traceview 3.8.0-java → 3.8.1-java

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (56) hide show
  1. checksums.yaml +4 -4
  2. data/CHANGELOG.md +12 -0
  3. data/README.md +3 -3
  4. data/lib/joboe_metal.rb +4 -4
  5. data/lib/oboe_metal.rb +3 -3
  6. data/lib/traceview/api/layerinit.rb +2 -2
  7. data/lib/traceview/api/logging.rb +12 -12
  8. data/lib/traceview/api/profiling.rb +6 -6
  9. data/lib/traceview/api/tracing.rb +1 -1
  10. data/lib/traceview/api/util.rb +1 -1
  11. data/lib/traceview/base.rb +14 -7
  12. data/lib/traceview/config.rb +8 -5
  13. data/lib/traceview/frameworks/padrino/templates.rb +4 -4
  14. data/lib/traceview/frameworks/rails.rb +2 -2
  15. data/lib/traceview/frameworks/rails/inst/action_controller.rb +6 -2
  16. data/lib/traceview/frameworks/rails/inst/action_controller2.rb +4 -2
  17. data/lib/traceview/frameworks/rails/inst/action_controller3.rb +5 -4
  18. data/lib/traceview/frameworks/rails/inst/action_controller4.rb +4 -2
  19. data/lib/traceview/frameworks/rails/inst/action_controller5.rb +22 -11
  20. data/lib/traceview/frameworks/rails/inst/action_controller5_api.rb +23 -12
  21. data/lib/traceview/frameworks/sinatra/templates.rb +4 -4
  22. data/lib/traceview/inst/bunny-client.rb +8 -8
  23. data/lib/traceview/inst/bunny-consumer.rb +1 -1
  24. data/lib/traceview/inst/curb.rb +19 -19
  25. data/lib/traceview/inst/dalli.rb +4 -4
  26. data/lib/traceview/inst/delayed_job.rb +4 -4
  27. data/lib/traceview/inst/em-http-request.rb +6 -6
  28. data/lib/traceview/inst/excon.rb +18 -18
  29. data/lib/traceview/inst/faraday.rb +13 -13
  30. data/lib/traceview/inst/http.rb +12 -12
  31. data/lib/traceview/inst/httpclient.rb +19 -19
  32. data/lib/traceview/inst/memcache.rb +5 -5
  33. data/lib/traceview/inst/memcached.rb +4 -4
  34. data/lib/traceview/inst/mongo.rb +6 -6
  35. data/lib/traceview/inst/moped.rb +28 -28
  36. data/lib/traceview/inst/rack.rb +24 -24
  37. data/lib/traceview/inst/redis.rb +6 -6
  38. data/lib/traceview/inst/resque.rb +6 -6
  39. data/lib/traceview/inst/rest-client.rb +4 -4
  40. data/lib/traceview/inst/sequel.rb +12 -12
  41. data/lib/traceview/inst/sidekiq-client.rb +3 -3
  42. data/lib/traceview/inst/sidekiq-worker.rb +3 -3
  43. data/lib/traceview/inst/twitter-cassandra.rb +17 -17
  44. data/lib/traceview/inst/typhoeus.rb +13 -13
  45. data/lib/traceview/method_profiling.rb +2 -2
  46. data/lib/traceview/ruby.rb +1 -1
  47. data/lib/traceview/util.rb +4 -4
  48. data/lib/traceview/version.rb +1 -1
  49. data/test/frameworks/rails3x_test.rb +105 -0
  50. data/test/frameworks/rails4x_test.rb +97 -0
  51. data/test/frameworks/rails5x_api_test.rb +98 -1
  52. data/test/frameworks/rails5x_test.rb +99 -2
  53. data/test/profiling/legacy_method_profiling_test.rb +1 -1
  54. data/test/support/backcompat_test.rb +2 -2
  55. data/test/support/config_test.rb +1 -1
  56. metadata +2 -2
@@ -11,27 +11,27 @@ module TraceView
11
11
 
12
12
  def traceview_collect(params)
13
13
  kvs = {}
14
- kvs['IsService'] = 1
15
- kvs['RemoteProtocol'] = ::TraceView::Util.upcase(@data[:scheme])
16
- kvs['RemoteHost'] = @data[:host]
14
+ kvs[:IsService] = 1
15
+ kvs[:RemoteProtocol] = ::TraceView::Util.upcase(@data[:scheme])
16
+ kvs[:RemoteHost] = @data[:host]
17
17
 
18
18
  # Conditionally log query args
19
19
  if TraceView::Config[:excon][:log_args] && @data[:query]
20
20
  if @data[:query].is_a?(Hash)
21
21
  if RUBY_VERSION >= '1.9.2'
22
- kvs['ServiceArg'] = "#{@data[:path]}?#{URI.encode_www_form(@data[:query])}"
22
+ kvs[:ServiceArg] = "#{@data[:path]}?#{URI.encode_www_form(@data[:query])}"
23
23
  else
24
24
  # An imperfect solution for the lack of URI.encode_www_form for Ruby versions before
25
25
  # 1.9.2. We manually create a query string for reporting purposes only.
26
26
  query_arg = ""
27
27
  @data[:query].each_pair { |k,v| query_arg += "#{k}=#{v}?"; }
28
- kvs['ServiceArg'] = "#{@data[:path]}?#{query_arg.chop}"
28
+ kvs[:ServiceArg] = "#{@data[:path]}?#{query_arg.chop}"
29
29
  end
30
30
  else
31
- kvs['ServiceArg'] = "#{@data[:path]}?#{@data[:query]}"
31
+ kvs[:ServiceArg] = "#{@data[:path]}?#{@data[:query]}"
32
32
  end
33
33
  else
34
- kvs['ServiceArg'] = @data[:path]
34
+ kvs[:ServiceArg] = @data[:path]
35
35
  end
36
36
 
37
37
  # In the case of HTTP pipelining, params could be an array of
@@ -41,12 +41,12 @@ module TraceView
41
41
  params.each do |p|
42
42
  methods << ::TraceView::Util.upcase(p[:method])
43
43
  end
44
- kvs['HTTPMethods'] = methods.join(', ')[0..1024]
45
- kvs['Pipeline'] = true
44
+ kvs[:HTTPMethods] = methods.join(', ')[0..1024]
45
+ kvs[:Pipeline] = true
46
46
  else
47
- kvs['HTTPMethod'] = ::TraceView::Util.upcase(params[:method])
47
+ kvs[:HTTPMethod] = ::TraceView::Util.upcase(params[:method])
48
48
  end
49
- kvs['Backtrace'] = TraceView::API.backtrace if TraceView::Config[:excon][:collect_backtraces]
49
+ kvs[:Backtrace] = TraceView::API.backtrace if TraceView::Config[:excon][:collect_backtraces]
50
50
  kvs
51
51
  rescue => e
52
52
  TraceView.logger.debug "[traceview/debug] Error capturing excon KVs: #{e.message}"
@@ -57,7 +57,7 @@ module TraceView
57
57
 
58
58
  def requests_with_traceview(pipeline_params)
59
59
  responses = nil
60
- TraceView::API.trace('excon', traceview_collect(pipeline_params)) do
60
+ TraceView::API.trace(:excon, traceview_collect(pipeline_params)) do
61
61
  responses = requests_without_traceview(pipeline_params)
62
62
  end
63
63
  responses
@@ -82,9 +82,9 @@ module TraceView
82
82
  @data[:headers]['X-Trace'] = req_context unless blacklisted
83
83
 
84
84
  kvs = traceview_collect(params)
85
- kvs['Blacklisted'] = true if blacklisted
85
+ kvs[:Blacklisted] = true if blacklisted
86
86
 
87
- TraceView::API.log_entry('excon', kvs)
87
+ TraceView::API.log_entry(:excon, kvs)
88
88
  kvs.clear
89
89
 
90
90
  # The core excon call
@@ -95,11 +95,11 @@ module TraceView
95
95
  # the datatype before trying to extract pertinent info
96
96
  if response.is_a?(Excon::Response)
97
97
  response_context = response.headers['X-Trace']
98
- kvs['HTTPStatus'] = response.status
98
+ kvs[:HTTPStatus] = response.status
99
99
 
100
100
  # If we get a redirect, report the location header
101
101
  if ((300..308).to_a.include? response.status.to_i) && response.headers.key?('Location')
102
- kvs['Location'] = response.headers['Location']
102
+ kvs[:Location] = response.headers['Location']
103
103
  end
104
104
 
105
105
  if response_context && !blacklisted
@@ -109,10 +109,10 @@ module TraceView
109
109
 
110
110
  response
111
111
  rescue => e
112
- TraceView::API.log_exception('excon', e)
112
+ TraceView::API.log_exception(:excon, e)
113
113
  raise e
114
114
  ensure
115
- TraceView::API.log_exit('excon', kvs) unless params[:pipeline]
115
+ TraceView::API.log_exit(:excon, kvs) unless params[:pipeline]
116
116
  end
117
117
  end
118
118
  end
@@ -13,13 +13,13 @@ module TraceView
13
13
  # Otherwise, the Net::HTTP instrumentation will send the service KVs
14
14
  handle_service = !@builder.handlers.include?(Faraday::Adapter::NetHttp) &&
15
15
  !@builder.handlers.include?(Faraday::Adapter::Excon)
16
- TraceView::API.log_entry('faraday')
16
+ TraceView::API.log_entry(:faraday)
17
17
 
18
18
  result = run_request_without_traceview(method, url, body, headers, &block)
19
19
 
20
20
  kvs = {}
21
- kvs['Middleware'] = @builder.handlers
22
- kvs['Backtrace'] = TraceView::API.backtrace if TraceView::Config[:faraday][:collect_backtraces]
21
+ kvs[:Middleware] = @builder.handlers
22
+ kvs[:Backtrace] = TraceView::API.backtrace if TraceView::Config[:faraday][:collect_backtraces]
23
23
 
24
24
  if handle_service
25
25
  blacklisted = TraceView::API.blacklisted?(@url_prefix.to_s)
@@ -30,14 +30,14 @@ module TraceView
30
30
  # Conditionally add the X-Trace header to the outgoing request
31
31
  @headers['X-Trace'] = context unless blacklisted
32
32
 
33
- kvs['IsService'] = 1
34
- kvs['RemoteProtocol'] = (@url_prefix.scheme == 'https') ? 'HTTPS' : 'HTTP'
35
- kvs['RemoteHost'] = @url_prefix.host
36
- kvs['RemotePort'] = @url_prefix.port
37
- kvs['ServiceArg'] = url
38
- kvs['HTTPMethod'] = method
33
+ kvs[:IsService] = 1
34
+ kvs[:RemoteProtocol] = (@url_prefix.scheme == 'https') ? 'HTTPS' : 'HTTP'
35
+ kvs[:RemoteHost] = @url_prefix.host
36
+ kvs[:RemotePort] = @url_prefix.port
37
+ kvs[:ServiceArg] = url
38
+ kvs[:HTTPMethod] = method
39
39
  kvs[:HTTPStatus] = result.status
40
- kvs['Blacklisted'] = true if blacklisted
40
+ kvs[:Blacklisted] = true if blacklisted
41
41
 
42
42
  # Re-attach net::http edge unless it's blacklisted or if we don't have a
43
43
  # valid X-Trace header
@@ -56,13 +56,13 @@ module TraceView
56
56
  end
57
57
  end
58
58
 
59
- TraceView::API.log('faraday', 'info', kvs)
59
+ TraceView::API.log(:faraday, :info, kvs)
60
60
  result
61
61
  rescue => e
62
- TraceView::API.log_exception('faraday', e)
62
+ TraceView::API.log_exception(:faraday, e)
63
63
  raise e
64
64
  ensure
65
- TraceView::API.log_exit('faraday')
65
+ TraceView::API.log_exit(:faraday)
66
66
  end
67
67
  end
68
68
  end
@@ -17,7 +17,7 @@ if TraceView::Config[:nethttp][:enabled]
17
17
  # Avoid cross host tracing for blacklisted domains
18
18
  blacklisted = TraceView::API.blacklisted?(addr_port)
19
19
 
20
- TraceView::API.trace('net-http') do
20
+ TraceView::API.trace(:'net-http') do
21
21
  opts = {}
22
22
  context = TraceView::Context.toString()
23
23
  task_id = TraceView::XTrace.task_id(context)
@@ -26,20 +26,20 @@ if TraceView::Config[:nethttp][:enabled]
26
26
  if args.length && args[0]
27
27
  req = args[0]
28
28
 
29
- opts['IsService'] = 1
30
- opts['RemoteProtocol'] = use_ssl? ? 'HTTPS' : 'HTTP'
31
- opts['RemoteHost'] = addr_port
29
+ opts[:IsService] = 1
30
+ opts[:RemoteProtocol] = use_ssl? ? :HTTPS : :HTTP
31
+ opts[:RemoteHost] = addr_port
32
32
 
33
33
  # Conditionally log query params
34
34
  if TraceView::Config[:nethttp][:log_args]
35
- opts['ServiceArg'] = req.path
35
+ opts[:ServiceArg] = req.path
36
36
  else
37
- opts['ServiceArg'] = req.path.split('?').first
37
+ opts[:ServiceArg] = req.path.split('?').first
38
38
  end
39
39
 
40
- opts['HTTPMethod'] = req.method
41
- opts['Blacklisted'] = true if blacklisted
42
- opts['Backtrace'] = TraceView::API.backtrace if TraceView::Config[:nethttp][:collect_backtraces]
40
+ opts[:HTTPMethod] = req.method
41
+ opts[:Blacklisted] = true if blacklisted
42
+ opts[:Backtrace] = TraceView::API.backtrace if TraceView::Config[:nethttp][:collect_backtraces]
43
43
 
44
44
  req['X-Trace'] = context unless blacklisted
45
45
  end
@@ -64,17 +64,17 @@ if TraceView::Config[:nethttp][:enabled]
64
64
  end
65
65
  end
66
66
 
67
- opts['HTTPStatus'] = resp.code
67
+ opts[:HTTPStatus] = resp.code
68
68
 
69
69
  # If we get a redirect, report the location header
70
70
  if ((300..308).to_a.include? resp.code.to_i) && resp.header["Location"]
71
- opts["Location"] = resp.header["Location"]
71
+ opts[:Location] = resp.header["Location"]
72
72
  end
73
73
 
74
74
  next resp
75
75
  ensure
76
76
  # Log the info event with the KVs in opts
77
- TraceView::API.log('net-http', 'info', opts)
77
+ TraceView::API.log(:'net-http', :info, opts)
78
78
  end
79
79
  end
80
80
  end
@@ -12,23 +12,23 @@ module TraceView
12
12
 
13
13
  def traceview_collect(method, uri, query = nil)
14
14
  kvs = {}
15
- kvs['IsService'] = 1
15
+ kvs[:IsService] = 1
16
16
 
17
17
  # Conditionally log URL query params
18
18
  # Because of the hook points, the query arg can come in under <tt>query</tt>
19
19
  # or as a part of <tt>uri</tt> (not both). Here we handle both cases.
20
20
  if TraceView::Config[:httpclient][:log_args]
21
21
  if query
22
- kvs['RemoteURL'] = uri.to_s + '?' + TraceView::Util.to_query(query)
22
+ kvs[:RemoteURL] = uri.to_s + '?' + TraceView::Util.to_query(query)
23
23
  else
24
- kvs['RemoteURL'] = uri.to_s
24
+ kvs[:RemoteURL] = uri.to_s
25
25
  end
26
26
  else
27
- kvs['RemoteURL'] = uri.to_s.split('?').first
27
+ kvs[:RemoteURL] = uri.to_s.split('?').first
28
28
  end
29
29
 
30
- kvs['HTTPMethod'] = ::TraceView::Util.upcase(method)
31
- kvs['Backtrace'] = TraceView::API.backtrace if TraceView::Config[:httpclient][:collect_backtraces]
30
+ kvs[:HTTPMethod] = ::TraceView::Util.upcase(method)
31
+ kvs[:Backtrace] = TraceView::API.backtrace if TraceView::Config[:httpclient][:collect_backtraces]
32
32
  kvs
33
33
  rescue => e
34
34
  TraceView.logger.debug "[traceview/debug] Error capturing httpclient KVs: #{e.message}"
@@ -50,9 +50,9 @@ module TraceView
50
50
  blacklisted = TraceView::API.blacklisted?(uri.hostname)
51
51
 
52
52
  kvs = traceview_collect(method, uri, query)
53
- kvs['Blacklisted'] = true if blacklisted
53
+ kvs[:Blacklisted] = true if blacklisted
54
54
 
55
- TraceView::API.log_entry('httpclient', kvs)
55
+ TraceView::API.log_entry(:httpclient, kvs)
56
56
  kvs.clear
57
57
 
58
58
  req_context = TraceView::Context.toString()
@@ -68,11 +68,11 @@ module TraceView
68
68
  response = do_request_without_traceview(method, uri, query, body, header, &block)
69
69
 
70
70
  response_context = response.headers['X-Trace']
71
- kvs['HTTPStatus'] = response.status_code
71
+ kvs[:HTTPStatus] = response.status_code
72
72
 
73
73
  # If we get a redirect, report the location header
74
74
  if ((300..308).to_a.include? response.status.to_i) && response.headers.key?("Location")
75
- kvs["Location"] = response.headers["Location"]
75
+ kvs[:Location] = response.headers["Location"]
76
76
  end
77
77
 
78
78
  if response_context && !blacklisted
@@ -81,10 +81,10 @@ module TraceView
81
81
 
82
82
  response
83
83
  rescue => e
84
- TraceView::API.log_exception('httpclient', e)
84
+ TraceView::API.log_exception(:httpclient, e)
85
85
  raise e
86
86
  ensure
87
- TraceView::API.log_exit('httpclient', kvs)
87
+ TraceView::API.log_exit(:httpclient, kvs)
88
88
  end
89
89
  end
90
90
 
@@ -123,10 +123,10 @@ module TraceView
123
123
  blacklisted = TraceView::API.blacklisted?(uri.hostname)
124
124
 
125
125
  kvs = traceview_collect(method, uri)
126
- kvs['Blacklisted'] = true if blacklisted
127
- kvs['Async'] = 1
126
+ kvs[:Blacklisted] = true if blacklisted
127
+ kvs[:Async] = 1
128
128
 
129
- TraceView::API.log_entry('httpclient', kvs)
129
+ TraceView::API.log_entry(:httpclient, kvs)
130
130
  kvs.clear
131
131
 
132
132
  req_context = TraceView::Context.toString()
@@ -143,11 +143,11 @@ module TraceView
143
143
  end
144
144
 
145
145
  response_context = response.headers['X-Trace']
146
- kvs['HTTPStatus'] = response.status_code
146
+ kvs[:HTTPStatus] = response.status_code
147
147
 
148
148
  # If we get a redirect, report the location header
149
149
  if ((300..308).to_a.include? response.status.to_i) && response.headers.key?("Location")
150
- kvs["Location"] = response.headers["Location"]
150
+ kvs[:Location] = response.headers["Location"]
151
151
  end
152
152
 
153
153
  if response_context && !blacklisted
@@ -158,11 +158,11 @@ module TraceView
158
158
  conn.push response if result.is_a?(::HTTPClient::Connection)
159
159
  result
160
160
  rescue => e
161
- TraceView::API.log_exception('httpclient', e)
161
+ TraceView::API.log_exception(:httpclient, e)
162
162
  raise e
163
163
  ensure
164
164
  # TraceView::API.log_exit('httpclient', kvs.merge('Async' => 1))
165
- TraceView::API.log_exit('httpclient', kvs)
165
+ TraceView::API.log_exit(:httpclient, kvs)
166
166
  end
167
167
  end
168
168
  end
@@ -17,7 +17,7 @@ module TraceView
17
17
  report_kvs[:Backtrace] = TraceView::API.backtrace if TraceView::Config[:memcache][:collect_backtraces]
18
18
 
19
19
  if TraceView.tracing?
20
- TraceView::API.trace('memcache', report_kvs) do
20
+ TraceView::API.trace(:memcache, report_kvs) do
21
21
  send("#{m}_without_traceview", *args)
22
22
  end
23
23
  else
@@ -58,11 +58,11 @@ module TraceView
58
58
  TraceView.logger.debug e.backtrace
59
59
  end
60
60
 
61
- TraceView::API.trace('memcache', { :KVOp => :get_multi }, :get_multi) do
61
+ TraceView::API.trace(:memcache, { :KVOp => :get_multi }, :get_multi) do
62
62
  values = get_multi_without_traceview(args)
63
63
 
64
64
  info_kvs[:KVHitCount] = values.length
65
- TraceView::API.log('memcache', 'info', info_kvs)
65
+ TraceView::API.log(:memcache, :info, info_kvs)
66
66
 
67
67
  values
68
68
  end
@@ -74,7 +74,7 @@ module TraceView
74
74
 
75
75
  info_kvs = { :KVKey => cache_key, :RemoteHost => server.host }
76
76
  info_kvs[:Backtrace] = TraceView::API.backtrace if TraceView::Config[:memcache][:collect_backtraces]
77
- TraceView::API.log('memcache', 'info', info_kvs)
77
+ TraceView::API.log(:memcache, :info, info_kvs)
78
78
 
79
79
  [server, cache_key]
80
80
  else
@@ -87,7 +87,7 @@ module TraceView
87
87
 
88
88
  info_kvs = { :KVHit => memcache_hit?(result) }
89
89
  info_kvs[:Backtrace] = TraceView::API.backtrace if TraceView::Config[:memcache][:collect_backtraces]
90
- TraceView::API.log('memcache', 'info', info_kvs)
90
+ TraceView::API.log(:memcache, :info, info_kvs)
91
91
 
92
92
  result
93
93
  end
@@ -20,14 +20,14 @@ module TraceView
20
20
  opts[:RemoteHost] = rhost if rhost
21
21
  end
22
22
 
23
- TraceView::API.trace('memcache', opts) do
23
+ TraceView::API.trace(:memcache, opts) do
24
24
  result = send("#{m}_without_traceview", *args)
25
25
 
26
26
  info_kvs = {}
27
27
  info_kvs[:KVHit] = memcache_hit?(result) if m == :get && args.length && args[0].class == String
28
28
  info_kvs[:Backtrace] = TraceView::API.backtrace if TraceView::Config[:memcached][:collect_backtraces]
29
29
 
30
- TraceView::API.log('memcache', 'info', info_kvs) unless info_kvs.empty?
30
+ TraceView::API.log(:memcache, :info, info_kvs) unless info_kvs.empty?
31
31
  result
32
32
  end
33
33
  end
@@ -57,7 +57,7 @@ module TraceView
57
57
  layer_kvs = {}
58
58
  layer_kvs[:KVOp] = :get_multi
59
59
 
60
- TraceView::API.trace('memcache', layer_kvs || {}, :get_multi) do
60
+ TraceView::API.trace(:memcache, layer_kvs || {}, :get_multi) do
61
61
  begin
62
62
  info_kvs = {}
63
63
  info_kvs[:KVKeyCount] = keys.flatten.length
@@ -67,7 +67,7 @@ module TraceView
67
67
  info_kvs[:KVHitCount] = values.length
68
68
  info_kvs[:Backtrace] = TraceView::API.backtrace if TraceView::Config[:memcached][:collect_backtraces]
69
69
 
70
- TraceView::API.log('memcache', 'info', info_kvs)
70
+ TraceView::API.log(:memcache, :info, info_kvs)
71
71
  rescue
72
72
  values = get_multi_without_traceview(keys, raw)
73
73
  end
@@ -60,7 +60,7 @@ if defined?(::Mongo) && (Gem.loaded_specs['mongo'].version.to_s < '2.0.0') && Tr
60
60
  TraceView.logger.debug "[traceview/debug] #{__method__}:#{File.basename(__FILE__)}:#{__LINE__}: #{e.message}" if TraceView::Config[:verbose]
61
61
  end
62
62
 
63
- TraceView::API.trace('mongo', report_kvs) do
63
+ TraceView::API.trace(:mongo, report_kvs) do
64
64
  send("#{m}_without_traceview", *args)
65
65
  end
66
66
  end
@@ -94,7 +94,7 @@ if defined?(::Mongo) && (Gem.loaded_specs['mongo'].version.to_s < '2.0.0') && Tr
94
94
  unless @selector.empty?
95
95
  report_kvs[:Query] = @selector.to_json
96
96
  else
97
- report_kvs[:Query] = 'all'
97
+ report_kvs[:Query] = :all
98
98
  end
99
99
  report_kvs[:Limit] = @limit if @limit != 0
100
100
  end
@@ -102,7 +102,7 @@ if defined?(::Mongo) && (Gem.loaded_specs['mongo'].version.to_s < '2.0.0') && Tr
102
102
  TraceView.logger.debug "[traceview/debug] #{__method__}:#{File.basename(__FILE__)}:#{__LINE__}: #{e.message}" if TraceView::Config[:verbose]
103
103
  end
104
104
 
105
- TraceView::API.trace('mongo', report_kvs) do
105
+ TraceView::API.trace(:mongo, report_kvs) do
106
106
  send("#{m}_without_traceview", *args)
107
107
  end
108
108
  end
@@ -167,7 +167,7 @@ if defined?(::Mongo) && (Gem.loaded_specs['mongo'].version.to_s < '2.0.0') && Tr
167
167
  TraceView.logger.debug "[traceview/debug] #{__method__}:#{File.basename(__FILE__)}:#{__LINE__}: #{e.message}" if TraceView::Config[:verbose]
168
168
  end
169
169
 
170
- TraceView::API.trace('mongo', report_kvs) do
170
+ TraceView::API.trace(:mongo, report_kvs) do
171
171
  send("#{m}_without_traceview", *args)
172
172
  end
173
173
  end
@@ -206,7 +206,7 @@ if defined?(::Mongo) && (Gem.loaded_specs['mongo'].version.to_s < '2.0.0') && Tr
206
206
  TraceView.logger.debug "[traceview/debug] #{__method__}:#{File.basename(__FILE__)}:#{__LINE__}: #{e.message}" if TraceView::Config[:verbose]
207
207
  end
208
208
 
209
- TraceView::API.trace('mongo', report_kvs) do
209
+ TraceView::API.trace(:mongo, report_kvs) do
210
210
  send("#{m}_without_traceview", *args, &blk)
211
211
  end
212
212
  end
@@ -228,7 +228,7 @@ if defined?(::Mongo) && (Gem.loaded_specs['mongo'].version.to_s < '2.0.0') && Tr
228
228
  TraceView.logger.debug "[traceview/debug] #{__method__}:#{File.basename(__FILE__)}:#{__LINE__}: #{e.message}" if TraceView::Config[:verbose]
229
229
  end
230
230
 
231
- TraceView::API.trace('mongo', report_kvs) do
231
+ TraceView::API.trace(:mongo, report_kvs) do
232
232
  send("#{m}_without_traceview", *args)
233
233
  end
234
234
  end