Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
G
gitlab-ce
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
1
Merge Requests
1
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
nexedi
gitlab-ce
Commits
822b8b15
Commit
822b8b15
authored
Oct 16, 2020
by
Andrew Newdigate
Committed by
Jacob Vosmaer
Oct 16, 2020
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Include route identifier in access logs
parent
6623508b
Changes
3
Show whitespace changes
Inline
Side-by-side
Showing
3 changed files
with
69 additions
and
45 deletions
+69
-45
changelogs/unreleased/include-route-field-in-logs.yml
changelogs/unreleased/include-route-field-in-logs.yml
+5
-0
internal/upstream/routes.go
internal/upstream/routes.go
+60
-41
internal/upstream/upstream.go
internal/upstream/upstream.go
+4
-4
No files found.
changelogs/unreleased/include-route-field-in-logs.yml
0 → 100644
View file @
822b8b15
---
title
:
Include route regex identifier in structured logs
merge_request
:
624
author
:
type
:
other
internal/upstream/routes.go
View file @
822b8b15
...
...
@@ -8,6 +8,7 @@ import (
"github.com/gorilla/websocket"
"gitlab.com/gitlab-org/labkit/log"
"gitlab.com/gitlab-org/labkit/tracing"
apipkg
"gitlab.com/gitlab-org/gitlab-workhorse/internal/api"
...
...
@@ -81,7 +82,22 @@ func withoutTracing() func(*routeOptions) {
}
}
func
route
(
method
,
regexpStr
string
,
handler
http
.
Handler
,
opts
...
func
(
*
routeOptions
))
routeEntry
{
func
(
u
*
upstream
)
observabilityMiddlewares
(
handler
http
.
Handler
,
method
string
,
regexpStr
string
)
http
.
Handler
{
handler
=
log
.
AccessLogger
(
handler
,
log
.
WithAccessLogger
(
u
.
accessLogger
),
log
.
WithExtraFields
(
func
(
r
*
http
.
Request
)
log
.
Fields
{
return
log
.
Fields
{
"route"
:
regexpStr
,
// This field matches the `route` label in Prometheus metrics
}
}),
)
handler
=
instrumentRoute
(
handler
,
method
,
regexpStr
)
// Add prometheus metrics
return
handler
}
func
(
u
*
upstream
)
route
(
method
,
regexpStr
string
,
handler
http
.
Handler
,
opts
...
func
(
*
routeOptions
))
routeEntry
{
// Instantiate a route with the defaults
options
:=
routeOptions
{
tracing
:
true
,
...
...
@@ -91,8 +107,8 @@ func route(method, regexpStr string, handler http.Handler, opts ...func(*routeOp
f
(
&
options
)
}
handler
=
u
.
observabilityMiddlewares
(
handler
,
method
,
regexpStr
)
handler
=
denyWebsocket
(
handler
)
// Disallow websockets
handler
=
instrumentRoute
(
handler
,
method
,
regexpStr
)
// Add prometheus metrics
if
options
.
tracing
{
// Add distributed tracing
handler
=
tracing
.
Handler
(
handler
)
...
...
@@ -106,11 +122,14 @@ func route(method, regexpStr string, handler http.Handler, opts ...func(*routeOp
}
}
func
wsRoute
(
regexpStr
string
,
handler
http
.
Handler
,
matchers
...
matcherFunc
)
routeEntry
{
func
(
u
*
upstream
)
wsRoute
(
regexpStr
string
,
handler
http
.
Handler
,
matchers
...
matcherFunc
)
routeEntry
{
method
:=
"GET"
handler
=
u
.
observabilityMiddlewares
(
handler
,
method
,
regexpStr
)
return
routeEntry
{
method
:
"GET"
,
method
:
method
,
regex
:
compileRegexp
(
regexpStr
),
handler
:
instrumentRoute
(
handler
,
"GET"
,
regexpStr
)
,
handler
:
handler
,
matchers
:
append
(
matchers
,
websocket
.
IsWebSocketUpgrade
),
}
}
...
...
@@ -193,64 +212,64 @@ func (u *upstream) configureRoutes() {
u
.
Routes
=
[]
routeEntry
{
// Git Clone
route
(
"GET"
,
gitProjectPattern
+
`info/refs\z`
,
git
.
GetInfoRefsHandler
(
api
)),
route
(
"POST"
,
gitProjectPattern
+
`git-upload-pack\z`
,
contentEncodingHandler
(
git
.
UploadPack
(
api
)),
withMatcher
(
isContentType
(
"application/x-git-upload-pack-request"
))),
route
(
"POST"
,
gitProjectPattern
+
`git-receive-pack\z`
,
contentEncodingHandler
(
git
.
ReceivePack
(
api
)),
withMatcher
(
isContentType
(
"application/x-git-receive-pack-request"
))),
route
(
"PUT"
,
gitProjectPattern
+
`gitlab-lfs/objects/([0-9a-f]{64})/([0-9]+)\z`
,
lfs
.
PutStore
(
api
,
signingProxy
,
preparers
.
lfs
),
withMatcher
(
isContentType
(
"application/octet-stream"
))),
u
.
route
(
"GET"
,
gitProjectPattern
+
`info/refs\z`
,
git
.
GetInfoRefsHandler
(
api
)),
u
.
route
(
"POST"
,
gitProjectPattern
+
`git-upload-pack\z`
,
contentEncodingHandler
(
git
.
UploadPack
(
api
)),
withMatcher
(
isContentType
(
"application/x-git-upload-pack-request"
))),
u
.
route
(
"POST"
,
gitProjectPattern
+
`git-receive-pack\z`
,
contentEncodingHandler
(
git
.
ReceivePack
(
api
)),
withMatcher
(
isContentType
(
"application/x-git-receive-pack-request"
))),
u
.
route
(
"PUT"
,
gitProjectPattern
+
`gitlab-lfs/objects/([0-9a-f]{64})/([0-9]+)\z`
,
lfs
.
PutStore
(
api
,
signingProxy
,
preparers
.
lfs
),
withMatcher
(
isContentType
(
"application/octet-stream"
))),
// CI Artifacts
route
(
"POST"
,
apiPattern
+
`v4/jobs/[0-9]+/artifacts\z`
,
contentEncodingHandler
(
artifacts
.
UploadArtifacts
(
api
,
signingProxy
,
preparers
.
artifacts
))),
route
(
"POST"
,
ciAPIPattern
+
`v1/builds/[0-9]+/artifacts\z`
,
contentEncodingHandler
(
artifacts
.
UploadArtifacts
(
api
,
signingProxy
,
preparers
.
artifacts
))),
u
.
route
(
"POST"
,
apiPattern
+
`v4/jobs/[0-9]+/artifacts\z`
,
contentEncodingHandler
(
artifacts
.
UploadArtifacts
(
api
,
signingProxy
,
preparers
.
artifacts
))),
u
.
route
(
"POST"
,
ciAPIPattern
+
`v1/builds/[0-9]+/artifacts\z`
,
contentEncodingHandler
(
artifacts
.
UploadArtifacts
(
api
,
signingProxy
,
preparers
.
artifacts
))),
// ActionCable websocket
wsRoute
(
`^/-/cable\z`
,
cableProxy
),
u
.
wsRoute
(
`^/-/cable\z`
,
cableProxy
),
// Terminal websocket
wsRoute
(
projectPattern
+
`-/environments/[0-9]+/terminal.ws\z`
,
channel
.
Handler
(
api
)),
wsRoute
(
projectPattern
+
`-/jobs/[0-9]+/terminal.ws\z`
,
channel
.
Handler
(
api
)),
u
.
wsRoute
(
projectPattern
+
`-/environments/[0-9]+/terminal.ws\z`
,
channel
.
Handler
(
api
)),
u
.
wsRoute
(
projectPattern
+
`-/jobs/[0-9]+/terminal.ws\z`
,
channel
.
Handler
(
api
)),
// Proxy Job Services
wsRoute
(
projectPattern
+
`-/jobs/[0-9]+/proxy.ws\z`
,
channel
.
Handler
(
api
)),
u
.
wsRoute
(
projectPattern
+
`-/jobs/[0-9]+/proxy.ws\z`
,
channel
.
Handler
(
api
)),
// Long poll and limit capacity given to jobs/request and builds/register.json
route
(
""
,
apiPattern
+
`v4/jobs/request\z`
,
ciAPILongPolling
),
route
(
""
,
ciAPIPattern
+
`v1/builds/register.json\z`
,
ciAPILongPolling
),
u
.
route
(
""
,
apiPattern
+
`v4/jobs/request\z`
,
ciAPILongPolling
),
u
.
route
(
""
,
ciAPIPattern
+
`v1/builds/register.json\z`
,
ciAPILongPolling
),
// Maven Artifact Repository
route
(
"PUT"
,
apiPattern
+
`v4/projects/[0-9]+/packages/maven/`
,
upload
.
BodyUploader
(
api
,
signingProxy
,
preparers
.
packages
)),
u
.
route
(
"PUT"
,
apiPattern
+
`v4/projects/[0-9]+/packages/maven/`
,
upload
.
BodyUploader
(
api
,
signingProxy
,
preparers
.
packages
)),
// Conan Artifact Repository
route
(
"PUT"
,
apiPattern
+
`v4/packages/conan/`
,
upload
.
BodyUploader
(
api
,
signingProxy
,
preparers
.
packages
)),
route
(
"PUT"
,
apiPattern
+
`v4/projects/[0-9]+/packages/conan/`
,
upload
.
BodyUploader
(
api
,
signingProxy
,
preparers
.
packages
)),
u
.
route
(
"PUT"
,
apiPattern
+
`v4/packages/conan/`
,
upload
.
BodyUploader
(
api
,
signingProxy
,
preparers
.
packages
)),
u
.
route
(
"PUT"
,
apiPattern
+
`v4/projects/[0-9]+/packages/conan/`
,
upload
.
BodyUploader
(
api
,
signingProxy
,
preparers
.
packages
)),
// Generic Packages Repository
route
(
"PUT"
,
apiPattern
+
`v4/projects/[0-9]+/packages/generic/`
,
upload
.
BodyUploader
(
api
,
signingProxy
,
preparers
.
packages
)),
u
.
route
(
"PUT"
,
apiPattern
+
`v4/projects/[0-9]+/packages/generic/`
,
upload
.
BodyUploader
(
api
,
signingProxy
,
preparers
.
packages
)),
// NuGet Artifact Repository
route
(
"PUT"
,
apiPattern
+
`v4/projects/[0-9]+/packages/nuget/`
,
upload
.
Accelerate
(
api
,
signingProxy
,
preparers
.
packages
)),
u
.
route
(
"PUT"
,
apiPattern
+
`v4/projects/[0-9]+/packages/nuget/`
,
upload
.
Accelerate
(
api
,
signingProxy
,
preparers
.
packages
)),
// PyPI Artifact Repository
route
(
"POST"
,
apiPattern
+
`v4/projects/[0-9]+/packages/pypi`
,
upload
.
Accelerate
(
api
,
signingProxy
,
preparers
.
packages
)),
u
.
route
(
"POST"
,
apiPattern
+
`v4/projects/[0-9]+/packages/pypi`
,
upload
.
Accelerate
(
api
,
signingProxy
,
preparers
.
packages
)),
// We are porting API to disk acceleration
// we need to declare each routes until we have fixed all the routes on the rails codebase.
// Overall status can be seen at https://gitlab.com/groups/gitlab-org/-/epics/1802#current-status
route
(
"POST"
,
apiPattern
+
`v4/projects/[0-9]+/wikis/attachments\z`
,
uploadAccelerateProxy
),
route
(
"POST"
,
apiPattern
+
`graphql\z`
,
uploadAccelerateProxy
),
route
(
"POST"
,
apiPattern
+
`v4/groups/import`
,
upload
.
Accelerate
(
api
,
signingProxy
,
preparers
.
uploads
)),
route
(
"POST"
,
apiPattern
+
`v4/projects/import`
,
upload
.
Accelerate
(
api
,
signingProxy
,
preparers
.
uploads
)),
u
.
route
(
"POST"
,
apiPattern
+
`v4/projects/[0-9]+/wikis/attachments\z`
,
uploadAccelerateProxy
),
u
.
route
(
"POST"
,
apiPattern
+
`graphql\z`
,
uploadAccelerateProxy
),
u
.
route
(
"POST"
,
apiPattern
+
`v4/groups/import`
,
upload
.
Accelerate
(
api
,
signingProxy
,
preparers
.
uploads
)),
u
.
route
(
"POST"
,
apiPattern
+
`v4/projects/import`
,
upload
.
Accelerate
(
api
,
signingProxy
,
preparers
.
uploads
)),
// Project Import via UI upload acceleration
route
(
"POST"
,
importPattern
+
`gitlab_project`
,
upload
.
Accelerate
(
api
,
signingProxy
,
preparers
.
uploads
)),
u
.
route
(
"POST"
,
importPattern
+
`gitlab_project`
,
upload
.
Accelerate
(
api
,
signingProxy
,
preparers
.
uploads
)),
// Group Import via UI upload acceleration
route
(
"POST"
,
importPattern
+
`gitlab_group`
,
upload
.
Accelerate
(
api
,
signingProxy
,
preparers
.
uploads
)),
u
.
route
(
"POST"
,
importPattern
+
`gitlab_group`
,
upload
.
Accelerate
(
api
,
signingProxy
,
preparers
.
uploads
)),
// Explicitly proxy API requests
route
(
""
,
apiPattern
,
proxy
),
route
(
""
,
ciAPIPattern
,
proxy
),
u
.
route
(
""
,
apiPattern
,
proxy
),
u
.
route
(
""
,
ciAPIPattern
,
proxy
),
// Serve assets
route
(
u
.
route
(
""
,
`^/assets/`
,
static
.
ServeExisting
(
u
.
URLPrefix
,
...
...
@@ -261,26 +280,26 @@ func (u *upstream) configureRoutes() {
),
// Uploads
route
(
"POST"
,
projectPattern
+
`uploads\z`
,
upload
.
Accelerate
(
api
,
signingProxy
,
preparers
.
uploads
)),
route
(
"POST"
,
snippetUploadPattern
,
upload
.
Accelerate
(
api
,
signingProxy
,
preparers
.
uploads
)),
route
(
"POST"
,
userUploadPattern
,
upload
.
Accelerate
(
api
,
signingProxy
,
preparers
.
uploads
)),
u
.
route
(
"POST"
,
projectPattern
+
`uploads\z`
,
upload
.
Accelerate
(
api
,
signingProxy
,
preparers
.
uploads
)),
u
.
route
(
"POST"
,
snippetUploadPattern
,
upload
.
Accelerate
(
api
,
signingProxy
,
preparers
.
uploads
)),
u
.
route
(
"POST"
,
userUploadPattern
,
upload
.
Accelerate
(
api
,
signingProxy
,
preparers
.
uploads
)),
// For legacy reasons, user uploads are stored under the document root.
// To prevent anybody who knows/guesses the URL of a user-uploaded file
// from downloading it we make sure requests to /uploads/ do _not_ pass
// through static.ServeExisting.
route
(
""
,
`^/uploads/`
,
static
.
ErrorPagesUnless
(
u
.
DevelopmentMode
,
staticpages
.
ErrorFormatHTML
,
proxy
)),
u
.
route
(
""
,
`^/uploads/`
,
static
.
ErrorPagesUnless
(
u
.
DevelopmentMode
,
staticpages
.
ErrorFormatHTML
,
proxy
)),
// health checks don't intercept errors and go straight to rails
// TODO: We should probably not return a HTML deploy page?
// https://gitlab.com/gitlab-org/gitlab-workhorse/issues/230
route
(
""
,
"^/-/(readiness|liveness)$"
,
static
.
DeployPage
(
probeUpstream
)),
route
(
""
,
"^/-/health$"
,
static
.
DeployPage
(
healthUpstream
)),
u
.
route
(
""
,
"^/-/(readiness|liveness)$"
,
static
.
DeployPage
(
probeUpstream
)),
u
.
route
(
""
,
"^/-/health$"
,
static
.
DeployPage
(
healthUpstream
)),
// This route lets us filter out health checks from our metrics.
route
(
""
,
"^/-/"
,
defaultUpstream
),
u
.
route
(
""
,
"^/-/"
,
defaultUpstream
),
route
(
""
,
""
,
defaultUpstream
),
u
.
route
(
""
,
""
,
defaultUpstream
),
}
}
...
...
internal/upstream/upstream.go
View file @
822b8b15
...
...
@@ -14,7 +14,6 @@ import (
"github.com/sirupsen/logrus"
"gitlab.com/gitlab-org/labkit/correlation"
"gitlab.com/gitlab-org/labkit/log"
"gitlab.com/gitlab-org/gitlab-workhorse/internal/config"
"gitlab.com/gitlab-org/gitlab-workhorse/internal/helper"
...
...
@@ -36,11 +35,13 @@ type upstream struct {
Routes
[]
routeEntry
RoundTripper
http
.
RoundTripper
CableRoundTripper
http
.
RoundTripper
accessLogger
*
logrus
.
Logger
}
func
NewUpstream
(
cfg
config
.
Config
,
accessLogger
*
logrus
.
Logger
)
http
.
Handler
{
up
:=
upstream
{
Config
:
cfg
,
accessLogger
:
accessLogger
,
}
if
up
.
Backend
==
nil
{
up
.
Backend
=
DefaultBackend
...
...
@@ -61,8 +62,7 @@ func NewUpstream(cfg config.Config, accessLogger *logrus.Logger) http.Handler {
correlationOpts
=
append
(
correlationOpts
,
correlation
.
WithPropagation
())
}
handler
:=
log
.
AccessLogger
(
&
up
,
log
.
WithAccessLogger
(
accessLogger
))
handler
=
correlation
.
InjectCorrelationID
(
handler
,
correlationOpts
...
)
handler
:=
correlation
.
InjectCorrelationID
(
&
up
,
correlationOpts
...
)
return
handler
}
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment