middleware
middleware copied to clipboard
Add healthcheck routes
Proposed changes (including videos or screenshots)
Add healthcheck routes that can be used with Kubernetes readiness processes. Two routes have been added:
/pingthat return a plain text status 200/statusthat returns a json output status 200
Further comments
This should be beneficial for anyone who wants to deployed the app in a Kubernetes setup. More info there: https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/
Test with the following (change the URL to whatever it should be):
curl -IL https://3333-itv-middleware-5talawwxbrr.ws-eu121.gitpod.io/ping
curl -IL https://3333-itv-middleware-5talawwxbrr.ws-eu121.gitpod.io/status
Summary by CodeRabbit
- New Features
- Added a lightweight /ping health-check endpoint that returns plain-text “OK”; responses are non-cacheable and excluded from indexing.
- Added a /status endpoint that returns service status and the application version in JSON; version may be reported as "unknown" if unavailable. Both endpoints support monitoring and load‑balancer probes without affecting caching or search indexing.
Walkthrough
Adds two Next.js App Router GET endpoints: /ping returns plain text "OK"; /status reads package.json version at module load (fallback "unknown", logs on failure) and returns JSON { status: "OK", version }.
Changes
| Cohort / File(s) | Summary of Changes |
|---|---|
New App Router endpointsweb-server/app/ping/route.ts, web-server/app/status/route.ts |
Adds GET handlers: /ping returns 200 "OK" with headers (Content-Type: text/plain, Cache-Control: no-store, X-Robots-Tag: noindex); /status reads package.json synchronously at module load (logs on error, defaults to "unknown"), exposes GET that returns JSON { status: "OK", version } via NextResponse.json and sets response headers (Cache-Control: no-store, X-Robots-Tag: noindex). |
Sequence Diagram(s)
sequenceDiagram
autonumber
participant C as Client
participant Ping as /ping route
participant Status as /status route
participant FS as package.json (fs)
rect rgba(224,240,255,0.4)
note over Status,FS: Module initialization (on module load)
Status->>FS: readFileSync(package.json)
FS-->>Status: version or error -> "unknown" (logged)
end
C->>Ping: GET /ping
Ping-->>C: 200 OK ("OK", text/plain, no-store)
C->>Status: GET /status
Status-->>C: 200 OK ({ status: "OK", version }, application/json, no-store)
Estimated code review effort
🎯 2 (Simple) | ⏱️ ~10 minutes
Poem
I thump my paw—new routes take wing,
A soft "OK" from /ping I sing.
I nudged the package, found its line,
A version hum, steady and fine.
Two hops deployed — servers cheer, carrot-time! 🥕
Pre-merge checks and finishing touches
❌ Failed checks (1 warning)
| Check name | Status | Explanation | Resolution |
|---|---|---|---|
| Docstring Coverage | ⚠️ Warning | Docstring coverage is 0.00% which is insufficient. The required threshold is 80.00%. | You can run @coderabbitai generate docstrings to improve docstring coverage. |
✅ Passed checks (2 passed)
| Check name | Status | Explanation |
|---|---|---|
| Title Check | ✅ Passed | The title "Add healthcheck routes" is short, clear, and correctly summarizes the primary change in the diff (adding the /ping and /status healthcheck endpoints), so it conveys the main intent to a reviewer scanning history. |
| Description Check | ✅ Passed | The PR description provides a clear "Proposed changes" changelog, rationale for Kubernetes readiness/liveness probes, example curl commands for testing, and a screenshot, so it documents intent and how to verify the changes; however it does not include a "Linked Issue(s)" entry nor an "Acceptance Criteria" checklist from the repository template. |
✨ Finishing touches
- [ ] 📝 Generate Docstrings
🧪 Generate unit tests
- [ ] Create PR with unit tests
- [ ] Post copyable unit tests in a comment
📜 Recent review details
Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro
📥 Commits
Reviewing files that changed from the base of the PR and between 404e657865b3a52c4ff2329fbe3444ad232945a6 and f89867bc3362ddd8c59014212327e01f3d75b7e9.
📒 Files selected for processing (1)
web-server/app/status/route.ts(1 hunks)
🚧 Files skipped from review as they are similar to previous changes (1)
- web-server/app/status/route.ts
[!TIP]
👮 Agentic pre-merge checks are now available in preview!
Pro plan users can now enable pre-merge checks in their settings to enforce checklists before merging PRs.
- Built-in checks – Quickly apply ready-made checks to enforce title conventions, require pull request descriptions that follow templates, validate linked issues for compliance, and more.
- Custom agentic checks – Define your own rules using CodeRabbit’s advanced agentic capabilities to enforce organization-specific policies and workflows. For example, you can instruct CodeRabbit’s agent to verify that API documentation is updated whenever API schema files are modified in a PR. Note: Upto 5 custom checks are currently allowed during the preview period. Pricing for this feature will be announced in a few weeks.
Please see the documentation for more information.
Example:
reviews: pre_merge_checks: custom_checks: - name: "Undocumented Breaking Changes" mode: "warning" instructions: | Pass/fail criteria: All breaking changes to public APIs, CLI flags, environment variables, configuration keys, database schemas, or HTTP/GraphQL endpoints must be documented in the "Breaking Change" section of the PR description and in CHANGELOG.md. Exclude purely internal or private changes (e.g., code not exported from package entry points or explicitly marked as internal).Please share your feedback with us on this Discord post.
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out.
Comment @coderabbitai help to get the list of available commands and usage tips.
Also, we already have status based APIs. https://github.com/middlewarehq/middleware/blob/f89867bc3362ddd8c59014212327e01f3d75b7e9/web-server/pages/api/status.ts
If you point your k8s livenessProbe path to one of these APIs, it should be just fine, right?
Hey @jayantbh, thanks for the replies, I'll look into it.
Your status route should be fine, it just need to respond a 200.
Sadly I found that we are using a internal framework, some kind of wrapper and I can't change the healthcheck routes to be /api/something.
I could create a page router route for /api/ping, and create 2 next config rewrite so that the path are /ping and /status.
async rewrites() {
return [
// Health check routes - map root paths to API routes
{
source: '/ping',
destination: '/api/ping',
},
{
source: '/status',
destination: '/api/status',
},
// ... any other existing rewrites ...
]
},
However. I understand this is now very specific. While it doesn't change the existing, I understand you may not want to merge something like that. What do you think?
My other options would be rebuilding from source injecting routes, injecting routes in Docker directly, fork the repo and make changes, or use a reverse proxy in the container.
FYI, this is how our Dockerfile looks like:
FROM middlewareeng/middleware:0.3.1
WORKDIR /app
COPY entrypoint.sh /app
ENTRYPOINT ["/app/entrypoint.sh"]
CMD ["/bin/bash", "-c", "/app/setup_utils/start.sh"]
Do you have the ability to specify query params to the endpoint in your framework? I might have an idea here then.
Alternatively, we might be able to add a change that adds leverages some environment config to expose health endpoints on whatever path you specify.
Or, to just keep things simple, pages router APIs for those cases are fine. I can't imagine we'll need to add another status API that has potential naming conflicts in a long time.
Do you have the ability to specify query params to the endpoint in your framework
Sadly no, but we're looking at a way to overcome this on our side as it is not really a "you" problem.
Thanks for the efforts though, very much appreciated. I'll keep you posted.
In case you're not able to get things to work on your end, we could try this:
Or, to just keep things simple, pages router APIs for those cases are fine. I can't imagine we'll need to add another status API that has potential naming conflicts in a long time.
@jayantbh I forgot to say, you might have a bunch of unwanted stuff in your image (0.3.1). Like a 233 MB zip file.
/app# ls -lh
total 233M
-rw-r--r--. 1 root root 5.2K May 30 15:30 CODE_OF_CONDUCT.md
-rw-r--r--. 1 root root 3.7K May 30 15:30 SECURITY.md
drwxr-xr-x. 4 root root 120 May 30 15:30 backend
drwxr-xr-x. 3 root root 42 May 30 15:30 db
-rwxr-xr-x. 1 root root 295 Sep 12 14:52 entrypoint.sh
-rw-r--r--. 1 root root 566 May 30 15:30 env.example
-rwxr-xr-x. 1 root root 5.7K May 30 15:30 local-setup.sh
drwxr-xr-x. 2 root root 84 May 30 15:30 media_files
drwxr-xr-x. 1 root root 129 May 30 15:32 setup_utils
-rw-r--r--. 1 root root 124 May 30 15:30 version.txt
drwxr-xr-x. 1 root root 16K May 30 15:35 web-server
-rw-r--r--. 1 root root 233M May 30 15:35 web-server.tar.gz <-------
Sorry another side track comment, just an FYI cause the image is quite big, I'm seeing some things like this:
163M /app/web-server/node_modules/@next/swc-linux-x64-musl/next-swc.linux-x64-musl.node
134M /app/web-server/node_modules/@next/swc-linux-x64-gnu/next-swc.linux-x64-gnu.node
You may not need both, there is chance that this is only required for build a well (didn't check if your image is multi-stage). Just to let you know in case you want to optimize the size of the image, I'm getting that locally:
dora latest c1aa3740c126 36 seconds ago 1.32GB
I believe it is a multi-stage and multi-environment image.
I believe it is a multi-stage and multi-environment image.
Yes sure, but that should still not be there I believe? These screenshots are taken from a deployed container. Discarded layers from different stages are not part of the image.
Probably. I'll get it checked internally. Thanks for letting us know! :)