Skip to content

Commit d38be03

Browse files
Merge pull request #7 from JeffreyRichter/test-feature
Reworked default logging
2 parents 7054139 + f82d799 commit d38be03

5 files changed

+68
-46
lines changed

2016-05-31/azblob/policy_request_log.go

+38-21
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,8 @@ import (
1515

1616
// RequestLogOptions configures the retry policy's behavior.
1717
type RequestLogOptions struct {
18-
// LogWarningIfTryOverThreshold logs a warning if a tried operation takes longer than the specified duration (0=no logging).
18+
// LogWarningIfTryOverThreshold logs a warning if a tried operation takes longer than the specified
19+
// duration (-1=no logging; 0=default threshold).
1920
LogWarningIfTryOverThreshold time.Duration
2021
}
2122

@@ -40,45 +41,50 @@ func (f *requestLogPolicyFactory) New(node pipeline.Node) pipeline.Policy {
4041
type requestLogPolicy struct {
4142
node pipeline.Node
4243
o RequestLogOptions
43-
try int
44+
try int32
4445
operationStart time.Time
4546
}
4647

4748
func redactSigQueryParam(rawQuery string) (bool, string) {
48-
sigFound := strings.EqualFold(rawQuery, "?sig=")
49+
rawQuery = strings.ToLower(rawQuery) // lowercase the string so we can look for ?sig= and &sig=
50+
sigFound := strings.Contains(rawQuery, "?sig=")
4951
if !sigFound {
50-
sigFound = strings.EqualFold(rawQuery, "&sig=")
52+
sigFound = strings.Contains(rawQuery, "&sig=")
5153
if !sigFound {
5254
return sigFound, rawQuery // [?|&]sig= not found; return same rawQuery passed in (no memory allocation)
5355
}
5456
}
55-
// [?|&]sig= was found, redact its value
57+
// [?|&]sig= found, redact its value
5658
values, _ := url.ParseQuery(rawQuery)
5759
for name := range values {
5860
if strings.EqualFold(name, "sig") {
59-
values[name] = []string{"(redacted)"}
61+
values[name] = []string{"REDACTED"}
6062
}
6163
}
6264
return sigFound, values.Encode()
6365
}
6466

67+
func prepareRequestForLogging(request pipeline.Request) *http.Request {
68+
req := request
69+
if sigFound, rawQuery := redactSigQueryParam(req.URL.RawQuery); sigFound {
70+
// Make copy so we don't destroy the query parameters we actually need to send in the request
71+
req = request.Copy()
72+
req.Request.URL.RawQuery = rawQuery
73+
}
74+
return req.Request
75+
}
76+
6577
func (p *requestLogPolicy) Do(ctx context.Context, request pipeline.Request) (response pipeline.Response, err error) {
6678
p.try++ // The first try is #1 (not #0)
6779
if p.try == 1 {
6880
p.operationStart = time.Now() // If this is the 1st try, record the operation state time
6981
}
7082

7183
// Log the outgoing request as informational
72-
if p.node.WouldLog(pipeline.LogInfo) {
84+
if p.node.ShouldLog(pipeline.LogInfo) {
7385
b := &bytes.Buffer{}
7486
fmt.Fprintf(b, "==> OUTGOING REQUEST (Try=%d)\n", p.try)
75-
req := request
76-
if sigFound, rawQuery := redactSigQueryParam(req.URL.RawQuery); sigFound {
77-
// TODO: Make copy so we dont' destroy the query parameters we actually need to send in the request
78-
req = request.Copy()
79-
req.Request.URL.RawQuery = rawQuery
80-
}
81-
pipeline.WriteRequest(b, req.Request)
87+
pipeline.WriteRequest(b, prepareRequestForLogging(request))
8288
p.node.Log(pipeline.LogInfo, b.String())
8389
}
8490

@@ -92,16 +98,18 @@ func (p *requestLogPolicy) Do(ctx context.Context, request pipeline.Request) (re
9298
severity := pipeline.LogInfo // Assume success and default to informational logging
9399
logMsg := func(b *bytes.Buffer) {
94100
b.WriteString("SUCCESSFUL OPERATION\n")
95-
pipeline.WriteResponseWithRequest(b, response.Response())
101+
pipeline.WriteRequestWithResponse(b, prepareRequestForLogging(request), response.Response())
96102
}
97103

104+
forceLog := false
98105
// If the response took too long, we'll upgrade to warning.
99106
if p.o.LogWarningIfTryOverThreshold > 0 && tryDuration > p.o.LogWarningIfTryOverThreshold {
100107
// Log a warning if the try duration exceeded the specified threshold
101108
severity = pipeline.LogWarning
102109
logMsg = func(b *bytes.Buffer) {
103110
fmt.Fprintf(b, "SLOW OPERATION [tryDuration > %v]\n", p.o.LogWarningIfTryOverThreshold)
104-
pipeline.WriteResponseWithRequest(b, response.Response())
111+
pipeline.WriteRequestWithResponse(b, prepareRequestForLogging(request), response.Response())
112+
forceLog = true // For CSS (Customer Support Services), we always log these to help diagnose latency issues
105113
}
106114
}
107115

@@ -111,9 +119,10 @@ func (p *requestLogPolicy) Do(ctx context.Context, request pipeline.Request) (re
111119
severity = pipeline.LogError // Promote to Error any 4xx (except those listed is an error) or any 5xx
112120
logMsg = func(b *bytes.Buffer) {
113121
// Write the error, the originating request and the stack
114-
fmt.Fprintf(b, "OPERATION ERROR:\n%v\n", err)
115-
pipeline.WriteResponseWithRequest(b, response.Response())
122+
fmt.Fprintf(b, "OPERATION ERROR:\n")
123+
pipeline.WriteRequestWithResponse(b, prepareRequestForLogging(request), response.Response())
116124
b.Write(stack()) // For errors, we append the stack trace (an expensive operation)
125+
forceLog = true // TODO: Do we really want this here?
117126
}
118127
} else {
119128
// For other status codes, we leave the severity as is.
@@ -123,17 +132,25 @@ func (p *requestLogPolicy) Do(ctx context.Context, request pipeline.Request) (re
123132
logMsg = func(b *bytes.Buffer) {
124133
// Write the error, the originating request and the stack
125134
fmt.Fprintf(b, "NETWORK ERROR:\n%v\n", err)
126-
pipeline.WriteRequest(b, request.Request)
135+
pipeline.WriteRequest(b, prepareRequestForLogging(request))
127136
b.Write(stack()) // For errors, we append the stack trace (an expensive operation)
137+
forceLog = true
128138
}
129139
}
130140

131-
if p.node.WouldLog(severity) || false { // Change false to true for testing
141+
if shouldLog := p.node.ShouldLog(severity); forceLog || shouldLog {
132142
// We're going to log this; build the string to log
133143
b := &bytes.Buffer{}
134144
fmt.Fprintf(b, "==> REQUEST/RESPONSE (Try=%d, TryDuration=%v, OpDuration=%v) -- ", p.try, tryDuration, opDuration)
135145
logMsg(b)
136-
p.node.Log(severity, b.String())
146+
msg := b.String()
147+
148+
if forceLog {
149+
pipeline.ForceLog(severity, msg)
150+
}
151+
if shouldLog {
152+
p.node.Log(severity, msg)
153+
}
137154
}
138155
return response, err
139156
}

2016-05-31/azblob/policy_retry.go

+13-13
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,9 @@ import (
1212
"github.com/Azure/azure-pipeline-go/pipeline"
1313
)
1414

15+
// RetryPolicy tells the pipeline what kind of retry policy to use. See the RetryPolicy* constants.
16+
type RetryPolicy int32
17+
1518
const (
1619
// RetryPolicyExponential tells the pipeline to use an exponential back-off retry policy
1720
RetryPolicyExponential RetryPolicy = 0
@@ -20,9 +23,6 @@ const (
2023
RetryPolicyFixed RetryPolicy = 1
2124
)
2225

23-
// RetryPolicy tells the pipeline what kind of retry policy to use. See the RetryPolicy* constants.
24-
type RetryPolicy int
25-
2626
// RetryOptions configures the retry policy's behavior.
2727
type RetryOptions struct {
2828
// Policy tells the pipeline what kind of retry policy to use. See the RetryPolicy* constants.\
@@ -31,7 +31,7 @@ type RetryOptions struct {
3131

3232
// MaxTries specifies the maximum number of attempts an operation will be tried before producing an error (0=default).
3333
// A value of zero means that you accept our default policy. A value of 1 means 1 try and no retries.
34-
MaxTries int
34+
MaxTries int32
3535

3636
// TryTimeout indicates the maximum time allowed for any single try of an HTTP request.
3737
// A value of zero means that you accept our default timeout. NOTE: When transferring large amounts
@@ -85,10 +85,10 @@ func (o RetryOptions) defaults() RetryOptions {
8585
return o
8686
}
8787

88-
func (o RetryOptions) calcDelay(try int) time.Duration { // try is >=1; never 0
89-
pow := func(number int64, exponent int) int64 { // pow is nested helper function
88+
func (o RetryOptions) calcDelay(try int32) time.Duration { // try is >=1; never 0
89+
pow := func(number int64, exponent int32) int64 { // pow is nested helper function
9090
var result int64 = 1
91-
for n := 0; n < exponent; n++ {
91+
for n := int32(0); n < exponent; n++ {
9292
result *= number
9393
}
9494
return result
@@ -139,7 +139,7 @@ var logf = func(format string, a ...interface{}) {}
139139
func (p *retryPolicy) Do(ctx context.Context, request pipeline.Request) (response pipeline.Response, err error) {
140140
// Before each try, we'll select either the primary or secondary URL.
141141
secondaryHost := ""
142-
primaryTry := 0 // This indicates how many tries we've attempted against the primary DC
142+
primaryTry := int32(0) // This indicates how many tries we've attempted against the primary DC
143143

144144
// We only consider retring against a secondary if we have a read request (GET/HEAD) AND this policy has a Secondary URL it can use
145145
considerSecondary := (request.Method == http.MethodGet || request.Method == http.MethodHead) && p.o.RetryReadsFromSecondaryHost != ""
@@ -154,7 +154,7 @@ func (p *retryPolicy) Do(ctx context.Context, request pipeline.Request) (respons
154154
// For a primary wait ((2 ^ primaryTries - 1) * delay * random(0.8, 1.2)
155155
// If secondary gets a 404, don't fail, retry but future retries are only against the primary
156156
// When retrying against a secondary, ignore the retry count and wait (.1 second * random(0.8, 1.2))
157-
for try := 1; try <= p.o.MaxTries; try++ {
157+
for try := int32(1); try <= p.o.MaxTries; try++ {
158158
logf("\n=====> Try=%d\n", try)
159159

160160
// Determine which endpoint to try. It's primary if there is no secondary or if it is an add # attempt.
@@ -184,9 +184,9 @@ func (p *retryPolicy) Do(ctx context.Context, request pipeline.Request) (respons
184184
}
185185

186186
// Set the server-side timeout query parameter "timeout=[seconds]"
187-
timeout := int(p.o.TryTimeout.Seconds()) // Max seconds per try
188-
if deadline, ok := ctx.Deadline(); ok { // If user's ctx has a deadline, make the timeout the smaller of the two
189-
t := int(deadline.Sub(time.Now()).Seconds()) // Duration from now until user's ctx reaches its deadline
187+
timeout := int32(p.o.TryTimeout.Seconds()) // Max seconds per try
188+
if deadline, ok := ctx.Deadline(); ok { // If user's ctx has a deadline, make the timeout the smaller of the two
189+
t := int32(deadline.Sub(time.Now()).Seconds()) // Duration from now until user's ctx reaches its deadline
190190
logf("MaxTryTimeout=%d secs, TimeTilDeadline=%d sec\n", timeout, t)
191191
if t < timeout {
192192
timeout = t
@@ -197,7 +197,7 @@ func (p *retryPolicy) Do(ctx context.Context, request pipeline.Request) (respons
197197
logf("TryTimeout adjusted to=%d sec\n", timeout)
198198
}
199199
q := requestCopy.Request.URL.Query()
200-
q.Set("timeout", strconv.Itoa(timeout))
200+
q.Set("timeout", strconv.Itoa(int(timeout)))
201201
requestCopy.Request.URL.RawQuery = q.Encode()
202202
logf("Url=%s\n", requestCopy.Request.URL.String())
203203

2016-05-31/azblob/storage_error.go

+2-1
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,8 @@ func (e *storageError) Error() string {
6868
fmt.Fprintf(b, " %s: %+v\n", k, e.details[k])
6969
}
7070
}
71-
pipeline.WriteResponseWithRequest(b, e.response)
71+
req := pipeline.Request{Request: e.response.Request}.Copy() // Make a copy of the response's request
72+
pipeline.WriteRequestWithResponse(b, prepareRequestForLogging(req), e.response)
7273
return e.ErrorNode.Error(b.String())
7374
}
7475

2016-05-31/azblob/zt_examples_test.go

+11-6
Original file line numberDiff line numberDiff line change
@@ -79,6 +79,7 @@ func Example() {
7979

8080
downloadedData := &bytes.Buffer{}
8181
downloadedData.ReadFrom(get.Body())
82+
get.Body().Close() // The client must close the response body when finished with it
8283
if data != downloadedData.String() {
8384
log.Fatal("downloaded data doesn't match uploaded data")
8485
}
@@ -431,6 +432,9 @@ func ExampleBlobAccessConditions() {
431432
fmt.Print("Failure: " + serr.Response().Status + "\n")
432433
}
433434
} else {
435+
if get, ok := response.(*GetResponse); ok {
436+
get.Body().Close() // The client must close the response body when finished with it
437+
}
434438
fmt.Print("Success: " + response.Response().Status + "\n")
435439
}
436440
}
@@ -668,7 +672,7 @@ func ExampleBlockBlobURL() {
668672
}
669673
blobData := &bytes.Buffer{}
670674
blobData.ReadFrom(get.Body())
671-
get.Body().Close()
675+
get.Body().Close() // The client must close the response body when finished with it
672676
fmt.Println(blobData)
673677
}
674678

@@ -703,7 +707,7 @@ func ExampleAppendBlobURL() {
703707
}
704708
b := bytes.Buffer{}
705709
b.ReadFrom(get.Body())
706-
get.Body().Close()
710+
get.Body().Close() // The client must close the response body when finished with it
707711
fmt.Println(b.String())
708712
}
709713

@@ -765,7 +769,7 @@ func ExamplePageBlobURL() {
765769
}
766770
blobData := &bytes.Buffer{}
767771
blobData.ReadFrom(get.Body())
768-
get.Body().Close()
772+
get.Body().Close() // The client must close the response body when finished with it
769773
fmt.Printf("%#v", blobData.Bytes())
770774
}
771775

@@ -804,15 +808,15 @@ func Example_blobSnapshots() {
804808
get, err := baseBlobURL.GetBlob(ctx, BlobRange{}, BlobAccessConditions{}, false)
805809
b := bytes.Buffer{}
806810
b.ReadFrom(get.Body())
807-
get.Body().Close()
811+
get.Body().Close() // The client must close the response body when finished with it
808812
fmt.Println(b.String())
809813

810814
// Show snapshot blob via original blob URI & snapshot time:
811815
snapshotBlobURL := baseBlobURL.WithSnapshot(snapshot)
812816
get, err = snapshotBlobURL.GetBlob(ctx, BlobRange{}, BlobAccessConditions{}, false)
813817
b.Reset()
814818
b.ReadFrom(get.Body())
815-
get.Body().Close()
819+
get.Body().Close() // The client must close the response body when finished with it
816820
fmt.Println(b.String())
817821

818822
// FYI: You can get the base blob URL from one of its snapshot by passing time.Time{} to WithSnapshot:
@@ -901,6 +905,7 @@ func Example_progressUploadDownload() {
901905

902906
downloadedData := &bytes.Buffer{}
903907
downloadedData.ReadFrom(responseBody)
908+
responseBody.Close() // The client must close the response body when finished with it
904909
// The downloaded blob data is in downloadData's buffer
905910
}
906911

@@ -1008,7 +1013,7 @@ func ExampleNewGetRetryStream() {
10081013
func(bytesTransferred int64) {
10091014
fmt.Printf("Downloaded %d of %d bytes.\n", bytesTransferred, contentLength)
10101015
})
1011-
defer stream.Close()
1016+
defer stream.Close() // The client must close the response body when finished with it
10121017

10131018
file, err := os.Create("BigFile.bin") // Create the file to hold the downloaded blob contents.
10141019
if err != nil {

2016-05-31/azblob/zt_policy_retry_test.go

+4-5
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ import (
1515
"github.com/Azure/azure-storage-blob-go/2016-05-31/azblob"
1616
)
1717

18-
type retryTestScenario int
18+
type retryTestScenario int32
1919

2020
const (
2121
// Retry until success. Max reties hit. Operation time out prevents additional retries
@@ -36,16 +36,16 @@ func (s *aztestsSuite) TestRetryTestScenarioUntilMaxRetries(c *chk.C) {
3636
testRetryTestScenario(c, retryTestScenarioRetryUntilMaxRetries)
3737
}
3838

39-
func newRetryTestPolicyFactory(c *chk.C, scenario retryTestScenario, maxRetries int, cancel context.CancelFunc) *retryTestPolicyFactory {
39+
func newRetryTestPolicyFactory(c *chk.C, scenario retryTestScenario, maxRetries int32, cancel context.CancelFunc) *retryTestPolicyFactory {
4040
return &retryTestPolicyFactory{c: c, scenario: scenario, maxRetries: maxRetries, cancel: cancel}
4141
}
4242

4343
type retryTestPolicyFactory struct {
4444
c *chk.C
4545
scenario retryTestScenario
46-
maxRetries int
46+
maxRetries int32
4747
cancel context.CancelFunc
48-
try int
48+
try int32
4949
}
5050

5151
func (f *retryTestPolicyFactory) New(node pipeline.Node) pipeline.Policy {
@@ -60,7 +60,6 @@ type retryTestPolicy struct {
6060

6161
type retryError struct {
6262
temporary, timeout bool
63-
statusCode int
6463
}
6564

6665
func (e *retryError) Temporary() bool { return e.temporary }

0 commit comments

Comments
 (0)