Software /
code /
prosody-modules
Diff
mod_sentry/sentry.lib.lua @ 4283:2ae71126e379
mod_sentry: New module to forward errors to a Sentry server
author | Matthew Wild <mwild1@gmail.com> |
---|---|
date | Tue, 08 Dec 2020 15:34:53 +0000 |
child | 4284:b7045af1e5b7 |
line wrap: on
line diff
--- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/mod_sentry/sentry.lib.lua Tue Dec 08 15:34:53 2020 +0000 @@ -0,0 +1,251 @@ +local hex = require "util.hex"; +local random = require "util.random"; +local url = require "socket.url"; +local datetime = require "util.datetime".datetime; +local http = require 'net.http' +local json = require "util.json"; +local errors = require "util.error"; +local promise = require "util.promise"; + +local unpack = unpack or table.unpack -- luacheck: ignore + +local user_agent = ("prosody-mod-%s/%s"):format((module.name:gsub("%W", "-")), (prosody.version:gsub("[^%w.-]", "-"))); + +local function generate_event_id() + return hex.to(random.bytes(16)); +end + +local function get_endpoint(server, name) + return ("%s/api/%d/%s/"):format(server.base_uri, server.project_id, name); +end + +-- Parse a DSN string +-- https://develop.sentry.dev/sdk/overview/#parsing-the-dsn +local function parse_dsn(dsn_string) + local parsed = url.parse(dsn_string); + if not parsed then + return nil, "unable to parse dsn (url)"; + end + local path, project_id = parsed.path:match("^(.*)/(%d+)$"); + if not path then + return nil, "unable to parse dsn (path)"; + end + local base_uri = url.build({ + scheme = parsed.scheme; + host = parsed.host; + port = parsed.port; + path = path; + }); + return { + base_uri = base_uri; + public_key = parsed.user; + project_id = project_id; + }; +end + +local function get_error_data(instance_id, context) + local data = { + instance_id = instance_id; + }; + for k, v in pairs(context) do + data[k] = tostring(v); + end + return data; +end + +local function error_to_sentry_exception(e) + return { + type = e.condition or (e.code and tostring(e.code)) or nil; + value = e.text or tostring(e); + context = e.source; + mechanism = { + type = "generic"; + description = "Prosody error object"; + synthetic = not not e.context.wrapped_error; + data = get_error_data(e.instance_id, e.context); + }; + }; +end + +local sentry_event_methods = {}; +local sentry_event_mt = { __index = sentry_event_methods }; + +function sentry_event_methods:set(key, value) + self.event[key] = value; + return self; +end + +function sentry_event_methods:tag(tag_name, tag_value) + local tags = self.event.tags; + if not tags then + tags = {}; + self.event.tags = tags; + end + if type(tag_name) == "string" then + tags[tag_name] = tag_value; + else + for k, v in pairs(tag_name) do + tags[k] = v; + end + end + return self; +end + +function sentry_event_methods:extra(key, value) + local extra = self.event.extra; + if not extra then + extra = {}; + self.event.extra = extra; + end + if type(key) == "string" then + extra[key] = tostring(value); + else + for k, v in pairs(key) do + extra[k] = tostring(v); + end + end + return self; +end + +function sentry_event_methods:message(text) + return self:set("message", { formatted = text }); +end + +function sentry_event_methods:add_exception(e) + if errors.is_error(e) then + e = error_to_sentry_exception(e); + elseif type(e) ~= "table" or not (e.type and e.value) then + e = error_to_sentry_exception(errors.coerce(nil, e)); + end + + local exception = self.event.exception; + if not exception or not exception.values then + exception = { values = {} }; + self.event.exception = exception; + end + + table.insert(exception.values, e); + + return self; +end + +function sentry_event_methods:add_breadcrumb(crumb_timestamp, crumb_type, crumb_category, message, data) + local crumbs = self.event.breadcrumbs; + if not crumbs then + crumbs = { values = {} }; + self.event.breadcrumbs = crumbs; + end + + local crumb = { + timestamp = crumb_timestamp and datetime(crumb_timestamp) or self.timestamp; + type = crumb_type; + category = crumb_category; + message = message; + data = data; + }; + table.insert(crumbs.values, crumb); + return self; +end + +function sentry_event_methods:add_http_request_breadcrumb(http_request, message) + local request_id_message = ("[Request %s]"):format(http_request.id); + message = message and (request_id_message.." "..message) or request_id_message; + return self:add_breadcrumb(http_request.time, "http", "net.http", message, { + url = http_request.url; + method = http_request.method or "GET"; + status_code = http_request.response and http_request.response.code or nil; + }); +end + +function sentry_event_methods:set_request(http_request) + return self:set("request", { + method = http_request.method; + url = url.build(http_request.url); + headers = http_request.headers; + env = { + REMOTE_ADDR = http_request.ip; + }; + }); +end + +function sentry_event_methods:send() + return self.server:send(self.event); +end + +local sentry_mt = { } +sentry_mt.__index = sentry_mt + +local function new(conf) + local server = assert(parse_dsn(conf.dsn)); + return setmetatable({ + server = server; + endpoints = { + store = get_endpoint(server, "store"); + }; + insecure = conf.insecure; + tags = conf.tags or nil, + extra = conf.extra or nil, + server_name = conf.server_name or "undefined"; + logger = conf.logger; + }, sentry_mt); +end + +local function resolve_sentry_response(response) + if response.code == 200 and response.body then + local data = json.decode(response.body); + return data; + end + return promise.reject(response); +end + +function sentry_mt:send(event) + local json_payload = json.encode(event); + local response_promise, err = self:_request(self.endpoints.store, "application/json", json_payload); + + if not response_promise then + module:log("warn", "Failed to submit to Sentry: %s %s", err, json); + return nil, err; + end + + return response_promise:next(resolve_sentry_response), event.event_id; +end + +function sentry_mt:_request(endpoint_url, body_type, body) + local auth_header = ("Sentry sentry_version=7, sentry_client=%s, sentry_timestamp=%s, sentry_key=%s") + :format(user_agent, datetime(), self.server.public_key); + + return http.request(endpoint_url, { + headers = { + ["X-Sentry-Auth"] = auth_header; + ["Content-Type"] = body_type; + ["User-Agent"] = user_agent; + }; + insecure = self.insecure; + body = body; + }); +end + +function sentry_mt:event(level, source) + local event = setmetatable({ + server = self; + event = { + event_id = generate_event_id(); + timestamp = datetime(); + platform = "lua"; + server_name = self.server_name; + logger = source or self.logger; + level = level; + }; + }, sentry_event_mt); + if self.tags then + event:tag(self.tags); + end + if self.extra then + event:extra(self.extra); + end + return event; +end + +return { + new = new; +};