* Android-21 introduced an API for symlinking.
 * Android-19 has an API which can be used via reflection.
 * Earlier versions use Runtime.exec('/system/bin/ln')
This also extends the SanitizedFile stuff so that the android < 19 can
safely use Runtime.exec() with less fear of command injection vulnerabilities.
Finally, some tests for the SanitizedFile and symlink stuff was added.
		
	
			
		
			
				
	
	
		
			22 lines
		
	
	
		
			793 B
		
	
	
	
		
			Properties
		
	
	
	
	
	
			
		
		
	
	
			22 lines
		
	
	
		
			793 B
		
	
	
	
		
			Properties
		
	
	
	
	
	
# This file is automatically generated by Android Tools.
 | 
						|
# Do not modify this file -- YOUR CHANGES WILL BE ERASED!
 | 
						|
#
 | 
						|
# This file must be checked in Version Control Systems.
 | 
						|
#
 | 
						|
# To customize properties used by the Ant build system edit
 | 
						|
# "ant.properties", and override values to adapt the script to your
 | 
						|
# project structure.
 | 
						|
#
 | 
						|
# To enable ProGuard to shrink and obfuscate your code, uncomment this (available properties: sdk.dir, user.home):
 | 
						|
#proguard.config=${sdk.dir}/tools/proguard/proguard-android.txt:proguard-project.txt
 | 
						|
 | 
						|
# Project target.
 | 
						|
target=android-21
 | 
						|
 | 
						|
# With a target SDK of android-21 (5.0/Lollipop) and a Java 1.7 compiler, you
 | 
						|
# can use Java 1.7 features like the <> diamond operator, multi-catch, strings
 | 
						|
# in switches, etc.
 | 
						|
java.encoding=UTF-8
 | 
						|
java.source=1.7
 | 
						|
java.target=1.7
 |