⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 listing13-07_build.xml_usingantcallextension

📁 着几乎所有智能机厂商都将有自己配套的App Store,甚至并非智能手机制造商的三星也有意加入本次混战. 当然,我们也不能忘记苹果最先从iTunes中得到的灵感,从而带来了应用程序商店,一个正确
💻 XML_USINGANTCALLEXTENSION
字号:
<!-- you can also call any Ant target within your build.xml file
     when you use the "antcall" extension, e.g. 
     <preprocessor name="antcall" target="mypreprocesstarget" />
     In the following example we extend the obfuscation phase:
-->

<project name="roadrunner" default="j2mepolish">
	<property name="polish.home" location="C:\programs\J2ME-Polish" />
	<property name="wtk.home" location="C:\WTK22" />

	<taskdef 
		name="j2mepolish"
		classname="de.enough.polish.ant.PolishTask"
		classpath="${polish.home}/import/enough-j2mepolish-build.jar:${polish.home}/import/jdom.jar"
	/>

	<target name="j2mepolish">
		<j2mepolish>
			<info
				license="GPL"
				name="Roadrunner"
				vendorName="A reader."
				version="0.0.1"
				jarName="${polish.vendor}-${polish.name}-roadrunner.jar"
			/>
			<deviceRequirements>
				<requirement name="Identifier" value="Generic/midp1" />
			</deviceRequirements>
			<build
				usePolishGui="true"
			>
				<midlet class="com.apress.roadrunner.Roadrunner" />
				<obfuscator name="antcall" target="yguard" />
			</build>
			<emulator />
		</j2mepolish>
	</target>

	<target name="yguard" >
		<taskdef name="yguard"
		classname="com.yworks.yguard.ObfuscatorTask"
		classpath="import/yguard.jar"
	/>
		<echo message="obfuscating for ${polish.identifier}." />
		<yguard>
			<property name="error-checking" value="pedantic"/>
			<inoutpair in="${polish.obfuscate.source}" out="${polish.obfuscate.target}"/>
			<externalclasses
				path="${polish.obfuscate.bootclasspath}:${polish.obfuscate.classpath}"
			/>
			<expose>
				<class name="com.apress.roadrunner.Roadrunner" />
			</expose>
		</yguard>
	</target>
</project>

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -