docs/config.rst in sentry-raven-2.6.2 vs docs/config.rst in sentry-raven-2.6.3
- old
+ new
@@ -37,11 +37,11 @@
.. code-block:: ruby
class SentryJob < ActiveJob::Base
queue_as :default
-
+
# Important! Otherwise, we can get caught in an infinite loop.
rescue_from(ActiveJob::DeserializationError) { |e| Rails.logger.error e }
def perform(event)
Raven.send_event(event)
@@ -115,9 +115,17 @@
.. code-block:: ruby
config.sanitize_fields = Rails.application.config.filter_parameters.map(&:to_s)
The client scrubs the HTTP "Authorization" header of requests before sending them to Sentry, to prevent sensitive credentials from being sent. You can specify additional HTTP headers to ignore:
+
+ You can also provide regex-like strings to the sanitizer:
+
+ .. code-block:: ruby
+
+ config.sanitize_fields = ["my_field", "foo(.*)?bar]
+
+ It's also possible to remove HTTP header values which match a list:
.. code-block:: ruby
config.sanitize_http_headers = ["Via", "Referer", "User-Agent", "Server", "From"]