-
-
Notifications
You must be signed in to change notification settings - Fork 4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Android proguard handling #2613
Comments
Right now, Sentry doesn't support decoding stacktraces that were output by code that was obfuscated with ProGuard. From my understanding, this feature should be possible to implement with the plugin preprocessing hooks and release files, similar to how we handle dealing with rewriting stack traces that were generated by minified JavaScript. We don't have any immediate plans to implement this as part of the Sentry core, but we may look into implementing it as a plugin in the future. We're also always pleased to recommend quality third-party plugins or include them as part of hosted Sentry if it's something that you'd be interested in implementing independently. In the meantime, I'm going to close this ticket since it's not really an issue, but more of a question/feature request, which we'll keep in mind for the future. Thanks! |
OK, I got it ,thanks a lot. |
Does somebody manage to see de-obfuscated stacktrace on Sentry when the Android app source is obfuscated with Proguard ?
The text was updated successfully, but these errors were encountered: