Closed T12E closed 10 years ago
I am not too familiar with ProGuard but it seems the obfuscated names would be in the stacktraces in Sentry based upon my quick research. It looks like you would probably have to map the obfuscated code yourself with the stacktrace that you see in Sentry using something like this - http://stackoverflow.com/questions/3913338/how-to-debug-with-obfuscated-with-proguard-applications-on-android
Yes, I think it's more a Sentry server side feature. The mapping file generated by proguard should be uploaded to the Sentry instance, and Sentry should use it to de-obfuscate the stacktrace sent by the client.
Correct - that would definitely be a nice feature for Sentry. Sorry that I can't help you :-/
No problem, thanks for the feedback
Anytime! Maybe when I get bored next I'll see difficult it is to fork Sentry and de-obfuscate ProGuarded stacktraces :)
Does somebody manage to see de-obfuscated stacktrace on Sentry when the Android app source is obfuscated with Proguard ?