Skip to content

configurable tracing header w/ aws signed request#3836

Merged
tlhunter merged 4 commits intomasterfrom
tlhunter/trace-aws
Dec 1, 2023
Merged

configurable tracing header w/ aws signed request#3836
tlhunter merged 4 commits intomasterfrom
tlhunter/trace-aws

Conversation

@tlhunter
Copy link
Copy Markdown
Member

@tlhunter tlhunter commented Nov 30, 2023

What does this PR do?

  • adds a new http service configuration option enablePropagationWithAmazonHeaders
  • defaults to false which is current behavior
  • when set to true it will allow injecting tracing headers for requests signed via AWS IAM headers

Motivation

Plugin Checklist

Additional Notes

Security

Datadog employees:

  • If this PR touches code that signs or publishes builds or packages, or handles credentials of any kind, I've requested a review from @DataDog/security-design-and-guidance.
  • This PR doesn't touch any of that.

Unsure? Have a question? Request a review!

@github-actions
Copy link
Copy Markdown
Contributor

github-actions Bot commented Nov 30, 2023

Overall package size

Self size: 5.61 MB
Deduped: 61.61 MB
No deduping: 62.36 MB

Dependency sizes

name version self size total size
@datadog/native-iast-taint-tracking 1.6.4 16.43 MB 16.44 MB
@datadog/native-appsec 5.0.0 15.16 MB 15.17 MB
@datadog/pprof 4.0.1 9.32 MB 10.16 MB
protobufjs 7.2.4 2.74 MB 6.52 MB
@datadog/native-iast-rewriter 2.2.1 2.27 MB 2.36 MB
@opentelemetry/core 1.14.0 872.87 kB 1.47 MB
@datadog/native-metrics 2.0.0 898.77 kB 1.3 MB
@opentelemetry/api 1.4.1 780.32 kB 780.32 kB
import-in-the-middle 1.4.2 41.4 kB 704.79 kB
pprof-format 2.0.7 588.12 kB 588.12 kB
msgpack-lite 0.1.26 201.16 kB 281.59 kB
opentracing 0.14.7 194.81 kB 194.81 kB
semver 7.5.4 93.4 kB 123.8 kB
@datadog/sketches-js 2.1.0 109.9 kB 109.9 kB
lodash.sortby 4.7.0 75.76 kB 75.76 kB
lru-cache 7.14.0 74.95 kB 74.95 kB
ipaddr.js 2.1.0 60.23 kB 60.23 kB
ignore 5.2.4 51.22 kB 51.22 kB
int64-buffer 0.1.10 49.18 kB 49.18 kB
istanbul-lib-coverage 3.2.0 29.34 kB 29.34 kB
lodash.uniq 4.5.0 25.01 kB 25.01 kB
limiter 1.1.5 23.17 kB 23.17 kB
dc-polyfill 0.1.2 22.77 kB 22.77 kB
retry 0.13.1 18.85 kB 18.85 kB
lodash.kebabcase 4.1.1 17.75 kB 17.75 kB
node-abort-controller 3.1.1 16.89 kB 16.89 kB
lodash.pick 4.4.0 16.33 kB 16.33 kB
jest-docblock 29.7.0 8.99 kB 12.76 kB
crypto-randomuuid 1.0.0 11.18 kB 11.18 kB
path-to-regexp 0.1.7 6.78 kB 6.78 kB
koalas 1.0.2 6.47 kB 6.47 kB
methods 1.1.2 5.29 kB 5.29 kB
module-details-from-path 1.0.3 4.47 kB 4.47 kB

🤖 This report was automatically generated by heaviest-objects-in-the-universe

@codecov
Copy link
Copy Markdown

codecov Bot commented Nov 30, 2023

Codecov Report

Attention: 82 lines in your changes are missing coverage. Please review.

Comparison is base (33c9000) 85.21% compared to head (f59c866) 84.87%.
Report is 1 commits behind head on master.

Files Patch % Lines
...ackages/dd-trace/src/profiling/profilers/events.js 3.52% 82 Missing ⚠️
Additional details and impacted files
@@            Coverage Diff             @@
##           master    #3836      +/-   ##
==========================================
- Coverage   85.21%   84.87%   -0.35%     
==========================================
  Files         230      230              
  Lines        9546     9587      +41     
  Branches       33       33              
==========================================
+ Hits         8135     8137       +2     
- Misses       1411     1450      +39     

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

@pr-commenter
Copy link
Copy Markdown

pr-commenter Bot commented Nov 30, 2023

Benchmarks

Benchmark execution time: 2023-12-01 19:31:01

Comparing candidate commit f59c866 in PR branch tlhunter/trace-aws with baseline commit 8bd6f02 in branch master.

Found 1 performance improvements and 0 performance regressions! Performance is the same for 519 metrics, 12 unstable metrics.

scenario:plugin-graphql-with-depth-off-18

  • 🟩 max_rss_usage [-129.367MB; -120.005MB] or [-13.460%; -12.485%]

@tlhunter tlhunter marked this pull request as ready for review November 30, 2023 22:08
@tlhunter tlhunter requested review from a team as code owners November 30, 2023 22:08
@tlhunter tlhunter requested a review from jbertran November 30, 2023 22:08
Comment thread docs/test.ts Outdated
client: httpClientOptions
});
tracer.use('http', {
enableTracingWithAmazonSignature: true
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Tracing is always enabled, it's only propagation that changes.

sabrenner
sabrenner previously approved these changes Dec 1, 2023
@tlhunter tlhunter merged commit ec70f99 into master Dec 1, 2023
@tlhunter tlhunter deleted the tlhunter/trace-aws branch December 1, 2023 20:28
khanayan123 pushed a commit that referenced this pull request Dec 12, 2023
- adds a new `http` service configuration option `enablePropagationWithAmazonHeaders`
- defaults to `false` which is current behavior
- when set to `true` it will allow injecting tracing headers for requests signed via AWS IAM headers
- allows customer applications which communicate across services with signed requests to be traced
- making this a configurable since there may be use-cases which the change could break
khanayan123 pushed a commit that referenced this pull request Dec 13, 2023
- adds a new `http` service configuration option `enablePropagationWithAmazonHeaders`
- defaults to `false` which is current behavior
- when set to `true` it will allow injecting tracing headers for requests signed via AWS IAM headers
- allows customer applications which communicate across services with signed requests to be traced
- making this a configurable since there may be use-cases which the change could break
This was referenced Dec 13, 2023
khanayan123 pushed a commit that referenced this pull request Dec 14, 2023
- adds a new `http` service configuration option `enablePropagationWithAmazonHeaders`
- defaults to `false` which is current behavior
- when set to `true` it will allow injecting tracing headers for requests signed via AWS IAM headers
- allows customer applications which communicate across services with signed requests to be traced
- making this a configurable since there may be use-cases which the change could break
khanayan123 pushed a commit that referenced this pull request Dec 14, 2023
- adds a new `http` service configuration option `enablePropagationWithAmazonHeaders`
- defaults to `false` which is current behavior
- when set to `true` it will allow injecting tracing headers for requests signed via AWS IAM headers
- allows customer applications which communicate across services with signed requests to be traced
- making this a configurable since there may be use-cases which the change could break
khanayan123 pushed a commit that referenced this pull request Jan 2, 2024
- adds a new `http` service configuration option `enablePropagationWithAmazonHeaders`
- defaults to `false` which is current behavior
- when set to `true` it will allow injecting tracing headers for requests signed via AWS IAM headers
- allows customer applications which communicate across services with signed requests to be traced
- making this a configurable since there may be use-cases which the change could break
khanayan123 pushed a commit that referenced this pull request Jan 2, 2024
- adds a new `http` service configuration option `enablePropagationWithAmazonHeaders`
- defaults to `false` which is current behavior
- when set to `true` it will allow injecting tracing headers for requests signed via AWS IAM headers
- allows customer applications which communicate across services with signed requests to be traced
- making this a configurable since there may be use-cases which the change could break
khanayan123 pushed a commit that referenced this pull request Jan 2, 2024
- adds a new `http` service configuration option `enablePropagationWithAmazonHeaders`
- defaults to `false` which is current behavior
- when set to `true` it will allow injecting tracing headers for requests signed via AWS IAM headers
- allows customer applications which communicate across services with signed requests to be traced
- making this a configurable since there may be use-cases which the change could break
khanayan123 pushed a commit that referenced this pull request Jan 2, 2024
- adds a new `http` service configuration option `enablePropagationWithAmazonHeaders`
- defaults to `false` which is current behavior
- when set to `true` it will allow injecting tracing headers for requests signed via AWS IAM headers
- allows customer applications which communicate across services with signed requests to be traced
- making this a configurable since there may be use-cases which the change could break
@tlhunter tlhunter mentioned this pull request Nov 12, 2024
6 tasks
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Allow Datadog trace headers when using AWS IAM authentication

3 participants