Page Menu
Home
c4science
Search
Configure Global Search
Log In
Files
F96164998
DarkConsoleXHProfPluginAPI.php
No One
Temporary
Actions
Download File
Edit File
Delete File
View Transforms
Subscribe
Mute Notifications
Award Token
Subscribers
None
File Metadata
Details
File Info
Storage
Attached
Created
Mon, Dec 23, 08:53
Size
3 KB
Mime Type
text/x-php
Expires
Wed, Dec 25, 08:53 (1 d, 23 h)
Engine
blob
Format
Raw Data
Handle
23136714
Attached To
rPH Phabricator
DarkConsoleXHProfPluginAPI.php
View Options
<?php
/**
* @group console
* @phutil-external-symbol function xhprof_enable
* @phutil-external-symbol function xhprof_disable
*/
final
class
DarkConsoleXHProfPluginAPI
{
private
static
$profilerStarted
;
public
static
function
isProfilerAvailable
()
{
return
extension_loaded
(
'xhprof'
);
}
public
static
function
getProfilerHeader
()
{
return
'X-Phabricator-Profiler'
;
}
public
static
function
isProfilerRequested
()
{
if
(!
empty
(
$_REQUEST
[
'__profile__'
]))
{
return
$_REQUEST
[
'__profile__'
];
}
$header
=
AphrontRequest
::
getHTTPHeader
(
self
::
getProfilerHeader
());
if
(
$header
)
{
return
$header
;
}
return
false
;
}
public
static
function
shouldStartProfiler
()
{
if
(
self
::
isProfilerRequested
())
{
return
true
;
}
static
$sample_request
=
null
;
if
(
$sample_request
===
null
)
{
if
(
PhabricatorEnv
::
getEnvConfig
(
'debug.profile-rate'
))
{
$rate
=
PhabricatorEnv
::
getEnvConfig
(
'debug.profile-rate'
);
if
(
mt_rand
(
1
,
$rate
)
==
1
)
{
$sample_request
=
true
;
}
else
{
$sample_request
=
false
;
}
}
}
return
$sample_request
;
}
public
static
function
isProfilerStarted
()
{
return
self
::
$profilerStarted
;
}
public
static
function
includeXHProfLib
()
{
// TODO: this is incredibly stupid, but we may not have Phutil metamodule
// stuff loaded yet so we can't just phutil_get_library_root() our way
// to victory.
$root
=
__FILE__
;
for
(
$ii
=
0
;
$ii
<
6
;
$ii
++)
{
$root
=
dirname
(
$root
);
}
require_once
$root
.
'/externals/xhprof/xhprof_lib.php'
;
}
public
static
function
saveProfilerSample
(
AphrontRequest
$request
,
$access_log
)
{
if
(!
self
::
isProfilerStarted
())
{
return
;
}
$profile
=
DarkConsoleXHProfPluginAPI
::
stopProfiler
();
$profile_sample
=
id
(
new
PhabricatorXHProfSample
())
->
setFilePHID
(
$profile
);
if
(
self
::
isProfilerRequested
())
{
$sample_rate
=
0
;
}
else
{
$sample_rate
=
PhabricatorEnv
::
getEnvConfig
(
'debug.profile-rate'
);
}
$profile_sample
->
setSampleRate
(
$sample_rate
);
if
(
$access_log
)
{
$profile_sample
->
setUsTotal
(
$access_log
->
getData
(
'T'
))
->
setHostname
(
$access_log
->
getData
(
'h'
))
->
setRequestPath
(
$access_log
->
getData
(
'U'
))
->
setController
(
$access_log
->
getData
(
'C'
))
->
setUserPHID
(
$request
->
getUser
()->
getPHID
());
}
$profile_sample
->
save
();
}
public
static
function
hookProfiler
()
{
if
(!
self
::
shouldStartProfiler
())
{
return
;
}
if
(!
self
::
isProfilerAvailable
())
{
return
;
}
if
(
self
::
$profilerStarted
)
{
return
;
}
self
::
startProfiler
();
self
::
$profilerStarted
=
true
;
}
public
static
function
startProfiler
()
{
self
::
includeXHProfLib
();
xhprof_enable
();
}
public
static
function
stopProfiler
()
{
if
(!
self
::
isProfilerStarted
())
{
return
null
;
}
$data
=
xhprof_disable
();
$data
=
serialize
(
$data
);
$file_class
=
'PhabricatorFile'
;
// Since these happen on GET we can't do guarded writes. These also
// sometimes happen after we've disposed of the write guard; in this
// case we need to disable the whole mechanism.
$use_scope
=
AphrontWriteGuard
::
isGuardActive
();
if
(
$use_scope
)
{
$unguarded
=
AphrontWriteGuard
::
beginScopedUnguardedWrites
();
}
else
{
AphrontWriteGuard
::
allowDangerousUnguardedWrites
(
true
);
}
$caught
=
null
;
try
{
$file
=
call_user_func
(
array
(
$file_class
,
'newFromFileData'
),
$data
,
array
(
'mime-type'
=>
'application/xhprof'
,
'name'
=>
'profile.xhprof'
,
));
}
catch
(
Exception
$ex
)
{
$caught
=
$ex
;
}
if
(
$use_scope
)
{
unset
(
$unguarded
);
}
else
{
AphrontWriteGuard
::
allowDangerousUnguardedWrites
(
false
);
}
if
(
$caught
)
{
throw
$caught
;
}
else
{
return
$file
->
getPHID
();
}
}
}
Event Timeline
Log In to Comment