2018-06-25 11:23:51 +01:00
|
|
|
import os
|
2017-09-22 15:41:41 +01:00
|
|
|
import sys
|
|
|
|
|
import traceback
|
2022-04-12 17:31:17 +01:00
|
|
|
import eventlet
|
|
|
|
|
import socket
|
2017-09-22 15:41:41 +01:00
|
|
|
|
2019-10-23 13:02:41 +01:00
|
|
|
import gunicorn
|
2020-07-01 13:27:12 +01:00
|
|
|
from gds_metrics.gunicorn import child_exit # noqa
|
|
|
|
|
|
2018-06-25 11:23:51 +01:00
|
|
|
workers = 5
|
|
|
|
|
worker_class = "eventlet"
|
|
|
|
|
errorlog = "/home/vcap/logs/gunicorn_error.log"
|
|
|
|
|
bind = "0.0.0.0:{}".format(os.getenv("PORT"))
|
|
|
|
|
disable_redirect_access_to_syslog = True
|
2019-10-23 13:02:41 +01:00
|
|
|
gunicorn.SERVER_SOFTWARE = 'None'
|
2018-06-25 11:23:51 +01:00
|
|
|
|
2017-09-22 15:41:41 +01:00
|
|
|
|
|
|
|
|
def worker_abort(worker):
|
|
|
|
|
worker.log.info("worker received ABORT")
|
2019-11-01 10:43:01 +00:00
|
|
|
for stack in sys._current_frames().values():
|
2017-09-25 16:24:11 +01:00
|
|
|
worker.log.error(''.join(traceback.format_stack(stack)))
|
2022-04-12 17:31:17 +01:00
|
|
|
|
|
|
|
|
|
|
|
|
|
def fix_ssl_monkeypatching():
|
|
|
|
|
"""
|
|
|
|
|
eventlet works by monkey-patching core IO libraries (such as ssl) to be non-blocking. However, there's currently
|
|
|
|
|
a bug: In the normal socket library it may throw a timeout error as a `socket.timeout` exception. However
|
|
|
|
|
eventlet.green.ssl's patch raises an ssl.SSLError('timed out',) instead. redispy handles socket.timeout but not
|
|
|
|
|
ssl.SSLError, so we solve this by monkey patching the monkey patching code to raise the correct exception type
|
|
|
|
|
:scream:
|
|
|
|
|
https://github.com/eventlet/eventlet/issues/692
|
|
|
|
|
"""
|
|
|
|
|
# this has probably already been called somewhere in gunicorn internals, however, to be sure, we invoke it again.
|
|
|
|
|
# eventlet.monkey_patch can be called multiple times without issue
|
|
|
|
|
eventlet.monkey_patch()
|
|
|
|
|
eventlet.green.ssl.timeout_exc = socket.timeout
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
fix_ssl_monkeypatching()
|