oncall-engine/engine/apps/api/views/route_regex_debugger.py
Joey Orlando 9dde1805aa
add mypy static type checker to backend codebase (#2151)
# What this PR does

- Adds [`mypy` static type checking](https://mypy-lang.org/) to our CI
pipeline. Currently there is still a **ton** of errors being returned by
the tool, as we'll need to fix pre-existing errors. I think we can
slowly chip away at these errors in small PRs, doing them all in one
large PR is likely very risky.
- Also, this PR starts chipping away at one of the main type errors that
we have which is accessing the `datetime` class (from the `datetime`
library) or `timedelta` function on the `django.utils.timezone` module.
Basically we should be instead accessing these two objects from the
native `datetime` module. This makes sense because the [`__all__`
attribute](https://github.com/django/django/blob/main/django/utils/timezone.py#L14-L30)
in `django.utils.timezone` does not re-export `datetime` or `timedelta`.
- splits `engine` dependencies out into `requirements.txt` and
`requirements-dev.txt`

## Checklist

- [ ] Unit, integration, and e2e (if applicable) tests updated (N/A)
- [ ] Documentation added (or `pr:no public docs` PR label added if not
required) (N/A)
- [ ] `CHANGELOG.md` updated (or `pr:no changelog` PR label added if not
required) (N/A)
2023-06-12 12:50:33 -04:00

55 lines
2.1 KiB
Python

import json
import re
from django.db.models import Prefetch
from rest_framework.permissions import IsAuthenticated
from rest_framework.response import Response
from rest_framework.views import APIView
from apps.alerts.incident_appearance.renderers.web_renderer import AlertWebRenderer
from apps.alerts.models import Alert, AlertGroup
from apps.auth_token.auth import PluginAuthentication
from common.api_helpers.exceptions import BadRequest
class RouteRegexDebuggerView(APIView):
authentication_classes = (PluginAuthentication,)
permission_classes = (IsAuthenticated,)
def get(self, request):
organization = self.request.auth.organization
team = self.request.user.current_team
regex = request.query_params.get("regex", None)
if regex is None:
raise BadRequest(detail={"regex": ["This field is required."]})
if regex == "":
return Response([])
try:
re.compile(regex)
except re.error:
raise BadRequest(detail={"regex": ["Invalid regex."]})
incidents_matching_regex = []
MAX_INCIDENTS_TO_SHOW = 5
INCIDENTS_TO_LOOKUP = 100
for ag in (
AlertGroup.unarchived_objects.prefetch_related(Prefetch("alerts", queryset=Alert.objects.order_by("pk")))
.filter(channel__organization=organization, channel__team=team)
.order_by("-started_at")[:INCIDENTS_TO_LOOKUP]
):
if len(incidents_matching_regex) < MAX_INCIDENTS_TO_SHOW:
first_alert = ag.alerts.all()[0]
if re.search(regex, json.dumps(first_alert.raw_request_data)):
title = AlertWebRenderer(first_alert).render()["title"]
incidents_matching_regex.append(
{
"title": title,
"pk": ag.public_primary_key,
"payload": first_alert.raw_request_data,
"inside_organization_number": ag.inside_organization_number,
}
)
return Response(incidents_matching_regex)