From 7330408ac36f893a4a11c668ba230b440ec09f41 Mon Sep 17 00:00:00 2001 From: Mariusz Felisiak Date: Thu, 30 Mar 2023 10:22:23 +0200 Subject: Reverted "Refs #31949 -- Enabled @sensitive_variables to work with async functions." This reverts commits 23cbed21876bf02f4600c0dac3a5277db5b2afbb and 203a15cadbf8d03b51df1b28d89b2e7ab4264973. --- docs/howto/error-reporting.txt | 8 -------- docs/releases/5.0.txt | 4 +--- 2 files changed, 1 insertion(+), 11 deletions(-) (limited to 'docs') diff --git a/docs/howto/error-reporting.txt b/docs/howto/error-reporting.txt index 875e56a51d..fd465ecf6b 100644 --- a/docs/howto/error-reporting.txt +++ b/docs/howto/error-reporting.txt @@ -205,10 +205,6 @@ filtered out of error reports in a production environment (that is, where exception reporting, and consider implementing a :ref:`custom filter ` if necessary. - .. versionchanged:: 5.0 - - Support for wrapping ``async`` functions was added. - .. function:: sensitive_post_parameters(*parameters) If one of your views receives an :class:`~django.http.HttpRequest` object @@ -249,10 +245,6 @@ filtered out of error reports in a production environment (that is, where ``user_change_password`` in the ``auth`` admin) to prevent the leaking of sensitive information such as user passwords. - .. versionchanged:: 5.0 - - Support for wrapping ``async`` functions was added. - .. _custom-error-reports: Custom error reports diff --git a/docs/releases/5.0.txt b/docs/releases/5.0.txt index 08de2a3740..6e911f471e 100644 --- a/docs/releases/5.0.txt +++ b/docs/releases/5.0.txt @@ -215,9 +215,7 @@ Email Error Reporting ~~~~~~~~~~~~~~~ -* :func:`~django.views.decorators.debug.sensitive_variables` and - :func:`~django.views.decorators.debug.sensitive_post_parameters` can now be - used with asynchronous functions. +* ... File Storage ~~~~~~~~~~~~ -- cgit v1.2.1