
* Android-21 introduced an API for symlinking. * Android-19 has an API which can be used via reflection. * Earlier versions use Runtime.exec('/system/bin/ln') This also extends the SanitizedFile stuff so that the android < 19 can safely use Runtime.exec() with less fear of command injection vulnerabilities. Finally, some tests for the SanitizedFile and symlink stuff was added.
22 lines
793 B
Properties
22 lines
793 B
Properties
# This file is automatically generated by Android Tools.
|
|
# Do not modify this file -- YOUR CHANGES WILL BE ERASED!
|
|
#
|
|
# This file must be checked in Version Control Systems.
|
|
#
|
|
# To customize properties used by the Ant build system edit
|
|
# "ant.properties", and override values to adapt the script to your
|
|
# project structure.
|
|
#
|
|
# To enable ProGuard to shrink and obfuscate your code, uncomment this (available properties: sdk.dir, user.home):
|
|
#proguard.config=${sdk.dir}/tools/proguard/proguard-android.txt:proguard-project.txt
|
|
|
|
# Project target.
|
|
target=android-21
|
|
|
|
# With a target SDK of android-21 (5.0/Lollipop) and a Java 1.7 compiler, you
|
|
# can use Java 1.7 features like the <> diamond operator, multi-catch, strings
|
|
# in switches, etc.
|
|
java.encoding=UTF-8
|
|
java.source=1.7
|
|
java.target=1.7
|