Live test cleanup - sub deployments, immutable containers, purge skip (#9333)

* Retry container deletion

* Continue on deployment failure

* Do not try to purge keyvaults with purge protection

* Remove subscription scoped deployments

* Delete all blobs when container has immutability

* temp skip sub deploy delete

* Skip missing blob container properties

* Fix null container
This commit is contained in:
Ben Broderick Phillips 2024-11-07 14:59:45 -05:00 коммит произвёл GitHub
Родитель 1cbab84790
Коммит 79b6cd01ae
Не найден ключ, соответствующий данной подписи
Идентификатор ключа GPG: B5690EEEBB952194
2 изменённых файлов: 33 добавлений и 11 удалений

Просмотреть файл

@ -123,8 +123,8 @@ filter Remove-PurgeableResources {
switch ($r.AzsdkResourceType) {
'Key Vault' {
if ($r.EnablePurgeProtection) {
# We will try anyway but will ignore errors.
Write-Warning "Key Vault '$($r.VaultName)' has purge protection enabled and may not be purged until $($r.ScheduledPurgeDate)"
continue
}
# Use `-AsJob` to start a lightweight, cancellable job and pass to `Wait-PurgeableResoruceJob` for consistent behavior.
@ -134,8 +134,8 @@ filter Remove-PurgeableResources {
'Managed HSM' {
if ($r.EnablePurgeProtection) {
# We will try anyway but will ignore errors.
Write-Warning "Managed HSM '$($r.Name)' has purge protection enabled and may not be purged until $($r.ScheduledPurgeDate)"
continue
}
# Use `GetNewClosure()` on the `-Action` ScriptBlock to make sure variables are captured.
@ -313,14 +313,16 @@ function RemoveStorageAccount($Account) {
if ($Account.Kind -eq "FileStorage") { return }
$containers = New-AzStorageContext -StorageAccountName $Account.StorageAccountName | Get-AzStorageContainer
$blobs = $containers | Get-AzStorageBlob
$deleteNow = @()
try {
foreach ($blob in $blobs) {
$shouldDelete = EnableBlobDeletion -Blob $blob -StorageAccountName $Account.StorageAccountName -ResourceGroupName $Account.ResourceGroupName
if ($shouldDelete) {
$deleteNow += $blob
foreach ($container in $containers) {
$blobs = $container | Get-AzStorageBlob
foreach ($blob in $blobs) {
$shouldDelete = EnableBlobDeletion -Blob $blob -Container $container -StorageAccountName $Account.StorageAccountName -ResourceGroupName $Account.ResourceGroupName
if ($shouldDelete) {
$deleteNow += $blob
}
}
}
} catch {
@ -342,11 +344,15 @@ function RemoveStorageAccount($Account) {
}
foreach ($container in $containers) {
if (!($container | Get-Member 'BlobContainerProperties')) {
continue
}
if ($container.BlobContainerProperties.HasImmutableStorageWithVersioning) {
try {
# Use AzRm cmdlet as deletion will only work through ARM with the immutability policies defined on the blobs
Remove-AzRmStorageContainer -Name $container.Name -StorageAccountName $Account.StorageAccountName -ResourceGroupName $Account.ResourceGroupName -Force
#$container | Remove-AzStorageContainer
# Add a retry in case blob deletion has not finished in time for container deletion, but not too many that we end up
# getting throttled by ARM/SRP if things are actually in a stuck state
Retry -Attempts 1 -Action { Remove-AzRmStorageContainer -Name $container.Name -StorageAccountName $Account.StorageAccountName -ResourceGroupName $Account.ResourceGroupName -Force }
} catch {
Write-Host "Container removal failed: $($container.Name), account: $($Account.storageAccountName), group: $($Account.ResourceGroupName)"
Write-Warning "Ignoring the error and trying to delete the storage account"
@ -360,7 +366,7 @@ function RemoveStorageAccount($Account) {
}
}
function EnableBlobDeletion($Blob, $StorageAccountName, $ResourceGroupName) {
function EnableBlobDeletion($Blob, $Container, $StorageAccountName, $ResourceGroupName) {
# Some properties like immutability policies require the blob to be
# deleted before the container can be deleted
$forceBlobDeletion = $false
@ -394,6 +400,10 @@ function EnableBlobDeletion($Blob, $StorageAccountName, $ResourceGroupName) {
$Blob.ICloudBlob.BreakLease()
}
if (($Container | Get-Member 'BlobContainerProperties') -and $Container.BlobContainerProperties.HasImmutableStorageWithVersioning) {
$forceBlobDeletion = $true
}
return $forceBlobDeletion
}

Просмотреть файл

@ -344,6 +344,12 @@ function DeleteArmDeployments([object]$ResourceGroup) {
$null = $toDelete | Remove-AzResourceGroupDeployment
}
function DeleteSubscriptionDeployments() {
$subDeployments = Get-AzSubscriptionDeployment
Write-Host "Removing $($subDeployments.Count) subscription scoped deployments"
$subDeployments | Remove-AzSubscriptionDeployment
}
function DeleteOrUpdateResourceGroups() {
[CmdletBinding(SupportsShouldProcess = $true, ConfirmImpact = 'Medium')]
param()
@ -403,7 +409,12 @@ function DeleteOrUpdateResourceGroups() {
$hasError = DeleteAndPurgeGroups $toDelete
foreach ($rg in $toClean) {
DeleteArmDeployments $rg
try {
DeleteArmDeployments $rg
} catch {
Write-Warning "Error deleting deployments for group '$($rg.ResourceGroupName)'"
Write-Warning $_
}
}
if ($hasError) {
@ -507,6 +518,7 @@ if ($SubscriptionId -and ($originalSubscription -ne $SubscriptionId)) {
try {
DeleteOrUpdateResourceGroups
#DeleteSubscriptionDeployments
} finally {
if ($SubscriptionId -and ($originalSubscription -ne $SubscriptionId)) {
Select-AzSubscription -Subscription $originalSubscription -Confirm:$false -WhatIf:$false