diff --git a/e2e/windows/e2e-scenario.sh b/e2e/windows/e2e-scenario.sh index 6d007372b9b..df977b9d5a5 100644 --- a/e2e/windows/e2e-scenario.sh +++ b/e2e/windows/e2e-scenario.sh @@ -146,6 +146,13 @@ WINDOWS_LOADBALANCER=$(jq -c '.parameters | with_entries( select(.key|contains(" WINDOWS_IDENTITY=$(jq -c '.resources[0] | with_entries( select(.key|contains("identity")))' test.json) WINDOWS_SKU=$(jq -c '.resources[0] | with_entries( select(.key|contains("sku")))' test.json) WINDOWS_OSDISK=$(jq -c '.resources[0].properties.virtualMachineProfile.storageProfile | with_entries( select(.key|contains("osDisk")))' test.json) + +# Testing Windows Drivers requires SecureBoot to be disabled in-order to enable kernel debugging and installing drivers +ENABLE_SECURE_BOOT="true" +if [ -n "$ALLOW_TEST_WINDOWS_DRIVERS" ]; then + ENABLE_SECURE_BOOT="false" +fi + NETWORK_PROPERTIES=$(jq -c '.resources[0].properties.virtualMachineProfile.networkProfile.networkInterfaceConfigurations[0] | with_entries( select(.key|contains("properties")))' test.json) CUSTOM_DATA=$(cat scenarios/$SCENARIO_NAME/$WINDOWS_E2E_IMAGE-$SCENARIO_NAME-cloud-init.txt) CSE_CMD=$(cat scenarios/$SCENARIO_NAME/$WINDOWS_E2E_IMAGE-$SCENARIO_NAME-cseCmd) @@ -161,7 +168,8 @@ jq --argjson JsonForVnet "$WINDOWS_VNET" \ --arg ValueForCustomData "$CUSTOM_DATA" \ --arg ValueForCSECmd "$CSE_CMD" \ --arg ValueForVMSS "$DEPLOYMENT_VMSS_NAME" \ - '.parameters += $JsonForVnet | .parameters += $JsonForLB | .resources[0] += $JsonForIdentity | .resources[0] += $JsonForSKU | .resources[0].properties.virtualMachineProfile.storageProfile+=$JsonForOSDisk | .resources[0].properties.virtualMachineProfile.networkProfile.networkInterfaceConfigurations[0] += $JsonForNetwork | .resources[0].properties.virtualMachineProfile.storageProfile.imageReference.id=$ValueForImageReference | .resources[0].properties.virtualMachineProfile.osProfile.adminPassword=$ValueForAdminPassword | .resources[0].properties.virtualMachineProfile.osProfile.customData=$ValueForCustomData | .resources[0].properties.virtualMachineProfile.extensionProfile.extensions[0].properties.settings.commandToExecute=$ValueForCSECmd | .parameters.virtualMachineScaleSets_akswin30_name.defaultValue=$ValueForVMSS' \ + --arg ValueForEnableSecureBoot "$ENABLE_SECURE_BOOT" \ + '.parameters += $JsonForVnet | .parameters += $JsonForLB | .resources[0] += $JsonForIdentity | .resources[0] += $JsonForSKU | .resources[0].properties.virtualMachineProfile.storageProfile+=$JsonForOSDisk | .resources[0].properties.virtualMachineProfile.networkProfile.networkInterfaceConfigurations[0] += $JsonForNetwork | .resources[0].properties.virtualMachineProfile.storageProfile.imageReference.id=$ValueForImageReference | .resources[0].properties.virtualMachineProfile.osProfile.adminPassword=$ValueForAdminPassword | .resources[0].properties.virtualMachineProfile.osProfile.customData=$ValueForCustomData | .resources[0].properties.virtualMachineProfile.extensionProfile.extensions[0].properties.settings.commandToExecute=$ValueForCSECmd | .parameters.virtualMachineScaleSets_akswin30_name.defaultValue=$ValueForVMSS | .resources[0].properties.virtualMachineProfile.securityProfile.uefiSettings.secureBootEnabled=$ValueForEnableSecureBoot' \ windows_vmss_template.json > $DEPLOYMENT_VMSS_NAME-deployment.json retval=0