2023-09-07 19:55:58 -04:00
|
|
|
// Copyright The OpenTelemetry Authors
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
2023-10-13 15:38:21 -04:00
|
|
|
package otelhttp // import "go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp"
|
2023-09-07 19:55:58 -04:00
|
|
|
|
|
|
|
import (
|
|
|
|
"io"
|
|
|
|
"net/http"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/felixge/httpsnoop"
|
|
|
|
|
2023-12-12 10:28:35 -05:00
|
|
|
"go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp/internal/semconvutil"
|
2023-09-07 19:55:58 -04:00
|
|
|
"go.opentelemetry.io/otel"
|
|
|
|
"go.opentelemetry.io/otel/attribute"
|
|
|
|
"go.opentelemetry.io/otel/metric"
|
|
|
|
"go.opentelemetry.io/otel/propagation"
|
2023-10-13 15:38:21 -04:00
|
|
|
semconv "go.opentelemetry.io/otel/semconv/v1.17.0"
|
2023-09-07 19:55:58 -04:00
|
|
|
"go.opentelemetry.io/otel/trace"
|
|
|
|
)
|
|
|
|
|
2023-12-12 10:28:35 -05:00
|
|
|
// middleware is an http middleware which wraps the next handler in a span.
|
|
|
|
type middleware struct {
|
2023-09-07 19:55:58 -04:00
|
|
|
operation string
|
2023-10-13 15:38:21 -04:00
|
|
|
server string
|
2023-09-07 19:55:58 -04:00
|
|
|
|
|
|
|
tracer trace.Tracer
|
|
|
|
meter metric.Meter
|
|
|
|
propagators propagation.TextMapPropagator
|
|
|
|
spanStartOptions []trace.SpanStartOption
|
|
|
|
readEvent bool
|
|
|
|
writeEvent bool
|
|
|
|
filters []Filter
|
|
|
|
spanNameFormatter func(string, *http.Request) string
|
2023-12-12 10:26:50 -05:00
|
|
|
counters map[string]metric.Int64Counter
|
|
|
|
valueRecorders map[string]metric.Float64Histogram
|
2023-10-13 15:38:21 -04:00
|
|
|
publicEndpoint bool
|
|
|
|
publicEndpointFn func(*http.Request) bool
|
2023-09-07 19:55:58 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
func defaultHandlerFormatter(operation string, _ *http.Request) string {
|
|
|
|
return operation
|
|
|
|
}
|
|
|
|
|
2023-12-12 10:28:35 -05:00
|
|
|
// NewHandler wraps the passed handler in a span named after the operation and
|
|
|
|
// enriches it with metrics.
|
2023-09-07 19:55:58 -04:00
|
|
|
func NewHandler(handler http.Handler, operation string, opts ...Option) http.Handler {
|
2023-12-12 10:28:35 -05:00
|
|
|
return NewMiddleware(operation, opts...)(handler)
|
|
|
|
}
|
|
|
|
|
|
|
|
// NewMiddleware returns a tracing and metrics instrumentation middleware.
|
|
|
|
// The handler returned by the middleware wraps a handler
|
|
|
|
// in a span named after the operation and enriches it with metrics.
|
|
|
|
func NewMiddleware(operation string, opts ...Option) func(http.Handler) http.Handler {
|
|
|
|
h := middleware{
|
2023-09-07 19:55:58 -04:00
|
|
|
operation: operation,
|
|
|
|
}
|
|
|
|
|
|
|
|
defaultOpts := []Option{
|
|
|
|
WithSpanOptions(trace.WithSpanKind(trace.SpanKindServer)),
|
|
|
|
WithSpanNameFormatter(defaultHandlerFormatter),
|
|
|
|
}
|
|
|
|
|
|
|
|
c := newConfig(append(defaultOpts, opts...)...)
|
|
|
|
h.configure(c)
|
|
|
|
h.createMeasures()
|
|
|
|
|
2023-12-12 10:28:35 -05:00
|
|
|
return func(next http.Handler) http.Handler {
|
|
|
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
h.serveHTTP(w, r, next)
|
|
|
|
})
|
|
|
|
}
|
2023-09-07 19:55:58 -04:00
|
|
|
}
|
|
|
|
|
2023-12-12 10:28:35 -05:00
|
|
|
func (h *middleware) configure(c *config) {
|
2023-09-07 19:55:58 -04:00
|
|
|
h.tracer = c.Tracer
|
|
|
|
h.meter = c.Meter
|
|
|
|
h.propagators = c.Propagators
|
|
|
|
h.spanStartOptions = c.SpanStartOptions
|
|
|
|
h.readEvent = c.ReadEvent
|
|
|
|
h.writeEvent = c.WriteEvent
|
|
|
|
h.filters = c.Filters
|
|
|
|
h.spanNameFormatter = c.SpanNameFormatter
|
2023-10-13 15:38:21 -04:00
|
|
|
h.publicEndpoint = c.PublicEndpoint
|
|
|
|
h.publicEndpointFn = c.PublicEndpointFn
|
|
|
|
h.server = c.ServerName
|
2023-09-07 19:55:58 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
func handleErr(err error) {
|
|
|
|
if err != nil {
|
|
|
|
otel.Handle(err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-12-12 10:28:35 -05:00
|
|
|
func (h *middleware) createMeasures() {
|
2023-12-12 10:26:50 -05:00
|
|
|
h.counters = make(map[string]metric.Int64Counter)
|
|
|
|
h.valueRecorders = make(map[string]metric.Float64Histogram)
|
2023-09-07 19:55:58 -04:00
|
|
|
|
2024-02-26 11:50:23 -05:00
|
|
|
requestBytesCounter, err := h.meter.Int64Counter(
|
|
|
|
RequestContentLength,
|
|
|
|
metric.WithUnit("By"),
|
|
|
|
metric.WithDescription("Measures the size of HTTP request content length (uncompressed)"),
|
|
|
|
)
|
2023-09-07 19:55:58 -04:00
|
|
|
handleErr(err)
|
|
|
|
|
2024-02-26 11:50:23 -05:00
|
|
|
responseBytesCounter, err := h.meter.Int64Counter(
|
|
|
|
ResponseContentLength,
|
|
|
|
metric.WithUnit("By"),
|
|
|
|
metric.WithDescription("Measures the size of HTTP response content length (uncompressed)"),
|
|
|
|
)
|
2023-09-07 19:55:58 -04:00
|
|
|
handleErr(err)
|
|
|
|
|
2024-02-26 11:50:23 -05:00
|
|
|
serverLatencyMeasure, err := h.meter.Float64Histogram(
|
|
|
|
ServerLatency,
|
|
|
|
metric.WithUnit("ms"),
|
|
|
|
metric.WithDescription("Measures the duration of HTTP request handling"),
|
|
|
|
)
|
2023-09-07 19:55:58 -04:00
|
|
|
handleErr(err)
|
|
|
|
|
|
|
|
h.counters[RequestContentLength] = requestBytesCounter
|
|
|
|
h.counters[ResponseContentLength] = responseBytesCounter
|
|
|
|
h.valueRecorders[ServerLatency] = serverLatencyMeasure
|
|
|
|
}
|
|
|
|
|
2023-12-12 10:28:35 -05:00
|
|
|
// serveHTTP sets up tracing and calls the given next http.Handler with the span
|
|
|
|
// context injected into the request context.
|
|
|
|
func (h *middleware) serveHTTP(w http.ResponseWriter, r *http.Request, next http.Handler) {
|
2023-09-07 19:55:58 -04:00
|
|
|
requestStartTime := time.Now()
|
|
|
|
for _, f := range h.filters {
|
|
|
|
if !f(r) {
|
|
|
|
// Simply pass through to the handler if a filter rejects the request
|
2023-12-12 10:28:35 -05:00
|
|
|
next.ServeHTTP(w, r)
|
2023-09-07 19:55:58 -04:00
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-10-13 15:38:21 -04:00
|
|
|
ctx := h.propagators.Extract(r.Context(), propagation.HeaderCarrier(r.Header))
|
|
|
|
opts := []trace.SpanStartOption{
|
2023-12-12 10:28:35 -05:00
|
|
|
trace.WithAttributes(semconvutil.HTTPServerRequest(h.server, r)...),
|
2023-10-13 15:38:21 -04:00
|
|
|
}
|
|
|
|
if h.server != "" {
|
|
|
|
hostAttr := semconv.NetHostName(h.server)
|
|
|
|
opts = append(opts, trace.WithAttributes(hostAttr))
|
|
|
|
}
|
|
|
|
opts = append(opts, h.spanStartOptions...)
|
|
|
|
if h.publicEndpoint || (h.publicEndpointFn != nil && h.publicEndpointFn(r.WithContext(ctx))) {
|
|
|
|
opts = append(opts, trace.WithNewRoot())
|
|
|
|
// Linking incoming span context if any for public endpoint.
|
|
|
|
if s := trace.SpanContextFromContext(ctx); s.IsValid() && s.IsRemote() {
|
|
|
|
opts = append(opts, trace.WithLinks(trace.Link{SpanContext: s}))
|
|
|
|
}
|
|
|
|
}
|
2023-09-07 19:55:58 -04:00
|
|
|
|
|
|
|
tracer := h.tracer
|
|
|
|
|
|
|
|
if tracer == nil {
|
|
|
|
if span := trace.SpanFromContext(r.Context()); span.SpanContext().IsValid() {
|
|
|
|
tracer = newTracer(span.TracerProvider())
|
|
|
|
} else {
|
|
|
|
tracer = newTracer(otel.GetTracerProvider())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
ctx, span := tracer.Start(ctx, h.spanNameFormatter(h.operation, r), opts...)
|
|
|
|
defer span.End()
|
|
|
|
|
|
|
|
readRecordFunc := func(int64) {}
|
|
|
|
if h.readEvent {
|
|
|
|
readRecordFunc = func(n int64) {
|
|
|
|
span.AddEvent("read", trace.WithAttributes(ReadBytesKey.Int64(n)))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
var bw bodyWrapper
|
2023-10-13 15:38:21 -04:00
|
|
|
// if request body is nil or NoBody, we don't want to mutate the body as it
|
|
|
|
// will affect the identity of it in an unforeseeable way because we assert
|
|
|
|
// ReadCloser fulfills a certain interface and it is indeed nil or NoBody.
|
|
|
|
if r.Body != nil && r.Body != http.NoBody {
|
2023-09-07 19:55:58 -04:00
|
|
|
bw.ReadCloser = r.Body
|
|
|
|
bw.record = readRecordFunc
|
|
|
|
r.Body = &bw
|
|
|
|
}
|
|
|
|
|
|
|
|
writeRecordFunc := func(int64) {}
|
|
|
|
if h.writeEvent {
|
|
|
|
writeRecordFunc = func(n int64) {
|
|
|
|
span.AddEvent("write", trace.WithAttributes(WroteBytesKey.Int64(n)))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-10-13 15:38:21 -04:00
|
|
|
rww := &respWriterWrapper{
|
|
|
|
ResponseWriter: w,
|
|
|
|
record: writeRecordFunc,
|
|
|
|
ctx: ctx,
|
|
|
|
props: h.propagators,
|
|
|
|
statusCode: http.StatusOK, // default status code in case the Handler doesn't write anything
|
|
|
|
}
|
2023-09-07 19:55:58 -04:00
|
|
|
|
|
|
|
// Wrap w to use our ResponseWriter methods while also exposing
|
|
|
|
// other interfaces that w may implement (http.CloseNotifier,
|
|
|
|
// http.Flusher, http.Hijacker, http.Pusher, io.ReaderFrom).
|
|
|
|
|
|
|
|
w = httpsnoop.Wrap(w, httpsnoop.Hooks{
|
|
|
|
Header: func(httpsnoop.HeaderFunc) httpsnoop.HeaderFunc {
|
|
|
|
return rww.Header
|
|
|
|
},
|
|
|
|
Write: func(httpsnoop.WriteFunc) httpsnoop.WriteFunc {
|
|
|
|
return rww.Write
|
|
|
|
},
|
|
|
|
WriteHeader: func(httpsnoop.WriteHeaderFunc) httpsnoop.WriteHeaderFunc {
|
|
|
|
return rww.WriteHeader
|
|
|
|
},
|
|
|
|
})
|
|
|
|
|
|
|
|
labeler := &Labeler{}
|
|
|
|
ctx = injectLabeler(ctx, labeler)
|
|
|
|
|
2023-12-12 10:28:35 -05:00
|
|
|
next.ServeHTTP(w, r.WithContext(ctx))
|
2023-09-07 19:55:58 -04:00
|
|
|
|
|
|
|
setAfterServeAttributes(span, bw.read, rww.written, rww.statusCode, bw.err, rww.err)
|
|
|
|
|
|
|
|
// Add metrics
|
2023-12-12 10:28:35 -05:00
|
|
|
attributes := append(labeler.Get(), semconvutil.HTTPServerRequestMetrics(h.server, r)...)
|
2023-10-13 15:38:21 -04:00
|
|
|
if rww.statusCode > 0 {
|
|
|
|
attributes = append(attributes, semconv.HTTPStatusCode(rww.statusCode))
|
|
|
|
}
|
2023-12-12 10:26:50 -05:00
|
|
|
o := metric.WithAttributes(attributes...)
|
|
|
|
h.counters[RequestContentLength].Add(ctx, bw.read, o)
|
|
|
|
h.counters[ResponseContentLength].Add(ctx, rww.written, o)
|
2023-09-07 19:55:58 -04:00
|
|
|
|
|
|
|
// Use floating point division here for higher precision (instead of Millisecond method).
|
|
|
|
elapsedTime := float64(time.Since(requestStartTime)) / float64(time.Millisecond)
|
|
|
|
|
2023-12-12 10:26:50 -05:00
|
|
|
h.valueRecorders[ServerLatency].Record(ctx, elapsedTime, o)
|
2023-09-07 19:55:58 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
func setAfterServeAttributes(span trace.Span, read, wrote int64, statusCode int, rerr, werr error) {
|
|
|
|
attributes := []attribute.KeyValue{}
|
|
|
|
|
|
|
|
// TODO: Consider adding an event after each read and write, possibly as an
|
|
|
|
// option (defaulting to off), so as to not create needlessly verbose spans.
|
|
|
|
if read > 0 {
|
|
|
|
attributes = append(attributes, ReadBytesKey.Int64(read))
|
|
|
|
}
|
|
|
|
if rerr != nil && rerr != io.EOF {
|
|
|
|
attributes = append(attributes, ReadErrorKey.String(rerr.Error()))
|
|
|
|
}
|
|
|
|
if wrote > 0 {
|
|
|
|
attributes = append(attributes, WroteBytesKey.Int64(wrote))
|
|
|
|
}
|
|
|
|
if statusCode > 0 {
|
2023-10-13 15:38:21 -04:00
|
|
|
attributes = append(attributes, semconv.HTTPStatusCode(statusCode))
|
2023-09-07 19:55:58 -04:00
|
|
|
}
|
2023-12-12 10:28:35 -05:00
|
|
|
span.SetStatus(semconvutil.HTTPServerStatus(statusCode))
|
2023-10-13 15:38:21 -04:00
|
|
|
|
2023-09-07 19:55:58 -04:00
|
|
|
if werr != nil && werr != io.EOF {
|
|
|
|
attributes = append(attributes, WriteErrorKey.String(werr.Error()))
|
|
|
|
}
|
|
|
|
span.SetAttributes(attributes...)
|
|
|
|
}
|
|
|
|
|
2023-12-12 10:28:35 -05:00
|
|
|
// WithRouteTag annotates spans and metrics with the provided route name
|
|
|
|
// with HTTP route attribute.
|
2023-09-07 19:55:58 -04:00
|
|
|
func WithRouteTag(route string, h http.Handler) http.Handler {
|
|
|
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
2023-12-12 10:28:35 -05:00
|
|
|
attr := semconv.HTTPRouteKey.String(route)
|
|
|
|
|
2023-09-07 19:55:58 -04:00
|
|
|
span := trace.SpanFromContext(r.Context())
|
2023-12-12 10:28:35 -05:00
|
|
|
span.SetAttributes(attr)
|
|
|
|
|
|
|
|
labeler, _ := LabelerFromContext(r.Context())
|
|
|
|
labeler.Add(attr)
|
|
|
|
|
2023-09-07 19:55:58 -04:00
|
|
|
h.ServeHTTP(w, r)
|
|
|
|
})
|
|
|
|
}
|