# encoding: utf-8
# This file is distributed under New Relic's license terms.
# See https://github.com/newrelic/rpm/blob/master/LICENSE for complete details.
require 'base64'
require 'new_relic/agent/obfuscator'
require 'new_relic/agent/transaction_timings'
module NewRelic
module Agent
class JavascriptInstrumentor
include NewRelic::Coerce
RUM_KEY_LENGTH = 13
def initialize(event_listener)
event_listener.subscribe(:finished_configuring, &method(:log_configuration))
end
def log_configuration
NewRelic::Agent.logger.debug("JS agent loader requested: #{NewRelic::Agent.config[:'browser_monitoring.loader']}",
"JS agent loader debug: #{NewRelic::Agent.config[:'browser_monitoring.debug']}",
"JS agent loader version: #{NewRelic::Agent.config[:'browser_monitoring.loader_version']}")
if !NewRelic::Agent.config[:'rum.enabled']
NewRelic::Agent.logger.debug("Real User Monitoring is disabled for this agent. Edit your configuration to change this.")
end
end
def enabled?
Agent.config[:'rum.enabled'] && !!Agent.config[:beacon]
end
def obfuscator
@obfuscator ||= NewRelic::Agent::Obfuscator.new(NewRelic::Agent.config[:license_key], RUM_KEY_LENGTH)
end
def current_transaction
NewRelic::Agent::TransactionState.get.transaction
end
def insert_js?
if !enabled?
::NewRelic::Agent.logger.log_once(:debug, :js_agent_disabled,
"JS agent instrumentation is disabled.")
false
elsif missing_config?(:js_agent_loader)
::NewRelic::Agent.logger.log_once(:debug, :missing_js_agent_loader,
"Missing :js_agent_loader. Skipping browser instrumentation.")
false
elsif missing_config?(:beacon)
::NewRelic::Agent.logger.log_once(:debug, :missing_beacon,
"Beacon configuration not received (yet?). Skipping browser instrumentation.")
false
elsif missing_config?(:browser_key)
::NewRelic::Agent.logger.log_once(:debug, :missing_browser_key,
"Browser key is not set. Skipping browser instrumentation.")
false
elsif !current_transaction
::NewRelic::Agent.logger.debug "Not in transaction. Skipping browser instrumentation."
false
elsif !::NewRelic::Agent.is_transaction_traced?
::NewRelic::Agent.logger.debug "Transaction is not traced. Skipping browser instrumentation."
false
elsif !::NewRelic::Agent.is_execution_traced?
::NewRelic::Agent.logger.debug "Execution is not traced. Skipping browser instrumentation."
false
elsif ::NewRelic::Agent::TransactionState.get.request_ignore_enduser
::NewRelic::Agent.logger.debug "Ignore end user for this transaction is set. Skipping browser instrumentation."
false
else
true
end
rescue => e
::NewRelic::Agent.logger.debug "Failure during insert_js", e
false
end
def missing_config?(key)
value = NewRelic::Agent.config[key]
value.nil? || value.empty?
end
def browser_timing_header
return "" unless insert_js?
browser_timing_config + browser_timing_loader
rescue => e
::NewRelic::Agent.logger.debug "Failure during RUM browser_timing_header construction", e
""
end
# NOTE: Internal prototyping often overrides this, so leave name stable!
def browser_timing_loader
html_safe_if_needed("\n")
end
# NOTE: Internal prototyping often overrides this, so leave name stable!
def browser_timing_config
NewRelic::Agent::Transaction.freeze_name
data = data_for_js_agent
json = NewRelic::JSONWrapper.dump(data)
html_safe_if_needed("\n")
end
BEACON_KEY = "beacon".freeze
ERROR_BEACON_KEY = "errorBeacon".freeze
LICENSE_KEY_KEY = "licenseKey".freeze
APPLICATIONID_KEY = "applicationID".freeze
TRANSACTION_NAME_KEY = "transactionName".freeze
QUEUE_TIME_KEY = "queueTime".freeze
APPLICATION_TIME_KEY = "applicationTime".freeze
TT_GUID_KEY = "ttGuid".freeze
AGENT_TOKEN_KEY = "agentToken".freeze
AGENT_KEY = "agent".freeze
USER_ATTRIBUTES_KEY = "userAttributes".freeze
SSL_FOR_HTTP_KEY = "sslForHttp".freeze
# NOTE: Internal prototyping may override this, so leave name stable!
def data_for_js_agent
state = NewRelic::Agent::TransactionState.get
timings = state.timings
data = {
BEACON_KEY => NewRelic::Agent.config[:beacon],
ERROR_BEACON_KEY => NewRelic::Agent.config[:error_beacon],
LICENSE_KEY_KEY => NewRelic::Agent.config[:browser_key],
APPLICATIONID_KEY => NewRelic::Agent.config[:application_id],
TRANSACTION_NAME_KEY => obfuscator.obfuscate(timings.transaction_name_or_unknown),
QUEUE_TIME_KEY => timings.queue_time_in_millis,
APPLICATION_TIME_KEY => timings.app_time_in_millis,
TT_GUID_KEY => state.request_guid_to_include,
AGENT_TOKEN_KEY => state.request_token,
AGENT_KEY => NewRelic::Agent.config[:js_agent_file]
}
add_ssl_for_http(data)
add_user_attributes(data)
data
end
def add_ssl_for_http(data)
ssl_for_http = NewRelic::Agent.config[:'browser_monitoring.ssl_for_http']
unless ssl_for_http.nil?
data[SSL_FOR_HTTP_KEY] = ssl_for_http
end
end
def add_user_attributes(data)
return unless include_custom_parameters?
params = event_params(current_transaction.custom_parameters)
json = NewRelic::JSONWrapper.dump(params)
data[USER_ATTRIBUTES_KEY] = obfuscator.obfuscate(json)
end
# Still support deprecated capture_attributes.page_view_events for
# clients that use it. Could potentially be removed if we don't have
# anymore users with it set according to zeitgeist.
def include_custom_parameters?
has_custom_parameters? &&
(NewRelic::Agent.config[:'browser_monitoring.capture_attributes'] ||
NewRelic::Agent.config[:'capture_attributes.page_view_events'])
end
def has_custom_parameters?
current_transaction &&
current_transaction.custom_parameters &&
!current_transaction.custom_parameters.empty?
end
def html_safe_if_needed(string)
string = string.html_safe if string.respond_to?(:html_safe)
string
end
end
end
end