Skip to content

Commit

Permalink
Android/source context mentions (#7316)
Browse files Browse the repository at this point in the history
* added source context mention to recent Android highlights, proguard and common source context
  • Loading branch information
stefanosiano committed Jul 14, 2023
1 parent a85a39e commit c7f0a09
Show file tree
Hide file tree
Showing 3 changed files with 14 additions and 0 deletions.
2 changes: 2 additions & 0 deletions src/platform-includes/getting-started-primer/android.mdx
Original file line number Diff line number Diff line change
@@ -1,5 +1,7 @@
<Expandable title="Already using Sentry for Android? Here are some recent highlights">

We released <PlatformLink to="/enhance-errors/source-context">Source Context</PlatformLink>, which shows snippets of code around the location of stack frames.

We just released a new <PlatformLink to="/configuration/integrations/logcat">Logcat integration</PlatformLink>, which automatically creates breadcrumbs for your `android.util.Log.*` calls.

Using Jetpack Compose? Measure composition and rendering time of your `@Composable` functions using our <PlatformLink to="/configuration/integrations/jetpack-compose#performance-metrics">performance metrics for Jetpack Compose</PlatformLink>.
Expand Down
2 changes: 2 additions & 0 deletions src/platforms/android/enhance-errors/proguard.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,8 @@ If you want to see de-obfuscated stack traces, you'll need to use [ProGuard](htt

It works the same either way. A (random) UUID will be or has to be generated and placed into the `AndroidManifest.xml`. The same UUID has to be used to upload the mapping file(s). In case a crash happens in the app, the Sentry Android SDK will send the UUID along with the stacktrace to the Sentry server instance. Sentry will then de-obfuscate the stacktrace by searching for the associated mapping file with the same UUID.

If [Source Context](/platforms/android/enhance-errors/source-context) is enabled, Sentry can show snippets of code (_source context_) around the location of stack frames, which helps to quickly pinpoint problematic code.

Support for Guardsquare's ProGuard and [DexGuard](https://www.guardsquare.com/dexguard) was added in version 3.0.0 of the [Sentry Android Gradle Plugin](/platforms/android/configuration/gradle/).

<Note>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -71,6 +71,16 @@ For native Android and iOS code, follow the instructions in the [Debug Symbols](

</PlatformSection>

<PlatformSection supported={["android"]}>

<Note>

For Android, follow the instructions in the [Android Source Context](/platforms/android/enhance-errors/source-context) guide.

</Note>

</PlatformSection>

After they've been uploaded you can review and manage source bundles the same as
any other debug information file. See [Managing Debug Information Files](../#managing-debug-information-files).
Source bundles will be tagged with `sources`, and will carry the same filename as the
Expand Down

1 comment on commit c7f0a09

@vercel
Copy link

@vercel vercel bot commented on c7f0a09 Jul 14, 2023

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Successfully deployed to the following URLs:

sentry-docs – ./

sentry-docs-git-master.sentry.dev
sentry-docs.sentry.dev
docs.sentry.io

Please sign in to comment.