def handle_email(request): if request.method != "POST": return HttpResponseBadRequest() events = json.loads(request.POST["mandrill_events"]) for event in events: for recipient_address, recipient_name in event["msg"]["to"]: code, domain = recipient_address.split("@") try: check = Check.objects.get(code=code) except ValueError: continue except Check.DoesNotExist: continue check.last_ping = timezone.now() if check.status == "new": check.status = "up" check.save() ping = Ping(owner=check) ping.scheme = "email" ping.body = event["msg"]["raw_msg"] ping.save() response = HttpResponse("OK") return response
def ping(request, code): check = get_object_or_404(Check, code=code) check.n_pings = F("n_pings") + 1 check.last_ping = timezone.now() check.last_ping_body = request.body[:10000] check.alert_after = check.get_alert_after() if check.status in ("new", "paused"): check.status = "up" check.save() check.refresh_from_db() ping = Ping(owner=check) headers = request.META ping.n = check.n_pings remote_addr = headers.get("HTTP_X_FORWARDED_FOR", headers["REMOTE_ADDR"]) ping.remote_addr = remote_addr.split(",")[0] ping.scheme = headers.get("HTTP_X_FORWARDED_PROTO", "http") ping.method = headers["REQUEST_METHOD"] # If User-Agent is longer than 200 characters, truncate it: ping.ua = headers.get("HTTP_USER_AGENT", "")[:200] ping.save() response = HttpResponse("OK") response["Access-Control-Allow-Origin"] = "*" return response
def setUp(self): super(LogTestCase, self).setUp() self.check = Check(user=self.alice) self.check.save() ping = Ping(owner=self.check) ping.save()
def ping(request, code): try: check = Check.objects.get(code=code) except Check.DoesNotExist: return HttpResponseBadRequest() check.n_pings = F("n_pings") + 1 check.last_ping = timezone.now() if check.status in ("new", "paused"): check.status = "up" if check.runs_too_often() == 'over': check.status = "over" check.save() check.refresh_from_db() # check from the db send mail to user on jobs that are running too often check.runs_too_often() ping = Ping(owner=check) headers = request.META ping.n = check.n_pings remote_addr = headers.get("HTTP_X_FORWARDED_FOR", headers["REMOTE_ADDR"]) ping.remote_addr = remote_addr.split(",")[0] ping.scheme = headers.get("HTTP_X_FORWARDED_PROTO", "http") ping.method = headers["REQUEST_METHOD"] # If User-Agent is longer than 200 characters, truncate it: ping.ua = headers.get("HTTP_USER_AGENT", "")[:200] ping.save() response = HttpResponse("OK" + check.status) response["Access-Control-Allow-Origin"] = "*" return response
def ping(request, code): try: check = Check.objects.get(code=code) except Check.DoesNotExist: return HttpResponseBadRequest() check.last_ping = timezone.now() if check.status == "new": check.status = "up" check.save() ping = Ping(owner=check) headers = request.META ping.remote_addr = headers.get("HTTP_X_REAL_IP", headers["REMOTE_ADDR"]) ping.scheme = headers.get("HTTP_X_SCHEME", "http") ping.method = headers["REQUEST_METHOD"] # If User-Agent is longer than 200 characters, truncate it: ping.ua = headers.get("HTTP_USER_AGENT", "")[:200] ping.body = request.body ping.save() response = HttpResponse("OK") response["Access-Control-Allow-Origin"] = "*" return response
def setUp(self): self.alice = User(username="******") self.alice.set_password("password") self.alice.save() self.check = Check(user=self.alice) self.check.save() ping = Ping(owner=self.check) ping.save()
def setUp(self): super(LogTestCase, self).setUp() self.alice = User(username="******", email="*****@*****.**") self.alice.set_password("password") self.alice.save() self.check = Check(user=self.alice) self.check.save() ping = Ping(owner=self.check) ping.save()
def setUp(self): super(LogTestCase, self).setUp() self.check = Check(user=self.alice) self.check.save() ping = Ping(owner=self.check) ping.save() # Older MySQL versions don't store microseconds. This makes sure # the ping is older than any notifications we may create later: ping.created = "2000-01-01T00:00:00+00:00" ping.save()
def test_it_works(self): p = Ping(owner=self.check) p.created = now() p.save() n = Notification.objects.create(owner=self.check, channel=self.channel) n.created = p.created - td(minutes=1) n.save() output = Command().handle() self.assertIn("Pruned 1 notifications", output) self.assertFalse(Notification.objects.exists())
def log(request, code): check = get_object_or_404(Check, code=code) if check.user != request.user: return HttpResponseForbidden() profile = Profile.objects.for_user(request.user) limit = profile.ping_log_limit pings = Ping.objects.filter(owner=check).order_by("-id")[:limit] pings = list(pings.iterator()) # oldest-to-newest order will be more convenient for adding # "not received" placeholders: pings.reverse() # Add a dummy ping object at the end. We iterate over *pairs* of pings # and don't want to handle a special case of a check with a single ping. pings.append(Ping(created=timezone.now())) # Now go through pings, calculate time gaps, and decorate # the pings list for convenient use in template wrapped = [] early = False for older, newer in pairwise(pings): wrapped.append({"ping": older, "early": early}) # Fill in "missed ping" placeholders: expected_date = older.created + check.timeout n_blanks = 0 while expected_date + check.grace < newer.created and n_blanks < 10: wrapped.append({"placeholder_date": expected_date}) expected_date = expected_date + check.timeout n_blanks += 1 # Prepare early flag for next ping to come early = older.created + check.timeout > newer.created + check.grace reached_limit = len(pings) > limit wrapped.reverse() ctx = { "check": check, "pings": wrapped, "num_pings": len(pings), "limit": limit, "show_limit_notice": reached_limit and settings.USE_PAYMENTS } return render(request, "front/log.html", ctx)
def ping(request, code): try: check = Check.objects.get(code=code) except Check.DoesNotExist: return HttpResponseBadRequest() check.n_pings = F("n_pings") + 1 if check.last_ping: now = timezone.now() reverse_grace = check.timeout - check.grace if reverse_grace <= td(seconds=0): too_early = now else: too_early = check.last_ping + reverse_grace if now <= too_early: check.often = True else: check.often = False check.last_ping = timezone.now() if check.status in ("new", "paused"): check.status = "up" check.save() check.refresh_from_db() if check.often: check.send_alert() ping = Ping(owner=check) headers = request.META ping.n = check.n_pings remote_addr = headers.get("HTTP_X_FORWARDED_FOR", headers["REMOTE_ADDR"]) ping.remote_addr = remote_addr.split(",")[0] ping.scheme = headers.get("HTTP_X_FORWARDED_PROTO", "http") ping.method = headers["REQUEST_METHOD"] # If User-Agent is longer than 200 characters, truncate it: ping.ua = headers.get("HTTP_USER_AGENT", "")[:200] ping.save() response = HttpResponse("OK") response["Access-Control-Allow-Origin"] = "*" return response
def setUp(self): super().setUp() self.a1 = Check(project=self.project, name="Alice 1") self.a1.timeout = td(seconds=3600) self.a1.grace = td(seconds=900) self.a1.n_pings = 1 self.a1.status = "new" self.a1.tags = "a1-tag a1-additional-tag" self.a1.desc = "This is description" self.a1.save() self.ping = Ping(owner=self.a1) self.ping.n = 1 self.ping.remote_addr = "1.2.3.4" self.ping.scheme = "https" self.ping.method = "get" self.ping.ua = "foo-agent" self.ping.save() self.url = "/api/v1/checks/%s/pings/" % self.a1.code
def ping(request, code): try: check = Check.objects.get(code=code) except Check.DoesNotExist: return HttpResponseBadRequest() if check.status in ("new", "paused"): check.status = "up" # only confirm if a check is too_often if the check is not in down-wise statuses if check.status not in ("down"): if check.running_too_often(): check.status = "too often" else: check.status = "up" now = timezone.now() check.n_pings = F("n_pings") + 1 check.last_ping = now # store expected time for next ping check.next_ping = now + check.timeout check.save() check.refresh_from_db() ping = Ping(owner=check) headers = request.META ping.n = check.n_pings remote_addr = headers.get("HTTP_X_FORWARDED_FOR", headers["REMOTE_ADDR"]) ping.remote_addr = remote_addr.split(",")[0] ping.scheme = headers.get("HTTP_X_FORWARDED_PROTO", "http") ping.method = headers["REQUEST_METHOD"] # If User-Agent is longer than 200 characters, truncate it: ping.ua = headers.get("HTTP_USER_AGENT", "")[:200] ping.save() response = HttpResponse("OK") response["Access-Control-Allow-Origin"] = "*" return response
def ping(request, code): try: check = Check.objects.get(code=code) except Check.DoesNotExist: return HttpResponseBadRequest() # num_pings= Ping.objects.filter(owner=check).filter(created__range=(check.prev_ping,deadline)) # import pdb; pdb.set_trace() # if len(num_pings) > 1: if check.last_ping: deadline = check.last_ping + check.timeout - check.grace if timezone.now() > check.last_ping and timezone.now() < deadline: check.often = True else: check.often = False check.n_pings = F("n_pings") + 1 check.last_ping = timezone.now() if check.status in ("new", "paused"): check.status = "up" check.save() check.refresh_from_db() if check.often: check.often_alert() ping = Ping(owner=check) headers = request.META ping.n = check.n_pings remote_addr = headers.get("HTTP_X_FORWARDED_FOR", headers["REMOTE_ADDR"]) ping.remote_addr = remote_addr.split(",")[0] ping.scheme = headers.get("HTTP_X_FORWARDED_PROTO", "http") ping.method = headers["REQUEST_METHOD"] # If User-Agent is longer than 200 characters, truncate it: ping.ua = headers.get("HTTP_USER_AGENT", "")[:200] ping.save() response = HttpResponse("OK") response["Access-Control-Allow-Origin"] = "*" return response
def setUp(self): super().setUp() self.check = Check(project=self.project) self.check.name = "Daily Backup" self.check.desc = "Line 1\nLine2" self.check.tags = "foo bar" self.check.status = "down" self.check.last_ping = now() - td(minutes=61) self.check.n_pings = 112233 self.check.save() self.ping = Ping(owner=self.check) self.ping.remote_addr = "1.2.3.4" self.ping.body = "Body Line 1\nBody Line 2" self.ping.save() self.channel = Channel(project=self.project) self.channel.kind = "email" self.channel.value = "*****@*****.**" self.channel.email_verified = True self.channel.save() self.channel.checks.add(self.check)