Add support for unauthenticated pprof access on a per-listener basis,… (#11324)
* Add support for unauthenticated pprof access on a per-listener basis, as we do for metrics. * Add missing pprof sub-targets like 'allocs' and 'block'. Capture the goroutine subtarget a second time in text form. This is mostly a convenience, but also I think the pprof format might be a bit lossy?
This commit is contained in:
parent
0f45cd37ea
commit
a8023e0fdb
|
@ -0,0 +1,3 @@
|
||||||
|
```release-note:enhancement
|
||||||
|
core: Add per-listener config to allow unauthenticated pprof requests, and collect a few more pprof targets.
|
||||||
|
```
|
|
@ -5,6 +5,7 @@ import (
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
"fmt"
|
"fmt"
|
||||||
"io/ioutil"
|
"io/ioutil"
|
||||||
|
"net/url"
|
||||||
"os"
|
"os"
|
||||||
"path/filepath"
|
"path/filepath"
|
||||||
"strconv"
|
"strconv"
|
||||||
|
@ -581,7 +582,10 @@ func (c *DebugCommand) capturePollingTargets() error {
|
||||||
|
|
||||||
if strutil.StrListContains(c.flagTargets, "log") {
|
if strutil.StrListContains(c.flagTargets, "log") {
|
||||||
g.Add(func() error {
|
g.Add(func() error {
|
||||||
_ = c.writeLogs(ctx)
|
c.writeLogs(ctx)
|
||||||
|
// If writeLogs returned earlier due to an error, wait for context
|
||||||
|
// to terminate so we don't abort everything.
|
||||||
|
<-ctx.Done()
|
||||||
return nil
|
return nil
|
||||||
}, func(error) {
|
}, func(error) {
|
||||||
cancelFunc()
|
cancelFunc()
|
||||||
|
@ -670,16 +674,12 @@ func (c *DebugCommand) collectMetrics(ctx context.Context) {
|
||||||
}
|
}
|
||||||
|
|
||||||
// Check replication status. We skip on processing metrics if we're one
|
// Check replication status. We skip on processing metrics if we're one
|
||||||
// of the following (since the request will be forwarded):
|
// a DR node, though non-perf standbys will fail if they aren't using
|
||||||
// 1. Any type of DR Node
|
// unauthenticated_metrics_access.
|
||||||
// 2. Non-DR, non-performance standby nodes
|
|
||||||
switch {
|
switch {
|
||||||
case healthStatus.ReplicationDRMode == "secondary":
|
case healthStatus.ReplicationDRMode == "secondary":
|
||||||
c.logger.Info("skipping metrics capture on DR secondary node")
|
c.logger.Info("skipping metrics capture on DR secondary node")
|
||||||
continue
|
continue
|
||||||
case healthStatus.Standby && !healthStatus.PerformanceStandby:
|
|
||||||
c.logger.Info("skipping metrics on standby node")
|
|
||||||
continue
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// Perform metrics request
|
// Perform metrics request
|
||||||
|
@ -731,35 +731,37 @@ func (c *DebugCommand) collectPprof(ctx context.Context) {
|
||||||
|
|
||||||
var wg sync.WaitGroup
|
var wg sync.WaitGroup
|
||||||
|
|
||||||
// Capture goroutines
|
for _, target := range []string{"threadcreate", "allocs", "block", "mutex", "goroutine", "heap"} {
|
||||||
wg.Add(1)
|
wg.Add(1)
|
||||||
go func() {
|
go func(target string) {
|
||||||
defer wg.Done()
|
defer wg.Done()
|
||||||
data, err := pprofGoroutine(ctx, c.cachedClient)
|
data, err := pprofTarget(ctx, c.cachedClient, target, nil)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
c.captureError("pprof.goroutine", err)
|
c.captureError("pprof."+target, err)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
err = ioutil.WriteFile(filepath.Join(dirName, "goroutine.prof"), data, 0o644)
|
err = ioutil.WriteFile(filepath.Join(dirName, target+".prof"), data, 0o644)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
c.captureError("pprof.goroutine", err)
|
c.captureError("pprof."+target, err)
|
||||||
|
}
|
||||||
|
}(target)
|
||||||
}
|
}
|
||||||
}()
|
|
||||||
|
|
||||||
// Capture heap
|
// As a convenience, we'll also fetch the goroutine target using debug=2, which yields a text
|
||||||
|
// version of the stack traces that don't require using `go tool pprof` to view.
|
||||||
wg.Add(1)
|
wg.Add(1)
|
||||||
go func() {
|
go func() {
|
||||||
defer wg.Done()
|
defer wg.Done()
|
||||||
data, err := pprofHeap(ctx, c.cachedClient)
|
data, err := pprofTarget(ctx, c.cachedClient, "goroutine", url.Values{"debug": []string{"2"}})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
c.captureError("pprof.heap", err)
|
c.captureError("pprof.goroutines-text", err)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
err = ioutil.WriteFile(filepath.Join(dirName, "heap.prof"), data, 0o644)
|
err = ioutil.WriteFile(filepath.Join(dirName, "goroutines.txt"), data, 0o644)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
c.captureError("pprof.heap", err)
|
c.captureError("pprof.goroutines-text", err)
|
||||||
}
|
}
|
||||||
}()
|
}()
|
||||||
|
|
||||||
|
@ -911,24 +913,11 @@ func (c *DebugCommand) compress(dst string) error {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func pprofGoroutine(ctx context.Context, client *api.Client) ([]byte, error) {
|
func pprofTarget(ctx context.Context, client *api.Client, target string, params url.Values) ([]byte, error) {
|
||||||
req := client.NewRequest("GET", "/v1/sys/pprof/goroutine")
|
req := client.NewRequest("GET", "/v1/sys/pprof/"+target)
|
||||||
resp, err := client.RawRequestWithContext(ctx, req)
|
if params != nil {
|
||||||
if err != nil {
|
req.Params = params
|
||||||
return nil, err
|
|
||||||
}
|
}
|
||||||
defer resp.Body.Close()
|
|
||||||
|
|
||||||
data, err := ioutil.ReadAll(resp.Body)
|
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
return data, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func pprofHeap(ctx context.Context, client *api.Client) ([]byte, error) {
|
|
||||||
req := client.NewRequest("GET", "/v1/sys/pprof/heap")
|
|
||||||
resp, err := client.RawRequestWithContext(ctx, req)
|
resp, err := client.RawRequestWithContext(ctx, req)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
|
@ -994,16 +983,18 @@ func (c *DebugCommand) captureError(target string, err error) {
|
||||||
c.errLock.Unlock()
|
c.errLock.Unlock()
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *DebugCommand) writeLogs(ctx context.Context) error {
|
func (c *DebugCommand) writeLogs(ctx context.Context) {
|
||||||
out, err := os.Create(filepath.Join(c.flagOutput, "vault.log"))
|
out, err := os.Create(filepath.Join(c.flagOutput, "vault.log"))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
c.captureError("log", err)
|
||||||
|
return
|
||||||
}
|
}
|
||||||
defer out.Close()
|
defer out.Close()
|
||||||
|
|
||||||
logCh, err := c.cachedClient.Sys().Monitor(ctx, "trace")
|
logCh, err := c.cachedClient.Sys().Monitor(ctx, "trace")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
c.captureError("log", err)
|
||||||
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
for {
|
for {
|
||||||
|
@ -1011,10 +1002,11 @@ func (c *DebugCommand) writeLogs(ctx context.Context) error {
|
||||||
case log := <-logCh:
|
case log := <-logCh:
|
||||||
_, err = out.WriteString(log)
|
_, err = out.WriteString(log)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
c.captureError("log", err)
|
||||||
|
return
|
||||||
}
|
}
|
||||||
case <-ctx.Done():
|
case <-ctx.Done():
|
||||||
return nil
|
return
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -711,6 +711,12 @@ listener "tcp" {
|
||||||
tls_max_version = "tls13"
|
tls_max_version = "tls13"
|
||||||
tls_require_and_verify_client_cert = true
|
tls_require_and_verify_client_cert = true
|
||||||
tls_disable_client_certs = true
|
tls_disable_client_certs = true
|
||||||
|
telemetry {
|
||||||
|
unauthenticated_metrics_access = true
|
||||||
|
}
|
||||||
|
profiling {
|
||||||
|
unauthenticated_pprof_access = true
|
||||||
|
}
|
||||||
}`))
|
}`))
|
||||||
|
|
||||||
config := Config{
|
config := Config{
|
||||||
|
@ -742,6 +748,12 @@ listener "tcp" {
|
||||||
TLSMaxVersion: "tls13",
|
TLSMaxVersion: "tls13",
|
||||||
TLSRequireAndVerifyClientCert: true,
|
TLSRequireAndVerifyClientCert: true,
|
||||||
TLSDisableClientCerts: true,
|
TLSDisableClientCerts: true,
|
||||||
|
Telemetry: configutil.ListenerTelemetry{
|
||||||
|
UnauthenticatedMetricsAccess: true,
|
||||||
|
},
|
||||||
|
Profiling: configutil.ListenerProfiling{
|
||||||
|
UnauthenticatedPProfAccess: true,
|
||||||
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
|
|
@ -11,6 +11,7 @@ import (
|
||||||
"mime"
|
"mime"
|
||||||
"net"
|
"net"
|
||||||
"net/http"
|
"net/http"
|
||||||
|
"net/http/pprof"
|
||||||
"net/textproto"
|
"net/textproto"
|
||||||
"net/url"
|
"net/url"
|
||||||
"os"
|
"os"
|
||||||
|
@ -130,7 +131,6 @@ func Handler(props *vault.HandlerProperties) http.Handler {
|
||||||
// Handle non-forwarded paths
|
// Handle non-forwarded paths
|
||||||
mux.Handle("/v1/sys/config/state/", handleLogicalNoForward(core))
|
mux.Handle("/v1/sys/config/state/", handleLogicalNoForward(core))
|
||||||
mux.Handle("/v1/sys/host-info", handleLogicalNoForward(core))
|
mux.Handle("/v1/sys/host-info", handleLogicalNoForward(core))
|
||||||
mux.Handle("/v1/sys/pprof/", handleLogicalNoForward(core))
|
|
||||||
|
|
||||||
mux.Handle("/v1/sys/init", handleSysInit(core))
|
mux.Handle("/v1/sys/init", handleSysInit(core))
|
||||||
mux.Handle("/v1/sys/seal-status", handleSysSealStatus(core))
|
mux.Handle("/v1/sys/seal-status", handleSysSealStatus(core))
|
||||||
|
@ -177,6 +177,19 @@ func Handler(props *vault.HandlerProperties) http.Handler {
|
||||||
mux.Handle("/v1/sys/metrics", handleLogicalNoForward(core))
|
mux.Handle("/v1/sys/metrics", handleLogicalNoForward(core))
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if props.ListenerConfig != nil && props.ListenerConfig.Profiling.UnauthenticatedPProfAccess {
|
||||||
|
for _, name := range []string{"goroutine", "threadcreate", "heap", "allocs", "block", "mutex"} {
|
||||||
|
mux.Handle("/v1/sys/pprof/"+name, pprof.Handler(name))
|
||||||
|
}
|
||||||
|
mux.Handle("/v1/sys/pprof/", http.HandlerFunc(pprof.Index))
|
||||||
|
mux.Handle("/v1/sys/pprof/cmdline", http.HandlerFunc(pprof.Cmdline))
|
||||||
|
mux.Handle("/v1/sys/pprof/profile", http.HandlerFunc(pprof.Profile))
|
||||||
|
mux.Handle("/v1/sys/pprof/symbol", http.HandlerFunc(pprof.Symbol))
|
||||||
|
mux.Handle("/v1/sys/pprof/trace", http.HandlerFunc(pprof.Trace))
|
||||||
|
} else {
|
||||||
|
mux.Handle("/v1/sys/pprof/", handleLogicalNoForward(core))
|
||||||
|
}
|
||||||
|
|
||||||
additionalRoutes(mux, core)
|
additionalRoutes(mux, core)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -56,3 +56,41 @@ func TestSysMetricsUnauthenticated(t *testing.T) {
|
||||||
resp = testHttpGet(t, "", addr+"/v1/sys/metrics?format=prometheus")
|
resp = testHttpGet(t, "", addr+"/v1/sys/metrics?format=prometheus")
|
||||||
testResponseStatus(t, resp, 200)
|
testResponseStatus(t, resp, 200)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestSysPProfUnauthenticated(t *testing.T) {
|
||||||
|
conf := &vault.CoreConfig{}
|
||||||
|
core, _, token := vault.TestCoreUnsealedWithConfig(t, conf)
|
||||||
|
ln, addr := TestServer(t, core)
|
||||||
|
TestServerAuth(t, addr, token)
|
||||||
|
|
||||||
|
// Default: Only authenticated access
|
||||||
|
resp := testHttpGet(t, "", addr+"/v1/sys/pprof/cmdline")
|
||||||
|
testResponseStatus(t, resp, 400)
|
||||||
|
resp = testHttpGet(t, token, addr+"/v1/sys/pprof/cmdline")
|
||||||
|
testResponseStatus(t, resp, 200)
|
||||||
|
|
||||||
|
// Close listener
|
||||||
|
ln.Close()
|
||||||
|
|
||||||
|
// Setup new custom listener with unauthenticated metrics access
|
||||||
|
ln, addr = TestListener(t)
|
||||||
|
props := &vault.HandlerProperties{
|
||||||
|
Core: core,
|
||||||
|
ListenerConfig: &configutil.Listener{
|
||||||
|
Profiling: configutil.ListenerProfiling{
|
||||||
|
UnauthenticatedPProfAccess: true,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
TestServerWithListenerAndProperties(t, ln, addr, core, props)
|
||||||
|
defer ln.Close()
|
||||||
|
TestServerAuth(t, addr, token)
|
||||||
|
|
||||||
|
// Test without token
|
||||||
|
resp = testHttpGet(t, "", addr+"/v1/sys/pprof/cmdline")
|
||||||
|
testResponseStatus(t, resp, 200)
|
||||||
|
|
||||||
|
// Should also work with token
|
||||||
|
resp = testHttpGet(t, token, addr+"/v1/sys/pprof/cmdline")
|
||||||
|
testResponseStatus(t, resp, 200)
|
||||||
|
}
|
||||||
|
|
|
@ -21,6 +21,11 @@ type ListenerTelemetry struct {
|
||||||
UnauthenticatedMetricsAccessRaw interface{} `hcl:"unauthenticated_metrics_access"`
|
UnauthenticatedMetricsAccessRaw interface{} `hcl:"unauthenticated_metrics_access"`
|
||||||
}
|
}
|
||||||
|
|
||||||
|
type ListenerProfiling struct {
|
||||||
|
UnauthenticatedPProfAccess bool `hcl:"-"`
|
||||||
|
UnauthenticatedPProfAccessRaw interface{} `hcl:"unauthenticated_pprof_access"`
|
||||||
|
}
|
||||||
|
|
||||||
// Listener is the listener configuration for the server.
|
// Listener is the listener configuration for the server.
|
||||||
type Listener struct {
|
type Listener struct {
|
||||||
RawConfig map[string]interface{}
|
RawConfig map[string]interface{}
|
||||||
|
@ -81,6 +86,7 @@ type Listener struct {
|
||||||
SocketGroup string `hcl:"socket_group"`
|
SocketGroup string `hcl:"socket_group"`
|
||||||
|
|
||||||
Telemetry ListenerTelemetry `hcl:"telemetry"`
|
Telemetry ListenerTelemetry `hcl:"telemetry"`
|
||||||
|
Profiling ListenerProfiling `hcl:"profiling"`
|
||||||
|
|
||||||
// RandomPort is used only for some testing purposes
|
// RandomPort is used only for some testing purposes
|
||||||
RandomPort bool `hcl:"-"`
|
RandomPort bool `hcl:"-"`
|
||||||
|
@ -315,6 +321,17 @@ func ParseListeners(result *SharedConfig, list *ast.ObjectList) error {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Profiling
|
||||||
|
{
|
||||||
|
if l.Profiling.UnauthenticatedPProfAccessRaw != nil {
|
||||||
|
if l.Profiling.UnauthenticatedPProfAccess, err = parseutil.ParseBool(l.Profiling.UnauthenticatedPProfAccessRaw); err != nil {
|
||||||
|
return multierror.Prefix(fmt.Errorf("invalid value for profiling.unauthenticated_pprof_access: %w", err), fmt.Sprintf("listeners.%d", i))
|
||||||
|
}
|
||||||
|
|
||||||
|
l.Profiling.UnauthenticatedPProfAccessRaw = nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// CORS
|
// CORS
|
||||||
{
|
{
|
||||||
if l.CorsEnabledRaw != nil {
|
if l.CorsEnabledRaw != nil {
|
||||||
|
|
|
@ -1,6 +1,7 @@
|
||||||
package pprof
|
package pprof
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"context"
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
"io/ioutil"
|
"io/ioutil"
|
||||||
"net/http"
|
"net/http"
|
||||||
|
@ -9,8 +10,11 @@ import (
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
"github.com/hashicorp/go-cleanhttp"
|
"github.com/hashicorp/go-cleanhttp"
|
||||||
|
"github.com/hashicorp/vault/api"
|
||||||
vaulthttp "github.com/hashicorp/vault/http"
|
vaulthttp "github.com/hashicorp/vault/http"
|
||||||
|
"github.com/hashicorp/vault/internalshared/configutil"
|
||||||
"github.com/hashicorp/vault/vault"
|
"github.com/hashicorp/vault/vault"
|
||||||
|
"github.com/stretchr/testify/require"
|
||||||
"golang.org/x/net/http2"
|
"golang.org/x/net/http2"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -168,6 +172,45 @@ func TestSysPprof_MaxRequestDuration(t *testing.T) {
|
||||||
t.Fatalf("expected error response, got: %v", httpResp)
|
t.Fatalf("expected error response, got: %v", httpResp)
|
||||||
}
|
}
|
||||||
if len(errs) == 0 || !strings.Contains(errs[0].(string), "exceeds max request duration") {
|
if len(errs) == 0 || !strings.Contains(errs[0].(string), "exceeds max request duration") {
|
||||||
t.Fatalf("unexptected error returned: %v", errs)
|
t.Fatalf("unexpected error returned: %v", errs)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestSysPprof_Standby(t *testing.T) {
|
||||||
|
cluster := vault.NewTestCluster(t, &vault.CoreConfig{
|
||||||
|
DisablePerformanceStandby: true,
|
||||||
|
}, &vault.TestClusterOptions{
|
||||||
|
HandlerFunc: vaulthttp.Handler,
|
||||||
|
DefaultHandlerProperties: vault.HandlerProperties{
|
||||||
|
ListenerConfig: &configutil.Listener{
|
||||||
|
Profiling: configutil.ListenerProfiling{
|
||||||
|
UnauthenticatedPProfAccess: true,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
})
|
||||||
|
cluster.Start()
|
||||||
|
defer cluster.Cleanup()
|
||||||
|
|
||||||
|
pprof := func(client *api.Client) (string, error) {
|
||||||
|
req := client.NewRequest("GET", "/v1/sys/pprof/cmdline")
|
||||||
|
resp, err := client.RawRequestWithContext(context.Background(), req)
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
defer resp.Body.Close()
|
||||||
|
|
||||||
|
data, err := ioutil.ReadAll(resp.Body)
|
||||||
|
return string(data), err
|
||||||
|
}
|
||||||
|
|
||||||
|
cmdline, err := pprof(cluster.Cores[0].Client)
|
||||||
|
require.Nil(t, err)
|
||||||
|
require.NotEmpty(t, cmdline)
|
||||||
|
t.Log(cmdline)
|
||||||
|
|
||||||
|
cmdline, err = pprof(cluster.Cores[1].Client)
|
||||||
|
require.Nil(t, err)
|
||||||
|
require.NotEmpty(t, cmdline)
|
||||||
|
t.Log(cmdline)
|
||||||
|
}
|
||||||
|
|
|
@ -59,6 +59,50 @@ render pages.`,
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
Pattern: "pprof/allocs",
|
||||||
|
|
||||||
|
Operations: map[logical.Operation]framework.OperationHandler{
|
||||||
|
logical.ReadOperation: &framework.PathOperation{
|
||||||
|
Callback: b.handlePprofAllocs,
|
||||||
|
Summary: "Returns a sampling of all past memory allocations.",
|
||||||
|
Description: "Returns a sampling of all past memory allocations.",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Pattern: "pprof/threadcreate",
|
||||||
|
|
||||||
|
Operations: map[logical.Operation]framework.OperationHandler{
|
||||||
|
logical.ReadOperation: &framework.PathOperation{
|
||||||
|
Callback: b.handlePprofThreadcreate,
|
||||||
|
Summary: "Returns stack traces that led to the creation of new OS threads",
|
||||||
|
Description: "Returns stack traces that led to the creation of new OS threads",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Pattern: "pprof/block",
|
||||||
|
|
||||||
|
Operations: map[logical.Operation]framework.OperationHandler{
|
||||||
|
logical.ReadOperation: &framework.PathOperation{
|
||||||
|
Callback: b.handlePprofBlock,
|
||||||
|
Summary: "Returns stack traces that led to blocking on synchronization primitives",
|
||||||
|
Description: "Returns stack traces that led to blocking on synchronization primitives",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Pattern: "pprof/mutex",
|
||||||
|
|
||||||
|
Operations: map[logical.Operation]framework.OperationHandler{
|
||||||
|
logical.ReadOperation: &framework.PathOperation{
|
||||||
|
Callback: b.handlePprofMutex,
|
||||||
|
Summary: "Returns stack traces of holders of contended mutexes",
|
||||||
|
Description: "Returns stack traces of holders of contended mutexes",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
{
|
{
|
||||||
Pattern: "pprof/profile",
|
Pattern: "pprof/profile",
|
||||||
|
|
||||||
|
@ -146,6 +190,42 @@ func (b *SystemBackend) handlePprofHeap(ctx context.Context, req *logical.Reques
|
||||||
return nil, nil
|
return nil, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (b *SystemBackend) handlePprofAllocs(ctx context.Context, req *logical.Request, d *framework.FieldData) (*logical.Response, error) {
|
||||||
|
if err := checkRequestHandlerParams(req); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
pprof.Handler("allocs").ServeHTTP(req.ResponseWriter, req.HTTPRequest)
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (b *SystemBackend) handlePprofThreadcreate(ctx context.Context, req *logical.Request, d *framework.FieldData) (*logical.Response, error) {
|
||||||
|
if err := checkRequestHandlerParams(req); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
pprof.Handler("threadcreate").ServeHTTP(req.ResponseWriter, req.HTTPRequest)
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (b *SystemBackend) handlePprofBlock(ctx context.Context, req *logical.Request, d *framework.FieldData) (*logical.Response, error) {
|
||||||
|
if err := checkRequestHandlerParams(req); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
pprof.Handler("block").ServeHTTP(req.ResponseWriter, req.HTTPRequest)
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (b *SystemBackend) handlePprofMutex(ctx context.Context, req *logical.Request, d *framework.FieldData) (*logical.Response, error) {
|
||||||
|
if err := checkRequestHandlerParams(req); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
pprof.Handler("mutex").ServeHTTP(req.ResponseWriter, req.HTTPRequest)
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
|
||||||
func (b *SystemBackend) handlePprofProfile(ctx context.Context, req *logical.Request, d *framework.FieldData) (*logical.Response, error) {
|
func (b *SystemBackend) handlePprofProfile(ctx context.Context, req *logical.Request, d *framework.FieldData) (*logical.Response, error) {
|
||||||
if err := checkRequestHandlerParams(req); err != nil {
|
if err := checkRequestHandlerParams(req); err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
|
|
Loading…
Reference in New Issue