This is a proxy that forwards tunneled sentry requests to the real sentry server. The implementation is based on the explanation provided by the official sentry documentation.
A tunnel is an HTTP endpoint that acts as a proxy between Sentry and your application. Because you control this server, there is no risk of any requests sent to it being blocked. When the endpoint lives under the same origin (although it does not have to in order for the tunnel to work), the browser will not treat any requests to the endpoint as a third-party request. As a result, these requests will have different security measures applied which, by default, don't trigger ad-blockers.
Please note that the minimal supported Relay version is v21.6.0. Older versions might work, but are not supported by this project. Explanation here
This proxy looks for the following environnement variables :
TUNNEL_REMOTE_HOST
: A comma separted list of sentry relays which are allowed to be tuneled by this service. Example :TUNNEL_REMOTE_HOST=https://sentry.example.com, https://sentry2.example.com
.TUNNEL_PROJECT_IDS
: A comma separated list of valid project ids. Request that are not from those projects will be rejected. Example :TUNNEL_PROJECT_IDS=456,78,10840
.TUNNEL_LISTEN_PORT
: The port that this application will bind to. Example :TUNNEL_LISTEN_PORT=7878
. This is optional, the default value is 7878.TUNNEL_PATH
: The url path where the tunnel will be waiting for tunneled request. Example :TUNNEL_PATH=/tunnel
. This is optional, the default value is '/tunnel'.TUNNEL_IP
: The ip that this application will listen on. Optional, the default value is127.0.0.1
.TRUST_X_FORWARDED_FOR
: TrustX-Forwarded-For
headers. Optional, the default value isfalse
.
The docker image lives here.
An example docker-compose file is provided. Otherwise :
docker run --rm -e 'TUNNEL_REMOTE_HOST=https://sentry.example.com' -e 'TUNNEL_PROJECT_IDS=1,5' sigalen/sentry_tunnel
git clone https://github.com/gbip/sentry_tunnel # Clone the project
cd sentry_tunnel
cargo run --release # Build & run
BSD-2