From f5e744f59827fafdc0efe7cd7229baaae0a4d41a Mon Sep 17 00:00:00 2001 From: Julius Liu Date: Thu, 5 Oct 2023 16:28:06 -0700 Subject: [PATCH] feat: add check to enable disabling secure boot for windows nodes - For testing drivers w/ windows secure boot must be disabled --- e2e/windows/e2e-scenario.sh | 10 +++++++++- 1 file changed, 9 insertions(+), 1 deletion(-) diff --git a/e2e/windows/e2e-scenario.sh b/e2e/windows/e2e-scenario.sh index 6d007372b9b..df977b9d5a5 100644 --- a/e2e/windows/e2e-scenario.sh +++ b/e2e/windows/e2e-scenario.sh @@ -146,6 +146,13 @@ WINDOWS_LOADBALANCER=$(jq -c '.parameters | with_entries( select(.key|contains(" WINDOWS_IDENTITY=$(jq -c '.resources[0] | with_entries( select(.key|contains("identity")))' test.json) WINDOWS_SKU=$(jq -c '.resources[0] | with_entries( select(.key|contains("sku")))' test.json) WINDOWS_OSDISK=$(jq -c '.resources[0].properties.virtualMachineProfile.storageProfile | with_entries( select(.key|contains("osDisk")))' test.json) + +# Testing Windows Drivers requires SecureBoot to be disabled in-order to enable kernel debugging and installing drivers +ENABLE_SECURE_BOOT="true" +if [ -n "$ALLOW_TEST_WINDOWS_DRIVERS" ]; then + ENABLE_SECURE_BOOT="false" +fi + NETWORK_PROPERTIES=$(jq -c '.resources[0].properties.virtualMachineProfile.networkProfile.networkInterfaceConfigurations[0] | with_entries( select(.key|contains("properties")))' test.json) CUSTOM_DATA=$(cat scenarios/$SCENARIO_NAME/$WINDOWS_E2E_IMAGE-$SCENARIO_NAME-cloud-init.txt) CSE_CMD=$(cat scenarios/$SCENARIO_NAME/$WINDOWS_E2E_IMAGE-$SCENARIO_NAME-cseCmd) @@ -161,7 +168,8 @@ jq --argjson JsonForVnet "$WINDOWS_VNET" \ --arg ValueForCustomData "$CUSTOM_DATA" \ --arg ValueForCSECmd "$CSE_CMD" \ --arg ValueForVMSS "$DEPLOYMENT_VMSS_NAME" \ - '.parameters += $JsonForVnet | .parameters += $JsonForLB | .resources[0] += $JsonForIdentity | .resources[0] += $JsonForSKU | .resources[0].properties.virtualMachineProfile.storageProfile+=$JsonForOSDisk | .resources[0].properties.virtualMachineProfile.networkProfile.networkInterfaceConfigurations[0] += $JsonForNetwork | .resources[0].properties.virtualMachineProfile.storageProfile.imageReference.id=$ValueForImageReference | .resources[0].properties.virtualMachineProfile.osProfile.adminPassword=$ValueForAdminPassword | .resources[0].properties.virtualMachineProfile.osProfile.customData=$ValueForCustomData | .resources[0].properties.virtualMachineProfile.extensionProfile.extensions[0].properties.settings.commandToExecute=$ValueForCSECmd | .parameters.virtualMachineScaleSets_akswin30_name.defaultValue=$ValueForVMSS' \ + --arg ValueForEnableSecureBoot "$ENABLE_SECURE_BOOT" \ + '.parameters += $JsonForVnet | .parameters += $JsonForLB | .resources[0] += $JsonForIdentity | .resources[0] += $JsonForSKU | .resources[0].properties.virtualMachineProfile.storageProfile+=$JsonForOSDisk | .resources[0].properties.virtualMachineProfile.networkProfile.networkInterfaceConfigurations[0] += $JsonForNetwork | .resources[0].properties.virtualMachineProfile.storageProfile.imageReference.id=$ValueForImageReference | .resources[0].properties.virtualMachineProfile.osProfile.adminPassword=$ValueForAdminPassword | .resources[0].properties.virtualMachineProfile.osProfile.customData=$ValueForCustomData | .resources[0].properties.virtualMachineProfile.extensionProfile.extensions[0].properties.settings.commandToExecute=$ValueForCSECmd | .parameters.virtualMachineScaleSets_akswin30_name.defaultValue=$ValueForVMSS | .resources[0].properties.virtualMachineProfile.securityProfile.uefiSettings.secureBootEnabled=$ValueForEnableSecureBoot' \ windows_vmss_template.json > $DEPLOYMENT_VMSS_NAME-deployment.json retval=0