- 17 Jan 2025
- 1 Minute à lire
- SombreLumière
- PDF
Troubleshooting re-packaging
- Mis à jour le 17 Jan 2025
- 1 Minute à lire
- SombreLumière
- PDF
In case the protected application exits with exit reason 01 after shielding, it is an indication that App Shielding does not find the correct application signer certificate in the app.
This should never happen if the Shielding Tool performs the signing and the <applicationSignerCertificate v="auto" /> option is used.
However, if the application is signed by another tool, then App Shielding must be explicitly configured with the correct signing certificate in the config.xml file, as described in applicationSignerCertificate.
Google Play App signing
If you have enabled the Google Play App signing option when uploading an app to Google Play, you must add app-specific key from Google using the applicationSignerCertificate option, found on the Google Play Developer pages. See Troubleshooting re-packaging.
Google Play and repackaging checks
When the application is launched, App Shielding performs a repackaging check on the app. If there are any injected files, the application will terminate unexpectedly with RepackagingException.
In some cases, it is observed that Google Play will inject files to your application. To skip these files, you can use the skipVerifyPath option to exclude these files from integrity checking. See also List of operation options.
By default, the Shielding Tool skips these injected:
skipVerifyPath "res/xml/locales_config.xml";
skipVerifyPath "res/xml/splits0.xml";
skipVerifyPath "stamp-cert-sha256";
skipVerifyPath "stamp-cert-sha1";
Amazon App Store Signing
Amazon App Store will resign your application, which is not optional from them. You must add your specific key for your application in Amazon App Store using the applicationSignerCertificate option.
Amazon App Store and Repackaging Checks
Amazon App Store will modify your application’s files. For all applications, Amazon App Store will also inject some code and files into the application, which for most applications also shuffles the classes in the apps' classesX.dex files. Since this modification would trigger the default repackaging checks of App Shielding, the file integrity checking must be tuned for apps published on Amazon App Store.
Due to the changes, the file integrity checking for Amazon App Store must be tuned for Amazon App Store.
The Shielding Tool has a built-in rules file, builtin:amazon-app-store-support.cfg, for the Amazon App Store. To use the file, you must use the following in your rules file:
include "builtin:amazon-app-store-support.cfg";
These rules will skip the classesX.dex files and the files that are known to be injected by Amazon App Store. The content of builtin:amazon-app-store-support.cfg:
# Amazon App Store modifies classes.dex, all the classesX.dex files must be skipped
skipVerifyPath "classes*.dex";
# Amazon App Store injects these files
skipVerifyPath "com.amazon.*";
skipVerifyPath "kiwi";