docs/config.rst in sentry-raven-2.6.2 vs docs/config.rst in sentry-raven-2.6.3

- old
+ new

@@ -37,11 +37,11 @@ .. code-block:: ruby class SentryJob < ActiveJob::Base queue_as :default - + # Important! Otherwise, we can get caught in an infinite loop. rescue_from(ActiveJob::DeserializationError) { |e| Rails.logger.error e } def perform(event) Raven.send_event(event) @@ -115,9 +115,17 @@ .. code-block:: ruby config.sanitize_fields = Rails.application.config.filter_parameters.map(&:to_s) The client scrubs the HTTP "Authorization" header of requests before sending them to Sentry, to prevent sensitive credentials from being sent. You can specify additional HTTP headers to ignore: + + You can also provide regex-like strings to the sanitizer: + + .. code-block:: ruby + + config.sanitize_fields = ["my_field", "foo(.*)?bar] + + It's also possible to remove HTTP header values which match a list: .. code-block:: ruby config.sanitize_http_headers = ["Via", "Referer", "User-Agent", "Server", "From"]