 08af7ee157
			
		
	
	
		08af7ee157
		
	
	
	
	
		
			
			* Android-21 introduced an API for symlinking.
 * Android-19 has an API which can be used via reflection.
 * Earlier versions use Runtime.exec('/system/bin/ln')
This also extends the SanitizedFile stuff so that the android < 19 can
safely use Runtime.exec() with less fear of command injection vulnerabilities.
Finally, some tests for the SanitizedFile and symlink stuff was added.
		
	
			
		
			
				
	
	
		
			22 line
		
	
	
		
			793 B
		
	
	
	
		
			Properties
		
	
	
	
	
	
			
		
		
	
	
			22 line
		
	
	
		
			793 B
		
	
	
	
		
			Properties
		
	
	
	
	
	
| # This file is automatically generated by Android Tools.
 | |
| # Do not modify this file -- YOUR CHANGES WILL BE ERASED!
 | |
| #
 | |
| # This file must be checked in Version Control Systems.
 | |
| #
 | |
| # To customize properties used by the Ant build system edit
 | |
| # "ant.properties", and override values to adapt the script to your
 | |
| # project structure.
 | |
| #
 | |
| # To enable ProGuard to shrink and obfuscate your code, uncomment this (available properties: sdk.dir, user.home):
 | |
| #proguard.config=${sdk.dir}/tools/proguard/proguard-android.txt:proguard-project.txt
 | |
| 
 | |
| # Project target.
 | |
| target=android-21
 | |
| 
 | |
| # With a target SDK of android-21 (5.0/Lollipop) and a Java 1.7 compiler, you
 | |
| # can use Java 1.7 features like the <> diamond operator, multi-catch, strings
 | |
| # in switches, etc.
 | |
| java.encoding=UTF-8
 | |
| java.source=1.7
 | |
| java.target=1.7
 |