lib
directory of the
ProGuard distribution. To run ReTrace, just type:
java -jar retrace.jar
[options...]
mapping_file [stacktrace_file]
bin
directory contains some short Linux and
Windows scripts containing this command. These are the arguments:
-printmapping
mapping_file",
while obfuscating the application that produced the stack trace.-verbose
-regex
regular_expression(?:.*?\bat\s+%c\.%m\s*\(.*?(?::%l)?\)\s*)|(?:(?:.*?[:"]\s+)?%c(?::.*)?)The regular expression is a Java regular expression (cfr. the documentation of
java.util.regex.Pattern
), with a few additional wildcards:
%c |
matches a class name (e.g.
"myapplication.MyClass "). |
%C |
matches a class name with slashes (e.g.
"myapplication/MyClass "). |
%t |
matches a field type or method return type (e.g.
"myapplication.MyClass[] "). |
%f |
matches a field name (e.g.
"myField "). |
%m |
matches a method name (e.g.
"myMethod "). |
%a |
matches a list of method arguments (e.g.
"boolean,int "). |
%l |
matches a line number inside a method (e.g.
"123 "). |
(?:
...)
Preserving line number tables is explained in detail in this example in the ProGuard User Manual.
Unobfuscated elements and obfuscated elements for which no mapping is available will be left unchanged.