Class SafeExceptionReporterFilter
Use annotations made by the sensitive_post_parameters and sensitive_variables decorators to filter out sensitive information.
Declaration
class SafeExceptionReporterFilter
source linkDocumentation
Methods
▷ def cleanse_setting(self, key, value) Cleanse an individual setting key/value of sensitive content. If the value is a dictionary, recursively cleanse the keys in that dictionary.
▷ def get_cleansed_multivaluedict(self, request, multivaluedict) Replace the keys in a MultiValueDict marked as sensitive with stars. This mitigates leaking sensitive POST parameters if something like request.POST['nonexistent_key'] throws an exception (#21098).
▷ def get_post_parameters(self, request) Replace the values of POST parameters marked as sensitive with stars (*********).
▷ def get_safe_request_meta(self, request) Return a dictionary of request.META with sensitive values redacted.
▷ def get_safe_settings(self) Return a dictionary of the settings module with values of sensitive settings replaced with stars (*********).
▶ def is_active(self, request) This filter is to add safety in production environments (i.e. DEBUG
is False). If DEBUG is True then your site is not safe anyway.
This hook is provided as a convenience to easily activate or
deactivate the filter on a per request basis.