Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Android proguard handling #2613

Closed
thierryxing opened this issue Jan 28, 2016 · 2 comments
Closed

Android proguard handling #2613

thierryxing opened this issue Jan 28, 2016 · 2 comments

Comments

@thierryxing
Copy link

Does somebody manage to see de-obfuscated stacktrace on Sentry when the Android app source is obfuscated with Proguard ?

@tkaemming
Copy link
Contributor

Right now, Sentry doesn't support decoding stacktraces that were output by code that was obfuscated with ProGuard. From my understanding, this feature should be possible to implement with the plugin preprocessing hooks and release files, similar to how we handle dealing with rewriting stack traces that were generated by minified JavaScript.

We don't have any immediate plans to implement this as part of the Sentry core, but we may look into implementing it as a plugin in the future. We're also always pleased to recommend quality third-party plugins or include them as part of hosted Sentry if it's something that you'd be interested in implementing independently.

In the meantime, I'm going to close this ticket since it's not really an issue, but more of a question/feature request, which we'll keep in mind for the future. Thanks!

@thierryxing
Copy link
Author

OK, I got it ,thanks a lot.
Maybe I will try to write a plugin for this feature ;-)

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants