PageRenderTime 38ms CodeModel.GetById 9ms RepoModel.GetById 0ms app.codeStats 0ms

/python/lib/django-1.5/docs/howto/error-reporting.txt

http://googleappengine.googlecode.com/
Plain Text | 283 lines | 209 code | 74 blank | 0 comment | 0 complexity | 4987825b60c7e9eaf98663174f735cf7 MD5 | raw file
Possible License(s): MPL-2.0-no-copyleft-exception, Apache-2.0, BSD-3-Clause, GPL-2.0, LGPL-2.1, MIT
  1. Error reporting
  2. ===============
  3. When you're running a public site you should always turn off the
  4. :setting:`DEBUG` setting. That will make your server run much faster, and will
  5. also prevent malicious users from seeing details of your application that can be
  6. revealed by the error pages.
  7. However, running with :setting:`DEBUG` set to ``False`` means you'll never see
  8. errors generated by your site -- everyone will just see your public error pages.
  9. You need to keep track of errors that occur in deployed sites, so Django can be
  10. configured to create reports with details about those errors.
  11. Email reports
  12. -------------
  13. Server errors
  14. ~~~~~~~~~~~~~
  15. When :setting:`DEBUG` is ``False``, Django will email the users listed in the
  16. :setting:`ADMINS` setting whenever your code raises an unhandled exception and
  17. results in an internal server error (HTTP status code 500). This gives the
  18. administrators immediate notification of any errors. The :setting:`ADMINS` will
  19. get a description of the error, a complete Python traceback, and details about
  20. the HTTP request that caused the error.
  21. .. note::
  22. In order to send email, Django requires a few settings telling it
  23. how to connect to your mail server. At the very least, you'll need
  24. to specify :setting:`EMAIL_HOST` and possibly
  25. :setting:`EMAIL_HOST_USER` and :setting:`EMAIL_HOST_PASSWORD`,
  26. though other settings may be also required depending on your mail
  27. server's configuration. Consult :doc:`the Django settings
  28. documentation </ref/settings>` for a full list of email-related
  29. settings.
  30. By default, Django will send email from root@localhost. However, some mail
  31. providers reject all email from this address. To use a different sender
  32. address, modify the :setting:`SERVER_EMAIL` setting.
  33. To disable this behavior, just remove all entries from the :setting:`ADMINS`
  34. setting.
  35. .. seealso::
  36. Server error emails are sent using the logging framework, so you can
  37. customize this behavior by :doc:`customizing your logging configuration
  38. </topics/logging>`.
  39. 404 errors
  40. ~~~~~~~~~~
  41. Django can also be configured to email errors about broken links (404 "page
  42. not found" errors). Django sends emails about 404 errors when:
  43. * :setting:`DEBUG` is ``False``
  44. * :setting:`SEND_BROKEN_LINK_EMAILS` is ``True``
  45. * Your :setting:`MIDDLEWARE_CLASSES` setting includes ``CommonMiddleware``
  46. (which it does by default).
  47. If those conditions are met, Django will email the users listed in the
  48. :setting:`MANAGERS` setting whenever your code raises a 404 and the request has
  49. a referer. (It doesn't bother to email for 404s that don't have a referer --
  50. those are usually just people typing in broken URLs or broken Web 'bots).
  51. You can tell Django to stop reporting particular 404s by tweaking the
  52. :setting:`IGNORABLE_404_URLS` setting. It should be a tuple of compiled
  53. regular expression objects. For example::
  54. import re
  55. IGNORABLE_404_URLS = (
  56. re.compile(r'\.(php|cgi)$'),
  57. re.compile(r'^/phpmyadmin/'),
  58. )
  59. In this example, a 404 to any URL ending with ``.php`` or ``.cgi`` will *not* be
  60. reported. Neither will any URL starting with ``/phpmyadmin/``.
  61. The following example shows how to exclude some conventional URLs that browsers and
  62. crawlers often request::
  63. import re
  64. IGNORABLE_404_URLS = (
  65. re.compile(r'^/apple-touch-icon.*\.png$'),
  66. re.compile(r'^/favicon\.ico$'),
  67. re.compile(r'^/robots\.txt$'),
  68. )
  69. (Note that these are regular expressions, so we put a backslash in front of
  70. periods to escape them.)
  71. The best way to disable this behavior is to set
  72. :setting:`SEND_BROKEN_LINK_EMAILS` to ``False``.
  73. .. seealso::
  74. 404 errors are logged using the logging framework. By default, these log
  75. records are ignored, but you can use them for error reporting by writing a
  76. handler and :doc:`configuring logging </topics/logging>` appropriately.
  77. .. seealso::
  78. .. versionchanged:: 1.4
  79. Previously, two settings were used to control which URLs not to report:
  80. :setting:`IGNORABLE_404_STARTS` and :setting:`IGNORABLE_404_ENDS`. They
  81. were replaced by :setting:`IGNORABLE_404_URLS`.
  82. .. _filtering-error-reports:
  83. Filtering error reports
  84. -----------------------
  85. .. versionadded:: 1.4
  86. Filtering sensitive information
  87. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  88. Error reports are really helpful for debugging errors, so it is generally
  89. useful to record as much relevant information about those errors as possible.
  90. For example, by default Django records the `full traceback`_ for the
  91. exception raised, each `traceback frame`_'s local variables, and the
  92. :class:`~django.http.HttpRequest`'s :ref:`attributes<httprequest-attributes>`.
  93. However, sometimes certain types of information may be too sensitive and thus
  94. may not be appropriate to be kept track of, for example a user's password or
  95. credit card number. So Django offers a set of function decorators to help you
  96. control which information should be filtered out of error reports in a
  97. production environment (that is, where :setting:`DEBUG` is set to ``False``):
  98. :func:`sensitive_variables` and :func:`sensitive_post_parameters`.
  99. .. _`full traceback`: http://en.wikipedia.org/wiki/Stack_trace
  100. .. _`traceback frame`: http://en.wikipedia.org/wiki/Stack_frame
  101. .. function:: sensitive_variables(*variables)
  102. If a function (either a view or any regular callback) in your code uses
  103. local variables susceptible to contain sensitive information, you may
  104. prevent the values of those variables from being included in error reports
  105. using the ``sensitive_variables`` decorator::
  106. from django.views.decorators.debug import sensitive_variables
  107. @sensitive_variables('user', 'pw', 'cc')
  108. def process_info(user):
  109. pw = user.pass_word
  110. cc = user.credit_card_number
  111. name = user.name
  112. ...
  113. In the above example, the values for the ``user``, ``pw`` and ``cc``
  114. variables will be hidden and replaced with stars (`**********`) in the
  115. error reports, whereas the value of the ``name`` variable will be
  116. disclosed.
  117. To systematically hide all local variables of a function from error logs,
  118. do not provide any argument to the ``sensitive_variables`` decorator::
  119. @sensitive_variables()
  120. def my_function():
  121. ...
  122. .. admonition:: When using mutiple decorators
  123. If the variable you want to hide is also a function argument (e.g.
  124. '``user``' in the following example), and if the decorated function has
  125. mutiple decorators, then make sure to place ``@sensitive_variables`` at
  126. the top of the decorator chain. This way it will also hide the function
  127. argument as it gets passed through the other decorators::
  128. @sensitive_variables('user', 'pw', 'cc')
  129. @some_decorator
  130. @another_decorator
  131. def process_info(user):
  132. ...
  133. .. function:: sensitive_post_parameters(*parameters)
  134. If one of your views receives an :class:`~django.http.HttpRequest` object
  135. with :attr:`POST parameters<django.http.HttpRequest.POST>` susceptible to
  136. contain sensitive information, you may prevent the values of those
  137. parameters from being included in the error reports using the
  138. ``sensitive_post_parameters`` decorator::
  139. from django.views.decorators.debug import sensitive_post_parameters
  140. @sensitive_post_parameters('pass_word', 'credit_card_number')
  141. def record_user_profile(request):
  142. UserProfile.create(user=request.user,
  143. password=request.POST['pass_word'],
  144. credit_card=request.POST['credit_card_number'],
  145. name=request.POST['name'])
  146. ...
  147. In the above example, the values for the ``pass_word`` and
  148. ``credit_card_number`` POST parameters will be hidden and replaced with
  149. stars (`**********`) in the request's representation inside the error
  150. reports, whereas the value of the ``name`` parameter will be disclosed.
  151. To systematically hide all POST parameters of a request in error reports,
  152. do not provide any argument to the ``sensitive_post_parameters`` decorator::
  153. @sensitive_post_parameters()
  154. def my_view(request):
  155. ...
  156. .. note::
  157. .. versionchanged:: 1.4
  158. Since version 1.4, all POST parameters are systematically filtered out of
  159. error reports for certain :mod:`django.contrib.auth.views` views (
  160. ``login``, ``password_reset_confirm``, ``password_change``, and
  161. ``add_view`` and ``user_change_password`` in the ``auth`` admin) to prevent
  162. the leaking of sensitive information such as user passwords.
  163. .. _custom-error-reports:
  164. Custom error reports
  165. ~~~~~~~~~~~~~~~~~~~~
  166. All :func:`sensitive_variables` and :func:`sensitive_post_parameters` do is,
  167. respectively, annotate the decorated function with the names of sensitive
  168. variables and annotate the ``HttpRequest`` object with the names of sensitive
  169. POST parameters, so that this sensitive information can later be filtered out
  170. of reports when an error occurs. The actual filtering is done by Django's
  171. default error reporter filter:
  172. :class:`django.views.debug.SafeExceptionReporterFilter`. This filter uses the
  173. decorators' annotations to replace the corresponding values with stars
  174. (`**********`) when the error reports are produced. If you wish to override or
  175. customize this default behavior for your entire site, you need to define your
  176. own filter class and tell Django to use it via the
  177. :setting:`DEFAULT_EXCEPTION_REPORTER_FILTER` setting::
  178. DEFAULT_EXCEPTION_REPORTER_FILTER = 'path.to.your.CustomExceptionReporterFilter'
  179. You may also control in a more granular way which filter to use within any
  180. given view by setting the ``HttpRequest``'s ``exception_reporter_filter``
  181. attribute::
  182. def my_view(request):
  183. if request.user.is_authenticated():
  184. request.exception_reporter_filter = CustomExceptionReporterFilter()
  185. ...
  186. Your custom filter class needs to inherit from
  187. :class:`django.views.debug.SafeExceptionReporterFilter` and may override the
  188. following methods:
  189. .. class:: django.views.debug.SafeExceptionReporterFilter
  190. .. method:: SafeExceptionReporterFilter.is_active(self, request)
  191. Returns ``True`` to activate the filtering operated in the other methods.
  192. By default the filter is active if :setting:`DEBUG` is ``False``.
  193. .. method:: SafeExceptionReporterFilter.get_request_repr(self, request)
  194. Returns the representation string of the request object, that is, the
  195. value that would be returned by ``repr(request)``, except it uses the
  196. filtered dictionary of POST parameters as determined by
  197. :meth:`SafeExceptionReporterFilter.get_post_parameters`.
  198. .. method:: SafeExceptionReporterFilter.get_post_parameters(self, request)
  199. Returns the filtered dictionary of POST parameters. By default it replaces
  200. the values of sensitive parameters with stars (`**********`).
  201. .. method:: SafeExceptionReporterFilter.get_traceback_frame_variables(self, request, tb_frame)
  202. Returns the filtered dictionary of local variables for the given traceback
  203. frame. By default it replaces the values of sensitive variables with stars
  204. (`**********`).
  205. .. seealso::
  206. You can also set up custom error reporting by writing a custom piece of
  207. :ref:`exception middleware <exception-middleware>`. If you do write custom
  208. error handling, it's a good idea to emulate Django's built-in error handling
  209. and only report/log errors if :setting:`DEBUG` is ``False``.