# Mess **Repository Path**: mirrors_eleme/Mess ## Basic Information - **Project Name**: Mess - **Description**: a gradle plugin for minifying activities, services, receivers, providers and custom view - **Primary Language**: Unknown - **License**: MIT - **Default Branch**: master - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 0 - **Created**: 2020-08-08 - **Last Updated**: 2026-02-14 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README # Mess **mess** is a gradle plugin for obfuscating all code including activity, service, receiver, provider and custom view. It's really very cool to obfuscate all codes, lowers code readability after reverse engineering and ensures code's safety. **mess** is super easy to integrate with your app, its implementation is also clear to understand. During android gradle assemble task execution, It has a lot of tasks to do, and can be divided to resource process & code process briefly. **process\**Resources** is the last task in resource process, it will generate a merged **AndroidManifest.xml**, **aapt_rules.txt** and a merged **res** directory in project build dir. aapt_rules.txt is the output file after aapt, it contains all classes in xml files, and then this file is delivered to proguard task as a list of keeps. **transformClassesAndResourcesWithProguardFor\**** is the proguard task which obfuscates code, it generates a **mapping.txt** file which contains all mapping relation between origin and obfuscated classes. **mess** hooks two android gradle tasks: **process\**Resources** & **package\****, hook processResources task is to clear aapt_rules.txt, tells proguard not to obfuscate all the classes in xml; package task is the last task before package code & resource into apk, it runs after proguard, mess hooks it just to read the obfuscation mapping relation, then rewrite these into resources again, finally execute processResources task again. If your app sets **shrinkResources** to be true, then execute shrink task one more time. ## Usage ```groovy dependencies { ... classpath 'me.ele:mess-plugin:1.1.5' } apply plugin: 'com.android.library' apply plugin: 'me.ele.mess' ``` In some cases, you want to ignore some proguard configuration provided by aar. E.g. latest Butter Knife is an aar which contains proguard.txt, so users do not need to configure its proguard manually. However, we would like to still obfuscate classes used with Butter Knife. So we provide an extension for such scenario. ```groovy mess { ignoreProguard 'com.jakewharton:butterknife' } ``` If you are using AAPT2, please disable AAPT2 by setting `android.enableAapt2=false` in your gradle.properties file. As a result, the Butter Knife's proguard configuration will be ignored. And those activities, views, fragments will be obfuscated by Mess. That's all, just simple as that ## Note As almost every Android project uses [Butter Knife](https://jakewharton.github.io/butterknife/) for view injection. And Butter Knife has its own proguard rules which keeps every class using Butter Knife. As as result, almost every android activity, fragment, custom view would be kept. And out Mess plugin is useless. But good news is that we studied Butter Knife source code and figured it out. And the solution is also a gradle plugin [ButterMess](https://github.com/peacepassion/ButterMess) which has been a submodule of this project. ## feel free to use, welcome issue and comment