joshdholtz / Sentry-Android

[Deprecated] Use official "raven-java" library
https://github.com/getsentry/sentry-java
MIT License
180 stars 48 forks source link

Proguard handling #6

Closed T12E closed 10 years ago

T12E commented 10 years ago

Does somebody manage to see de-obfuscated stacktrace on Sentry when the Android app source is obfuscated with Proguard ?

joshdholtz commented 10 years ago

I am not too familiar with ProGuard but it seems the obfuscated names would be in the stacktraces in Sentry based upon my quick research. It looks like you would probably have to map the obfuscated code yourself with the stacktrace that you see in Sentry using something like this - http://stackoverflow.com/questions/3913338/how-to-debug-with-obfuscated-with-proguard-applications-on-android

T12E commented 10 years ago

Yes, I think it's more a Sentry server side feature. The mapping file generated by proguard should be uploaded to the Sentry instance, and Sentry should use it to de-obfuscate the stacktrace sent by the client.

joshdholtz commented 10 years ago

Correct - that would definitely be a nice feature for Sentry. Sorry that I can't help you :-/

T12E commented 10 years ago

No problem, thanks for the feedback

joshdholtz commented 10 years ago

Anytime! Maybe when I get bored next I'll see difficult it is to fork Sentry and de-obfuscate ProGuarded stacktraces :)