Ryan Hiebert
Ryan Hiebert
> mind adding a test in Looks like there was already a test of the old behavior. I updated it to reflect the new behavior.
fwiw, this is general good practice for use in front of load balancers, but I don't know nearly enough about the many ways that Sentry is used to know whether...
I'm currently having to put my Sentry tunnel behind an Apache proxy which is behind an ALB. And I can't figure out how to get Apache to not mess with...
I'm having this issue as well. Attempting to use it in a docker container build based on `mcr.microsoft.com/devcontainers/python:0-3.10`, and it says that it doesn't have a signature. It doesn't appear...
We've been going nuts with typos on an interactive console causing emails from Sentry, and the delay that sending the message causes when we do hit errors from the console...
@madsruben @dpikt would either of you be interested in reviewing the pull request I made, and see what you think? The tests aren't passing and quite out of date at...
He never got around to looking at it, and he’s not as keen on it as we are, but until he says something different I think it reasonable to think...
> Just to be clear, you can still lookup the provider -- it is not broken. You're correct, this isn't broken. You just use the `provider_id` in place of the...
Also, and for what it's worth, I consider URLs for both OpenID Connect and SAML to be things that need to be basically immutable. Coordinating those kinds of changes with...
Each endpoint should only error if they don't have the configuration needed for that endpoint's functionality. I'm not immediately sure what that should be as far as a status code....