Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add option in e2e testing to allow secure boot to be disabled for windows #3677

Open
juliusl opened this issue Oct 5, 2023 · 0 comments · May be fixed by #3678
Open

Add option in e2e testing to allow secure boot to be disabled for windows #3677

juliusl opened this issue Oct 5, 2023 · 0 comments · May be fixed by #3678
Labels

Comments

@juliusl
Copy link
Member

juliusl commented Oct 5, 2023

Is your feature request related to a problem?/Why is this needed
Windows doesn't allow unsigned drivers to be installed when secure boot is enabled. This makes it possible to test in-development drivers w/ Windows.

Describe the solution you'd like in detail
Check an env. arg in e2e-scenario.sh and edit the uefi settings in the vmss template.

https://learn.microsoft.com/en-us/azure/templates/microsoft.compute/virtualmachinescalesets?pivots=deployment-language-arm-template#securityprofile-1

Describe alternatives you've considered
This is a boot option so it cannot be disabled while the VM is running.

Additional context

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants