class documentation
class SafeExceptionReporterFilter: (source)
Use annotations made by the sensitive_post_parameters and sensitive_variables decorators to filter out sensitive information.
Method | cleanse |
Cleanse an individual setting key/value of sensitive content. If the value is a dictionary, recursively cleanse the keys in that dictionary. |
Method | cleanse |
Undocumented |
Method | get |
Replace the keys in a MultiValueDict marked as sensitive with stars. This mitigates leaking sensitive POST parameters if something like request.POST['nonexistent_key'] throws an exception (#21098). |
Method | get |
Replace the values of POST parameters marked as sensitive with stars (*********). |
Method | get |
Return a dictionary of request.META with sensitive values redacted. |
Method | get |
Return a dictionary of the settings module with values of sensitive settings replaced with stars (*********). |
Method | get |
Replace the values of variables marked as sensitive with stars (*********). |
Method | is |
This filter is to add safety in production environments (i.e. DEBUG is False). If DEBUG is True then your site is not safe anyway. This hook is provided as a convenience to easily activate or deactivate the filter on a per request basis. |
Class Variable | cleansed |
Undocumented |
Class Variable | hidden |
Undocumented |
Cleanse an individual setting key/value of sensitive content. If the value is a dictionary, recursively cleanse the keys in that dictionary.
Replace the keys in a MultiValueDict marked as sensitive with stars. This mitigates leaking sensitive POST parameters if something like request.POST['nonexistent_key'] throws an exception (#21098).
Return a dictionary of the settings module with values of sensitive settings replaced with stars (*********).