile.uefiSettings.secureBootEnabled=$ValueForEnableSecureBoot' \
windows_vmss_template.json > $DEPLOYMENT_VMSS_NAME-deployment.json

retval=0
Expand Down

0 comments on commit f5e744f

Please sign in to comment.