Class | ErrorReportEvent | A new error report has been created. |
Function | notify_publisher | Undocumented |
Function | attach_adapter_duration | Undocumented |
Function | attach_exc_info | Attach exception info to the report. |
Function | attach_previous_oopsid | Add a link to the previous OOPS generated this request, if any. |
Function | attach_feature_info | Attach info about the active features and scopes. |
Function | attach_http_request | Add request metadata into the error report. |
Function | attach_ignore_from_exception | Set the ignore key to True if the excception is ignored. |
Function | filter_sessions_timeline | Filter timeline session data in the report. |
Class | ErrorReportingUtility | No class docstring; 7/9 methods documented |
Class | ErrorReportRequest | Undocumented |
Class | ScriptRequest | Fake request that can be passed to ErrorReportingUtility.raising. |
Class | SoftRequestTimeout | Soft request timeout expired |
Function | end_request | Undocumented |
Class | UserRequestOops | A user requested OOPS to log statements. |
Function | maybe_record_user_requested_oops | If an OOPS has been requested, report one. |
Class | OopsNamespace | A namespace handle traversals with ++oops++. |
Function | _is_sensitive | Return True if the given request variable name is sensitive. |
Function | _filter_session_statement | Replace quoted strings with '%s' in statements on session DB. |
Function | _get_type | Undocumented |
Return True if the given request variable name is sensitive. Sensitive request variables should not be recorded in OOPS reports. Currently we consider the following to be sensitive: * any name containing 'password' or 'passwd' * cookies * the HTTP_COOKIE header.
This reads the 'exc_info' key from the context and sets the: * type * value * tb_text keys in the report.
This reads the exc_info and http_request keys from the context and will write to: * url * ignore * username * topic * req_vars