-
-
Notifications
You must be signed in to change notification settings - Fork 242
Comparing changes
Open a pull request
base repository: getsentry/sentry-cli
base: 2.28.6
head repository: getsentry/sentry-cli
compare: 2.29.1
- 17 commits
- 70 files changed
- 6 contributors
Commits on Feb 13, 2024
-
getsentry-bot committed
Feb 13, 2024 Configuration menu - View commit details
-
Copy full SHA for 875605d - Browse repository at this point
Copy the full SHA 875605dView commit details
Commits on Feb 14, 2024
-
fix: support windows on arm via x64 binary (#1943)
Ensures #1858 works even after a refactor
Configuration menu - View commit details
-
Copy full SHA for c04070a - Browse repository at this point
Copy the full SHA c04070aView commit details
Commits on Feb 20, 2024
-
We don't call this method anywhere. The CLI compiles without it, so let's delete it!
Configuration menu - View commit details
-
Copy full SHA for a0a9ff9 - Browse repository at this point
Copy the full SHA a0a9ff9View commit details -
fix(files): Fail when deleting all files fails with 404 error (#1949)
For some reason, until now, 404 errors received special treatment when running the sentry-cli files delete --all command. Therefore, if for whatever reason, the files could not be deleted due to a 404 error, the command would fail silently. The only indication that anything went wrong would be that the "All files deleted" message would not be printed. Instead, it would make more sense to print the error message from the Sentry API and fail with a nonzero status, since the CLI has likely failed to accomplish what the user intended for it to accomplish when running the command. Or, is there any reason why we need to keep the special logic for 404 errors around?
Configuration menu - View commit details
-
Copy full SHA for d40849a - Browse repository at this point
Copy the full SHA d40849aView commit details -
docs: Remove outdated comment (#1952)
We removed Api::reset way back in #489. We should delete this comment that continues to reference Api::reset, since it is clearly inaccurate.
Configuration menu - View commit details
-
Copy full SHA for b9138f7 - Browse repository at this point
Copy the full SHA b9138f7View commit details -
ref: Privatize most low-level api functions (#1953)
Most of the low-level Api functions are never called outside api.rs, yet we still label them as public functions. Let's make all the low-level Api functions only called in api.rs private, since we should anyways probably be using the high-level functions.
Configuration menu - View commit details
-
Copy full SHA for 1384b44 - Browse repository at this point
Copy the full SHA 1384b44View commit details
Commits on Feb 26, 2024
-
feat: Validate that auth token provided when needed (#1951)
Previously, if users ran a Sentry CLI command that required authentication via an auth token, the CLI would make the API request, which would fail with a 403 error because the user did not provide any authentication. With this change, we locally validate that the auth token is present whenever it is required, and if it is missing, we do not perform the API request. This change is implemented by creating a new struct called AuthenticatedApi in the api.rs file. The AuthenticatedApi holds a reference to an Api struct, whose config has been verified to have a non-None auth. An authenticated function has been added to the Api struct. This function ensures the Api it is called on has an auth, and if it does, it returns an Ok containing an AuthenticatedApi wrapping the &Api; otherwise, authenticated returns an error. All high-level Api functions, which call API endpoints requiring authentication (most of the high-level Api functions require authentication), have been moved to AuthenticatedApi. Api now only implements the low-level API functions and the high-level functions that call endpoints which don't require token authentication. All calls to the moved high-level functions have been updated by adding an authenticated()? call before calling methods requiring authentication. Fixes GH-1905 Co-authored-by: Sebastian Zivota <loewenheim@users.noreply.github.com>
Configuration menu - View commit details
-
Copy full SHA for 26da328 - Browse repository at this point
Copy the full SHA 26da328View commit details
Commits on Feb 28, 2024
-
Configuration menu - View commit details
-
Copy full SHA for 5657d86 - Browse repository at this point
Copy the full SHA 5657d86View commit details
Commits on Feb 29, 2024
-
Configuration menu - View commit details
-
Copy full SHA for 5708458 - Browse repository at this point
Copy the full SHA 5708458View commit details
Commits on Mar 4, 2024
-
fix: Merge "Scripts" and "Minified Scripts" under sourcemaps upload r…
…eport (#1962) The distinction between "Scripts" and "Minified Scripts" is arbitrary. #1958 already eliminates the distinction for sourcemaps inject, and since the same code is also used to distinguish between files to output as "Scripts" and "Minified Scripts," merging #1958 already will cause the two sections to merge in the sourcemaps upload output. However, with #1958, the two sections are merged as "Minified Scripts." If this PR is applied along with #1958 (which is my intention), it will cause the two sections to be merged as "Scripts." However, this PR is also completely independent of #1958 – applied alone, it will have the same effect of merging the "Minified Scripts" and "Scripts" sections of the sourcemaps upload report output under "Scripts."
Configuration menu - View commit details
-
Copy full SHA for 6bef09e - Browse repository at this point
Copy the full SHA 6bef09eView commit details -
Add clarifying comment to RN sourcemaps upload test (#1965)
The desired behavior of the command being tested is different from what the test specifies. This PR adds a comment to clarify the situation. Ref #1963
Configuration menu - View commit details
-
Copy full SHA for a1fb39a - Browse repository at this point
Copy the full SHA a1fb39aView commit details -
fix(sourcemaps): Remove distinction between
Sourceand `MinifiedSou……rce` for `sourcemaps inject` (#1958) Until now, the sentry-cli sourcemaps inject command had only been injecting debug IDs into files that we had identified as being minified. However, the intended behavior for this command is for the command to inject debug IDs into all JS source files at the user-specified path; we should not distinguish between minified and non-minified files at all. This PR implements the intended behavior. Users who currently call the sourcemap inject command with a path containing files that should not be injected with debug IDs (such as a path containing both transpiled and source JS files) should update the path passed to only include transpiled JS files, or should use other command line arguments (e.g. --ignore) to exclude the source files from having debug IDs injected. This PR is intended to provide a quick fix to implement the behavior. In the future, we plan to completely refactor and simplify the logic powering the sourcemaps inject command. Fixes GH-1955
Configuration menu - View commit details
-
Copy full SHA for 708f457 - Browse repository at this point
Copy the full SHA 708f457View commit details -
Configuration menu - View commit details
-
Copy full SHA for 876c624 - Browse repository at this point
Copy the full SHA 876c624View commit details -
getsentry-bot committed
Mar 4, 2024 Configuration menu - View commit details
-
Copy full SHA for cbbace1 - Browse repository at this point
Copy the full SHA cbbace1View commit details -
docs: Update changelog (#1966)
2.29.0 release was accepted before I was able to save these updates to the changelog. I plan to release a patch version containing the updated changelog. I have already updated the release on GitHub with these changes
Configuration menu - View commit details
-
Copy full SHA for 7e76944 - Browse repository at this point
Copy the full SHA 7e76944View commit details -
Configuration menu - View commit details
-
Copy full SHA for d765edd - Browse repository at this point
Copy the full SHA d765eddView commit details -
Configuration menu - View commit details
-
Copy full SHA for 7edd5f6 - Browse repository at this point
Copy the full SHA 7edd5f6View commit details
This comparison is taking too long to generate.
Unfortunately it looks like we can’t render this comparison for you right now. It might be too big, or there might be something weird with your repository.
You can try running this command locally to see the comparison on your machine:
git diff 2.28.6...2.29.1