-
-
Notifications
You must be signed in to change notification settings - Fork 4.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Breadcrumbs for Android release builds aren't deobfuscated #59154
Comments
Routing to @getsentry/team-mdx for triage, due by Wednesday, February 1st at 11:37 am (sfo). ⏲️ |
Issue opened by a member of Sentry, doesn't need triaging |
Also experiencing the same issue as @narsaynorath |
Having the same issue here on our project. 99% of entries for fragments state are not deobfuscated (except for 2 fragments who for weird reasons are deobfuscated). We are using manual FragmentLifecycleIntegration:
|
@hubertdeng123 this should live on the main sentry repo, we cannot do anything from the SDK side here, this is backend stuff. |
@romtsn Got it. I was a bit confused by what's going on here since it seemed like the issue might've fallen through. I'll transfer it back. |
Any updates on this issue? It's hard to debug fragment events when we cannot see the names. |
Looks like this item is backlogged, so unlikely. |
This issue undermines the premise of lifecycle breadcrumbs. Would be great if Sentry team would allocate some effort towards its resolution. |
there's some work going on to deobfuscate the entire event payload (breadcrumbs, messages, contexts, tags, etc etc) afaik, but no ETA. In the meantime you could exclude fragment names from deobfuscation (not great, I know) |
Good to know. Thanks for the update. |
Hey Team, |
Progress can be tracked in the symbolicator repo. Just to give some details: proguard processing is currently one of the biggest bottlenecks in our system, and this feature is not as straightforward to implement as it seems, moving proguard processing to a separate service in rust (symbolicator) with lots of memory should enable us to deobfuscate the entire event payload much easier. maybe @Swatinem or @loewenheim can chime in and give even more details on when this might become possible |
I would say we are in the final stretch to implement this for "regular" stack traces / frames, and profiles. Once we have rolled this out for stack traces, we will look at extending this further as a followup. |
Anything new here? Would also love to have this feature. We have a lot of custom breadcrumb logging that occasionally includes class names. Having this done automatically, or even some tag we could apply to a breadcrumb to opt it in to deobfuscation would be great. |
@JustinBis sadly no news, we'll update here when we get to it |
Environment
SaaS (https://sentry.io/)
Version
No response
Link
https://sentry.io/organizations/sentry-sdks/issues/3885054835/events/c884e0bb85284cde9035b55d8ac567cc/?project=5428559&referrer=previous-event
DSN
No response
Steps to Reproduce
Expected Result
Any values from the android application should be deobfuscated if there is a corresponding ProGuard file
Actual Result
The ui-click
view.class
values are still obfuscated, showingk.e
The text was updated successfully, but these errors were encountered: