summaryrefslogtreecommitdiff
path: root/docs/howto/error-reporting.txt
diff options
context:
space:
mode:
authorTim Graham <timograham@gmail.com>2012-12-25 09:56:22 -0500
committerTim Graham <timograham@gmail.com>2012-12-26 19:07:22 -0500
commitb3a8c9dab87be6bc4b8096d292abe0b35c700bdd (patch)
treef48e2778028ef3c147d688b168f374b9d6dabd26 /docs/howto/error-reporting.txt
parente2ec7b47b3acb0338d971942ca7ffd36c2a4d8f4 (diff)
Fixed broken links, round 3. refs #19516
Diffstat (limited to 'docs/howto/error-reporting.txt')
-rw-r--r--docs/howto/error-reporting.txt20
1 files changed, 10 insertions, 10 deletions
diff --git a/docs/howto/error-reporting.txt b/docs/howto/error-reporting.txt
index 78e797b607..5fbe5eda59 100644
--- a/docs/howto/error-reporting.txt
+++ b/docs/howto/error-reporting.txt
@@ -123,7 +123,7 @@ Error reports are really helpful for debugging errors, so it is generally
useful to record as much relevant information about those errors as possible.
For example, by default Django records the `full traceback`_ for the
exception raised, each `traceback frame`_'s local variables, and the
-:class:`HttpRequest`'s :ref:`attributes<httprequest-attributes>`.
+:class:`~django.http.HttpRequest`'s :ref:`attributes<httprequest-attributes>`.
However, sometimes certain types of information may be too sensitive and thus
may not be appropriate to be kept track of, for example a user's password or
@@ -165,11 +165,11 @@ production environment (that is, where :setting:`DEBUG` is set to ``False``):
.. function:: sensitive_post_parameters(*parameters)
- If one of your views receives an :class:`HttpRequest` object with
- :attr:`POST parameters<HttpRequest.POST>` susceptible to contain sensitive
- information, you may prevent the values of those parameters from being
- included in the error reports using the ``sensitive_post_parameters``
- decorator::
+ If one of your views receives an :class:`~django.http.HttpRequest` object
+ with :attr:`POST parameters<django.http.HttpRequest.POST>` susceptible to
+ contain sensitive information, you may prevent the values of those
+ parameters from being included in the error reports using the
+ ``sensitive_post_parameters`` decorator::
from django.views.decorators.debug import sensitive_post_parameters
@@ -198,10 +198,10 @@ production environment (that is, where :setting:`DEBUG` is set to ``False``):
.. versionchanged:: 1.4
Since version 1.4, all POST parameters are systematically filtered out of
- error reports for certain :mod:`contrib.views.auth` views (``login``,
- ``password_reset_confirm``, ``password_change``, and ``add_view`` and
- ``user_change_password`` in the ``auth`` admin) to prevent the leaking of
- sensitive information such as user passwords.
+ error reports for certain :mod:`django.contrib.auth.views` views (
+ ``login``, ``password_reset_confirm``, ``password_change``, and
+ ``add_view`` and ``user_change_password`` in the ``auth`` admin) to prevent
+ the leaking of sensitive information such as user passwords.
.. _custom-error-reports: