11import { Event , EventProcessor , Hub , Integration , StackFrame } from '@sentry/types' ;
2- import { getEventDescription , isMatchingPattern , logger } from '@sentry/utils' ;
2+ import { getEventDescription , logger , stringMatchesSomePattern } from '@sentry/utils' ;
33
44// "Script error." is hard coded into browsers for errors that it can't read.
55// this is the result of a script being pulled in from an external domain and CORS.
@@ -107,9 +107,7 @@ function _isIgnoredError(event: Event, ignoreErrors?: Array<string | RegExp>): b
107107 return false ;
108108 }
109109
110- return _getPossibleEventMessages ( event ) . some ( message =>
111- ignoreErrors . some ( pattern => isMatchingPattern ( message , pattern ) ) ,
112- ) ;
110+ return _getPossibleEventMessages ( event ) . some ( message => stringMatchesSomePattern ( message , ignoreErrors ) ) ;
113111}
114112
115113function _isDeniedUrl ( event : Event , denyUrls ?: Array < string | RegExp > ) : boolean {
@@ -118,7 +116,7 @@ function _isDeniedUrl(event: Event, denyUrls?: Array<string | RegExp>): boolean
118116 return false ;
119117 }
120118 const url = _getEventFilterUrl ( event ) ;
121- return ! url ? false : denyUrls . some ( pattern => isMatchingPattern ( url , pattern ) ) ;
119+ return ! url ? false : stringMatchesSomePattern ( url , denyUrls ) ;
122120}
123121
124122function _isAllowedUrl ( event : Event , allowUrls ?: Array < string | RegExp > ) : boolean {
@@ -127,7 +125,7 @@ function _isAllowedUrl(event: Event, allowUrls?: Array<string | RegExp>): boolea
127125 return true ;
128126 }
129127 const url = _getEventFilterUrl ( event ) ;
130- return ! url ? true : allowUrls . some ( pattern => isMatchingPattern ( url , pattern ) ) ;
128+ return ! url ? true : stringMatchesSomePattern ( url , allowUrls ) ;
131129}
132130
133131function _getPossibleEventMessages ( event : Event ) : string [ ] {
0 commit comments