sentry-ruby 5.3.1 → 5.16.1
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/.gitignore +11 -0
- data/.rspec +2 -0
- data/.yardopts +2 -0
- data/CHANGELOG.md +313 -0
- data/Gemfile +26 -0
- data/Makefile +4 -0
- data/README.md +11 -8
- data/Rakefile +20 -0
- data/bin/console +18 -0
- data/bin/setup +8 -0
- data/lib/sentry/background_worker.rb +79 -0
- data/lib/sentry/backpressure_monitor.rb +75 -0
- data/lib/sentry/backtrace.rb +124 -0
- data/lib/sentry/baggage.rb +70 -0
- data/lib/sentry/breadcrumb/sentry_logger.rb +90 -0
- data/lib/sentry/breadcrumb.rb +76 -0
- data/lib/sentry/breadcrumb_buffer.rb +64 -0
- data/lib/sentry/check_in_event.rb +60 -0
- data/lib/sentry/client.rb +248 -0
- data/lib/sentry/configuration.rb +650 -0
- data/lib/sentry/core_ext/object/deep_dup.rb +61 -0
- data/lib/sentry/core_ext/object/duplicable.rb +155 -0
- data/lib/sentry/cron/configuration.rb +23 -0
- data/lib/sentry/cron/monitor_check_ins.rb +75 -0
- data/lib/sentry/cron/monitor_config.rb +53 -0
- data/lib/sentry/cron/monitor_schedule.rb +42 -0
- data/lib/sentry/dsn.rb +53 -0
- data/lib/sentry/envelope.rb +93 -0
- data/lib/sentry/error_event.rb +38 -0
- data/lib/sentry/event.rb +156 -0
- data/lib/sentry/exceptions.rb +9 -0
- data/lib/sentry/hub.rb +316 -0
- data/lib/sentry/integrable.rb +32 -0
- data/lib/sentry/interface.rb +16 -0
- data/lib/sentry/interfaces/exception.rb +43 -0
- data/lib/sentry/interfaces/request.rb +134 -0
- data/lib/sentry/interfaces/single_exception.rb +67 -0
- data/lib/sentry/interfaces/stacktrace.rb +87 -0
- data/lib/sentry/interfaces/stacktrace_builder.rb +79 -0
- data/lib/sentry/interfaces/threads.rb +42 -0
- data/lib/sentry/linecache.rb +47 -0
- data/lib/sentry/logger.rb +20 -0
- data/lib/sentry/net/http.rb +106 -0
- data/lib/sentry/profiler.rb +233 -0
- data/lib/sentry/propagation_context.rb +134 -0
- data/lib/sentry/puma.rb +32 -0
- data/lib/sentry/rack/capture_exceptions.rb +79 -0
- data/lib/sentry/rack.rb +5 -0
- data/lib/sentry/rake.rb +28 -0
- data/lib/sentry/redis.rb +108 -0
- data/lib/sentry/release_detector.rb +39 -0
- data/lib/sentry/scope.rb +360 -0
- data/lib/sentry/session.rb +33 -0
- data/lib/sentry/session_flusher.rb +90 -0
- data/lib/sentry/span.rb +273 -0
- data/lib/sentry/test_helper.rb +84 -0
- data/lib/sentry/transaction.rb +359 -0
- data/lib/sentry/transaction_event.rb +80 -0
- data/lib/sentry/transport/configuration.rb +98 -0
- data/lib/sentry/transport/dummy_transport.rb +21 -0
- data/lib/sentry/transport/http_transport.rb +206 -0
- data/lib/sentry/transport/spotlight_transport.rb +50 -0
- data/lib/sentry/transport.rb +225 -0
- data/lib/sentry/utils/argument_checking_helper.rb +19 -0
- data/lib/sentry/utils/custom_inspection.rb +14 -0
- data/lib/sentry/utils/encoding_helper.rb +22 -0
- data/lib/sentry/utils/exception_cause_chain.rb +20 -0
- data/lib/sentry/utils/logging_helper.rb +26 -0
- data/lib/sentry/utils/real_ip.rb +84 -0
- data/lib/sentry/utils/request_id.rb +18 -0
- data/lib/sentry/version.rb +5 -0
- data/lib/sentry-ruby.rb +580 -0
- data/sentry-ruby-core.gemspec +23 -0
- data/sentry-ruby.gemspec +24 -0
- metadata +75 -16
@@ -0,0 +1,206 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
require "net/http"
|
4
|
+
require "zlib"
|
5
|
+
|
6
|
+
module Sentry
|
7
|
+
class HTTPTransport < Transport
|
8
|
+
GZIP_ENCODING = "gzip"
|
9
|
+
GZIP_THRESHOLD = 1024 * 30
|
10
|
+
CONTENT_TYPE = 'application/x-sentry-envelope'
|
11
|
+
|
12
|
+
DEFAULT_DELAY = 60
|
13
|
+
RETRY_AFTER_HEADER = "retry-after"
|
14
|
+
RATE_LIMIT_HEADER = "x-sentry-rate-limits"
|
15
|
+
USER_AGENT = "sentry-ruby/#{Sentry::VERSION}"
|
16
|
+
|
17
|
+
# The list of errors ::Net::HTTP is known to raise
|
18
|
+
# See https://github.com/ruby/ruby/blob/b0c639f249165d759596f9579fa985cb30533de6/lib/bundler/fetcher.rb#L281-L286
|
19
|
+
HTTP_ERRORS = [
|
20
|
+
Timeout::Error, EOFError, SocketError, Errno::ENETDOWN, Errno::ENETUNREACH,
|
21
|
+
Errno::EINVAL, Errno::ECONNRESET, Errno::ETIMEDOUT, Errno::EAGAIN,
|
22
|
+
Net::HTTPBadResponse, Net::HTTPHeaderSyntaxError, Net::ProtocolError,
|
23
|
+
Zlib::BufError, Errno::EHOSTUNREACH, Errno::ECONNREFUSED
|
24
|
+
].freeze
|
25
|
+
|
26
|
+
|
27
|
+
def initialize(*args)
|
28
|
+
super
|
29
|
+
log_debug("Sentry HTTP Transport will connect to #{@dsn.server}") if @dsn
|
30
|
+
end
|
31
|
+
|
32
|
+
def send_data(data)
|
33
|
+
encoding = ""
|
34
|
+
|
35
|
+
if should_compress?(data)
|
36
|
+
data = Zlib.gzip(data)
|
37
|
+
encoding = GZIP_ENCODING
|
38
|
+
end
|
39
|
+
|
40
|
+
headers = {
|
41
|
+
'Content-Type' => CONTENT_TYPE,
|
42
|
+
'Content-Encoding' => encoding,
|
43
|
+
'User-Agent' => USER_AGENT
|
44
|
+
}
|
45
|
+
|
46
|
+
auth_header = generate_auth_header
|
47
|
+
headers['X-Sentry-Auth'] = auth_header if auth_header
|
48
|
+
|
49
|
+
response = conn.start do |http|
|
50
|
+
request = ::Net::HTTP::Post.new(endpoint, headers)
|
51
|
+
request.body = data
|
52
|
+
http.request(request)
|
53
|
+
end
|
54
|
+
|
55
|
+
if response.code.match?(/\A2\d{2}/)
|
56
|
+
handle_rate_limited_response(response) if has_rate_limited_header?(response)
|
57
|
+
elsif response.code == "429"
|
58
|
+
log_debug("the server responded with status 429")
|
59
|
+
handle_rate_limited_response(response)
|
60
|
+
else
|
61
|
+
error_info = "the server responded with status #{response.code}"
|
62
|
+
error_info += "\nbody: #{response.body}"
|
63
|
+
error_info += " Error in headers is: #{response['x-sentry-error']}" if response['x-sentry-error']
|
64
|
+
|
65
|
+
raise Sentry::ExternalError, error_info
|
66
|
+
end
|
67
|
+
rescue SocketError, *HTTP_ERRORS => e
|
68
|
+
on_error if respond_to?(:on_error)
|
69
|
+
raise Sentry::ExternalError.new(e&.message)
|
70
|
+
end
|
71
|
+
|
72
|
+
def endpoint
|
73
|
+
@dsn.envelope_endpoint
|
74
|
+
end
|
75
|
+
|
76
|
+
def generate_auth_header
|
77
|
+
return nil unless @dsn
|
78
|
+
|
79
|
+
now = Sentry.utc_now.to_i
|
80
|
+
fields = {
|
81
|
+
'sentry_version' => PROTOCOL_VERSION,
|
82
|
+
'sentry_client' => USER_AGENT,
|
83
|
+
'sentry_timestamp' => now,
|
84
|
+
'sentry_key' => @dsn.public_key
|
85
|
+
}
|
86
|
+
fields['sentry_secret'] = @dsn.secret_key if @dsn.secret_key
|
87
|
+
'Sentry ' + fields.map { |key, value| "#{key}=#{value}" }.join(', ')
|
88
|
+
end
|
89
|
+
|
90
|
+
def conn
|
91
|
+
server = URI(@dsn.server)
|
92
|
+
|
93
|
+
# connection respects proxy setting from @transport_configuration, or environment variables (HTTP_PROXY, HTTPS_PROXY, NO_PROXY)
|
94
|
+
# Net::HTTP will automatically read the env vars.
|
95
|
+
# See https://ruby-doc.org/3.2.2/stdlibs/net/Net/HTTP.html#class-Net::HTTP-label-Proxies
|
96
|
+
connection =
|
97
|
+
if proxy = normalize_proxy(@transport_configuration.proxy)
|
98
|
+
::Net::HTTP.new(server.hostname, server.port, proxy[:uri].hostname, proxy[:uri].port, proxy[:user], proxy[:password])
|
99
|
+
else
|
100
|
+
::Net::HTTP.new(server.hostname, server.port)
|
101
|
+
end
|
102
|
+
|
103
|
+
connection.use_ssl = server.scheme == "https"
|
104
|
+
connection.read_timeout = @transport_configuration.timeout
|
105
|
+
connection.write_timeout = @transport_configuration.timeout if connection.respond_to?(:write_timeout)
|
106
|
+
connection.open_timeout = @transport_configuration.open_timeout
|
107
|
+
|
108
|
+
ssl_configuration.each do |key, value|
|
109
|
+
connection.send("#{key}=", value)
|
110
|
+
end
|
111
|
+
|
112
|
+
connection
|
113
|
+
end
|
114
|
+
|
115
|
+
private
|
116
|
+
|
117
|
+
def has_rate_limited_header?(headers)
|
118
|
+
headers[RETRY_AFTER_HEADER] || headers[RATE_LIMIT_HEADER]
|
119
|
+
end
|
120
|
+
|
121
|
+
def handle_rate_limited_response(headers)
|
122
|
+
rate_limits =
|
123
|
+
if rate_limits = headers[RATE_LIMIT_HEADER]
|
124
|
+
parse_rate_limit_header(rate_limits)
|
125
|
+
elsif retry_after = headers[RETRY_AFTER_HEADER]
|
126
|
+
# although Sentry doesn't send a date string back
|
127
|
+
# based on HTTP specification, this could be a date string (instead of an integer)
|
128
|
+
retry_after = retry_after.to_i
|
129
|
+
retry_after = DEFAULT_DELAY if retry_after == 0
|
130
|
+
|
131
|
+
{ nil => Time.now + retry_after }
|
132
|
+
else
|
133
|
+
{ nil => Time.now + DEFAULT_DELAY }
|
134
|
+
end
|
135
|
+
|
136
|
+
rate_limits.each do |category, limit|
|
137
|
+
if current_limit = @rate_limits[category]
|
138
|
+
if current_limit < limit
|
139
|
+
@rate_limits[category] = limit
|
140
|
+
end
|
141
|
+
else
|
142
|
+
@rate_limits[category] = limit
|
143
|
+
end
|
144
|
+
end
|
145
|
+
end
|
146
|
+
|
147
|
+
def parse_rate_limit_header(rate_limit_header)
|
148
|
+
time = Time.now
|
149
|
+
|
150
|
+
result = {}
|
151
|
+
|
152
|
+
limits = rate_limit_header.split(",")
|
153
|
+
limits.each do |limit|
|
154
|
+
next if limit.nil? || limit.empty?
|
155
|
+
|
156
|
+
begin
|
157
|
+
retry_after, categories = limit.strip.split(":").first(2)
|
158
|
+
retry_after = time + retry_after.to_i
|
159
|
+
categories = categories.split(";")
|
160
|
+
|
161
|
+
if categories.empty?
|
162
|
+
result[nil] = retry_after
|
163
|
+
else
|
164
|
+
categories.each do |category|
|
165
|
+
result[category] = retry_after
|
166
|
+
end
|
167
|
+
end
|
168
|
+
rescue StandardError
|
169
|
+
end
|
170
|
+
end
|
171
|
+
|
172
|
+
result
|
173
|
+
end
|
174
|
+
|
175
|
+
def should_compress?(data)
|
176
|
+
@transport_configuration.encoding == GZIP_ENCODING && data.bytesize >= GZIP_THRESHOLD
|
177
|
+
end
|
178
|
+
|
179
|
+
# @param proxy [String, URI, Hash] Proxy config value passed into `config.transport`.
|
180
|
+
# Accepts either a URI formatted string, URI, or a hash with the `uri`, `user`, and `password` keys.
|
181
|
+
# @return [Hash] Normalized proxy config that will be passed into `Net::HTTP`
|
182
|
+
def normalize_proxy(proxy)
|
183
|
+
return proxy unless proxy
|
184
|
+
|
185
|
+
case proxy
|
186
|
+
when String
|
187
|
+
uri = URI(proxy)
|
188
|
+
{ uri: uri, user: uri.user, password: uri.password }
|
189
|
+
when URI
|
190
|
+
{ uri: proxy, user: proxy.user, password: proxy.password }
|
191
|
+
when Hash
|
192
|
+
proxy
|
193
|
+
end
|
194
|
+
end
|
195
|
+
|
196
|
+
def ssl_configuration
|
197
|
+
configuration = {
|
198
|
+
verify: @transport_configuration.ssl_verification,
|
199
|
+
ca_file: @transport_configuration.ssl_ca_file
|
200
|
+
}.merge(@transport_configuration.ssl || {})
|
201
|
+
|
202
|
+
configuration[:verify_mode] = configuration.delete(:verify) ? OpenSSL::SSL::VERIFY_PEER : OpenSSL::SSL::VERIFY_NONE
|
203
|
+
configuration
|
204
|
+
end
|
205
|
+
end
|
206
|
+
end
|
@@ -0,0 +1,50 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
require "net/http"
|
4
|
+
require "zlib"
|
5
|
+
|
6
|
+
module Sentry
|
7
|
+
# Designed to just report events to Spotlight in development.
|
8
|
+
class SpotlightTransport < HTTPTransport
|
9
|
+
DEFAULT_SIDECAR_URL = "http://localhost:8969/stream"
|
10
|
+
MAX_FAILED_REQUESTS = 3
|
11
|
+
|
12
|
+
def initialize(configuration)
|
13
|
+
super
|
14
|
+
@sidecar_url = configuration.spotlight.is_a?(String) ? configuration.spotlight : DEFAULT_SIDECAR_URL
|
15
|
+
@failed = 0
|
16
|
+
@logged = false
|
17
|
+
|
18
|
+
log_debug("[Spotlight] initialized for url #{@sidecar_url}")
|
19
|
+
end
|
20
|
+
|
21
|
+
def endpoint
|
22
|
+
"/stream"
|
23
|
+
end
|
24
|
+
|
25
|
+
def send_data(data)
|
26
|
+
if @failed >= MAX_FAILED_REQUESTS
|
27
|
+
unless @logged
|
28
|
+
log_debug("[Spotlight] disabling because of too many request failures")
|
29
|
+
@logged = true
|
30
|
+
end
|
31
|
+
|
32
|
+
return
|
33
|
+
end
|
34
|
+
|
35
|
+
super
|
36
|
+
end
|
37
|
+
|
38
|
+
def on_error
|
39
|
+
@failed += 1
|
40
|
+
end
|
41
|
+
|
42
|
+
# Similar to HTTPTransport connection, but does not support Proxy and SSL
|
43
|
+
def conn
|
44
|
+
sidecar = URI(@sidecar_url)
|
45
|
+
connection = ::Net::HTTP.new(sidecar.hostname, sidecar.port, nil)
|
46
|
+
connection.use_ssl = false
|
47
|
+
connection
|
48
|
+
end
|
49
|
+
end
|
50
|
+
end
|
@@ -0,0 +1,225 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
require "json"
|
4
|
+
require "base64"
|
5
|
+
require "sentry/envelope"
|
6
|
+
|
7
|
+
module Sentry
|
8
|
+
class Transport
|
9
|
+
PROTOCOL_VERSION = '7'
|
10
|
+
USER_AGENT = "sentry-ruby/#{Sentry::VERSION}"
|
11
|
+
CLIENT_REPORT_INTERVAL = 30
|
12
|
+
|
13
|
+
# https://develop.sentry.dev/sdk/client-reports/#envelope-item-payload
|
14
|
+
CLIENT_REPORT_REASONS = [
|
15
|
+
:ratelimit_backoff,
|
16
|
+
:queue_overflow,
|
17
|
+
:cache_overflow, # NA
|
18
|
+
:network_error,
|
19
|
+
:sample_rate,
|
20
|
+
:before_send,
|
21
|
+
:event_processor,
|
22
|
+
:insufficient_data,
|
23
|
+
:backpressure
|
24
|
+
]
|
25
|
+
|
26
|
+
include LoggingHelper
|
27
|
+
|
28
|
+
attr_reader :rate_limits, :discarded_events, :last_client_report_sent
|
29
|
+
|
30
|
+
# @deprecated Use Sentry.logger to retrieve the current logger instead.
|
31
|
+
attr_reader :logger
|
32
|
+
|
33
|
+
def initialize(configuration)
|
34
|
+
@logger = configuration.logger
|
35
|
+
@transport_configuration = configuration.transport
|
36
|
+
@dsn = configuration.dsn
|
37
|
+
@rate_limits = {}
|
38
|
+
@send_client_reports = configuration.send_client_reports
|
39
|
+
|
40
|
+
if @send_client_reports
|
41
|
+
@discarded_events = Hash.new(0)
|
42
|
+
@last_client_report_sent = Time.now
|
43
|
+
end
|
44
|
+
end
|
45
|
+
|
46
|
+
def send_data(data, options = {})
|
47
|
+
raise NotImplementedError
|
48
|
+
end
|
49
|
+
|
50
|
+
def send_event(event)
|
51
|
+
envelope = envelope_from_event(event)
|
52
|
+
send_envelope(envelope)
|
53
|
+
|
54
|
+
event
|
55
|
+
end
|
56
|
+
|
57
|
+
def send_envelope(envelope)
|
58
|
+
reject_rate_limited_items(envelope)
|
59
|
+
|
60
|
+
return if envelope.items.empty?
|
61
|
+
|
62
|
+
data, serialized_items = serialize_envelope(envelope)
|
63
|
+
|
64
|
+
if data
|
65
|
+
log_info("[Transport] Sending envelope with items [#{serialized_items.map(&:type).join(', ')}] #{envelope.event_id} to Sentry")
|
66
|
+
send_data(data)
|
67
|
+
end
|
68
|
+
end
|
69
|
+
|
70
|
+
def serialize_envelope(envelope)
|
71
|
+
serialized_items = []
|
72
|
+
serialized_results = []
|
73
|
+
|
74
|
+
envelope.items.each do |item|
|
75
|
+
result, oversized = item.serialize
|
76
|
+
|
77
|
+
if oversized
|
78
|
+
log_debug("Envelope item [#{item.type}] is still oversized after size reduction: {#{item.size_breakdown}}")
|
79
|
+
|
80
|
+
next
|
81
|
+
end
|
82
|
+
|
83
|
+
serialized_results << result
|
84
|
+
serialized_items << item
|
85
|
+
end
|
86
|
+
|
87
|
+
data = [JSON.generate(envelope.headers), *serialized_results].join("\n") unless serialized_results.empty?
|
88
|
+
|
89
|
+
[data, serialized_items]
|
90
|
+
end
|
91
|
+
|
92
|
+
def is_rate_limited?(item_type)
|
93
|
+
# check category-specific limit
|
94
|
+
category_delay =
|
95
|
+
case item_type
|
96
|
+
when "transaction"
|
97
|
+
@rate_limits["transaction"]
|
98
|
+
when "sessions"
|
99
|
+
@rate_limits["session"]
|
100
|
+
else
|
101
|
+
@rate_limits["error"]
|
102
|
+
end
|
103
|
+
|
104
|
+
# check universal limit if not category limit
|
105
|
+
universal_delay = @rate_limits[nil]
|
106
|
+
|
107
|
+
delay =
|
108
|
+
if category_delay && universal_delay
|
109
|
+
if category_delay > universal_delay
|
110
|
+
category_delay
|
111
|
+
else
|
112
|
+
universal_delay
|
113
|
+
end
|
114
|
+
elsif category_delay
|
115
|
+
category_delay
|
116
|
+
else
|
117
|
+
universal_delay
|
118
|
+
end
|
119
|
+
|
120
|
+
!!delay && delay > Time.now
|
121
|
+
end
|
122
|
+
|
123
|
+
def any_rate_limited?
|
124
|
+
@rate_limits.values.any? { |t| t && t > Time.now }
|
125
|
+
end
|
126
|
+
|
127
|
+
def envelope_from_event(event)
|
128
|
+
# Convert to hash
|
129
|
+
event_payload = event.to_hash
|
130
|
+
event_id = event_payload[:event_id] || event_payload["event_id"]
|
131
|
+
item_type = event_payload[:type] || event_payload["type"]
|
132
|
+
|
133
|
+
envelope_headers = {
|
134
|
+
event_id: event_id,
|
135
|
+
dsn: @dsn.to_s,
|
136
|
+
sdk: Sentry.sdk_meta,
|
137
|
+
sent_at: Sentry.utc_now.iso8601
|
138
|
+
}
|
139
|
+
|
140
|
+
if event.is_a?(Event) && event.dynamic_sampling_context
|
141
|
+
envelope_headers[:trace] = event.dynamic_sampling_context
|
142
|
+
end
|
143
|
+
|
144
|
+
envelope = Envelope.new(envelope_headers)
|
145
|
+
|
146
|
+
envelope.add_item(
|
147
|
+
{ type: item_type, content_type: 'application/json' },
|
148
|
+
event_payload
|
149
|
+
)
|
150
|
+
|
151
|
+
if event.is_a?(TransactionEvent) && event.profile
|
152
|
+
envelope.add_item(
|
153
|
+
{ type: 'profile', content_type: 'application/json' },
|
154
|
+
event.profile
|
155
|
+
)
|
156
|
+
end
|
157
|
+
|
158
|
+
client_report_headers, client_report_payload = fetch_pending_client_report
|
159
|
+
envelope.add_item(client_report_headers, client_report_payload) if client_report_headers
|
160
|
+
|
161
|
+
envelope
|
162
|
+
end
|
163
|
+
|
164
|
+
def record_lost_event(reason, item_type)
|
165
|
+
return unless @send_client_reports
|
166
|
+
return unless CLIENT_REPORT_REASONS.include?(reason)
|
167
|
+
|
168
|
+
@discarded_events[[reason, item_type]] += 1
|
169
|
+
end
|
170
|
+
|
171
|
+
def flush
|
172
|
+
client_report_headers, client_report_payload = fetch_pending_client_report(force: true)
|
173
|
+
return unless client_report_headers
|
174
|
+
|
175
|
+
envelope = Envelope.new
|
176
|
+
envelope.add_item(client_report_headers, client_report_payload)
|
177
|
+
send_envelope(envelope)
|
178
|
+
end
|
179
|
+
|
180
|
+
private
|
181
|
+
|
182
|
+
def fetch_pending_client_report(force: false)
|
183
|
+
return nil unless @send_client_reports
|
184
|
+
return nil if !force && @last_client_report_sent > Time.now - CLIENT_REPORT_INTERVAL
|
185
|
+
return nil if @discarded_events.empty?
|
186
|
+
|
187
|
+
discarded_events_hash = @discarded_events.map do |key, val|
|
188
|
+
reason, type = key
|
189
|
+
|
190
|
+
# 'event' has to be mapped to 'error'
|
191
|
+
category = type == 'event' ? 'error' : type
|
192
|
+
|
193
|
+
{ reason: reason, category: category, quantity: val }
|
194
|
+
end
|
195
|
+
|
196
|
+
item_header = { type: 'client_report' }
|
197
|
+
item_payload = {
|
198
|
+
timestamp: Sentry.utc_now.iso8601,
|
199
|
+
discarded_events: discarded_events_hash
|
200
|
+
}
|
201
|
+
|
202
|
+
@discarded_events = Hash.new(0)
|
203
|
+
@last_client_report_sent = Time.now
|
204
|
+
|
205
|
+
[item_header, item_payload]
|
206
|
+
end
|
207
|
+
|
208
|
+
def reject_rate_limited_items(envelope)
|
209
|
+
envelope.items.reject! do |item|
|
210
|
+
if is_rate_limited?(item.type)
|
211
|
+
log_debug("[Transport] Envelope item [#{item.type}] not sent: rate limiting")
|
212
|
+
record_lost_event(:ratelimit_backoff, item.type)
|
213
|
+
|
214
|
+
true
|
215
|
+
else
|
216
|
+
false
|
217
|
+
end
|
218
|
+
end
|
219
|
+
end
|
220
|
+
end
|
221
|
+
end
|
222
|
+
|
223
|
+
require "sentry/transport/dummy_transport"
|
224
|
+
require "sentry/transport/http_transport"
|
225
|
+
require "sentry/transport/spotlight_transport"
|
@@ -0,0 +1,19 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
module Sentry
|
4
|
+
module ArgumentCheckingHelper
|
5
|
+
private
|
6
|
+
|
7
|
+
def check_argument_type!(argument, *expected_types)
|
8
|
+
unless expected_types.any? { |t| argument.is_a?(t) }
|
9
|
+
raise ArgumentError, "expect the argument to be a #{expected_types.join(' or ')}, got #{argument.class} (#{argument.inspect})"
|
10
|
+
end
|
11
|
+
end
|
12
|
+
|
13
|
+
def check_argument_includes!(argument, values)
|
14
|
+
unless values.include?(argument)
|
15
|
+
raise ArgumentError, "expect the argument to be one of #{values.map(&:inspect).join(' or ')}, got #{argument.inspect}"
|
16
|
+
end
|
17
|
+
end
|
18
|
+
end
|
19
|
+
end
|
@@ -0,0 +1,14 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
module Sentry
|
4
|
+
module CustomInspection
|
5
|
+
def inspect
|
6
|
+
attr_strings = (instance_variables - self.class::SKIP_INSPECTION_ATTRIBUTES).each_with_object([]) do |attr, result|
|
7
|
+
value = instance_variable_get(attr)
|
8
|
+
result << "#{attr}=#{value.inspect}" if value
|
9
|
+
end
|
10
|
+
|
11
|
+
"#<#{self.class.name} #{attr_strings.join(", ")}>"
|
12
|
+
end
|
13
|
+
end
|
14
|
+
end
|
@@ -0,0 +1,22 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
module Sentry
|
4
|
+
module Utils
|
5
|
+
module EncodingHelper
|
6
|
+
def self.encode_to_utf_8(value)
|
7
|
+
if value.encoding != Encoding::UTF_8 && value.respond_to?(:force_encoding)
|
8
|
+
value = value.dup.force_encoding(Encoding::UTF_8)
|
9
|
+
end
|
10
|
+
|
11
|
+
value = value.scrub unless value.valid_encoding?
|
12
|
+
value
|
13
|
+
end
|
14
|
+
|
15
|
+
def self.valid_utf_8?(value)
|
16
|
+
return true unless value.respond_to?(:force_encoding)
|
17
|
+
|
18
|
+
value.dup.force_encoding(Encoding::UTF_8).valid_encoding?
|
19
|
+
end
|
20
|
+
end
|
21
|
+
end
|
22
|
+
end
|
@@ -0,0 +1,20 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
module Sentry
|
4
|
+
module Utils
|
5
|
+
module ExceptionCauseChain
|
6
|
+
def self.exception_to_array(exception)
|
7
|
+
exceptions = [exception]
|
8
|
+
|
9
|
+
while exception.cause
|
10
|
+
exception = exception.cause
|
11
|
+
break if exceptions.any? { |e| e.object_id == exception.object_id }
|
12
|
+
|
13
|
+
exceptions << exception
|
14
|
+
end
|
15
|
+
|
16
|
+
exceptions
|
17
|
+
end
|
18
|
+
end
|
19
|
+
end
|
20
|
+
end
|
@@ -0,0 +1,26 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
module Sentry
|
4
|
+
module LoggingHelper
|
5
|
+
def log_error(message, exception, debug: false)
|
6
|
+
message = "#{message}: #{exception.message}"
|
7
|
+
message += "\n#{exception.backtrace.join("\n")}" if debug
|
8
|
+
|
9
|
+
@logger.error(LOGGER_PROGNAME) do
|
10
|
+
message
|
11
|
+
end
|
12
|
+
end
|
13
|
+
|
14
|
+
def log_info(message)
|
15
|
+
@logger.info(LOGGER_PROGNAME) { message }
|
16
|
+
end
|
17
|
+
|
18
|
+
def log_debug(message)
|
19
|
+
@logger.debug(LOGGER_PROGNAME) { message }
|
20
|
+
end
|
21
|
+
|
22
|
+
def log_warn(message)
|
23
|
+
@logger.warn(LOGGER_PROGNAME) { message }
|
24
|
+
end
|
25
|
+
end
|
26
|
+
end
|
@@ -0,0 +1,84 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
require 'ipaddr'
|
4
|
+
|
5
|
+
# Based on ActionDispatch::RemoteIp. All security-related precautions from that
|
6
|
+
# middleware have been removed, because the Event IP just needs to be accurate,
|
7
|
+
# and spoofing an IP here only makes data inaccurate, not insecure. Don't re-use
|
8
|
+
# this module if you have to *trust* the IP address.
|
9
|
+
module Sentry
|
10
|
+
module Utils
|
11
|
+
class RealIp
|
12
|
+
LOCAL_ADDRESSES = [
|
13
|
+
"127.0.0.1", # localhost IPv4
|
14
|
+
"::1", # localhost IPv6
|
15
|
+
"fc00::/7", # private IPv6 range fc00::/7
|
16
|
+
"10.0.0.0/8", # private IPv4 range 10.x.x.x
|
17
|
+
"172.16.0.0/12", # private IPv4 range 172.16.0.0 .. 172.31.255.255
|
18
|
+
"192.168.0.0/16", # private IPv4 range 192.168.x.x
|
19
|
+
]
|
20
|
+
|
21
|
+
attr_reader :ip
|
22
|
+
|
23
|
+
def initialize(
|
24
|
+
remote_addr: nil,
|
25
|
+
client_ip: nil,
|
26
|
+
real_ip: nil,
|
27
|
+
forwarded_for: nil,
|
28
|
+
trusted_proxies: []
|
29
|
+
)
|
30
|
+
@remote_addr = remote_addr
|
31
|
+
@client_ip = client_ip
|
32
|
+
@real_ip = real_ip
|
33
|
+
@forwarded_for = forwarded_for
|
34
|
+
@trusted_proxies = (LOCAL_ADDRESSES + Array(trusted_proxies)).map do |proxy|
|
35
|
+
if proxy.is_a?(IPAddr)
|
36
|
+
proxy
|
37
|
+
else
|
38
|
+
IPAddr.new(proxy.to_s)
|
39
|
+
end
|
40
|
+
end.uniq
|
41
|
+
end
|
42
|
+
|
43
|
+
def calculate_ip
|
44
|
+
# CGI environment variable set by Rack
|
45
|
+
remote_addr = ips_from(@remote_addr).last
|
46
|
+
|
47
|
+
# Could be a CSV list and/or repeated headers that were concatenated.
|
48
|
+
client_ips = ips_from(@client_ip)
|
49
|
+
real_ips = ips_from(@real_ip)
|
50
|
+
|
51
|
+
# The first address in this list is the original client, followed by
|
52
|
+
# the IPs of successive proxies. We want to search starting from the end
|
53
|
+
# until we find the first proxy that we do not trust.
|
54
|
+
forwarded_ips = ips_from(@forwarded_for).reverse
|
55
|
+
|
56
|
+
ips = [client_ips, real_ips, forwarded_ips, remote_addr].flatten.compact
|
57
|
+
|
58
|
+
# If every single IP option is in the trusted list, just return REMOTE_ADDR
|
59
|
+
@ip = filter_trusted_proxy_addresses(ips).first || remote_addr
|
60
|
+
end
|
61
|
+
|
62
|
+
protected
|
63
|
+
|
64
|
+
def ips_from(header)
|
65
|
+
# Split the comma-separated list into an array of strings
|
66
|
+
ips = header ? header.strip.split(/[,\s]+/) : []
|
67
|
+
ips.select do |ip|
|
68
|
+
begin
|
69
|
+
# Only return IPs that are valid according to the IPAddr#new method
|
70
|
+
range = IPAddr.new(ip).to_range
|
71
|
+
# we want to make sure nobody is sneaking a netmask in
|
72
|
+
range.begin == range.end
|
73
|
+
rescue ArgumentError
|
74
|
+
nil
|
75
|
+
end
|
76
|
+
end
|
77
|
+
end
|
78
|
+
|
79
|
+
def filter_trusted_proxy_addresses(ips)
|
80
|
+
ips.reject { |ip| @trusted_proxies.any? { |proxy| proxy === ip } }
|
81
|
+
end
|
82
|
+
end
|
83
|
+
end
|
84
|
+
end
|
@@ -0,0 +1,18 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
module Sentry
|
4
|
+
module Utils
|
5
|
+
module RequestId
|
6
|
+
REQUEST_ID_HEADERS = %w(action_dispatch.request_id HTTP_X_REQUEST_ID).freeze
|
7
|
+
|
8
|
+
# Request ID based on ActionDispatch::RequestId
|
9
|
+
def self.read_from(env)
|
10
|
+
REQUEST_ID_HEADERS.each do |key|
|
11
|
+
request_id = env[key]
|
12
|
+
return request_id if request_id
|
13
|
+
end
|
14
|
+
nil
|
15
|
+
end
|
16
|
+
end
|
17
|
+
end
|
18
|
+
end
|