We’re seeing an issue reported in the Play Store with our app published via Expo 27:
at io.nlopez.smartlocation.location.a.a.a (LocationGooglePlayServicesProvider.java:158)
at io.nlopez.smartlocation.location.a.a.onConnected (LocationGooglePlayServicesProvider.java:221)
Which initially seems similar to that reported here:
However, the obfuscated stack trace prevents us from determining this for sure.
The Play Store would really like me to “upload [my] ProGuard deobfuscation file in order to deobfuscate future stack traces”, and I’d like to do that too.
How can I access the mapping.txt that was produced during the build of my project?