configurable tracing header w/ aws signed request#3836
Conversation
Overall package sizeSelf size: 5.61 MB Dependency sizes
🤖 This report was automatically generated by heaviest-objects-in-the-universe |
Codecov ReportAttention:
Additional details and impacted files@@ Coverage Diff @@
## master #3836 +/- ##
==========================================
- Coverage 85.21% 84.87% -0.35%
==========================================
Files 230 230
Lines 9546 9587 +41
Branches 33 33
==========================================
+ Hits 8135 8137 +2
- Misses 1411 1450 +39 ☔ View full report in Codecov by Sentry. |
BenchmarksBenchmark execution time: 2023-12-01 19:31:01 Comparing candidate commit f59c866 in PR branch Found 1 performance improvements and 0 performance regressions! Performance is the same for 519 metrics, 12 unstable metrics. scenario:plugin-graphql-with-depth-off-18
|
5f2bf75 to
ced812e
Compare
| client: httpClientOptions | ||
| }); | ||
| tracer.use('http', { | ||
| enableTracingWithAmazonSignature: true |
There was a problem hiding this comment.
Tracing is always enabled, it's only propagation that changes.
76512b2 to
0bcfdbf
Compare
0bcfdbf to
f59c866
Compare
- adds a new `http` service configuration option `enablePropagationWithAmazonHeaders` - defaults to `false` which is current behavior - when set to `true` it will allow injecting tracing headers for requests signed via AWS IAM headers - allows customer applications which communicate across services with signed requests to be traced - making this a configurable since there may be use-cases which the change could break
- adds a new `http` service configuration option `enablePropagationWithAmazonHeaders` - defaults to `false` which is current behavior - when set to `true` it will allow injecting tracing headers for requests signed via AWS IAM headers - allows customer applications which communicate across services with signed requests to be traced - making this a configurable since there may be use-cases which the change could break
- adds a new `http` service configuration option `enablePropagationWithAmazonHeaders` - defaults to `false` which is current behavior - when set to `true` it will allow injecting tracing headers for requests signed via AWS IAM headers - allows customer applications which communicate across services with signed requests to be traced - making this a configurable since there may be use-cases which the change could break
- adds a new `http` service configuration option `enablePropagationWithAmazonHeaders` - defaults to `false` which is current behavior - when set to `true` it will allow injecting tracing headers for requests signed via AWS IAM headers - allows customer applications which communicate across services with signed requests to be traced - making this a configurable since there may be use-cases which the change could break
- adds a new `http` service configuration option `enablePropagationWithAmazonHeaders` - defaults to `false` which is current behavior - when set to `true` it will allow injecting tracing headers for requests signed via AWS IAM headers - allows customer applications which communicate across services with signed requests to be traced - making this a configurable since there may be use-cases which the change could break
- adds a new `http` service configuration option `enablePropagationWithAmazonHeaders` - defaults to `false` which is current behavior - when set to `true` it will allow injecting tracing headers for requests signed via AWS IAM headers - allows customer applications which communicate across services with signed requests to be traced - making this a configurable since there may be use-cases which the change could break
- adds a new `http` service configuration option `enablePropagationWithAmazonHeaders` - defaults to `false` which is current behavior - when set to `true` it will allow injecting tracing headers for requests signed via AWS IAM headers - allows customer applications which communicate across services with signed requests to be traced - making this a configurable since there may be use-cases which the change could break
- adds a new `http` service configuration option `enablePropagationWithAmazonHeaders` - defaults to `false` which is current behavior - when set to `true` it will allow injecting tracing headers for requests signed via AWS IAM headers - allows customer applications which communicate across services with signed requests to be traced - making this a configurable since there may be use-cases which the change could break
What does this PR do?
httpservice configuration optionenablePropagationWithAmazonHeadersfalsewhich is current behaviortrueit will allow injecting tracing headers for requests signed via AWS IAM headersMotivation
Plugin Checklist
Additional Notes
Security
Datadog employees:
@DataDog/security-design-and-guidance.Unsure? Have a question? Request a review!