Skip to content
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
100 commits
Select commit Hold shift + click to select a range
1f711dd
Merged PR 23042: Remove last log line " logs
May 6, 2025
adc44cc
Merged PR 23057: Stop capturing the raw log file, as we are no longer…
May 7, 2025
cae4faf
Merged PR 23026: engineering: build clones in e2e tests
May 7, 2025
868ff1a
Merged PR 23070: bug: Fix parsing of Prism history
fintelia May 8, 2025
c247e95
Merged PR 23065: bug: Handle unknown partition table types from lsblk
fintelia May 8, 2025
c42b5ac
Merged PR 22966: bug: Fix error message when filesystem requires more…
ayaegashi May 8, 2025
efae01b
Merged PR 22984: doc: rfc: COSI 1.1 Revision
May 8, 2025
6e2106a
Merged PR 22963: feature: Unwind to main before starting reboot
fintelia May 9, 2025
31b2145
Merged PR 23111: docs: Trident Install Flow Diagram
May 13, 2025
5ca9cec
Merged PR 23118: engineering: try to fix dev-azl based builds
May 13, 2025
4d5fa60
Merged PR 23086: engineering: e2e usr-verity tests
May 14, 2025
f7979ea
Merged PR 23139: engineering: storm: better output capturing
May 15, 2025
267770d
Merged PR 23141: engineering: storm: refactor into independent module
May 15, 2025
b9dd940
Merged PR 23146: Add currently unused LocalVmUuid field to netlaunch
fintelia May 15, 2025
9cf5eb3
Merged PR 23016: doc: Trident Feature Matrix
May 16, 2025
c090119
Merged PR 23033: engineering: try getting kernel/initrd/userspace/etc…
May 16, 2025
3582006
Merged PR 23095: engineering: SFI: disable pypi.org with /etc/hosts
May 16, 2025
9c834fa
Merged PR 23166: Fix 'make download-runtime-images'
fintelia May 16, 2025
1d59a3e
Merged PR 23171: engineering: Stream Update Test Images
May 19, 2025
709b5ff
Merged PR 23178: bug: use bm variable for metrics path
May 19, 2025
fa18baf
Merged PR 23158: engineering: Extensive testing of usr-verity sans UK…
May 20, 2025
66dfec4
Merged PR 23155: engineering: Have netlaunch directly interact with l…
fintelia May 20, 2025
7b7f803
Merged PR 23209: engineering: Disable memory-constraint-combined
May 20, 2025
ce522b5
Merged PR 23222: bug: Fix parsing of prism history when disks or file…
fintelia May 21, 2025
3ec37af
Merged PR 23230: bug: Stop disabling the sshd service for misc test
fintelia May 22, 2025
0f029e7
Merged PR 23218: engineering: Delete virt-deploy run
May 22, 2025
12c54c6
Merged PR 23234: Update osmodifier
fintelia May 23, 2025
ae1ba5a
Merged PR 23246: engineering: Pre-generate test matrix
May 23, 2025
dbd871c
Merged PR 23203: feature: Enable UKI+RAID
May 24, 2025
dba8941
Merged PR 23261: bug: Disable usr-verity-e2e on baremetal
May 27, 2025
ddc5dae
Merged PR 23264: Fixes for clippy 1.87
fintelia May 27, 2025
13736e1
Merged PR 23250: engineering: SFI: set up code coverage phase 3
May 28, 2025
e2eecec
Merged PR 23221: engineering: Introduce systemd-pcrlock utilities
ndubchak May 28, 2025
b6fb817
Merged PR 23276: engineering: Update pipelines to build installer ISO…
ayaegashi May 28, 2025
6eaa609
Merged PR 23278: engineering: (small follow-up) rename build-runtime …
ayaegashi May 29, 2025
a487fa6
Merged PR 23274: engineering: Enable UKI + Encryption - Internal para…
May 29, 2025
279e60b
Merged PR 23291: bug: Fix memory-constraint-combined
May 29, 2025
764a90c
Merged PR 23191: engineering: trace cpu/memory/network usage during t…
May 29, 2025
e876dfb
Merged PR 23288: engineering: Misc Pipeline Fixes
May 29, 2025
9b008a5
Merged PR 23292: engineering: Download missed usrverity images for tr…
alejandro-microsoft May 29, 2025
9420bc6
Merged PR 23293: bug: Disable mem-contrained test
May 29, 2025
5c2be9e
Merged PR 23299: engineering: functional tests periodically complain …
May 30, 2025
4662dc2
Merged PR 23300: engineering: update mic submodule to get CVE fix
May 30, 2025
9a806f1
Merged PR 23329: engineering: SFI: get-tests triggered pypi notification
Jun 2, 2025
74a75f9
Merged PR 23301: Implement pcrlock helpers and re-factor logic
ndubchak Jun 2, 2025
597d03e
Merged PR 23336: engineering: Fixes for clippy 1.86
Jun 2, 2025
196746f
Merged PR 23205: feature: Support rollback with UKI
fintelia Jun 2, 2025
150a3f4
Merged PR 23335: engineering: SFI: add CODEOWNERS for github
Jun 3, 2025
38e91cf
Merged PR 22856: engineering: Create Trident SELinux policy module
ayaegashi Jun 3, 2025
e7a6ae2
Merged PR 23363: engineering: Merge Unit Tests and Coverage
Jun 4, 2025
60ccda3
Merged PR 23337: engineering: Stage ESP in block device
Jun 4, 2025
6fca9fe
Merged PR 23280: engineering: Mock OB Template for PRs
Jun 4, 2025
cde8c4b
Merged PR 23375: Revert 'engineering: Create Trident SELinux policy m…
ayaegashi Jun 4, 2025
ce4b2d9
Merged PR 23372: Update naming of test image
fintelia Jun 5, 2025
e634fd5
Merged PR 23391: Fix renaming for Servicing Test fix
ndubchak Jun 5, 2025
bdc3139
Merged PR 23396: Rename image in loop-update scripts
ndubchak Jun 5, 2025
4181769
Create codeql.yml
Britel Jun 6, 2025
db9b5cc
Merged PR 23381: Test usr-verity
fintelia Jun 9, 2025
4f070ef
Merged PR 23359: Add statically defined .pcrlock files
ndubchak Jun 9, 2025
dc53016
Merged PR 23443: engineering: Build FT Image in CI
Jun 9, 2025
2472b08
Merged PR 23437: Populate sha384 in HC if user sets it to ignored
fintelia Jun 10, 2025
ec8452f
Merged PR 23379: engineering: UKI on Baremetal
Jun 10, 2025
73c531f
Merged PR 23449: engineering: SELinux domain policy
ayaegashi Jun 10, 2025
08ce716
Merged PR 23457: engineering: A couple fixes to BM
Jun 10, 2025
1df0b63
Merged PR 23459: bug: Serve COSI file for finalize
Jun 10, 2025
4ef4de0
Merged PR 23462: engineering: Pass SELinux policy files so ISO builds…
ayaegashi Jun 10, 2025
80bc059
Merged PR 23475: engineering: Fix storm scenario setup/cleanup
Jun 11, 2025
fafe663
Merged PR 23474: bug: Allow Trident to enable services
ayaegashi Jun 11, 2025
850d564
Merged PR 23483: engineering: bm-script: Use trident's capabilities i…
Jun 11, 2025
68beca5
Merged PR 23497: engineering: Re-enable all tests
Jun 12, 2025
a7732d0
Merged PR 23496: bug: Fix root-verity
Jun 12, 2025
ea78c49
Merged PR 23499: engineering: A couple small fixes
ayaegashi Jun 12, 2025
8ec82d3
Merged PR 23498: Add logic to parse and validate systemd-pcrlock log
ndubchak Jun 13, 2025
e055005
Merged PR 23486: engineering: Enable enforcing mode on usrverity tests
ayaegashi Jun 13, 2025
93aa672
Merged PR 23510: engineering: Explicitly set memory-constraint-combin…
ayaegashi Jun 13, 2025
ca15f06
Merged PR 23465: engineering: Faster FTs
Jun 13, 2025
534429c
Merged PR 23519: engineering: Permissions to allow installer image to…
ayaegashi Jun 13, 2025
494eee6
Merged PR 23530: bug: Add permissions so pipelines succeed
ayaegashi Jun 16, 2025
f225aa4
Merged PR 23548: doc: typos
Jun 16, 2025
b51bd94
Merged PR 23513: Add helpful information to log when mounting over no…
Jun 16, 2025
443bc3c
Merged PR 23423: Migrate servicing tests to storm
Jun 16, 2025
d5d9229
Merged PR 23553: engineering: Makefile rule to download functest image
Jun 16, 2025
0c460ab
Merged PR 23554: Refactor to create ESP subsystem and run encryption …
ndubchak Jun 17, 2025
a13e100
Merged PR 23514: Verity size validation does not account for hash
Jun 17, 2025
47e2fc8
Merged PR 23505: Add some retry to COSI download logic
Jun 18, 2025
c6c4b2a
Merged PR 23573: engineering: Add swap to storage graph
Jun 18, 2025
fc3eaa2
Merged PR 23571: Re-factor get_first_backing_partition()
ndubchak Jun 18, 2025
106bdb0
Merged PR 23584: PackageArchitecture w/ noarch for COSI OsPackages
Jun 18, 2025
2e5a261
Merged PR 23602: engineering: PackageArchitecture: add '(none)'
Jun 19, 2025
9b0ccb1
Merged PR 23588: Centralize checking whether image is UKI
fintelia Jun 19, 2025
b67c2c9
Merged PR 23612: engineering: Publish RPMs from PR pipeline
ayaegashi Jun 20, 2025
ca60e18
Merged PR 23621: engineering: azure servicing tests: unbound variable…
Jun 20, 2025
cb4d104
Merged PR 23625: engineering: loop-update.sh task did not previously …
Jun 20, 2025
51e4fae
Merged PR 23583: engineering: Changes to Trident SELinux policy for S…
ayaegashi Jun 23, 2025
ad69c54
Merged PR 23536: engineering: Update SELinux and verity error message
ayaegashi Jun 23, 2025
9648897
Merged PR 23645: engineering: Updating warning for root-verity + grub…
ayaegashi Jun 23, 2025
c58c192
Merged PR 23614: engineering: Steamboat helpers
Jun 23, 2025
520d386
Merged PR 23676: enginerring: ensure publish depends on barmetal cont…
Jun 25, 2025
185110a
Create codeql.yml
Britel Jun 6, 2025
5a9469a
rebase
Britel Jul 4, 2025
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 2 additions & 0 deletions .github/CODEOWNERS
Original file line number Diff line number Diff line change
@@ -0,0 +1,2 @@
# For any changes, ensure owners approvals
* @microsoft/azurelinux-trident
100 changes: 100 additions & 0 deletions .github/workflows/codeql.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,100 @@
# For most projects, this workflow file will not need changing; you simply need
# to commit it to your repository.
#
# You may wish to alter this file to override the set of languages analyzed,
# or to provide custom queries or build logic.
#
# ******** NOTE ********
# We have attempted to detect the languages in your repository. Please check
# the `language` matrix defined below to confirm you have the correct set of
# supported CodeQL languages.
#
name: "CodeQL Advanced"

on:
push:
branches: [ "main" ]
pull_request:
branches: [ "main" ]
schedule:
- cron: '43 9 * * 0'

jobs:
analyze:
name: Analyze (${{ matrix.language }})
# Runner size impacts CodeQL analysis time. To learn more, please see:
# - https://gh.io/recommended-hardware-resources-for-running-codeql
# - https://gh.io/supported-runners-and-hardware-resources
# - https://gh.io/using-larger-runners (GitHub.com only)
# Consider using larger runners or machines with greater resources for possible analysis time improvements.
runs-on: ${{ (matrix.language == 'swift' && 'macos-latest') || 'ubuntu-latest' }}
permissions:
# required for all workflows
security-events: write

# required to fetch internal or private CodeQL packs
packages: read

# only required for workflows in private repositories
actions: read
contents: read

strategy:
fail-fast: false
matrix:
include:
- language: go
build-mode: autobuild
- language: python
build-mode: none
# CodeQL supports the following values keywords for 'language': 'actions', 'c-cpp', 'csharp', 'go', 'java-kotlin', 'javascript-typescript', 'python', 'ruby', 'swift'
# Use `c-cpp` to analyze code written in C, C++ or both
# Use 'java-kotlin' to analyze code written in Java, Kotlin or both
# Use 'javascript-typescript' to analyze code written in JavaScript, TypeScript or both
# To learn more about changing the languages that are analyzed or customizing the build mode for your analysis,
# see https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/customizing-your-advanced-setup-for-code-scanning.
# If you are analyzing a compiled language, you can modify the 'build-mode' for that language to customize how
# your codebase is analyzed, see https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/codeql-code-scanning-for-compiled-languages
steps:
- name: Checkout repository
uses: actions/checkout@v4

# Add any setup steps before running the `github/codeql-action/init` action.
# This includes steps like installing compilers or runtimes (`actions/setup-node`
# or others). This is typically only required for manual builds.
# - name: Setup runtime (example)
# uses: actions/setup-example@v1

# Initializes the CodeQL tools for scanning.
- name: Initialize CodeQL
uses: github/codeql-action/init@v3
with:
languages: ${{ matrix.language }}
build-mode: ${{ matrix.build-mode }}
# If you wish to specify custom queries, you can do so here or in a config file.
# By default, queries listed here will override any specified in a config file.
# Prefix the list here with "+" to use these queries and those in the config file.

# For more details on CodeQL's query packs, refer to: https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs
# queries: security-extended,security-and-quality

# If the analyze step fails for one of the languages you are analyzing with
# "We were unable to automatically build your code", modify the matrix above
# to set the build mode to "manual" for that language. Then modify this step
# to build your code.
# ℹ️ Command-line programs to run using the OS shell.
# 📚 See https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idstepsrun
- if: matrix.build-mode == 'manual'
shell: bash
run: |
echo 'If you are using a "manual" build mode for one or more of the' \
'languages you are analyzing, replace this with the commands to build' \
'your code, for example:'
echo ' make bootstrap'
echo ' make release'
exit 1

- name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@v3
with:
category: "/language:${{matrix.language}}"
114 changes: 114 additions & 0 deletions .pipelines/templates/MockOB.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,114 @@
parameters:
- name: stages
type: stageList
default: []

stages:
- ${{ each stage in parameters.stages }}:
- stage: ${{ stage.stage }}
${{ if ne(stage.displayName, '') }}:
displayName: ${{ stage.displayName }}

${{ if ne(join(stage.dependsOn, ','), '') }}:
dependsOn: ${{ stage.dependsOn }}

${{ if ne(stage.condition, '') }}:
condition: ${{ stage.condition }}

${{ if ne(stage.variables, '') }}:
variables: ${{ stage.variables }}

${{ if ne(stage.isSkippable, '') }}:
isSkippable: ${{ stage.isSkippable }}

${{ if ne(stage.lockBehavior, '') }}:
lockBehavior: ${{ stage.lockBehavior }}

jobs:
- ${{ each job in stage.jobs }}:
- job: ${{ job.job }}
${{ if ne(job.displayName, '') }}:
displayName: ${{ job.displayName }}

${{ if and(ne(job.timeoutInMinutes, ''), gt(2880, job.timeoutInMinutes)) }}:
timeoutInMinutes: ${{ job.timeoutInMinutes }}
${{ else }}:
timeoutInMinutes: 1440

${{ if ne(job.condition, '') }}:
condition: ${{ job.condition }}

${{ if ne(job.strategy, '') }}:
strategy: ${{ job.strategy }}

${{ if ne(join(job.dependsOn, ','), '') }}:
dependsOn: ${{ job.dependsOn }}

variables:
- ${{ if ne(job.variables, '') }}:
- ${{ each v in job.variables }}:
- ${{ if ne(v.key, '') }}:
- name: ${{ v.key }}
value: ${{ v.value }}
- ${{ else }}:
- ${{ insert }}: ${{ v }}
- name: ob_customArtifactName
value: ${{ coalesce(variables.ob_artifactBaseName, format('drop_{0}_{1}', stage.stage, job.job)) }}${{ coalesce(variables.ob_artifactSuffix, '') }}

pool:
name: ${{ coalesce(job.pool.name, 'trident-azl3-1es-pool-westus2') }}

${{ if ne(job.pool.hostArchitecture, '') }}:
HostArchitecture: ${{ job.pool.hostArchitecture }}

LinuxHostVersion:
vmBuild: true
distribution: mariner
Host: linux

steps:
- ${{ if eq(variables.ob_outputDirectory, '' ) }}:
- ${{ job.job }}
- "Variable ob_outputDirectory is not defined. Please check https://aka.ms/obpipelines/artifacts": error

- checkout: self
fetchDepth: 1
submodules: recursive
path: s

- bash: |
set -eux
mkdir -p "${{ variables.ob_outputDirectory }}"
displayName: "Create output directory"

- ${{ each step in job.steps }}:
- ${{ if ne(step.task, '') }}:
task: ${{ step.task }}
${{ if ne(step.displayName, '') }}:
displayName: ${{ step.displayName }}
${{ if ne(step.inputs, '') }}:
inputs: ${{ step.inputs }}
${{ if ne(step.condition, '') }}:
condition: ${{ step.condition }}
${{ if ne(step.env, '') }}:
env: ${{ step.env }}
${{ if ne(step.retryCountOnTaskFailure, '') }}:
retryCountOnTaskFailure: ${{ step.retryCountOnTaskFailure }}
${{ if ne(step.continueOnError, '') }}:
continueOnError: ${{ step.continueOnError }}
${{ if ne(step.target, '') }}:
target: ${{ step.target }}
${{ if ne(step.enabled, '') }}:
enabled: ${{ step.enabled }}
${{ if ne(step.name, '') }}:
name: ${{ step.name }}
${{ if ne(step.timeoutInMinutes, '') }}:
timeoutInMinutes: ${{ step.timeoutInMinutes }}

# - bash: |
# # ACTUAL:
# # ${{ convertToJson(step) }}

- publish: ${{ variables.ob_outputDirectory }}
artifact: ${{ variables.ob_customArtifactName }}
condition: always()
82 changes: 54 additions & 28 deletions .pipelines/templates/e2e-template.yml
Original file line number Diff line number Diff line change
Expand Up @@ -77,90 +77,114 @@ stages:
# Build tools (Go stuff)
- template: stages/building_tools/building-tools.yml

# Makefile validation, only for CI and PR-E2E
- ${{ if or(eq(parameters.stageType, 'ci'), eq(parameters.stageType, 'pr-e2e'), eq(parameters.stageType, 'pr-e2e-azure')) }}:
# Makefile validation, only for CI
- ${{ if eq(parameters.stageType, 'ci') }}:
- template: stages/validate_makefile/dev-build.yml

# Build FT base Image, only in CI
- ${{ if eq(parameters.stageType, 'ci') }}:
# Build Trident installer ISO (host)
- template: stages/build_image/build-image.yml
parameters:
imageName: trident-functest
dependsOnTrident: false
baseimgBuildType: ${{ parameters.baseimgBuildType }}
baseImagePipelineBuildId: ${{ parameters.baseImagePipelineBuildId }}
micBuildType: ${{ parameters.micBuildType }}
micVersion: ${{ parameters.micVersion }}
clones: 1

# Build Trident container image
- template: stages/build_docker_image/trident-container.yml
parameters:
baseimgBuildType: ${{ parameters.baseimgBuildType }}
baseImagePipelineBuildId: ${{ parameters.baseImagePipelineBuildId }}

# Build Trident installer ISO (host)
- template: stages/build_image/trident-testimg.yml
- template: stages/build_image/build-image.yml
parameters:
imageName: build/trident-installer-testimage.iso
outputArtifactName: trident-installer-testimage
imageName: trident-installer
baseimgBuildType: ${{ parameters.baseimgBuildType }}
baseImagePipelineBuildId: ${{ parameters.baseImagePipelineBuildId }}
micBuildType: ${{ parameters.micBuildType }}
micVersion: ${{ parameters.micVersion }}
clones: 1

# Build Trident split (stage and finalize separated) installer ISO (host)
- template: stages/build_image/trident-testimg.yml
- template: stages/build_image/build-image.yml
parameters:
imageName: build/trident-split-installer-testimage.iso
outputArtifactName: trident-split-installer-testimage
imageName: trident-split-installer
baseimgBuildType: ${{ parameters.baseimgBuildType }}
baseImagePipelineBuildId: ${{ parameters.baseImagePipelineBuildId }}
micBuildType: ${{ parameters.micBuildType }}
micVersion: ${{ parameters.micVersion }}
clones: 1

# Build Trident installer ISO (container)
- template: stages/build_image/trident-testimg.yml
- template: stages/build_image/build-image.yml
parameters:
imageName: build/trident-container-installer-testimage.iso
outputArtifactName: trident-container-installer-testimage
imageName: trident-container-installer
baseimgBuildType: ${{ parameters.baseimgBuildType }}
baseImagePipelineBuildId: ${{ parameters.baseImagePipelineBuildId }}
runtimeEnv: "container"
micBuildType: ${{ parameters.micBuildType }}
micVersion: ${{ parameters.micVersion }}
clones: 1

# Build Trident test image (regular)
- template: stages/build_image/trident-testimg.yml
- template: stages/build_image/build-image.yml
parameters:
imageName: build/trident-testimage.cosi
outputArtifactName: trident-testimage
imageName: trident-testimage
baseimgBuildType: ${{ parameters.baseimgBuildType }}
baseImagePipelineBuildId: ${{ parameters.baseImagePipelineBuildId }}
mkcosiTemplate: "regular"
micBuildType: ${{ parameters.micBuildType }}
micVersion: ${{ parameters.micVersion }}

# Build Trident test image (container)
- template: stages/build_image/trident-testimg.yml
- template: stages/build_image/build-image.yml
parameters:
imageName: build/trident-container-testimage.cosi
outputArtifactName: trident-container-testimage
imageName: trident-container-testimage
baseimgBuildType: ${{ parameters.baseimgBuildType }}
baseImagePipelineBuildId: ${{ parameters.baseImagePipelineBuildId }}
runtimeEnv: "container"
mkcosiTemplate: "regular"
micBuildType: ${{ parameters.micBuildType }}
micVersion: ${{ parameters.micVersion }}

# Build Trident test image for verity (host)
- template: stages/build_image/trident-testimg.yml
- template: stages/build_image/build-image.yml
parameters:
imageName: build/trident-verity-testimage.cosi
outputArtifactName: trident-verity-testimage
imageName: trident-verity-testimage
baseimgBuildType: ${{ parameters.baseimgBuildType }}
baseImagePipelineBuildId: ${{ parameters.baseImagePipelineBuildId }}
mkcosiTemplate: "verity"
micBuildType: ${{ parameters.micBuildType }}
micVersion: ${{ parameters.micVersion }}

# Build Trident test image for verity (container)
- template: stages/build_image/trident-testimg.yml
- template: stages/build_image/build-image.yml
parameters:
imageName: trident-container-verity-testimage
baseimgBuildType: ${{ parameters.baseimgBuildType }}
baseImagePipelineBuildId: ${{ parameters.baseImagePipelineBuildId }}
runtimeEnv: "container"
micBuildType: ${{ parameters.micBuildType }}
micVersion: ${{ parameters.micVersion }}

# Build Trident test image for usr-verity (host)
- template: stages/build_image/build-image.yml
parameters:
imageName: build/trident-container-verity-testimage.cosi
outputArtifactName: trident-container-verity-testimage
imageName: trident-usrverity-testimage
baseimgBuildType: ${{ parameters.baseimgBuildType }}
baseImagePipelineBuildId: ${{ parameters.baseImagePipelineBuildId }}
micBuildType: ${{ parameters.micBuildType }}
micVersion: ${{ parameters.micVersion }}

# Build Trident test image for usr-verity (container)
- template: stages/build_image/build-image.yml
parameters:
imageName: trident-container-usrverity-testimage
runtimeEnv: "container"
mkcosiTemplate: "verity"
baseimgBuildType: ${{ parameters.baseimgBuildType }}
baseImagePipelineBuildId: ${{ parameters.baseImagePipelineBuildId }}
micBuildType: ${{ parameters.micBuildType }}
micVersion: ${{ parameters.micVersion }}

Expand Down Expand Up @@ -263,6 +287,8 @@ stages:
- ${{ if eq(parameters.stageType, 'ci') }}:
# Functional Testing
- template: stages/testing_functional/functional-testing.yml
parameters:
downloadPrebuiltImage: false

# VM Testing (host, post_merge)
- template: stages/testing_vm/netlaunch-testing.yml
Expand All @@ -281,7 +307,7 @@ stages:
# Functional Testing (short version)
- template: stages/testing_functional/functional-testing.yml
parameters:
buildPurpose: "validation"
rerunTests: false

# VM Testing (host, pullrequest)
- template: stages/testing_vm/netlaunch-testing.yml
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -28,6 +28,8 @@ stages:
ob_artifactBaseName: "trident-docker-image"

steps:
- template: ../common_tasks/avoid-pypi-usage.yml

- script: |
set -eux
mkdir -p bin/RPMS
Expand Down
Loading
Loading