feat(logging): add a logging middleware to log all api requests (#3437)

This commit is contained in:
Sampras Lopes
2024-01-25 12:56:20 +05:30
committed by GitHub
parent 47fbe486ce
commit c2946cfe05
12 changed files with 120 additions and 26 deletions

View File

@ -37,7 +37,7 @@ impl ExecuteQuery for kv::DBOperation {
]; ];
let (result, execution_time) = let (result, execution_time) =
common_utils::date_time::time_it(|| self.execute(&conn)).await; Box::pin(common_utils::date_time::time_it(|| self.execute(&conn))).await;
push_drainer_delay(pushed_at, operation, table, tags); push_drainer_delay(pushed_at, operation, table, tags);
metrics::QUERY_EXECUTION_TIME.record(&metrics::CONTEXT, execution_time, tags); metrics::QUERY_EXECUTION_TIME.record(&metrics::CONTEXT, execution_time, tags);

View File

@ -245,7 +245,13 @@ pub async fn update_customer_payment_method(
.as_ref() .as_ref()
.map(|card_network| card_network.to_string()), .map(|card_network| card_network.to_string()),
}; };
add_payment_method(state, new_pm, &merchant_account, &key_store).await Box::pin(add_payment_method(
state,
new_pm,
&merchant_account,
&key_store,
))
.await
} }
// Wrapper function to switch lockers // Wrapper function to switch lockers

View File

@ -81,11 +81,11 @@ where
) )
.await? .await?
} else { } else {
save_in_locker( Box::pin(save_in_locker(
state, state,
merchant_account, merchant_account,
payment_method_create_request.to_owned(), payment_method_create_request.to_owned(),
) ))
.await? .await?
}; };

View File

@ -267,5 +267,6 @@ pub fn get_application_builder(
.wrap(middleware::default_response_headers()) .wrap(middleware::default_response_headers())
.wrap(middleware::RequestId) .wrap(middleware::RequestId)
.wrap(cors::cors()) .wrap(cors::cors())
.wrap(middleware::LogSpanInitializer)
.wrap(router_env::tracing_actix_web::TracingLogger::default()) .wrap(router_env::tracing_actix_web::TracingLogger::default())
} }

View File

@ -1,3 +1,4 @@
use router_env::tracing::{field::Empty, Instrument};
/// Middleware to include request ID in response header. /// Middleware to include request ID in response header.
pub struct RequestId; pub struct RequestId;
@ -48,20 +49,23 @@ where
let request_id_fut = req.extract::<router_env::tracing_actix_web::RequestId>(); let request_id_fut = req.extract::<router_env::tracing_actix_web::RequestId>();
let response_fut = self.service.call(req); let response_fut = self.service.call(req);
Box::pin(async move { Box::pin(
let request_id = request_id_fut.await?; async move {
let request_id = request_id.as_hyphenated().to_string(); let request_id = request_id_fut.await?;
if let Some(upstream_request_id) = old_x_request_id { let request_id = request_id.as_hyphenated().to_string();
router_env::logger::info!(?request_id, ?upstream_request_id); if let Some(upstream_request_id) = old_x_request_id {
} router_env::logger::info!(?request_id, ?upstream_request_id);
let mut response = response_fut.await?; }
response.headers_mut().append( let mut response = response_fut.await?;
http::header::HeaderName::from_static("x-request-id"), response.headers_mut().append(
http::HeaderValue::from_str(&request_id)?, http::header::HeaderName::from_static("x-request-id"),
); http::HeaderValue::from_str(&request_id)?,
);
Ok(response) Ok(response)
}) }
.in_current_span(),
)
} }
} }
@ -81,3 +85,67 @@ pub fn default_response_headers() -> actix_web::middleware::DefaultHeaders {
.add((header::STRICT_TRANSPORT_SECURITY, "max-age=31536000")) .add((header::STRICT_TRANSPORT_SECURITY, "max-age=31536000"))
.add((header::VIA, "HyperSwitch")) .add((header::VIA, "HyperSwitch"))
} }
/// Middleware to build a TOP level domain span for each request.
pub struct LogSpanInitializer;
impl<S, B> actix_web::dev::Transform<S, actix_web::dev::ServiceRequest> for LogSpanInitializer
where
S: actix_web::dev::Service<
actix_web::dev::ServiceRequest,
Response = actix_web::dev::ServiceResponse<B>,
Error = actix_web::Error,
>,
S::Future: 'static,
B: 'static,
{
type Response = actix_web::dev::ServiceResponse<B>;
type Error = actix_web::Error;
type Transform = LogSpanInitializerMiddleware<S>;
type InitError = ();
type Future = std::future::Ready<Result<Self::Transform, Self::InitError>>;
fn new_transform(&self, service: S) -> Self::Future {
std::future::ready(Ok(LogSpanInitializerMiddleware { service }))
}
}
pub struct LogSpanInitializerMiddleware<S> {
service: S,
}
impl<S, B> actix_web::dev::Service<actix_web::dev::ServiceRequest>
for LogSpanInitializerMiddleware<S>
where
S: actix_web::dev::Service<
actix_web::dev::ServiceRequest,
Response = actix_web::dev::ServiceResponse<B>,
Error = actix_web::Error,
>,
S::Future: 'static,
B: 'static,
{
type Response = actix_web::dev::ServiceResponse<B>;
type Error = actix_web::Error;
type Future = futures::future::LocalBoxFuture<'static, Result<Self::Response, Self::Error>>;
actix_web::dev::forward_ready!(service);
// TODO: have a common source of truth for the list of top level fields
// /crates/router_env/src/logger/storage.rs also has a list of fields called PERSISTENT_KEYS
fn call(&self, req: actix_web::dev::ServiceRequest) -> Self::Future {
let response_fut = self.service.call(req);
Box::pin(
response_fut.instrument(
router_env::tracing::info_span!(
"golden_log_line",
payment_id = Empty,
merchant_id = Empty,
connector_name = Empty
)
.or_current(),
),
)
}
}

View File

@ -520,7 +520,7 @@ pub async fn business_profile_update(
let flow = Flow::BusinessProfileUpdate; let flow = Flow::BusinessProfileUpdate;
let (merchant_id, profile_id) = path.into_inner(); let (merchant_id, profile_id) = path.into_inner();
api::server_wrap( Box::pin(api::server_wrap(
flow, flow,
state, state,
&req, &req,
@ -535,7 +535,7 @@ pub async fn business_profile_update(
req.headers(), req.headers(),
), ),
api_locking::LockAction::NotApplicable, api_locking::LockAction::NotApplicable,
) ))
.await .await
} }
#[instrument(skip_all, fields(flow = ?Flow::BusinessProfileDelete))] #[instrument(skip_all, fields(flow = ?Flow::BusinessProfileDelete))]

View File

@ -75,7 +75,7 @@ pub async fn revoke_mandate(
let mandate_id = mandates::MandateId { let mandate_id = mandates::MandateId {
mandate_id: path.into_inner(), mandate_id: path.into_inner(),
}; };
api::server_wrap( Box::pin(api::server_wrap(
flow, flow,
state, state,
&req, &req,
@ -85,7 +85,7 @@ pub async fn revoke_mandate(
}, },
&auth::ApiKeyAuth, &auth::ApiKeyAuth,
api_locking::LockAction::NotApplicable, api_locking::LockAction::NotApplicable,
) ))
.await .await
} }
/// Mandates - List Mandates /// Mandates - List Mandates

View File

@ -44,7 +44,13 @@ pub async fn create_payment_method_api(
&req, &req,
json_payload.into_inner(), json_payload.into_inner(),
|state, auth, req| async move { |state, auth, req| async move {
cards::add_payment_method(state, req, &auth.merchant_account, &auth.key_store).await Box::pin(cards::add_payment_method(
state,
req,
&auth.merchant_account,
&auth.key_store,
))
.await
}, },
&auth::ApiKeyAuth, &auth::ApiKeyAuth,
api_locking::LockAction::NotApplicable, api_locking::LockAction::NotApplicable,

View File

@ -1131,7 +1131,6 @@ where
status_code = response_code, status_code = response_code,
time_taken_ms = request_duration.as_millis(), time_taken_ms = request_duration.as_millis(),
); );
res res
} }

View File

@ -92,6 +92,8 @@ impl Visit for Storage<'_> {
} }
} }
const PERSISTENT_KEYS: [&str; 3] = ["payment_id", "connector_name", "merchant_id"];
impl<S: Subscriber + for<'a> tracing_subscriber::registry::LookupSpan<'a>> Layer<S> impl<S: Subscriber + for<'a> tracing_subscriber::registry::LookupSpan<'a>> Layer<S>
for StorageSubscription for StorageSubscription
{ {
@ -99,6 +101,7 @@ impl<S: Subscriber + for<'a> tracing_subscriber::registry::LookupSpan<'a>> Layer
fn on_new_span(&self, attrs: &Attributes<'_>, id: &Id, ctx: Context<'_, S>) { fn on_new_span(&self, attrs: &Attributes<'_>, id: &Id, ctx: Context<'_, S>) {
#[allow(clippy::expect_used)] #[allow(clippy::expect_used)]
let span = ctx.span(id).expect("No span"); let span = ctx.span(id).expect("No span");
let mut extensions = span.extensions_mut();
let mut visitor = if let Some(parent_span) = span.parent() { let mut visitor = if let Some(parent_span) = span.parent() {
let mut extensions = parent_span.extensions_mut(); let mut extensions = parent_span.extensions_mut();
@ -110,7 +113,6 @@ impl<S: Subscriber + for<'a> tracing_subscriber::registry::LookupSpan<'a>> Layer
Storage::default() Storage::default()
}; };
let mut extensions = span.extensions_mut();
attrs.record(&mut visitor); attrs.record(&mut visitor);
extensions.insert(visitor); extensions.insert(visitor);
} }
@ -150,6 +152,18 @@ impl<S: Subscriber + for<'a> tracing_subscriber::registry::LookupSpan<'a>> Layer
.unwrap_or(0) .unwrap_or(0)
}; };
if let Some(s) = span.extensions().get::<Storage<'_>>() {
s.values.iter().for_each(|(k, v)| {
if PERSISTENT_KEYS.contains(k) {
span.parent().and_then(|p| {
p.extensions_mut()
.get_mut::<Storage<'_>>()
.map(|s| s.values.insert(k, v.to_owned()))
});
}
})
};
let mut extensions_mut = span.extensions_mut(); let mut extensions_mut = span.extensions_mut();
#[allow(clippy::expect_used)] #[allow(clippy::expect_used)]
let visitor = extensions_mut let visitor = extensions_mut

View File

@ -31,7 +31,7 @@ services:
networks: networks:
- router_net - router_net
ports: ports:
- "6379" - "6379:6379"
migration_runner: migration_runner:
image: rust:latest image: rust:latest

View File

@ -27,7 +27,7 @@ services:
networks: networks:
- router_net - router_net
ports: ports:
- "6379" - "6379:6379"
migration_runner: migration_runner:
image: rust:latest image: rust:latest