diff options
| author | Tim Graham <timograham@gmail.com> | 2012-12-25 09:56:22 -0500 |
|---|---|---|
| committer | Tim Graham <timograham@gmail.com> | 2012-12-26 19:10:50 -0500 |
| commit | fbc06eef1af1d7ecf91fae5a94a1994f356ffd22 (patch) | |
| tree | 0d45acf4eecae06ddc205ffc8b23b11dcb4896b9 /docs/howto/error-reporting.txt | |
| parent | e2396bf1220c543ee8d15c7640481889caace61d (diff) | |
[1.5.X] Fixed broken links, round 3. refs #19516
Backport of b3a8c9dab8 from master
Diffstat (limited to 'docs/howto/error-reporting.txt')
| -rw-r--r-- | docs/howto/error-reporting.txt | 20 |
1 files changed, 10 insertions, 10 deletions
diff --git a/docs/howto/error-reporting.txt b/docs/howto/error-reporting.txt index 78e797b607..5fbe5eda59 100644 --- a/docs/howto/error-reporting.txt +++ b/docs/howto/error-reporting.txt @@ -123,7 +123,7 @@ Error reports are really helpful for debugging errors, so it is generally useful to record as much relevant information about those errors as possible. For example, by default Django records the `full traceback`_ for the exception raised, each `traceback frame`_'s local variables, and the -:class:`HttpRequest`'s :ref:`attributes<httprequest-attributes>`. +:class:`~django.http.HttpRequest`'s :ref:`attributes<httprequest-attributes>`. However, sometimes certain types of information may be too sensitive and thus may not be appropriate to be kept track of, for example a user's password or @@ -165,11 +165,11 @@ production environment (that is, where :setting:`DEBUG` is set to ``False``): .. function:: sensitive_post_parameters(*parameters) - If one of your views receives an :class:`HttpRequest` object with - :attr:`POST parameters<HttpRequest.POST>` susceptible to contain sensitive - information, you may prevent the values of those parameters from being - included in the error reports using the ``sensitive_post_parameters`` - decorator:: + If one of your views receives an :class:`~django.http.HttpRequest` object + with :attr:`POST parameters<django.http.HttpRequest.POST>` susceptible to + contain sensitive information, you may prevent the values of those + parameters from being included in the error reports using the + ``sensitive_post_parameters`` decorator:: from django.views.decorators.debug import sensitive_post_parameters @@ -198,10 +198,10 @@ production environment (that is, where :setting:`DEBUG` is set to ``False``): .. versionchanged:: 1.4 Since version 1.4, all POST parameters are systematically filtered out of - error reports for certain :mod:`contrib.views.auth` views (``login``, - ``password_reset_confirm``, ``password_change``, and ``add_view`` and - ``user_change_password`` in the ``auth`` admin) to prevent the leaking of - sensitive information such as user passwords. + error reports for certain :mod:`django.contrib.auth.views` views ( + ``login``, ``password_reset_confirm``, ``password_change``, and + ``add_view`` and ``user_change_password`` in the ``auth`` admin) to prevent + the leaking of sensitive information such as user passwords. .. _custom-error-reports: |
