discourse/config/initializers/006-mini_profiler.rb

110 lines
3.7 KiB
Ruby
Raw Normal View History

2013-02-05 14:16:51 -05:00
# If Mini Profiler is included via gem
if Rails.configuration.respond_to?(:load_mini_profiler) && Rails.configuration.load_mini_profiler
require 'rack-mini-profiler'
require 'flamegraph'
begin
require 'memory_profiler'
rescue => e
2017-07-27 21:20:09 -04:00
STDERR.put "#{e} failed to require mini profiler"
end
2014-12-28 21:30:54 -05:00
# initialization is skipped so trigger it
Rack::MiniProfilerRails.initialize!(Rails.application)
end
2013-02-05 14:16:51 -05:00
if defined?(Rack::MiniProfiler)
2013-03-25 02:19:59 -04:00
# note, we may want to add some extra security here that disables mini profiler in a multi hosted env unless user global admin
# raw_connection means results are not namespaced
#
# namespacing gets complex, cause mini profiler is in the rack chain way before multisite
Rack::MiniProfiler.config.storage_instance = Rack::MiniProfiler::RedisStore.new(
connection: DiscourseRedis.new(nil, namespace: false)
)
2013-02-05 14:16:51 -05:00
2015-04-16 22:16:37 -04:00
skip = [
/^\/message-bus/,
/^\/extra-locales/,
2015-04-16 22:16:37 -04:00
/topics\/timings/,
/assets/,
/\/user_avatar\//,
/\/letter_avatar\//,
2015-12-09 00:40:49 -05:00
/\/letter_avatar_proxy\//,
2015-04-16 22:16:37 -04:00
/\/highlight-js\//,
/qunit/,
/srv\/status/,
/commits-widget/,
/^\/cdn_asset/,
/^\/logs/,
/^\/site_customizations/,
2015-05-04 02:11:27 -04:00
/^\/uploads/,
/^\/javascripts\//,
/^\/images\//,
/^\/stylesheets\//,
/^\/favicon\/proxied/
2015-04-16 22:16:37 -04:00
]
# we DO NOT WANT mini-profiler loading on anything but real desktops and laptops
# so let's rule out all handheld, tablet, and mobile devices
2013-02-25 11:42:20 -05:00
Rack::MiniProfiler.config.pre_authorize_cb = lambda do |env|
path = env['PATH_INFO']
2015-04-16 22:16:37 -04:00
(env['HTTP_USER_AGENT'] !~ /iPad|iPhone|Android/) &&
2017-07-27 21:20:09 -04:00
!skip.any? { |re| re =~ path }
2013-02-05 14:16:51 -05:00
end
# without a user provider our results will use the ip address for namespacing
# with a load balancer in front this becomes really bad as some results can
# be stored associated with ip1 as the user and retrieved using ip2 causing 404s
Rack::MiniProfiler.config.user_provider = lambda do |env|
2013-03-24 23:36:55 -04:00
request = Rack::Request.new(env)
id = request.cookies["_t"] || request.ip || "unknown"
id = id.to_s
# some security, lets not have these tokens floating about
Digest::MD5.hexdigest(id)
end
2013-02-05 14:16:51 -05:00
Rack::MiniProfiler.config.position = 'left'
Rack::MiniProfiler.config.backtrace_ignores ||= []
Rack::MiniProfiler.config.backtrace_ignores << /lib\/rack\/message_bus.rb/
Rack::MiniProfiler.config.backtrace_ignores << /config\/initializers\/silence_logger/
Rack::MiniProfiler.config.backtrace_ignores << /config\/initializers\/quiet_logger/
2013-08-30 02:44:17 -04:00
# Rack::MiniProfiler.counter_method(ActiveRecord::QueryMethods, 'build_arel')
# Rack::MiniProfiler.counter_method(Array, 'uniq')
2013-02-05 14:16:51 -05:00
# require "#{Rails.root}/vendor/backports/notification"
# inst = Class.new
# class << inst
# def start(name,id,payload)
# if Rack::MiniProfiler.current && name !~ /(process_action.action_controller)|(render_template.action_view)/
# @prf ||= {}
# @prf[id] ||= []
# @prf[id] << Rack::MiniProfiler.start_step("#{payload[:serializer] if name =~ /serialize.serializer/} #{name}")
# end
# end
# def finish(name,id,payload)
# if Rack::MiniProfiler.current && name !~ /(process_action.action_controller)|(render_template.action_view)/
# t = @prf[id].pop
# @prf.delete id unless t
# Rack::MiniProfiler.finish_step t
# end
# end
# end
2013-02-05 14:16:51 -05:00
# disabling for now cause this slows stuff down too much
# ActiveSupport::Notifications.subscribe(/.*/, inst)
# Rack::MiniProfiler.profile_method ActionView::PathResolver, 'find_templates'
end
2015-08-19 02:58:25 -04:00
if ENV["PRINT_EXCEPTIONS"]
2017-07-27 21:20:09 -04:00
trace = TracePoint.new(:raise) do |tp|
2015-08-19 02:58:25 -04:00
puts tp.raised_exception
puts tp.raised_exception.backtrace.join("\n")
puts
end
trace.enable
end