Interactive debugging for your Falco apps
Project description
A Falcon middleware that wraps the excellent epdb tool and allows one to connect to a running Falcon app and use interactive debugging to step through the code.
Better documentation can be found at readthedocs.
Source code can be found on GitHub at jcwilson/falcon-epdb.
Installation
If you are only planning on debugging in a development environment where access to your service is restricted to you or trusted partners, you may find the Base64 backend sufficient to your purposes. You can just install the library as you would any Python library.
requirements.txt
falcon-epdb
pip
pip install falcon-epdb
poetry
poetry add falcon-epdb
However, if you need a little more security, you can use one of the other authenticated backends (Fernet, JWT). Choose the one that best fits your use case and install it as a Python extra.
requirements.txt
falcon-epdb[fernet]
pip
pip install falcon-epdb[fernet, jwt]
poetry
poetry add falcon-epdb[jwt]
Usage
This library adds a middleware to your Falcon API stack, and as such will run for all requests, save those excluded by exempt_methods provided to the EPDBServer constructor. If it detects a well-formed (and possibly authenticated) X-EPDB header on the request it will start the epdb server on the configured port and block until it establishes a connection from an epdb client, at which point processing continues but under the control of the remote debugging session.
Subsequent requests with an acceptable header will reuse the client connection and automatically drop into the remote debugging session again.
Configuring the middleware
The EPDBServe<falcon_epdb.EPDBServe> middleware accepts a handful of parameters. The most important are the backend and serve_options parameters. The backend determines how a request is examined for the “secret knock” to start the remote debugging server. The included implementations assume a well-formed X-EPDB header, but nothing precludes you from sub-classing EPDBBackend<falcon_epdb.EPDBBackend> and implementing your own.
The serve_options are options that are passed through to the epdb.serve() call. See Backends for details on how to add this middleware to your API.
Constructing the X-EPDB header
The content of the header is as follows:
{
"epdb": {}
}
Depending on the backend in use, one should encode this content into the appropriate header-safe value. Then append this value to the name of the backend.
X-EPDB: Base64 eyJlcGRiIjoge319
Connecting the client
Example code for connecting to the waiting port:
import epdb
edpb.connect(host=<host>, port=9000)
Backends
Base64
Server side configuration
epdb_middleware = EPDBServe(
backend=Base64Backend(),
serve_options={'port': 9000})
api = falcon.API(middleware=[epdb_middleware])
Crafting an appropriate header
import base64
import json
header_content = base64.b64encode(json.dumps({'epdb': {}}).encode()).decode()
header_value = 'Base64 {}'.format(header_content)
Fernet
Server side configuration
fernet_key = Fernet.generate_key() # The shared key
epdb_middleware = EPDBServe(
backend=FernetBackend(key=fernet_key),
serve_options={'port': 9000})
api = falcon.API(middleware=[epdb_middleware])
Crafting an appropriate header
import json
from cryptography.fernet import Fernet
f = Fernet(<fernet_key>) # Key configured on the server
header_content = f.encrypt(json.dumps({'epdb': {}}).encode()).decode()
header_value = 'Fernet {}'.format(header_content)
JWT
Server side configuration
jwt_key = uuid.uuid4().hex # The shared key
epdb_middleware = EPDBServe(
backend=JWTBackend(key=jwt_key),
serve_options={'port': 9000})
api = falcon.API(middleware=[epdb_middleware])
Crafting an appropriate header
import jwt
header_content = jwt.encode({'epdb': {}}, <jwt_key>, algorithm='HS256').decode()
header_value = 'JWT {}'.format(header_content)
Troubleshooting
You must be sure to allow access to the configured port on your host. Be sure to check your security groups and firewall rules.
Configure your web app to only run one worker process. If you have multiple workers, only the first one will be able to serve on the configured port. If this is not possible you will have to take steps to ensure that all requests that wish to use the remote debugging port are routed to the same worker. This will depend heavily on your HTTP stack and is beyond the scope of this documentation.
Be sure to up your request timeout limit to something on the order of minutes so that the HTTP server doesn’t close your request connection or kill your worker process while you’re debugging.
You may need to provide the HTTP- prefix on your X-EPDB header for it to be handled correctly. So instead of sending X-EPDB, you would send HTTP-X-EPDB.
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file falcon-epdb-1.1.2.tar.gz
.
File metadata
- Download URL: falcon-epdb-1.1.2.tar.gz
- Upload date:
- Size: 7.8 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: poetry/0.12.11 CPython/3.6.7 Linux/4.15.0-1026-gcp
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 478596960169d6127737099a9c09ca43efe9aa4a1325738326a7219340045766 |
|
MD5 | 9161dde9cb23968230c99531eaf82663 |
|
BLAKE2b-256 | ee73c927b08eb2123fcef43545f5c93986f1748d6e1ee54a81b13cff719504d3 |
File details
Details for the file falcon_epdb-1.1.2-py2.py3-none-any.whl
.
File metadata
- Download URL: falcon_epdb-1.1.2-py2.py3-none-any.whl
- Upload date:
- Size: 15.6 kB
- Tags: Python 2, Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: poetry/0.12.11 CPython/3.6.7 Linux/4.15.0-1026-gcp
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | aaf9a1122673088b537dc8cdf0d0654ac46a3f7a4cd61b7b92bc46c9302dbea4 |
|
MD5 | 483862ab4102d467f80132733fe1b458 |
|
BLAKE2b-256 | d0bd912322781ad023638108b779194fb88fe69c44c628c99e49238ea06bb55a |