![]() However, none of these strategies will ensure the protection of your keys and your secrets aren't safe. This solution does, however, prevent your secrets just sitting in plaintext in source control waiting for someone to use, and also has the advantage of being simple to use, leveraging Android's resource management system, and requiring no extra libraries. ![]() As resources, they are somewhat more vulnerable to decompilation of your application package, and so they are discoverable if somebody really wants to know them. You do not want to commit this file to Git. Now, go to commit files to Git and make sure that you do not see the secrets.xml file in the staging area. gitignore file within your git repository, and make sure that this line referencing secrets.xml exists. Verification: To make sure this worked, check the.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |