Closed GoogleCodeExporter closed 8 years ago
It would be very hard to support debugging of obfuscated assemblies. Even if
.pdb
files could be created to reflect the type and member name changes, the original
source code would also have to be parsed and patched accordingly.
Nearly all problems with obfuscated assemblies lead to a stack trace. The
mapping.txt
file can be used to translate the obfuscated type and member names in this
trace to
the original names.
Most of the time this gives the decisive hint which type or member to exclude
from
obfuscation. You can also narrow down the class or member type (field, property,
method, or event) by trial and error.
In general serialization, binding (e.g. in Windows Form), reflection, and some
VS-generated code lead to most of the issues with obfuscation. Some of them can
be
worked around without exclusion of classes or members from obfuscation.
Original comment by webbi...@gmail.com
on 3 Jan 2010 at 7:16
Yes, you're right, it would be difficult to support. At any rate, I narrowed my
problem to the data binding I was doing in my app. Skipping the obfuscation of
the
properties that were data-bound fixed my obfuscation issues. Thanks for your
reply.
Original comment by radun...@gmail.com
on 3 Jan 2010 at 11:30
Original comment by webbi...@gmail.com
on 9 Feb 2010 at 6:43
Original issue reported on code.google.com by
radun...@gmail.com
on 2 Jan 2010 at 7:56