diff options
| author | Jon Janzen <jon@jonjanzen.com> | 2023-03-22 02:21:04 -0700 |
|---|---|---|
| committer | GitHub <noreply@github.com> | 2023-03-22 10:21:04 +0100 |
| commit | 23cbed21876bf02f4600c0dac3a5277db5b2afbb (patch) | |
| tree | d0046e9b5930842d4b647129b479c5fd0d7c2677 /docs/howto/error-reporting.txt | |
| parent | 6087bc4e15e89d968396807f8485f4b5624c4f03 (diff) | |
Refs #31949 -- Enabled @sensitive_variables to work with async functions.
Diffstat (limited to 'docs/howto/error-reporting.txt')
| -rw-r--r-- | docs/howto/error-reporting.txt | 8 |
1 files changed, 8 insertions, 0 deletions
diff --git a/docs/howto/error-reporting.txt b/docs/howto/error-reporting.txt index 95adfce755..425aa3144e 100644 --- a/docs/howto/error-reporting.txt +++ b/docs/howto/error-reporting.txt @@ -194,6 +194,10 @@ filtered out of error reports in a production environment (that is, where def process_info(user): ... + .. versionchanged:: 5.0 + + :func:`sensitive_variables` can now be used to wrap ``async`` functions. + .. function:: sensitive_post_parameters(*parameters) If one of your views receives an :class:`~django.http.HttpRequest` object @@ -234,6 +238,10 @@ filtered out of error reports in a production environment (that is, where ``user_change_password`` in the ``auth`` admin) to prevent the leaking of sensitive information such as user passwords. + .. versionchanged:: 5.0 + + :func:`sensitive_post_parameters` can now be used to wrap ``async`` functions. + .. _custom-error-reports: Custom error reports |
