Skip to content

Commit 91a9a9e

Browse files
updated script
1 parent 91c8c22 commit 91a9a9e

1 file changed

Lines changed: 90 additions & 90 deletions

File tree

infra/scripts/process_sample_data.sh

Lines changed: 90 additions & 90 deletions
Original file line numberDiff line numberDiff line change
@@ -13,8 +13,8 @@ aif_resource_id="${8}"
1313
# Global variables to track original network access states
1414
original_storage_public_access=""
1515
original_storage_default_action=""
16-
original_search_public_access=""
17-
original_search_bypass=""
16+
# original_search_public_access=""
17+
# original_search_bypass=""
1818
original_foundry_public_access=""
1919
aif_resource_group=""
2020
aif_account_resource_id=""
@@ -71,53 +71,53 @@ enable_public_access() {
7171
fi
7272

7373
# Enable public access for AI Search Service
74-
echo "Enabling public access for AI Search Service: $aiSearchName"
75-
original_search_public_access=$(az search service show \
76-
--name "$aiSearchName" \
77-
--resource-group "$resourceGroupName" \
78-
--query "publicNetworkAccess" \
79-
-o tsv)
74+
# echo "Enabling public access for AI Search Service: $aiSearchName"
75+
# original_search_public_access=$(az search service show \
76+
# --name "$aiSearchName" \
77+
# --resource-group "$resourceGroupName" \
78+
# --query "publicNetworkAccess" \
79+
# -o tsv)
8080

81-
# Get current bypass setting for trusted services
82-
original_search_bypass=$(az search service show \
83-
--name "$aiSearchName" \
84-
--resource-group "$resourceGroupName" \
85-
--query "networkRuleSet.bypass" \
86-
-o tsv)
81+
# # Get current bypass setting for trusted services
82+
# original_search_bypass=$(az search service show \
83+
# --name "$aiSearchName" \
84+
# --resource-group "$resourceGroupName" \
85+
# --query "networkRuleSet.bypass" \
86+
# -o tsv)
8787

88-
if [ "$original_search_public_access" != "Enabled" ]; then
89-
az search service update \
90-
--name "$aiSearchName" \
91-
--resource-group "$resourceGroupName" \
92-
--public-access enabled \
93-
--output none
94-
if [ $? -eq 0 ]; then
95-
echo "✓ AI Search Service public access enabled"
96-
else
97-
echo "✗ Failed to enable AI Search Service public access"
98-
return 1
99-
fi
100-
else
101-
echo "✓ AI Search Service public access already enabled"
102-
fi
88+
# if [ "$original_search_public_access" != "Enabled" ]; then
89+
# az search service update \
90+
# --name "$aiSearchName" \
91+
# --resource-group "$resourceGroupName" \
92+
# --public-access enabled \
93+
# --output none
94+
# if [ $? -eq 0 ]; then
95+
# echo "✓ AI Search Service public access enabled"
96+
# else
97+
# echo "✗ Failed to enable AI Search Service public access"
98+
# return 1
99+
# fi
100+
# else
101+
# echo "✓ AI Search Service public access already enabled"
102+
# fi
103103

104-
# Enable trusted services bypass
105-
if [ "$original_search_bypass" != "AzureServices" ]; then
106-
echo "Enabling trusted services bypass for AI Search Service"
107-
MSYS_NO_PATHCONV=1 az resource update \
108-
--ids "/subscriptions/$(az account show --query id -o tsv)/resourceGroups/$resourceGroupName/providers/Microsoft.Search/searchServices/$aiSearchName" \
109-
--api-version 2024-06-01-preview \
110-
--set "properties.networkRuleSet.bypass=AzureServices" \
111-
--output none
112-
if [ $? -eq 0 ]; then
113-
echo "✓ AI Search Service trusted services bypass enabled"
114-
else
115-
echo "✗ Failed to enable AI Search Service trusted services bypass"
116-
return 1
117-
fi
118-
else
119-
echo "✓ AI Search Service trusted services bypass already enabled"
120-
fi
104+
# # Enable trusted services bypass
105+
# if [ "$original_search_bypass" != "AzureServices" ]; then
106+
# echo "Enabling trusted services bypass for AI Search Service"
107+
# MSYS_NO_PATHCONV=1 az resource update \
108+
# --ids "/subscriptions/$(az account show --query id -o tsv)/resourceGroups/$resourceGroupName/providers/Microsoft.Search/searchServices/$aiSearchName" \
109+
# --api-version 2024-06-01-preview \
110+
# --set "properties.networkRuleSet.bypass=AzureServices" \
111+
# --output none
112+
# if [ $? -eq 0 ]; then
113+
# echo "✓ AI Search Service trusted services bypass enabled"
114+
# else
115+
# echo "✗ Failed to enable AI Search Service trusted services bypass"
116+
# return 1
117+
# fi
118+
# else
119+
# echo "✓ AI Search Service trusted services bypass already enabled"
120+
# fi
121121

122122
# Enable public access for AI Foundry
123123
# Extract the account resource ID (remove /projects/... part if present)
@@ -201,51 +201,51 @@ restore_network_access() {
201201
echo "Storage Account network default action unchanged (already at desired state)"
202202
fi
203203

204-
# Restore AI Search Service access
205-
if [ -n "$original_search_public_access" ] && [ "$original_search_public_access" != "Enabled" ]; then
206-
echo "Restoring AI Search Service public access to: $original_search_public_access"
207-
# Handle case sensitivity - convert to proper case
208-
case "$original_search_public_access" in
209-
"Enabled"|"ENABLED") restore_value="Enabled" ;;
210-
"Disabled"|"DISABLED") restore_value="Disabled" ;;
211-
*) restore_value="$original_search_public_access" ;;
212-
esac
213-
az search service update \
214-
--name "$aiSearchName" \
215-
--resource-group "$resourceGroupName" \
216-
--public-access "$restore_value" \
217-
--output none
218-
if [ $? -eq 0 ]; then
219-
echo "✓ AI Search Service access restored"
220-
else
221-
echo "✗ Failed to restore AI Search Service access"
222-
fi
223-
else
224-
echo "AI Search Service access unchanged (already at desired state)"
225-
fi
204+
# # Restore AI Search Service access
205+
# if [ -n "$original_search_public_access" ] && [ "$original_search_public_access" != "Enabled" ]; then
206+
# echo "Restoring AI Search Service public access to: $original_search_public_access"
207+
# # Handle case sensitivity - convert to proper case
208+
# case "$original_search_public_access" in
209+
# "Enabled"|"ENABLED") restore_value="Enabled" ;;
210+
# "Disabled"|"DISABLED") restore_value="Disabled" ;;
211+
# *) restore_value="$original_search_public_access" ;;
212+
# esac
213+
# az search service update \
214+
# --name "$aiSearchName" \
215+
# --resource-group "$resourceGroupName" \
216+
# --public-access "$restore_value" \
217+
# --output none
218+
# if [ $? -eq 0 ]; then
219+
# echo "✓ AI Search Service access restored"
220+
# else
221+
# echo "✗ Failed to restore AI Search Service access"
222+
# fi
223+
# else
224+
# echo "AI Search Service access unchanged (already at desired state)"
225+
# fi
226226

227-
# Restore AI Search Service trusted services bypass
228-
if [ -n "$original_search_bypass" ] && [ "$original_search_bypass" != "AzureServices" ]; then
229-
echo "Restoring AI Search Service trusted services bypass to: $original_search_bypass"
230-
# Handle null/empty values
231-
if [ "$original_search_bypass" = "null" ] || [ -z "$original_search_bypass" ]; then
232-
restore_bypass_value="None"
233-
else
234-
restore_bypass_value="$original_search_bypass"
235-
fi
236-
MSYS_NO_PATHCONV=1 az resource update \
237-
--ids "/subscriptions/$(az account show --query id -o tsv)/resourceGroups/$resourceGroupName/providers/Microsoft.Search/searchServices/$aiSearchName" \
238-
--api-version 2024-06-01-preview \
239-
--set "properties.networkRuleSet.bypass=$restore_bypass_value" \
240-
--output none
241-
if [ $? -eq 0 ]; then
242-
echo "✓ AI Search Service trusted services bypass restored"
243-
else
244-
echo "✗ Failed to restore AI Search Service trusted services bypass"
245-
fi
246-
else
247-
echo "AI Search Service trusted services bypass unchanged (already at desired state)"
248-
fi
227+
# # Restore AI Search Service trusted services bypass
228+
# if [ -n "$original_search_bypass" ] && [ "$original_search_bypass" != "AzureServices" ]; then
229+
# echo "Restoring AI Search Service trusted services bypass to: $original_search_bypass"
230+
# # Handle null/empty values
231+
# if [ "$original_search_bypass" = "null" ] || [ -z "$original_search_bypass" ]; then
232+
# restore_bypass_value="None"
233+
# else
234+
# restore_bypass_value="$original_search_bypass"
235+
# fi
236+
# MSYS_NO_PATHCONV=1 az resource update \
237+
# --ids "/subscriptions/$(az account show --query id -o tsv)/resourceGroups/$resourceGroupName/providers/Microsoft.Search/searchServices/$aiSearchName" \
238+
# --api-version 2024-06-01-preview \
239+
# --set "properties.networkRuleSet.bypass=$restore_bypass_value" \
240+
# --output none
241+
# if [ $? -eq 0 ]; then
242+
# echo "✓ AI Search Service trusted services bypass restored"
243+
# else
244+
# echo "✗ Failed to restore AI Search Service trusted services bypass"
245+
# fi
246+
# else
247+
# echo "AI Search Service trusted services bypass unchanged (already at desired state)"
248+
# fi
249249

250250
# Restore AI Foundry access
251251
if [ -n "$original_foundry_public_access" ] && [ "$original_foundry_public_access" != "Enabled" ]; then

0 commit comments

Comments
 (0)