Skip to content

Add Bits AI SRE Investigations#10

Merged
platinummonkey merged 3 commits into
mainfrom
dshan/bits_investigate
Feb 10, 2026
Merged

Add Bits AI SRE Investigations#10
platinummonkey merged 3 commits into
mainfrom
dshan/bits_investigate

Conversation

@dshan-datadog
Copy link
Copy Markdown
Contributor

What does this PR do?

Adds a command to trigger a Bits AI SRE investigation. Since this endpoint isn't available in the official Datadog client yet, we create a function to call a generic HTTP endpoint.

Motivation

Bits AI SRE is available via an API already, and this would allow other agents or users to trigger investigations from the command line.

Checklist

  • The code change follows the project conventions (see CONTRIBUTING.md)
  • Tests have been added/updated (if applicable)
  • Documentation has been updated (if applicable)
  • All CI checks pass
  • Code coverage is maintained or improved

@dshan-datadog dshan-datadog requested a review from a team as a code owner February 10, 2026 02:57
@github-actions
Copy link
Copy Markdown

github-actions Bot commented Feb 10, 2026

📊 Test Coverage Report

Overall Coverage: 75.4% Coverage

Threshold: 80% ❌

Coverage by Package
## Coverage by Package

- github.com/DataDog/pup/pkg/auth/callback/server.go:40: 81.2%
- github.com/DataDog/pup/pkg/auth/dcr/client.go:28: 100.0%
- github.com/DataDog/pup/pkg/auth/dcr/types.go:24: 100.0%
- github.com/DataDog/pup/pkg/auth/oauth/client.go:22: 100.0%
- github.com/DataDog/pup/pkg/auth/oauth/pkce.go:24: 85.7%
- github.com/DataDog/pup/pkg/auth/storage/factory.go:53: 94.7%
- github.com/DataDog/pup/pkg/auth/storage/keychain.go:44: 42.9%
- github.com/DataDog/pup/pkg/auth/storage/storage.go:58: 71.4%
- github.com/DataDog/pup/pkg/auth/types/types.go:23: 100.0%
- github.com/DataDog/pup/pkg/client/client.go:31: 94.1%
- github.com/DataDog/pup/pkg/config/config.go:22: 100.0%
- github.com/DataDog/pup/pkg/formatter/formatter.go:31: 100.0%
- github.com/DataDog/pup/pkg/util/time.go:20: 95.8%

## Summary

total:								(statements)		75.4%

📈 Coverage Status: ❌ FAILED - Coverage below minimum threshold

Updated for commit b1bc4ac

platinummonkey and others added 2 commits February 9, 2026 21:29
Fix golangci-lint errcheck violations by explicitly handling Close() errors
in defer statements. Using anonymous function with blank identifier to
explicitly ignore the error, which is the common pattern for deferred Close()
calls where the error cannot be meaningfully handled.

- runInvestigationsTrigger: defer func() { _ = resp.Body.Close() }()
- runInvestigationsGet: defer func() { _ = resp.Body.Close() }()
- runInvestigationsList: defer func() { _ = resp.Body.Close() }()

Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
@platinummonkey platinummonkey merged commit 7dc500a into main Feb 10, 2026
5 checks passed
@platinummonkey platinummonkey deleted the dshan/bits_investigate branch February 10, 2026 03:35
platinummonkey added a commit that referenced this pull request Mar 26, 2026
Addresses Dependabot alert #10: libcrux-sha3 < 0.0.8 has an incorrect
calculation in incremental SHAKE XOF squeeze functions (GHSA-q29p-9pfr-j652).

russh 0.58.0 pins libcrux-ml-kem = "^0.0.4" which transitively requires
libcrux-sha3 0.0.4. The ^0.0.4 semver constraint prevents a simple
cargo update, so this uses [patch.crates-io] to redirect russh to the
upstream fix branch (warp-tech/russh PR #680) at commit fbc5d05, which
bumps libcrux-ml-kem to 0.0.8 and pulls in the patched libcrux-sha3 0.0.8.

The patch should be removed once russh publishes a release with the fix.

Co-Authored-By: Claude Sonnet 4.6 (1M context) <noreply@anthropic.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants