@@ -107,9 +107,12 @@ var _ = Describe("chgm", func() {
107
107
r .OcmClient .(* ocmmock.MockClient ).EXPECT ().PostServiceLog (gomock .Eq (cluster .ID ()), gomock .Eq (& chgmSL )).Return (nil )
108
108
r .PdClient .(* pdmock.MockClient ).EXPECT ().SilenceIncidentWithNote (gomock .Any ())
109
109
110
- _ , gotErr := Investigate (r )
110
+ result , gotErr := Investigate (r )
111
111
112
112
Expect (gotErr ).NotTo (HaveOccurred ())
113
+ Expect (result .ServiceLogPrepared .Performed ).To (BeFalse ())
114
+ Expect (result .ServiceLogSent .Performed ).To (BeTrue ())
115
+ Expect (result .LimitedSupportSet .Performed ).To (BeFalse ())
113
116
})
114
117
})
115
118
When ("Triggered finds instances stopped by the customer with CloudTrail eventVersion 1.99" , func () {
@@ -126,19 +129,25 @@ var _ = Describe("chgm", func() {
126
129
r .OcmClient .(* ocmmock.MockClient ).EXPECT ().PostServiceLog (gomock .Eq (cluster .ID ()), gomock .Eq (& chgmSL )).Return (nil )
127
130
r .PdClient .(* pdmock.MockClient ).EXPECT ().SilenceIncidentWithNote (gomock .Any ())
128
131
129
- _ , gotErr := Investigate (r )
132
+ result , gotErr := Investigate (r )
130
133
131
134
Expect (gotErr ).NotTo (HaveOccurred ())
135
+ Expect (result .ServiceLogPrepared .Performed ).To (BeFalse ())
136
+ Expect (result .ServiceLogSent .Performed ).To (BeTrue ())
137
+ Expect (result .LimitedSupportSet .Performed ).To (BeFalse ())
132
138
})
133
139
})
134
140
When ("Triggered errors" , func () {
135
141
It ("should update the incident notes and escalate to primary" , func () {
136
142
r .AwsClient .(* awsmock.MockClient ).EXPECT ().ListNonRunningInstances (gomock .Any ()).Return (nil , fakeErr )
137
143
r .PdClient .(* pdmock.MockClient ).EXPECT ().EscalateIncidentWithNote (gomock .Any ()).Return (nil )
138
144
139
- _ , gotErr := Investigate (r )
145
+ result , gotErr := Investigate (r )
140
146
141
147
Expect (gotErr ).NotTo (HaveOccurred ())
148
+ Expect (result .ServiceLogPrepared .Performed ).To (BeFalse ())
149
+ Expect (result .ServiceLogSent .Performed ).To (BeFalse ())
150
+ Expect (result .LimitedSupportSet .Performed ).To (BeFalse ())
142
151
})
143
152
})
144
153
When ("there were no stopped instances" , func () {
@@ -151,9 +160,12 @@ var _ = Describe("chgm", func() {
151
160
r .AwsClient .(* awsmock.MockClient ).EXPECT ().GetSubnetID (gomock .Eq (infraID )).Return ([]string {"string1" , "string2" }, nil )
152
161
r .PdClient .(* pdmock.MockClient ).EXPECT ().EscalateIncidentWithNote (gomock .Any ()).Return (nil )
153
162
r .OcmClient .(* ocmmock.MockClient ).EXPECT ().GetServiceLog (gomock .Eq (cluster ), gomock .Eq ("log_type='cluster-state-updates'" )).Return (& servicelogsv1.ClusterLogsUUIDListResponse {}, nil )
154
- _ , gotErr := Investigate (r )
163
+ result , gotErr := Investigate (r )
155
164
// Assert
156
165
Expect (gotErr ).ToNot (HaveOccurred ())
166
+ Expect (result .ServiceLogPrepared .Performed ).To (BeFalse ())
167
+ Expect (result .ServiceLogSent .Performed ).To (BeFalse ())
168
+ Expect (result .LimitedSupportSet .Performed ).To (BeFalse ())
157
169
})
158
170
})
159
171
When ("there was an error getting StopInstancesEvents" , func () {
@@ -165,8 +177,11 @@ var _ = Describe("chgm", func() {
165
177
166
178
r .PdClient .(* pdmock.MockClient ).EXPECT ().EscalateIncidentWithNote (gomock .Any ()).Return (nil )
167
179
168
- _ , gotErr := Investigate (r )
180
+ result , gotErr := Investigate (r )
169
181
Expect (gotErr ).ToNot (HaveOccurred ())
182
+ Expect (result .ServiceLogPrepared .Performed ).To (BeFalse ())
183
+ Expect (result .ServiceLogSent .Performed ).To (BeFalse ())
184
+ Expect (result .LimitedSupportSet .Performed ).To (BeFalse ())
170
185
})
171
186
})
172
187
When ("there were no StopInstancesEvents" , func () {
@@ -179,8 +194,11 @@ var _ = Describe("chgm", func() {
179
194
r .PdClient .(* pdmock.MockClient ).EXPECT ().EscalateIncidentWithNote (gomock .Any ()).Return (nil )
180
195
181
196
// Act
182
- _ , gotErr := Investigate (r )
197
+ result , gotErr := Investigate (r )
183
198
Expect (gotErr ).ToNot (HaveOccurred ())
199
+ Expect (result .ServiceLogPrepared .Performed ).To (BeFalse ())
200
+ Expect (result .ServiceLogSent .Performed ).To (BeFalse ())
201
+ Expect (result .LimitedSupportSet .Performed ).To (BeFalse ())
184
202
})
185
203
})
186
204
When ("the returned CloudTrailEventRaw base data is correct, but the sessionissue's username is not an authorized user" , func () {
@@ -193,9 +211,12 @@ var _ = Describe("chgm", func() {
193
211
r .OcmClient .(* ocmmock.MockClient ).EXPECT ().PostServiceLog (gomock .Eq (cluster .ID ()), gomock .Eq (& chgmSL )).Return (nil )
194
212
r .PdClient .(* pdmock.MockClient ).EXPECT ().SilenceIncidentWithNote (gomock .Any ()).Return (nil )
195
213
// Act
196
- _ , gotErr := Investigate (r )
214
+ result , gotErr := Investigate (r )
197
215
// Assert
198
216
Expect (gotErr ).NotTo (HaveOccurred ())
217
+ Expect (result .ServiceLogPrepared .Performed ).To (BeFalse ())
218
+ Expect (result .ServiceLogSent .Performed ).To (BeTrue ())
219
+ Expect (result .LimitedSupportSet .Performed ).To (BeFalse ())
199
220
})
200
221
})
201
222
When ("issuer user is authorized (openshift-machine-api-aws)" , func () {
@@ -212,8 +233,11 @@ var _ = Describe("chgm", func() {
212
233
r .PdClient .(* pdmock.MockClient ).EXPECT ().EscalateIncidentWithNote (gomock .Any ()).Return (nil )
213
234
r .OcmClient .(* ocmmock.MockClient ).EXPECT ().GetServiceLog (gomock .Eq (cluster ), gomock .Eq ("log_type='cluster-state-updates'" )).Return (& servicelogsv1.ClusterLogsUUIDListResponse {}, nil )
214
235
215
- _ , gotErr := Investigate (r )
236
+ result , gotErr := Investigate (r )
216
237
Expect (gotErr ).NotTo (HaveOccurred ())
238
+ Expect (result .ServiceLogPrepared .Performed ).To (BeFalse ())
239
+ Expect (result .ServiceLogSent .Performed ).To (BeFalse ())
240
+ Expect (result .LimitedSupportSet .Performed ).To (BeFalse ())
217
241
})
218
242
})
219
243
When ("username role is OrganizationAccountAccessRole on a non CCS cluster" , func () {
@@ -229,8 +253,11 @@ var _ = Describe("chgm", func() {
229
253
r .PdClient .(* pdmock.MockClient ).EXPECT ().EscalateIncidentWithNote (gomock .Any ()).Return (nil )
230
254
r .OcmClient .(* ocmmock.MockClient ).EXPECT ().GetServiceLog (gomock .Eq (cluster ), gomock .Eq ("log_type='cluster-state-updates'" )).Return (& servicelogsv1.ClusterLogsUUIDListResponse {}, nil )
231
255
232
- _ , gotErr := Investigate (r )
256
+ result , gotErr := Investigate (r )
233
257
Expect (gotErr ).NotTo (HaveOccurred ())
258
+ Expect (result .ServiceLogPrepared .Performed ).To (BeFalse ())
259
+ Expect (result .ServiceLogSent .Performed ).To (BeFalse ())
260
+ Expect (result .LimitedSupportSet .Performed ).To (BeFalse ())
234
261
})
235
262
})
236
263
@@ -247,8 +274,11 @@ var _ = Describe("chgm", func() {
247
274
r .PdClient .(* pdmock.MockClient ).EXPECT ().EscalateIncidentWithNote (gomock .Any ()).Return (nil )
248
275
r .OcmClient .(* ocmmock.MockClient ).EXPECT ().GetServiceLog (gomock .Any (), gomock .Eq ("log_type='cluster-state-updates'" )).Return (& servicelogsv1.ClusterLogsUUIDListResponse {}, nil )
249
276
250
- _ , gotErr := Investigate (r )
277
+ result , gotErr := Investigate (r )
251
278
Expect (gotErr ).NotTo (HaveOccurred ())
279
+ Expect (result .ServiceLogPrepared .Performed ).To (BeFalse ())
280
+ Expect (result .ServiceLogSent .Performed ).To (BeFalse ())
281
+ Expect (result .LimitedSupportSet .Performed ).To (BeFalse ())
252
282
})
253
283
})
254
284
@@ -265,8 +295,11 @@ var _ = Describe("chgm", func() {
265
295
r .PdClient .(* pdmock.MockClient ).EXPECT ().EscalateIncidentWithNote (gomock .Any ()).Return (nil )
266
296
r .OcmClient .(* ocmmock.MockClient ).EXPECT ().GetServiceLog (gomock .Eq (cluster ), gomock .Eq ("log_type='cluster-state-updates'" )).Return (& servicelogsv1.ClusterLogsUUIDListResponse {}, nil )
267
297
268
- _ , gotErr := Investigate (r )
298
+ result , gotErr := Investigate (r )
269
299
Expect (gotErr ).NotTo (HaveOccurred ())
300
+ Expect (result .ServiceLogPrepared .Performed ).To (BeFalse ())
301
+ Expect (result .ServiceLogSent .Performed ).To (BeFalse ())
302
+ Expect (result .LimitedSupportSet .Performed ).To (BeFalse ())
270
303
})
271
304
})
272
305
When ("issuer user is authorized (customprefix-Installer-Role)" , func () {
@@ -282,8 +315,11 @@ var _ = Describe("chgm", func() {
282
315
r .PdClient .(* pdmock.MockClient ).EXPECT ().EscalateIncidentWithNote (gomock .Any ()).Return (nil )
283
316
r .OcmClient .(* ocmmock.MockClient ).EXPECT ().GetServiceLog (gomock .Eq (cluster ), gomock .Eq ("log_type='cluster-state-updates'" )).Return (& servicelogsv1.ClusterLogsUUIDListResponse {}, nil )
284
317
285
- _ , gotErr := Investigate (r )
318
+ result , gotErr := Investigate (r )
286
319
Expect (gotErr ).NotTo (HaveOccurred ())
320
+ Expect (result .ServiceLogPrepared .Performed ).To (BeFalse ())
321
+ Expect (result .ServiceLogSent .Performed ).To (BeFalse ())
322
+ Expect (result .LimitedSupportSet .Performed ).To (BeFalse ())
287
323
})
288
324
})
289
325
When ("issuer user is authorized (ManagedOpenShift-Support-.*)" , func () {
@@ -299,8 +335,11 @@ var _ = Describe("chgm", func() {
299
335
r .PdClient .(* pdmock.MockClient ).EXPECT ().EscalateIncidentWithNote (gomock .Any ()).Return (nil )
300
336
r .OcmClient .(* ocmmock.MockClient ).EXPECT ().GetServiceLog (gomock .Eq (cluster ), gomock .Eq ("log_type='cluster-state-updates'" )).Return (& servicelogsv1.ClusterLogsUUIDListResponse {}, nil )
301
337
302
- _ , gotErr := Investigate (r )
338
+ result , gotErr := Investigate (r )
303
339
Expect (gotErr ).NotTo (HaveOccurred ())
340
+ Expect (result .ServiceLogPrepared .Performed ).To (BeFalse ())
341
+ Expect (result .ServiceLogSent .Performed ).To (BeFalse ())
342
+ Expect (result .LimitedSupportSet .Performed ).To (BeFalse ())
304
343
})
305
344
})
306
345
When ("issuer user is authorized (.*-Support-Role)" , func () {
@@ -316,8 +355,11 @@ var _ = Describe("chgm", func() {
316
355
r .PdClient .(* pdmock.MockClient ).EXPECT ().EscalateIncidentWithNote (gomock .Any ()).Return (nil )
317
356
r .OcmClient .(* ocmmock.MockClient ).EXPECT ().GetServiceLog (gomock .Eq (cluster ), gomock .Eq ("log_type='cluster-state-updates'" )).Return (& servicelogsv1.ClusterLogsUUIDListResponse {}, nil )
318
357
319
- _ , gotErr := Investigate (r )
358
+ result , gotErr := Investigate (r )
320
359
Expect (gotErr ).NotTo (HaveOccurred ())
360
+ Expect (result .ServiceLogPrepared .Performed ).To (BeFalse ())
361
+ Expect (result .ServiceLogSent .Performed ).To (BeFalse ())
362
+ Expect (result .LimitedSupportSet .Performed ).To (BeFalse ())
321
363
})
322
364
})
323
365
When ("the returned CloudTrailEvent has a matching whitelisted user (osdManagedAdmin-.*)" , func () {
@@ -333,8 +375,11 @@ var _ = Describe("chgm", func() {
333
375
r .PdClient .(* pdmock.MockClient ).EXPECT ().EscalateIncidentWithNote (gomock .Any ()).Return (nil )
334
376
r .OcmClient .(* ocmmock.MockClient ).EXPECT ().GetServiceLog (gomock .Eq (cluster ), gomock .Eq ("log_type='cluster-state-updates'" )).Return (& servicelogsv1.ClusterLogsUUIDListResponse {}, nil )
335
377
336
- _ , gotErr := Investigate (r )
378
+ result , gotErr := Investigate (r )
337
379
Expect (gotErr ).NotTo (HaveOccurred ())
380
+ Expect (result .ServiceLogPrepared .Performed ).To (BeFalse ())
381
+ Expect (result .ServiceLogSent .Performed ).To (BeFalse ())
382
+ Expect (result .LimitedSupportSet .Performed ).To (BeFalse ())
338
383
})
339
384
})
340
385
When ("the returned CloudTrailEvent has a matching whitelisted user (osdCcsAdmin)" , func () {
@@ -350,8 +395,11 @@ var _ = Describe("chgm", func() {
350
395
r .PdClient .(* pdmock.MockClient ).EXPECT ().EscalateIncidentWithNote (gomock .Any ()).Return (nil )
351
396
r .OcmClient .(* ocmmock.MockClient ).EXPECT ().GetServiceLog (gomock .Eq (cluster ), gomock .Eq ("log_type='cluster-state-updates'" )).Return (& servicelogsv1.ClusterLogsUUIDListResponse {}, nil )
352
397
353
- _ , gotErr := Investigate (r )
398
+ result , gotErr := Investigate (r )
354
399
Expect (gotErr ).NotTo (HaveOccurred ())
400
+ Expect (result .ServiceLogPrepared .Performed ).To (BeFalse ())
401
+ Expect (result .ServiceLogSent .Performed ).To (BeFalse ())
402
+ Expect (result .LimitedSupportSet .Performed ).To (BeFalse ())
355
403
})
356
404
})
357
405
When ("the returned CloudTrailEvent has a matching whitelisted user (.*openshift-machine-api-awsv2.*)" , func () {
@@ -367,8 +415,11 @@ var _ = Describe("chgm", func() {
367
415
r .PdClient .(* pdmock.MockClient ).EXPECT ().EscalateIncidentWithNote (gomock .Any ()).Return (nil )
368
416
r .OcmClient .(* ocmmock.MockClient ).EXPECT ().GetServiceLog (gomock .Eq (cluster ), gomock .Eq ("log_type='cluster-state-updates'" )).Return (& servicelogsv1.ClusterLogsUUIDListResponse {}, nil )
369
417
370
- _ , gotErr := Investigate (r )
418
+ result , gotErr := Investigate (r )
371
419
Expect (gotErr ).NotTo (HaveOccurred ())
420
+ Expect (result .ServiceLogPrepared .Performed ).To (BeFalse ())
421
+ Expect (result .ServiceLogSent .Performed ).To (BeFalse ())
422
+ Expect (result .LimitedSupportSet .Performed ).To (BeFalse ())
372
423
})
373
424
})
374
425
When ("the returned CloudTrailEventRaw has an empty userIdentity" , func () {
@@ -381,8 +432,11 @@ var _ = Describe("chgm", func() {
381
432
r .OcmClient .(* ocmmock.MockClient ).EXPECT ().PostServiceLog (gomock .Eq (cluster .ID ()), gomock .Eq (& chgmSL )).Return (nil )
382
433
r .PdClient .(* pdmock.MockClient ).EXPECT ().SilenceIncidentWithNote (gomock .Any ()).Return (nil )
383
434
384
- _ , gotErr := Investigate (r )
435
+ result , gotErr := Investigate (r )
385
436
Expect (gotErr ).NotTo (HaveOccurred ())
437
+ Expect (result .ServiceLogPrepared .Performed ).To (BeFalse ())
438
+ Expect (result .ServiceLogSent .Performed ).To (BeTrue ())
439
+ Expect (result .LimitedSupportSet .Performed ).To (BeFalse ())
386
440
})
387
441
})
388
442
When ("issuer user is unauthorized (testuser assumed role)" , func () {
@@ -395,8 +449,11 @@ var _ = Describe("chgm", func() {
395
449
r .OcmClient .(* ocmmock.MockClient ).EXPECT ().PostServiceLog (gomock .Eq (cluster .ID ()), gomock .Eq (& chgmSL )).Return (nil )
396
450
r .PdClient .(* pdmock.MockClient ).EXPECT ().SilenceIncidentWithNote (gomock .Any ()).Return (nil )
397
451
398
- _ , gotErr := Investigate (r )
452
+ result , gotErr := Investigate (r )
399
453
Expect (gotErr ).NotTo (HaveOccurred ())
454
+ Expect (result .ServiceLogPrepared .Performed ).To (BeFalse ())
455
+ Expect (result .ServiceLogSent .Performed ).To (BeTrue ())
456
+ Expect (result .LimitedSupportSet .Performed ).To (BeFalse ())
400
457
})
401
458
})
402
459
When ("the returned CloudTrailEventRaw base data is correct, but the sessionissue's role is not role" , func () {
@@ -409,8 +466,11 @@ var _ = Describe("chgm", func() {
409
466
r .OcmClient .(* ocmmock.MockClient ).EXPECT ().PostServiceLog (gomock .Eq (cluster .ID ()), gomock .Eq (& chgmSL )).Return (nil )
410
467
r .PdClient .(* pdmock.MockClient ).EXPECT ().SilenceIncidentWithNote (gomock .Any ()).Return (nil )
411
468
412
- _ , gotErr := Investigate (r )
469
+ result , gotErr := Investigate (r )
413
470
Expect (gotErr ).NotTo (HaveOccurred ())
471
+ Expect (result .ServiceLogPrepared .Performed ).To (BeFalse ())
472
+ Expect (result .ServiceLogSent .Performed ).To (BeTrue ())
473
+ Expect (result .LimitedSupportSet .Performed ).To (BeFalse ())
414
474
})
415
475
})
416
476
When ("the returned CloudTrailEventRaw has no data" , func () {
@@ -422,8 +482,11 @@ var _ = Describe("chgm", func() {
422
482
r .OcmClient .(* ocmmock.MockClient ).EXPECT ().PostServiceLog (gomock .Eq (cluster .ID ()), gomock .Eq (& chgmSL )).Return (nil )
423
483
r .PdClient .(* pdmock.MockClient ).EXPECT ().SilenceIncidentWithNote (gomock .Any ()).Return (nil )
424
484
425
- _ , gotErr := Investigate (r )
485
+ result , gotErr := Investigate (r )
426
486
Expect (gotErr ).NotTo (HaveOccurred ())
487
+ Expect (result .ServiceLogPrepared .Performed ).To (BeFalse ())
488
+ Expect (result .ServiceLogSent .Performed ).To (BeTrue ())
489
+ Expect (result .LimitedSupportSet .Performed ).To (BeFalse ())
427
490
})
428
491
})
429
492
@@ -437,8 +500,11 @@ var _ = Describe("chgm", func() {
437
500
r .OcmClient .(* ocmmock.MockClient ).EXPECT ().PostServiceLog (gomock .Eq (cluster .ID ()), gomock .Eq (& chgmSL )).Return (nil )
438
501
r .PdClient .(* pdmock.MockClient ).EXPECT ().SilenceIncidentWithNote (gomock .Any ()).Return (nil )
439
502
440
- _ , gotErr := Investigate (r )
503
+ result , gotErr := Investigate (r )
441
504
Expect (gotErr ).NotTo (HaveOccurred ())
505
+ Expect (result .ServiceLogPrepared .Performed ).To (BeFalse ())
506
+ Expect (result .ServiceLogSent .Performed ).To (BeTrue ())
507
+ Expect (result .LimitedSupportSet .Performed ).To (BeFalse ())
442
508
})
443
509
})
444
510
@@ -452,8 +518,11 @@ var _ = Describe("chgm", func() {
452
518
r .OcmClient .(* ocmmock.MockClient ).EXPECT ().PostServiceLog (gomock .Eq (cluster .ID ()), gomock .Eq (& chgmSL )).Return (nil )
453
519
r .PdClient .(* pdmock.MockClient ).EXPECT ().SilenceIncidentWithNote (gomock .Any ()).Return (nil )
454
520
455
- _ , gotErr := Investigate (r )
521
+ result , gotErr := Investigate (r )
456
522
Expect (gotErr ).NotTo (HaveOccurred ())
523
+ Expect (result .ServiceLogPrepared .Performed ).To (BeFalse ())
524
+ Expect (result .ServiceLogSent .Performed ).To (BeTrue ())
525
+ Expect (result .LimitedSupportSet .Performed ).To (BeFalse ())
457
526
})
458
527
})
459
528
When ("the returned CloudTrailEvent has more than one resource" , func () {
@@ -467,8 +536,11 @@ var _ = Describe("chgm", func() {
467
536
r .AwsClient .(* awsmock.MockClient ).EXPECT ().PollInstanceStopEventsFor (gomock .Any (), gomock .Any ()).Return ([]cloudtrailv2types.Event {event }, nil )
468
537
r .PdClient .(* pdmock.MockClient ).EXPECT ().EscalateIncidentWithNote (gomock .Any ()).Return (nil )
469
538
470
- _ , gotErr := Investigate (r )
539
+ result , gotErr := Investigate (r )
471
540
Expect (gotErr ).NotTo (HaveOccurred ())
541
+ Expect (result .ServiceLogPrepared .Performed ).To (BeFalse ())
542
+ Expect (result .ServiceLogSent .Performed ).To (BeFalse ())
543
+ Expect (result .LimitedSupportSet .Performed ).To (BeFalse ())
472
544
})
473
545
})
474
546
When ("the returned CloudTrailEvent is empty" , func () {
@@ -482,8 +554,11 @@ var _ = Describe("chgm", func() {
482
554
r .AwsClient .(* awsmock.MockClient ).EXPECT ().PollInstanceStopEventsFor (gomock .Any (), gomock .Any ()).Return ([]cloudtrailv2types.Event {}, nil )
483
555
r .PdClient .(* pdmock.MockClient ).EXPECT ().EscalateIncidentWithNote (gomock .Any ()).Return (nil )
484
556
485
- _ , gotErr := Investigate (r )
557
+ result , gotErr := Investigate (r )
486
558
Expect (gotErr ).NotTo (HaveOccurred ())
559
+ Expect (result .ServiceLogPrepared .Performed ).To (BeFalse ())
560
+ Expect (result .ServiceLogSent .Performed ).To (BeFalse ())
561
+ Expect (result .LimitedSupportSet .Performed ).To (BeFalse ())
487
562
})
488
563
})
489
564
When ("the returned CloudTrailEvent is an empty string" , func () {
@@ -497,8 +572,11 @@ var _ = Describe("chgm", func() {
497
572
r .AwsClient .(* awsmock.MockClient ).EXPECT ().PollInstanceStopEventsFor (gomock .Any (), gomock .Any ()).Return ([]cloudtrailv2types.Event {event }, nil )
498
573
r .PdClient .(* pdmock.MockClient ).EXPECT ().EscalateIncidentWithNote (gomock .Any ()).Return (nil )
499
574
500
- _ , gotErr := Investigate (r )
575
+ result , gotErr := Investigate (r )
501
576
Expect (gotErr ).NotTo (HaveOccurred ())
577
+ Expect (result .ServiceLogPrepared .Performed ).To (BeFalse ())
578
+ Expect (result .ServiceLogSent .Performed ).To (BeFalse ())
579
+ Expect (result .LimitedSupportSet .Performed ).To (BeFalse ())
502
580
})
503
581
})
504
582
When ("the returned CloudTrailEvent is an empty json" , func () {
@@ -512,8 +590,11 @@ var _ = Describe("chgm", func() {
512
590
r .AwsClient .(* awsmock.MockClient ).EXPECT ().PollInstanceStopEventsFor (gomock .Any (), gomock .Any ()).Return ([]cloudtrailv2types.Event {event }, nil )
513
591
r .PdClient .(* pdmock.MockClient ).EXPECT ().EscalateIncidentWithNote (gomock .Any ()).Return (nil )
514
592
515
- _ , gotErr := Investigate (r )
593
+ result , gotErr := Investigate (r )
516
594
Expect (gotErr ).NotTo (HaveOccurred ())
595
+ Expect (result .ServiceLogPrepared .Performed ).To (BeFalse ())
596
+ Expect (result .ServiceLogSent .Performed ).To (BeFalse ())
597
+ Expect (result .LimitedSupportSet .Performed ).To (BeFalse ())
517
598
})
518
599
})
519
600
When ("the returned CloudTrailEvent is an invalid json" , func () {
@@ -527,8 +608,11 @@ var _ = Describe("chgm", func() {
527
608
r .AwsClient .(* awsmock.MockClient ).EXPECT ().PollInstanceStopEventsFor (gomock .Any (), gomock .Any ()).Return ([]cloudtrailv2types.Event {event }, nil )
528
609
r .PdClient .(* pdmock.MockClient ).EXPECT ().EscalateIncidentWithNote (gomock .Any ()).Return (nil )
529
610
530
- _ , gotErr := Investigate (r )
611
+ result , gotErr := Investigate (r )
531
612
Expect (gotErr ).NotTo (HaveOccurred ())
613
+ Expect (result .ServiceLogPrepared .Performed ).To (BeFalse ())
614
+ Expect (result .ServiceLogSent .Performed ).To (BeFalse ())
615
+ Expect (result .LimitedSupportSet .Performed ).To (BeFalse ())
532
616
})
533
617
})
534
618
})
0 commit comments