-
Notifications
You must be signed in to change notification settings - Fork 2.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
aws-janitor: Support for CloudFormation Stacks #11504
aws-janitor: Support for CloudFormation Stacks #11504
Conversation
This patch introduces support for the removal of CloudFormation stacks by the AWS janitor.
/test pull-test-infra-verify-deps |
/lgtm |
LGTM label has been added. Git tree hash: 4a4dc227cf859c73ab94ce182e60c7d19fca91f1
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
One comment, thanks for working on this!
func (p cloudFormationStack) delete(svc *cf.CloudFormation) error { | ||
input := &cf.DeleteStackInput{StackName: aws.String(p.name)} | ||
if _, err := svc.DeleteStack(input); err != nil { | ||
return err |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Should we wait for the stack to be deleted?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hi @vincepri,
I'd just as soon not get hung up on waiting for things at this point. There are enough existing race conditions that I was already going to update the Boskos janitor to do three sweeps with a pause in between each one.
A separate PR at a later date will work out ordering, waiting, and dependency graphs.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/approve |
/approve feel free to |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: akutz, detiber, krzyzacy The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Well I’m good with it since it does work from my local tests. As @vincepri mentioned, we do need to revisit the resources list and work out a better dependency graph, but that’s phase two. /hold cancel |
This patch introduces support for the removal of CloudFormation stacks by the AWS janitor.
/assign @detiber @krzyzacy
/cc @randomvariable @vincepri