Globally censor a set of default variable names in your Django error reports
Project description
About
extra_sensitive_variables is a third-party exception filter for Django. This allows you to globally censor a set of default variable names in Django’s error reports regardless of a function’s lack of @sensitive_* decorators. Basically, any variable matching the names provided in settings.EXTRA_SENSITIVE_VARIABLES or settings.EXTRA_SENSITIVE_POST_PARAMETERS will be censored.
Installation
pip install django-extra-sensitive-variables
Then add the following variables to your settings.py and modify them as you see fit:
EXTRA_SENSITIVE_VARIABLES = ['password', 'credentials'] EXTRA_SENSITIVE_POST_PARAMETERS = ['password', 'credentials', 'credit_card_number']
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Close
Hashes for django-extra-sensitive-variables-1.0.1.tar.gz
Algorithm | Hash digest | |
---|---|---|
SHA256 | 702f8095dc3293881bf965a70525e8eb6a833115aea72f03478c8dd747675bb2 |
|
MD5 | 8a4f9e3f0dcc66d9769156dfb7ae3327 |
|
BLAKE2b-256 | 99653154ecd54900b6dd222d4f41614416106865d3db107c3ff836a2b0c95279 |
Close
Hashes for django_extra_sensitive_variables-1.0.1-py2.py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 1490af9d0e3ce9c3e8a431b294d9ba2cf72195f32cbcc38397bc59b854599bb5 |
|
MD5 | 575cc95aa923dbff72eda0fd67d17bd6 |
|
BLAKE2b-256 | fa2eedd4517d82c683c876077150e605a3272278fd72e5245585adbed87ec475 |