Commit graph

19 commits

Author SHA1 Message Date
GitLab Bot
a1ed241c82 Add latest changes from gitlab-org/gitlab@master 2021-02-03 21:09:17 +00:00
GitLab Bot
d10a462fed Add latest changes from gitlab-org/gitlab@master 2019-12-16 12:07:43 +00:00
GitLab Bot
8cc5f27909 Add latest changes from gitlab-org/gitlab@master 2019-12-13 12:07:41 +00:00
GitLab Bot
80f61b4035 Add latest changes from gitlab-org/gitlab@master 2019-09-18 14:02:45 +00:00
Roger Meier
946ffc67b7 refactor: remove Sentry from application settings 2019-06-25 21:17:19 +02:00
Roger Meier
aebb2f7025 feat: allow Sentry configuration to be passed on gitlab.yml 2019-04-30 18:10:57 +02:00
Sean McGivern
58643cd532 Send schema cache to Sentry on MissingAttributeError
We don't know why this happens, so this is an attempt to debug the
issue by sending a full list of all columns ActiveRecord knows about
when the error is raised.
2019-03-19 13:49:31 +00:00
Andrew Newdigate
2c0d69d310 Extract process_name from GitLab::Sentry
GitLab::Sentry has a program_context method to determine whether a
Sentry exception occurred in Sidekiq or rails. Since we will need
similar functionality for distributed tracing, this change extracts the
program_context method into GitLab.process_name for more general
consumption.
2019-01-16 15:29:05 +02:00
Kamil Trzciński
39c1731a53 Log and pass correlation-id between Unicorn, Sidekiq and Gitaly
The Correlation ID is taken or generated from received X-Request-ID.
Then it is being passed to all executed services (sidekiq workers
or gitaly calls).

The Correlation ID is logged in all structured logs as `correlation_id`.
2018-12-06 20:46:14 +01:00
Rémy Coutable
d50a80a282
Replace Gitlab::REVISION with Gitlab.revision and handle installations without a .git directory
Signed-off-by: Rémy Coutable <remy@rymai.me>
2018-05-24 10:14:01 +02:00
Alejandro Rodríguez
60a35e4230 Send API parameters as extra data for sentry errors 2017-10-05 18:31:34 -03:00
Sean McGivern
5883ce95ef current_application_settings belongs on Gitlab::CurrentSettings
The initializers including this were doing so at the top level, so every object
loaded after them had a `current_application_settings` method. However, if
someone had rack-attack enabled (which was loaded before these initializers), it
would try to load the API, and fail, because `Gitlab::CurrentSettings` didn't
have that method.

To fix this:

1. Don't include `Gitlab::CurrentSettings` at the top level. We do not need
   `Object.new.current_application_settings` to work.
2. Make `Gitlab::CurrentSettings` explicitly `extend self`, as we already use it
   like that in several places.
3. Change the initializers to use that new form.
2017-08-31 13:38:33 +01:00
Douwe Maan
6e1b52b8b9 Merge branch 'rs-filter-authentication_token' into 'security'
Add authentication_token to filter_parameters list

See merge request !2041
2016-12-08 21:23:09 -03:00
Jacob Vosmaer
437bebb0ff Don't send Private-Token headers to Sentry
Fixes https://gitlab.com/gitlab-org/gitlab-ce/issues/22537
2016-10-04 16:57:01 +02:00
Stan Hu
0fe4cf2b0f Fix Sentry not reporting right program for Sidekiq workers
Moves program tag into the global configuration since this doesn't
change and since Sidekiq workers get a unique context for each event.

Closes #21410
2016-08-25 19:42:52 -07:00
Connor Shea
519a791ef9
Prevent Rails filtered parameters from leaking to Sentry.
As described in their Docs: https://docs.getsentry.com/on-premise/clients/ruby/integrations/rails/
2016-04-28 15:08:23 -06:00
Robert Speicher
6c9ae675b5 Add release tracking for Sentry 2016-02-17 14:05:58 -05:00
Jeroen Nijhof
7a609858f0 Use sentry in env production only 2016-01-20 09:48:38 +01:00
Jeroen Nijhof
85e0fce9ee Add sentry integration 2016-01-18 17:15:10 +01:00