Skip to content

Commit 85c4e0e

Browse files
authored
Terminology fixes (#1839)
* terminology fix * terminology fix
1 parent a0f1f4a commit 85c4e0e

File tree

8 files changed

+15
-15
lines changed

8 files changed

+15
-15
lines changed

src/collections/_documentation/accounts/quotas/manage-event-stream-guide.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,8 +25,8 @@ The SDK includes multiple `Integrations` - functional plugins that you can confi
2525

2626
The integration is enabled by default and adds the following configuration options to the SDK:
2727

28-
- `whitelistUrls`: Domains that might raise acceptable exceptions represented in a regex pattern format.
29-
- `blacklistUrls`: A list of strings or regex patterns that match error URLs which should be blocked from sending events (Configuring both options on the SDK can be used to block **subdomains** of the domains listed in `whitelistUrls`).
28+
- `allowUrls`: Domains that might raise acceptable exceptions represented in a regex pattern format.
29+
- `denyUrls`: A list of strings or regex patterns that match error URLs which should be blocked from sending events (Configuring both options on the SDK can be used to block **subdomains** of the domains listed in `allowUrls`).
3030
- `ignoreErrors`: Instruct the SDK to never send an error to Sentry if it matches any of the listed error **messages**. If no message is available, the SDK will try to compare against an underlying **exception type and value**.
3131

3232
For more information and code samples checkout:

src/collections/_documentation/clients/ruby/integrations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ require 'sentry-raven-without-integrations'
2323
Raven.inject_only(:railties, :rack, :rake)
2424
```
2525

26-
To blacklist integrations:
26+
To deny integrations:
2727

2828
```ruby
2929
require 'sentry-raven-without-integrations'

src/collections/_documentation/performance-monitoring/configuration/javascript.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ The default value of `tracingOrigins` is `['localhost', /^\//]`. The JavaScript
7878
- Therefore, the option needs to be configured like this: `new ApmIntegrations.Tracing({tracingOrigins: ['api.example.com']})`
7979
- Now outgoing XHR/fetch requests to `api.example.com` will get the `sentry-trace` header attached
8080

81-
*NOTE:* You need to make sure your web server CORS is configured to allow the `sentry-trace` header. The configuration might look like `"Access-Control-Allow-Headers: sentry-trace"`, but this depends a lot on your setup. If you do not whitelist the `sentry-trace` header, the request might be blocked.
81+
*NOTE:* You need to make sure your web server CORS is configured to allow the `sentry-trace` header. The configuration might look like `"Access-Control-Allow-Headers: sentry-trace"`, but this depends a lot on your setup. If you do not allow the `sentry-trace` header, the request might be blocked.
8282

8383
**beforeNavigation Option**s
8484

src/collections/_documentation/platforms/javascript/cordova.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ When you [install](/error-reporting/quickstart/?platform=cordova) `sentry-cordov
1111

1212
## Configuration
1313

14-
You will need to whitelist Sentry's domain in your `config.xml` like:
14+
You will need to allow Sentry's domain in your `config.xml` like:
1515

1616
```xml
1717
<access origin="sentry.io" />

src/collections/_documentation/platforms/javascript/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -639,7 +639,7 @@ Sentry.init({
639639

640640
#### Decluttering Sentry
641641

642-
The first thing to do is consider constructing a whitelist of domains which might raise acceptable exceptions.
642+
The first thing to do is consider constructing an allowed list of domains which might raise acceptable exceptions.
643643

644644
If your scripts are loaded from `cdn.example.com` and your site is `example.com` it’d be reasonable to set `allowUrls` to:
645645

src/collections/_documentation/platforms/node/default-integrations.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,10 +17,10 @@ to `integrations` option. For example: to change fatal error handler
1717

1818
_Import name: `Sentry.Integrations.InboundFilters`_
1919

20-
This integration allows developers to ignore specific errors based on the type of message, as well as blocklist/whitelist URLs from which the exception originated.
21-
Keep in mind that blocklist and whitelist work only for captured exceptions, not raw message events.
20+
This integration allows developers to ignore specific errors based on the type of message, as well as deny/allow URLs from which the exception originated.
21+
Keep in mind that denyUrl and allowUrl work only for captured exceptions, not raw message events.
2222

23-
To configure it, use `ignoreErrors`, `blocklistUrls` and `whitelistUrls` SDK options directly.
23+
To configure it, use `ignoreErrors`, `denyUrls` and `allowUrls` SDK options directly.
2424

2525
### FunctionToString
2626

src/collections/_documentation/workflow/integrations/global-integrations.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -230,7 +230,7 @@ openssl x509 -pubkey -noout -in bitbucket_publickey.cer > bitbucket_publickey.p
230230

231231
##### III. Connect your Bitbucket Server application with Sentry
232232
{% capture __alert_content -%}
233-
Confirm [Sentry's IP ranges](/meta/ip-ranges/) are whitelisted.
233+
Confirm [Sentry's IP ranges](/meta/ip-ranges/) are allowed.
234234
{%- endcapture -%}
235235
{%- include components/alert.html
236236
title="Note"
@@ -458,7 +458,7 @@ Sentry owner or manager permissions, and GitHub owner permissions are required t
458458

459459
###### Add new GitHub App
460460

461-
1. Confirm [Sentry's IP ranges](/meta/ip-ranges/) are whitelisted for your GitHub Enterprise instance.
461+
1. Confirm [Sentry's IP ranges](/meta/ip-ranges/) are allowed for your GitHub Enterprise instance.
462462
2. In your GitHub Enterprise organization, navigate to Settings > Developer Settings > **GitHub Apps** and click to add a new **New GitHub App**.
463463

464464
[{% asset github-e-new-app.png %}]({% asset github-e-new-app.png @path %})
@@ -685,7 +685,7 @@ A `&lt;SHORT-ID&gt;` may look something like 'BACKEND-C' in the image below.
685685
#### Troubleshooting
686686
687687
FAQ:
688-
- I'm using GitLab on-premise. Do I need to whitelist Sentry's IP addresses?
688+
- I'm using GitLab on-premise. Do I need to allow Sentry's IP addresses?
689689
- Yes. You can find our IP ranges [ here ](/meta/ip-ranges/).
690690
- Do you support subgroups?
691691
- Currently, we only support subgroups for users using GitLab 11.6 or higher.
@@ -815,7 +815,7 @@ openssl x509 -pubkey -noout -in jira_publickey.cer > jira_publickey.pem
815815
816816
##### III. Connect your Jira Server application with Sentry
817817
{% capture __alert_content -%}
818-
Confirm [Sentry's IP ranges](/meta/ip-ranges/) are whitelisted.
818+
Confirm [Sentry's IP ranges](/meta/ip-ranges/) are allowed.
819819
{%- endcapture -%}
820820
{%- include components/alert.html
821821
title="Note"
@@ -1140,5 +1140,5 @@ Follow the instructions in the link below:
11401140
11411141
If you're having trouble setting up Sentry with your on-premise integration like JIRA Server, Bitbucket Server, GitHub Enterprise, or Gitlab:
11421142
- Ensure that the installation URL you provided is a fully qualified domain name (FQDN), which is resolvable on the internet.
1143-
- Double-check that the IP addresses Sentry uses to make outbound requests are whitelisted </meta/ip-ranges/>.
1143+
- Double-check that the IP addresses Sentry uses to make outbound requests are [allowed](/meta/ip-ranges/).
11441144
- Make sure that Sentry's access to your installation URL is not path restricted.

src/collections/_documentation/workflow/integrations/integration-platform/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -301,7 +301,7 @@ For more information, see the [full documentation on UI Components](/workflow/in
301301
Webhooks allows your service to receive requests about specific resources, depending on your selection. For more information, see the [full documentation on Webhooks](/workflow/integrations/integration-platform/webhooks/).
302302

303303
## Authorized Origins
304-
It is possible to use Auth Tokens from the browser if you whitelist the origins of the pages making the requests. In the field that is called `Authorized JavaScript Origins`, add each origin you want to be separated by a newline (for example, docs.sentry.io). You do not need the protocol in the origin (http or https). At this moment, you cannot use any wildcard characters (for example, `*.sentry.io`), so if you have multiple subdomains, you will need to add them individually.
304+
It is possible to use Auth Tokens from the browser if you allow the origins of the pages making the requests. In the field that is called `Authorized JavaScript Origins`, add each origin you want to be separated by a newline (for example, docs.sentry.io). You do not need the protocol in the origin (http or https). At this moment, you cannot use any wildcard characters (for example, `*.sentry.io`), so if you have multiple subdomains, you will need to add them individually.
305305

306306
## FAQ
307307

0 commit comments

Comments
 (0)