Showing posts with label Android obfuscation. Show all posts
Showing posts with label Android obfuscation. Show all posts

Monday, June 20, 2016

Allatori obfuscator android mapping file location






If you are using Allatori for obfuscation and want to get non obfuscated stack track in crash reporting or your app logs than use mapping files generataed by Allatori during obfuscation.


From following address
Project\AppName\build\intermediates\classes\allatori-log-debug.xml
Project\AppName\app\build\intermediates\classes\allatori-log-release.xml


Use stack trace utility and stack trace and mapping file from above location
to get non obfuscated stack trace. so that you can fix issues :)




Author:
Hammad Tariq

Android Developer

Kotlin Android MVP Dagger 2 Retrofit Tutorial

http://developine.com/building-android-mvp-app-in-kotlin-using-dagger-retrofit/