• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright (C) 2006 The Android Open Source Project
3  *
4  * Licensed under the Apache License, Version 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  *
8  *      http://www.apache.org/licenses/LICENSE-2.0
9  *
10  * Unless required by applicable law or agreed to in writing, software
11  * distributed under the License is distributed on an "AS IS" BASIS,
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  * See the License for the specific language governing permissions and
14  * limitations under the License.
15  */
16 
17 package android.content;
18 
19 import android.annotation.AttrRes;
20 import android.annotation.CheckResult;
21 import android.annotation.ColorInt;
22 import android.annotation.ColorRes;
23 import android.annotation.DrawableRes;
24 import android.annotation.IntDef;
25 import android.annotation.NonNull;
26 import android.annotation.Nullable;
27 import android.annotation.RequiresPermission;
28 import android.annotation.StringDef;
29 import android.annotation.StringRes;
30 import android.annotation.StyleRes;
31 import android.annotation.StyleableRes;
32 import android.annotation.SystemApi;
33 import android.annotation.TestApi;
34 import android.annotation.UserIdInt;
35 import android.content.pm.ApplicationInfo;
36 import android.content.pm.PackageManager;
37 import android.content.res.AssetManager;
38 import android.content.res.ColorStateList;
39 import android.content.res.Configuration;
40 import android.content.res.Resources;
41 import android.content.res.TypedArray;
42 import android.database.DatabaseErrorHandler;
43 import android.database.sqlite.SQLiteDatabase;
44 import android.database.sqlite.SQLiteDatabase.CursorFactory;
45 import android.graphics.Bitmap;
46 import android.graphics.drawable.Drawable;
47 import android.net.Uri;
48 import android.os.Bundle;
49 import android.os.Environment;
50 import android.os.Handler;
51 import android.os.IBinder;
52 import android.os.Looper;
53 import android.os.StatFs;
54 import android.os.UserHandle;
55 import android.os.UserManager;
56 import android.provider.MediaStore;
57 import android.util.AttributeSet;
58 import android.view.Display;
59 import android.view.DisplayAdjustments;
60 import android.view.ViewDebug;
61 import android.view.WindowManager;
62 
63 import java.io.File;
64 import java.io.FileInputStream;
65 import java.io.FileNotFoundException;
66 import java.io.FileOutputStream;
67 import java.io.IOException;
68 import java.io.InputStream;
69 import java.lang.annotation.Retention;
70 import java.lang.annotation.RetentionPolicy;
71 
72 /**
73  * Interface to global information about an application environment.  This is
74  * an abstract class whose implementation is provided by
75  * the Android system.  It
76  * allows access to application-specific resources and classes, as well as
77  * up-calls for application-level operations such as launching activities,
78  * broadcasting and receiving intents, etc.
79  */
80 public abstract class Context {
81     /**
82      * File creation mode: the default mode, where the created file can only
83      * be accessed by the calling application (or all applications sharing the
84      * same user ID).
85      */
86     public static final int MODE_PRIVATE = 0x0000;
87 
88     /**
89      * File creation mode: allow all other applications to have read access to
90      * the created file.
91      * <p>
92      * As of {@link android.os.Build.VERSION_CODES#N} attempting to use this
93      * mode will throw a {@link SecurityException}.
94      *
95      * @deprecated Creating world-readable files is very dangerous, and likely
96      *             to cause security holes in applications. It is strongly
97      *             discouraged; instead, applications should use more formal
98      *             mechanism for interactions such as {@link ContentProvider},
99      *             {@link BroadcastReceiver}, and {@link android.app.Service}.
100      *             There are no guarantees that this access mode will remain on
101      *             a file, such as when it goes through a backup and restore.
102      * @see android.support.v4.content.FileProvider
103      * @see Intent#FLAG_GRANT_WRITE_URI_PERMISSION
104      */
105     @Deprecated
106     public static final int MODE_WORLD_READABLE = 0x0001;
107 
108     /**
109      * File creation mode: allow all other applications to have write access to
110      * the created file.
111      * <p>
112      * As of {@link android.os.Build.VERSION_CODES#N} attempting to use this
113      * mode will throw a {@link SecurityException}.
114      *
115      * @deprecated Creating world-writable files is very dangerous, and likely
116      *             to cause security holes in applications. It is strongly
117      *             discouraged; instead, applications should use more formal
118      *             mechanism for interactions such as {@link ContentProvider},
119      *             {@link BroadcastReceiver}, and {@link android.app.Service}.
120      *             There are no guarantees that this access mode will remain on
121      *             a file, such as when it goes through a backup and restore.
122      * @see android.support.v4.content.FileProvider
123      * @see Intent#FLAG_GRANT_WRITE_URI_PERMISSION
124      */
125     @Deprecated
126     public static final int MODE_WORLD_WRITEABLE = 0x0002;
127 
128     /**
129      * File creation mode: for use with {@link #openFileOutput}, if the file
130      * already exists then write data to the end of the existing file
131      * instead of erasing it.
132      * @see #openFileOutput
133      */
134     public static final int MODE_APPEND = 0x8000;
135 
136     /**
137      * SharedPreference loading flag: when set, the file on disk will
138      * be checked for modification even if the shared preferences
139      * instance is already loaded in this process.  This behavior is
140      * sometimes desired in cases where the application has multiple
141      * processes, all writing to the same SharedPreferences file.
142      * Generally there are better forms of communication between
143      * processes, though.
144      *
145      * <p>This was the legacy (but undocumented) behavior in and
146      * before Gingerbread (Android 2.3) and this flag is implied when
147      * targetting such releases.  For applications targetting SDK
148      * versions <em>greater than</em> Android 2.3, this flag must be
149      * explicitly set if desired.
150      *
151      * @see #getSharedPreferences
152      *
153      * @deprecated MODE_MULTI_PROCESS does not work reliably in
154      * some versions of Android, and furthermore does not provide any
155      * mechanism for reconciling concurrent modifications across
156      * processes.  Applications should not attempt to use it.  Instead,
157      * they should use an explicit cross-process data management
158      * approach such as {@link android.content.ContentProvider ContentProvider}.
159      */
160     @Deprecated
161     public static final int MODE_MULTI_PROCESS = 0x0004;
162 
163     /**
164      * Database open flag: when set, the database is opened with write-ahead
165      * logging enabled by default.
166      *
167      * @see #openOrCreateDatabase(String, int, CursorFactory)
168      * @see #openOrCreateDatabase(String, int, CursorFactory, DatabaseErrorHandler)
169      * @see SQLiteDatabase#enableWriteAheadLogging
170      */
171     public static final int MODE_ENABLE_WRITE_AHEAD_LOGGING = 0x0008;
172 
173     /**
174      * Database open flag: when set, the database is opened without support for
175      * localized collators.
176      *
177      * @see #openOrCreateDatabase(String, int, CursorFactory)
178      * @see #openOrCreateDatabase(String, int, CursorFactory, DatabaseErrorHandler)
179      * @see SQLiteDatabase#NO_LOCALIZED_COLLATORS
180      */
181     public static final int MODE_NO_LOCALIZED_COLLATORS = 0x0010;
182 
183     /** @hide */
184     @IntDef(flag = true,
185             value = {
186                 BIND_AUTO_CREATE,
187                 BIND_DEBUG_UNBIND,
188                 BIND_NOT_FOREGROUND,
189                 BIND_ABOVE_CLIENT,
190                 BIND_ALLOW_OOM_MANAGEMENT,
191                 BIND_WAIVE_PRIORITY,
192                 BIND_IMPORTANT,
193                 BIND_ADJUST_WITH_ACTIVITY
194             })
195     @Retention(RetentionPolicy.SOURCE)
196     public @interface BindServiceFlags {}
197 
198     /**
199      * Flag for {@link #bindService}: automatically create the service as long
200      * as the binding exists.  Note that while this will create the service,
201      * its {@link android.app.Service#onStartCommand}
202      * method will still only be called due to an
203      * explicit call to {@link #startService}.  Even without that, though,
204      * this still provides you with access to the service object while the
205      * service is created.
206      *
207      * <p>Note that prior to {@link android.os.Build.VERSION_CODES#ICE_CREAM_SANDWICH},
208      * not supplying this flag would also impact how important the system
209      * consider's the target service's process to be.  When set, the only way
210      * for it to be raised was by binding from a service in which case it will
211      * only be important when that activity is in the foreground.  Now to
212      * achieve this behavior you must explicitly supply the new flag
213      * {@link #BIND_ADJUST_WITH_ACTIVITY}.  For compatibility, old applications
214      * that don't specify {@link #BIND_AUTO_CREATE} will automatically have
215      * the flags {@link #BIND_WAIVE_PRIORITY} and
216      * {@link #BIND_ADJUST_WITH_ACTIVITY} set for them in order to achieve
217      * the same result.
218      */
219     public static final int BIND_AUTO_CREATE = 0x0001;
220 
221     /**
222      * Flag for {@link #bindService}: include debugging help for mismatched
223      * calls to unbind.  When this flag is set, the callstack of the following
224      * {@link #unbindService} call is retained, to be printed if a later
225      * incorrect unbind call is made.  Note that doing this requires retaining
226      * information about the binding that was made for the lifetime of the app,
227      * resulting in a leak -- this should only be used for debugging.
228      */
229     public static final int BIND_DEBUG_UNBIND = 0x0002;
230 
231     /**
232      * Flag for {@link #bindService}: don't allow this binding to raise
233      * the target service's process to the foreground scheduling priority.
234      * It will still be raised to at least the same memory priority
235      * as the client (so that its process will not be killable in any
236      * situation where the client is not killable), but for CPU scheduling
237      * purposes it may be left in the background.  This only has an impact
238      * in the situation where the binding client is a foreground process
239      * and the target service is in a background process.
240      */
241     public static final int BIND_NOT_FOREGROUND = 0x0004;
242 
243     /**
244      * Flag for {@link #bindService}: indicates that the client application
245      * binding to this service considers the service to be more important than
246      * the app itself.  When set, the platform will try to have the out of
247      * memory killer kill the app before it kills the service it is bound to, though
248      * this is not guaranteed to be the case.
249      */
250     public static final int BIND_ABOVE_CLIENT = 0x0008;
251 
252     /**
253      * Flag for {@link #bindService}: allow the process hosting the bound
254      * service to go through its normal memory management.  It will be
255      * treated more like a running service, allowing the system to
256      * (temporarily) expunge the process if low on memory or for some other
257      * whim it may have, and being more aggressive about making it a candidate
258      * to be killed (and restarted) if running for a long time.
259      */
260     public static final int BIND_ALLOW_OOM_MANAGEMENT = 0x0010;
261 
262     /**
263      * Flag for {@link #bindService}: don't impact the scheduling or
264      * memory management priority of the target service's hosting process.
265      * Allows the service's process to be managed on the background LRU list
266      * just like a regular application process in the background.
267      */
268     public static final int BIND_WAIVE_PRIORITY = 0x0020;
269 
270     /**
271      * Flag for {@link #bindService}: this service is very important to
272      * the client, so should be brought to the foreground process level
273      * when the client is.  Normally a process can only be raised to the
274      * visibility level by a client, even if that client is in the foreground.
275      */
276     public static final int BIND_IMPORTANT = 0x0040;
277 
278     /**
279      * Flag for {@link #bindService}: If binding from an activity, allow the
280      * target service's process importance to be raised based on whether the
281      * activity is visible to the user, regardless whether another flag is
282      * used to reduce the amount that the client process's overall importance
283      * is used to impact it.
284      */
285     public static final int BIND_ADJUST_WITH_ACTIVITY = 0x0080;
286 
287     /**
288      * @hide Flag for {@link #bindService}: allows application hosting service to manage whitelists
289      * such as temporary allowing a {@code PendingIntent} to bypass Power Save mode.
290      */
291     public static final int BIND_ALLOW_WHITELIST_MANAGEMENT = 0x01000000;
292 
293     /**
294      * @hide Flag for {@link #bindService}: Like {@link #BIND_FOREGROUND_SERVICE},
295      * but only applies while the device is awake.
296      */
297     public static final int BIND_FOREGROUND_SERVICE_WHILE_AWAKE = 0x02000000;
298 
299     /**
300      * @hide Flag for {@link #bindService}: For only the case where the binding
301      * is coming from the system, set the process state to FOREGROUND_SERVICE
302      * instead of the normal maximum of IMPORTANT_FOREGROUND.  That is, this is
303      * saying that the process shouldn't participate in the normal power reduction
304      * modes (removing network access etc).
305      */
306     public static final int BIND_FOREGROUND_SERVICE = 0x04000000;
307 
308     /**
309      * @hide Flag for {@link #bindService}: Treat the binding as hosting
310      * an activity, an unbinding as the activity going in the background.
311      * That is, when unbinding, the process when empty will go on the activity
312      * LRU list instead of the regular one, keeping it around more aggressively
313      * than it otherwise would be.  This is intended for use with IMEs to try
314      * to keep IME processes around for faster keyboard switching.
315      */
316     public static final int BIND_TREAT_LIKE_ACTIVITY = 0x08000000;
317 
318     /**
319      * @hide An idea that is not yet implemented.
320      * Flag for {@link #bindService}: If binding from an activity, consider
321      * this service to be visible like the binding activity is.  That is,
322      * it will be treated as something more important to keep around than
323      * invisible background activities.  This will impact the number of
324      * recent activities the user can switch between without having them
325      * restart.  There is no guarantee this will be respected, as the system
326      * tries to balance such requests from one app vs. the importantance of
327      * keeping other apps around.
328      */
329     public static final int BIND_VISIBLE = 0x10000000;
330 
331     /**
332      * @hide
333      * Flag for {@link #bindService}: Consider this binding to be causing the target
334      * process to be showing UI, so it will be do a UI_HIDDEN memory trim when it goes
335      * away.
336      */
337     public static final int BIND_SHOWING_UI = 0x20000000;
338 
339     /**
340      * Flag for {@link #bindService}: Don't consider the bound service to be
341      * visible, even if the caller is visible.
342      * @hide
343      */
344     public static final int BIND_NOT_VISIBLE = 0x40000000;
345 
346     /**
347      * Flag for {@link #bindService}: The service being bound is an
348      * {@link android.R.attr#isolatedProcess isolated},
349      * {@link android.R.attr#externalService external} service.  This binds the service into the
350      * calling application's package, rather than the package in which the service is declared.
351      * <p>
352      * When using this flag, the code for the service being bound will execute under the calling
353      * application's package name and user ID.  Because the service must be an isolated process,
354      * it will not have direct access to the application's data, though.
355      *
356      * The purpose of this flag is to allow applications to provide services that are attributed
357      * to the app using the service, rather than the application providing the service.
358      * </p>
359      */
360     public static final int BIND_EXTERNAL_SERVICE = 0x80000000;
361 
362     /**
363      * Returns an AssetManager instance for the application's package.
364      * <p>
365      * <strong>Note:</strong> Implementations of this method should return
366      * an AssetManager instance that is consistent with the Resources instance
367      * returned by {@link #getResources()}. For example, they should share the
368      * same {@link Configuration} object.
369      *
370      * @return an AssetManager instance for the application's package
371      * @see #getResources()
372      */
getAssets()373     public abstract AssetManager getAssets();
374 
375     /**
376      * Returns a Resources instance for the application's package.
377      * <p>
378      * <strong>Note:</strong> Implementations of this method should return
379      * a Resources instance that is consistent with the AssetManager instance
380      * returned by {@link #getAssets()}. For example, they should share the
381      * same {@link Configuration} object.
382      *
383      * @return a Resources instance for the application's package
384      * @see #getAssets()
385      */
getResources()386     public abstract Resources getResources();
387 
388     /** Return PackageManager instance to find global package information. */
getPackageManager()389     public abstract PackageManager getPackageManager();
390 
391     /** Return a ContentResolver instance for your application's package. */
getContentResolver()392     public abstract ContentResolver getContentResolver();
393 
394     /**
395      * Return the Looper for the main thread of the current process.  This is
396      * the thread used to dispatch calls to application components (activities,
397      * services, etc).
398      * <p>
399      * By definition, this method returns the same result as would be obtained
400      * by calling {@link Looper#getMainLooper() Looper.getMainLooper()}.
401      * </p>
402      *
403      * @return The main looper.
404      */
getMainLooper()405     public abstract Looper getMainLooper();
406 
407     /**
408      * Return the context of the single, global Application object of the
409      * current process.  This generally should only be used if you need a
410      * Context whose lifecycle is separate from the current context, that is
411      * tied to the lifetime of the process rather than the current component.
412      *
413      * <p>Consider for example how this interacts with
414      * {@link #registerReceiver(BroadcastReceiver, IntentFilter)}:
415      * <ul>
416      * <li> <p>If used from an Activity context, the receiver is being registered
417      * within that activity.  This means that you are expected to unregister
418      * before the activity is done being destroyed; in fact if you do not do
419      * so, the framework will clean up your leaked registration as it removes
420      * the activity and log an error.  Thus, if you use the Activity context
421      * to register a receiver that is static (global to the process, not
422      * associated with an Activity instance) then that registration will be
423      * removed on you at whatever point the activity you used is destroyed.
424      * <li> <p>If used from the Context returned here, the receiver is being
425      * registered with the global state associated with your application.  Thus
426      * it will never be unregistered for you.  This is necessary if the receiver
427      * is associated with static data, not a particular component.  However
428      * using the ApplicationContext elsewhere can easily lead to serious leaks
429      * if you forget to unregister, unbind, etc.
430      * </ul>
431      */
getApplicationContext()432     public abstract Context getApplicationContext();
433 
434     /**
435      * Add a new {@link ComponentCallbacks} to the base application of the
436      * Context, which will be called at the same times as the ComponentCallbacks
437      * methods of activities and other components are called.  Note that you
438      * <em>must</em> be sure to use {@link #unregisterComponentCallbacks} when
439      * appropriate in the future; this will not be removed for you.
440      *
441      * @param callback The interface to call.  This can be either a
442      * {@link ComponentCallbacks} or {@link ComponentCallbacks2} interface.
443      */
registerComponentCallbacks(ComponentCallbacks callback)444     public void registerComponentCallbacks(ComponentCallbacks callback) {
445         getApplicationContext().registerComponentCallbacks(callback);
446     }
447 
448     /**
449      * Remove a {@link ComponentCallbacks} object that was previously registered
450      * with {@link #registerComponentCallbacks(ComponentCallbacks)}.
451      */
unregisterComponentCallbacks(ComponentCallbacks callback)452     public void unregisterComponentCallbacks(ComponentCallbacks callback) {
453         getApplicationContext().unregisterComponentCallbacks(callback);
454     }
455 
456     /**
457      * Return a localized, styled CharSequence from the application's package's
458      * default string table.
459      *
460      * @param resId Resource id for the CharSequence text
461      */
getText(@tringRes int resId)462     public final CharSequence getText(@StringRes int resId) {
463         return getResources().getText(resId);
464     }
465 
466     /**
467      * Returns a localized string from the application's package's
468      * default string table.
469      *
470      * @param resId Resource id for the string
471      * @return The string data associated with the resource, stripped of styled
472      *         text information.
473      */
474     @NonNull
getString(@tringRes int resId)475     public final String getString(@StringRes int resId) {
476         return getResources().getString(resId);
477     }
478 
479     /**
480      * Returns a localized formatted string from the application's package's
481      * default string table, substituting the format arguments as defined in
482      * {@link java.util.Formatter} and {@link java.lang.String#format}.
483      *
484      * @param resId Resource id for the format string
485      * @param formatArgs The format arguments that will be used for
486      *                   substitution.
487      * @return The string data associated with the resource, formatted and
488      *         stripped of styled text information.
489      */
490     @NonNull
getString(@tringRes int resId, Object... formatArgs)491     public final String getString(@StringRes int resId, Object... formatArgs) {
492         return getResources().getString(resId, formatArgs);
493     }
494 
495     /**
496      * Returns a color associated with a particular resource ID and styled for
497      * the current theme.
498      *
499      * @param id The desired resource identifier, as generated by the aapt
500      *           tool. This integer encodes the package, type, and resource
501      *           entry. The value 0 is an invalid identifier.
502      * @return A single color value in the form 0xAARRGGBB.
503      * @throws android.content.res.Resources.NotFoundException if the given ID
504      *         does not exist.
505      */
506     @ColorInt
getColor(@olorRes int id)507     public final int getColor(@ColorRes int id) {
508         return getResources().getColor(id, getTheme());
509     }
510 
511     /**
512      * Returns a drawable object associated with a particular resource ID and
513      * styled for the current theme.
514      *
515      * @param id The desired resource identifier, as generated by the aapt
516      *           tool. This integer encodes the package, type, and resource
517      *           entry. The value 0 is an invalid identifier.
518      * @return An object that can be used to draw this resource, or
519      *         {@code null} if the resource could not be resolved.
520      * @throws android.content.res.Resources.NotFoundException if the given ID
521      *         does not exist.
522      */
523     @Nullable
getDrawable(@rawableRes int id)524     public final Drawable getDrawable(@DrawableRes int id) {
525         return getResources().getDrawable(id, getTheme());
526     }
527 
528     /**
529      * Returns a color state list associated with a particular resource ID and
530      * styled for the current theme.
531      *
532      * @param id The desired resource identifier, as generated by the aapt
533      *           tool. This integer encodes the package, type, and resource
534      *           entry. The value 0 is an invalid identifier.
535      * @return A color state list, or {@code null} if the resource could not be
536      *         resolved.
537      * @throws android.content.res.Resources.NotFoundException if the given ID
538      *         does not exist.
539      */
540     @Nullable
getColorStateList(@olorRes int id)541     public final ColorStateList getColorStateList(@ColorRes int id) {
542         return getResources().getColorStateList(id, getTheme());
543     }
544 
545      /**
546      * Set the base theme for this context.  Note that this should be called
547      * before any views are instantiated in the Context (for example before
548      * calling {@link android.app.Activity#setContentView} or
549      * {@link android.view.LayoutInflater#inflate}).
550      *
551      * @param resid The style resource describing the theme.
552      */
setTheme(@tyleRes int resid)553     public abstract void setTheme(@StyleRes int resid);
554 
555     /** @hide Needed for some internal implementation...  not public because
556      * you can't assume this actually means anything. */
getThemeResId()557     public int getThemeResId() {
558         return 0;
559     }
560 
561     /**
562      * Return the Theme object associated with this Context.
563      */
564     @ViewDebug.ExportedProperty(deepExport = true)
getTheme()565     public abstract Resources.Theme getTheme();
566 
567     /**
568      * Retrieve styled attribute information in this Context's theme.  See
569      * {@link android.content.res.Resources.Theme#obtainStyledAttributes(int[])}
570      * for more information.
571      *
572      * @see android.content.res.Resources.Theme#obtainStyledAttributes(int[])
573      */
obtainStyledAttributes(@tyleableRes int[] attrs)574     public final TypedArray obtainStyledAttributes(@StyleableRes int[] attrs) {
575         return getTheme().obtainStyledAttributes(attrs);
576     }
577 
578     /**
579      * Retrieve styled attribute information in this Context's theme.  See
580      * {@link android.content.res.Resources.Theme#obtainStyledAttributes(int, int[])}
581      * for more information.
582      *
583      * @see android.content.res.Resources.Theme#obtainStyledAttributes(int, int[])
584      */
obtainStyledAttributes( @tyleRes int resid, @StyleableRes int[] attrs)585     public final TypedArray obtainStyledAttributes(
586             @StyleRes int resid, @StyleableRes int[] attrs) throws Resources.NotFoundException {
587         return getTheme().obtainStyledAttributes(resid, attrs);
588     }
589 
590     /**
591      * Retrieve styled attribute information in this Context's theme.  See
592      * {@link android.content.res.Resources.Theme#obtainStyledAttributes(AttributeSet, int[], int, int)}
593      * for more information.
594      *
595      * @see android.content.res.Resources.Theme#obtainStyledAttributes(AttributeSet, int[], int, int)
596      */
obtainStyledAttributes( AttributeSet set, @StyleableRes int[] attrs)597     public final TypedArray obtainStyledAttributes(
598             AttributeSet set, @StyleableRes int[] attrs) {
599         return getTheme().obtainStyledAttributes(set, attrs, 0, 0);
600     }
601 
602     /**
603      * Retrieve styled attribute information in this Context's theme.  See
604      * {@link android.content.res.Resources.Theme#obtainStyledAttributes(AttributeSet, int[], int, int)}
605      * for more information.
606      *
607      * @see android.content.res.Resources.Theme#obtainStyledAttributes(AttributeSet, int[], int, int)
608      */
obtainStyledAttributes( AttributeSet set, @StyleableRes int[] attrs, @AttrRes int defStyleAttr, @StyleRes int defStyleRes)609     public final TypedArray obtainStyledAttributes(
610             AttributeSet set, @StyleableRes int[] attrs, @AttrRes int defStyleAttr,
611             @StyleRes int defStyleRes) {
612         return getTheme().obtainStyledAttributes(
613             set, attrs, defStyleAttr, defStyleRes);
614     }
615 
616     /**
617      * Return a class loader you can use to retrieve classes in this package.
618      */
getClassLoader()619     public abstract ClassLoader getClassLoader();
620 
621     /** Return the name of this application's package. */
getPackageName()622     public abstract String getPackageName();
623 
624     /** @hide Return the name of the base context this context is derived from. */
getBasePackageName()625     public abstract String getBasePackageName();
626 
627     /** @hide Return the package name that should be used for app ops calls from
628      * this context.  This is the same as {@link #getBasePackageName()} except in
629      * cases where system components are loaded into other app processes, in which
630      * case this will be the name of the primary package in that process (so that app
631      * ops uid verification will work with the name). */
getOpPackageName()632     public abstract String getOpPackageName();
633 
634     /** Return the full application info for this context's package. */
getApplicationInfo()635     public abstract ApplicationInfo getApplicationInfo();
636 
637     /**
638      * Return the full path to this context's primary Android package.
639      * The Android package is a ZIP file which contains the application's
640      * primary resources.
641      *
642      * <p>Note: this is not generally useful for applications, since they should
643      * not be directly accessing the file system.
644      *
645      * @return String Path to the resources.
646      */
getPackageResourcePath()647     public abstract String getPackageResourcePath();
648 
649     /**
650      * Return the full path to this context's primary Android package.
651      * The Android package is a ZIP file which contains application's
652      * primary code and assets.
653      *
654      * <p>Note: this is not generally useful for applications, since they should
655      * not be directly accessing the file system.
656      *
657      * @return String Path to the code and assets.
658      */
getPackageCodePath()659     public abstract String getPackageCodePath();
660 
661     /**
662      * @hide
663      * @deprecated use {@link #getSharedPreferencesPath(String)}
664      */
665     @Deprecated
getSharedPrefsFile(String name)666     public File getSharedPrefsFile(String name) {
667         return getSharedPreferencesPath(name);
668     }
669 
670     /**
671      * Retrieve and hold the contents of the preferences file 'name', returning
672      * a SharedPreferences through which you can retrieve and modify its
673      * values.  Only one instance of the SharedPreferences object is returned
674      * to any callers for the same name, meaning they will see each other's
675      * edits as soon as they are made.
676      *
677      * @param name Desired preferences file. If a preferences file by this name
678      * does not exist, it will be created when you retrieve an
679      * editor (SharedPreferences.edit()) and then commit changes (Editor.commit()).
680      * @param mode Operating mode.  Use 0 or {@link #MODE_PRIVATE} for the
681      * default operation.
682      *
683      * @return The single {@link SharedPreferences} instance that can be used
684      *         to retrieve and modify the preference values.
685      *
686      * @see #MODE_PRIVATE
687      */
getSharedPreferences(String name, int mode)688     public abstract SharedPreferences getSharedPreferences(String name, int mode);
689 
690     /**
691      * Retrieve and hold the contents of the preferences file, returning
692      * a SharedPreferences through which you can retrieve and modify its
693      * values.  Only one instance of the SharedPreferences object is returned
694      * to any callers for the same name, meaning they will see each other's
695      * edits as soon as they are made.
696      *
697      * @param file Desired preferences file. If a preferences file by this name
698      * does not exist, it will be created when you retrieve an
699      * editor (SharedPreferences.edit()) and then commit changes (Editor.commit()).
700      * @param mode Operating mode.  Use 0 or {@link #MODE_PRIVATE} for the
701      * default operation.
702      *
703      * @return The single {@link SharedPreferences} instance that can be used
704      *         to retrieve and modify the preference values.
705      *
706      * @see #getSharedPreferencesPath(String)
707      * @see #MODE_PRIVATE
708      * @removed
709      */
getSharedPreferences(File file, int mode)710     public abstract SharedPreferences getSharedPreferences(File file, int mode);
711 
712     /**
713      * Move an existing shared preferences file from the given source storage
714      * context to this context. This is typically used to migrate data between
715      * storage locations after an upgrade, such as moving to device protected
716      * storage.
717      *
718      * @param sourceContext The source context which contains the existing
719      *            shared preferences to move.
720      * @param name The name of the shared preferences file.
721      * @return {@code true} if the move was successful or if the shared
722      *         preferences didn't exist in the source context, otherwise
723      *         {@code false}.
724      * @see #createDeviceProtectedStorageContext()
725      */
moveSharedPreferencesFrom(Context sourceContext, String name)726     public abstract boolean moveSharedPreferencesFrom(Context sourceContext, String name);
727 
728     /** @removed */
729     @Deprecated
migrateSharedPreferencesFrom(Context sourceContext, String name)730     public boolean migrateSharedPreferencesFrom(Context sourceContext, String name) {
731         return moveSharedPreferencesFrom(sourceContext, name);
732     }
733 
734     /**
735      * Delete an existing shared preferences file.
736      *
737      * @param name The name (unique in the application package) of the shared
738      *            preferences file.
739      * @return {@code true} if the shared preferences file was successfully
740      *         deleted; else {@code false}.
741      * @see #getSharedPreferences(String, int)
742      */
deleteSharedPreferences(String name)743     public abstract boolean deleteSharedPreferences(String name);
744 
745     /**
746      * Open a private file associated with this Context's application package
747      * for reading.
748      *
749      * @param name The name of the file to open; can not contain path
750      *             separators.
751      *
752      * @return The resulting {@link FileInputStream}.
753      *
754      * @see #openFileOutput
755      * @see #fileList
756      * @see #deleteFile
757      * @see java.io.FileInputStream#FileInputStream(String)
758      */
openFileInput(String name)759     public abstract FileInputStream openFileInput(String name)
760         throws FileNotFoundException;
761 
762     /**
763      * Open a private file associated with this Context's application package
764      * for writing. Creates the file if it doesn't already exist.
765      * <p>
766      * No additional permissions are required for the calling app to read or
767      * write the returned file.
768      *
769      * @param name The name of the file to open; can not contain path
770      *            separators.
771      * @param mode Operating mode. Use 0 or {@link #MODE_PRIVATE} for the
772      *            default operation. Use {@link #MODE_APPEND} to append to an
773      *            existing file.
774      * @return The resulting {@link FileOutputStream}.
775      * @see #MODE_APPEND
776      * @see #MODE_PRIVATE
777      * @see #openFileInput
778      * @see #fileList
779      * @see #deleteFile
780      * @see java.io.FileOutputStream#FileOutputStream(String)
781      */
openFileOutput(String name, int mode)782     public abstract FileOutputStream openFileOutput(String name, int mode)
783         throws FileNotFoundException;
784 
785     /**
786      * Delete the given private file associated with this Context's
787      * application package.
788      *
789      * @param name The name of the file to delete; can not contain path
790      *             separators.
791      *
792      * @return {@code true} if the file was successfully deleted; else
793      *         {@code false}.
794      *
795      * @see #openFileInput
796      * @see #openFileOutput
797      * @see #fileList
798      * @see java.io.File#delete()
799      */
deleteFile(String name)800     public abstract boolean deleteFile(String name);
801 
802     /**
803      * Returns the absolute path on the filesystem where a file created with
804      * {@link #openFileOutput} is stored.
805      * <p>
806      * The returned path may change over time if the calling app is moved to an
807      * adopted storage device, so only relative paths should be persisted.
808      *
809      * @param name The name of the file for which you would like to get
810      *          its path.
811      *
812      * @return An absolute path to the given file.
813      *
814      * @see #openFileOutput
815      * @see #getFilesDir
816      * @see #getDir
817      */
getFileStreamPath(String name)818     public abstract File getFileStreamPath(String name);
819 
820     /**
821      * Returns the absolute path on the filesystem where a file created with
822      * {@link #getSharedPreferences(String, int)} is stored.
823      * <p>
824      * The returned path may change over time if the calling app is moved to an
825      * adopted storage device, so only relative paths should be persisted.
826      *
827      * @param name The name of the shared preferences for which you would like
828      *            to get a path.
829      * @return An absolute path to the given file.
830      * @see #getSharedPreferences(String, int)
831      * @removed
832      */
getSharedPreferencesPath(String name)833     public abstract File getSharedPreferencesPath(String name);
834 
835     /**
836      * Returns the absolute path to the directory on the filesystem where all
837      * private files belonging to this app are stored. Apps should not use this
838      * path directly; they should instead use {@link #getFilesDir()},
839      * {@link #getCacheDir()}, {@link #getDir(String, int)}, or other storage
840      * APIs on this class.
841      * <p>
842      * The returned path may change over time if the calling app is moved to an
843      * adopted storage device, so only relative paths should be persisted.
844      * <p>
845      * No additional permissions are required for the calling app to read or
846      * write files under the returned path.
847      *
848      * @see ApplicationInfo#dataDir
849      */
getDataDir()850     public abstract File getDataDir();
851 
852     /**
853      * Returns the absolute path to the directory on the filesystem where files
854      * created with {@link #openFileOutput} are stored.
855      * <p>
856      * The returned path may change over time if the calling app is moved to an
857      * adopted storage device, so only relative paths should be persisted.
858      * <p>
859      * No additional permissions are required for the calling app to read or
860      * write files under the returned path.
861      *
862      * @return The path of the directory holding application files.
863      * @see #openFileOutput
864      * @see #getFileStreamPath
865      * @see #getDir
866      */
getFilesDir()867     public abstract File getFilesDir();
868 
869     /**
870      * Returns the absolute path to the directory on the filesystem similar to
871      * {@link #getFilesDir()}. The difference is that files placed under this
872      * directory will be excluded from automatic backup to remote storage. See
873      * {@link android.app.backup.BackupAgent BackupAgent} for a full discussion
874      * of the automatic backup mechanism in Android.
875      * <p>
876      * The returned path may change over time if the calling app is moved to an
877      * adopted storage device, so only relative paths should be persisted.
878      * <p>
879      * No additional permissions are required for the calling app to read or
880      * write files under the returned path.
881      *
882      * @return The path of the directory holding application files that will not
883      *         be automatically backed up to remote storage.
884      * @see #openFileOutput
885      * @see #getFileStreamPath
886      * @see #getDir
887      * @see android.app.backup.BackupAgent
888      */
getNoBackupFilesDir()889     public abstract File getNoBackupFilesDir();
890 
891     /**
892      * Returns the absolute path to the directory on the primary shared/external
893      * storage device where the application can place persistent files it owns.
894      * These files are internal to the applications, and not typically visible
895      * to the user as media.
896      * <p>
897      * This is like {@link #getFilesDir()} in that these files will be deleted
898      * when the application is uninstalled, however there are some important
899      * differences:
900      * <ul>
901      * <li>Shared storage may not always be available, since removable media can
902      * be ejected by the user. Media state can be checked using
903      * {@link Environment#getExternalStorageState(File)}.
904      * <li>There is no security enforced with these files. For example, any
905      * application holding
906      * {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} can write to
907      * these files.
908      * </ul>
909      * <p>
910      * If a shared storage device is emulated (as determined by
911      * {@link Environment#isExternalStorageEmulated(File)}), it's contents are
912      * backed by a private user data partition, which means there is little
913      * benefit to storing data here instead of the private directories returned
914      * by {@link #getFilesDir()}, etc.
915      * <p>
916      * Starting in {@link android.os.Build.VERSION_CODES#KITKAT}, no permissions
917      * are required to read or write to the returned path; it's always
918      * accessible to the calling app. This only applies to paths generated for
919      * package name of the calling application. To access paths belonging to
920      * other packages,
921      * {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} and/or
922      * {@link android.Manifest.permission#READ_EXTERNAL_STORAGE} are required.
923      * <p>
924      * On devices with multiple users (as described by {@link UserManager}),
925      * each user has their own isolated shared storage. Applications only have
926      * access to the shared storage for the user they're running as.
927      * <p>
928      * The returned path may change over time if different shared storage media
929      * is inserted, so only relative paths should be persisted.
930      * <p>
931      * Here is an example of typical code to manipulate a file in an
932      * application's shared storage:
933      * </p>
934      * {@sample development/samples/ApiDemos/src/com/example/android/apis/content/ExternalStorage.java
935      * private_file}
936      * <p>
937      * If you supply a non-null <var>type</var> to this function, the returned
938      * file will be a path to a sub-directory of the given type. Though these
939      * files are not automatically scanned by the media scanner, you can
940      * explicitly add them to the media database with
941      * {@link android.media.MediaScannerConnection#scanFile(Context, String[], String[], android.media.MediaScannerConnection.OnScanCompletedListener)
942      * MediaScannerConnection.scanFile}. Note that this is not the same as
943      * {@link android.os.Environment#getExternalStoragePublicDirectory
944      * Environment.getExternalStoragePublicDirectory()}, which provides
945      * directories of media shared by all applications. The directories returned
946      * here are owned by the application, and their contents will be removed
947      * when the application is uninstalled. Unlike
948      * {@link android.os.Environment#getExternalStoragePublicDirectory
949      * Environment.getExternalStoragePublicDirectory()}, the directory returned
950      * here will be automatically created for you.
951      * <p>
952      * Here is an example of typical code to manipulate a picture in an
953      * application's shared storage and add it to the media database:
954      * </p>
955      * {@sample development/samples/ApiDemos/src/com/example/android/apis/content/ExternalStorage.java
956      * private_picture}
957      *
958      * @param type The type of files directory to return. May be {@code null}
959      *            for the root of the files directory or one of the following
960      *            constants for a subdirectory:
961      *            {@link android.os.Environment#DIRECTORY_MUSIC},
962      *            {@link android.os.Environment#DIRECTORY_PODCASTS},
963      *            {@link android.os.Environment#DIRECTORY_RINGTONES},
964      *            {@link android.os.Environment#DIRECTORY_ALARMS},
965      *            {@link android.os.Environment#DIRECTORY_NOTIFICATIONS},
966      *            {@link android.os.Environment#DIRECTORY_PICTURES}, or
967      *            {@link android.os.Environment#DIRECTORY_MOVIES}.
968      * @return the absolute path to application-specific directory. May return
969      *         {@code null} if shared storage is not currently available.
970      * @see #getFilesDir
971      * @see #getExternalFilesDirs(String)
972      * @see Environment#getExternalStorageState(File)
973      * @see Environment#isExternalStorageEmulated(File)
974      * @see Environment#isExternalStorageRemovable(File)
975      */
976     @Nullable
getExternalFilesDir(@ullable String type)977     public abstract File getExternalFilesDir(@Nullable String type);
978 
979     /**
980      * Returns absolute paths to application-specific directories on all
981      * shared/external storage devices where the application can place
982      * persistent files it owns. These files are internal to the application,
983      * and not typically visible to the user as media.
984      * <p>
985      * This is like {@link #getFilesDir()} in that these files will be deleted
986      * when the application is uninstalled, however there are some important
987      * differences:
988      * <ul>
989      * <li>Shared storage may not always be available, since removable media can
990      * be ejected by the user. Media state can be checked using
991      * {@link Environment#getExternalStorageState(File)}.
992      * <li>There is no security enforced with these files. For example, any
993      * application holding
994      * {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} can write to
995      * these files.
996      * </ul>
997      * <p>
998      * If a shared storage device is emulated (as determined by
999      * {@link Environment#isExternalStorageEmulated(File)}), it's contents are
1000      * backed by a private user data partition, which means there is little
1001      * benefit to storing data here instead of the private directories returned
1002      * by {@link #getFilesDir()}, etc.
1003      * <p>
1004      * Shared storage devices returned here are considered a stable part of the
1005      * device, including physical media slots under a protective cover. The
1006      * returned paths do not include transient devices, such as USB flash drives
1007      * connected to handheld devices.
1008      * <p>
1009      * An application may store data on any or all of the returned devices. For
1010      * example, an app may choose to store large files on the device with the
1011      * most available space, as measured by {@link StatFs}.
1012      * <p>
1013      * No additional permissions are required for the calling app to read or
1014      * write files under the returned path. Write access outside of these paths
1015      * on secondary external storage devices is not available.
1016      * <p>
1017      * The returned path may change over time if different shared storage media
1018      * is inserted, so only relative paths should be persisted.
1019      *
1020      * @param type The type of files directory to return. May be {@code null}
1021      *            for the root of the files directory or one of the following
1022      *            constants for a subdirectory:
1023      *            {@link android.os.Environment#DIRECTORY_MUSIC},
1024      *            {@link android.os.Environment#DIRECTORY_PODCASTS},
1025      *            {@link android.os.Environment#DIRECTORY_RINGTONES},
1026      *            {@link android.os.Environment#DIRECTORY_ALARMS},
1027      *            {@link android.os.Environment#DIRECTORY_NOTIFICATIONS},
1028      *            {@link android.os.Environment#DIRECTORY_PICTURES}, or
1029      *            {@link android.os.Environment#DIRECTORY_MOVIES}.
1030      * @return the absolute paths to application-specific directories. Some
1031      *         individual paths may be {@code null} if that shared storage is
1032      *         not currently available. The first path returned is the same as
1033      *         {@link #getExternalFilesDir(String)}.
1034      * @see #getExternalFilesDir(String)
1035      * @see Environment#getExternalStorageState(File)
1036      * @see Environment#isExternalStorageEmulated(File)
1037      * @see Environment#isExternalStorageRemovable(File)
1038      */
getExternalFilesDirs(String type)1039     public abstract File[] getExternalFilesDirs(String type);
1040 
1041     /**
1042      * Return the primary shared/external storage directory where this
1043      * application's OBB files (if there are any) can be found. Note if the
1044      * application does not have any OBB files, this directory may not exist.
1045      * <p>
1046      * This is like {@link #getFilesDir()} in that these files will be deleted
1047      * when the application is uninstalled, however there are some important
1048      * differences:
1049      * <ul>
1050      * <li>Shared storage may not always be available, since removable media can
1051      * be ejected by the user. Media state can be checked using
1052      * {@link Environment#getExternalStorageState(File)}.
1053      * <li>There is no security enforced with these files. For example, any
1054      * application holding
1055      * {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} can write to
1056      * these files.
1057      * </ul>
1058      * <p>
1059      * Starting in {@link android.os.Build.VERSION_CODES#KITKAT}, no permissions
1060      * are required to read or write to the returned path; it's always
1061      * accessible to the calling app. This only applies to paths generated for
1062      * package name of the calling application. To access paths belonging to
1063      * other packages,
1064      * {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} and/or
1065      * {@link android.Manifest.permission#READ_EXTERNAL_STORAGE} are required.
1066      * <p>
1067      * On devices with multiple users (as described by {@link UserManager}),
1068      * multiple users may share the same OBB storage location. Applications
1069      * should ensure that multiple instances running under different users don't
1070      * interfere with each other.
1071      *
1072      * @return the absolute path to application-specific directory. May return
1073      *         {@code null} if shared storage is not currently available.
1074      * @see #getObbDirs()
1075      * @see Environment#getExternalStorageState(File)
1076      * @see Environment#isExternalStorageEmulated(File)
1077      * @see Environment#isExternalStorageRemovable(File)
1078      */
getObbDir()1079     public abstract File getObbDir();
1080 
1081     /**
1082      * Returns absolute paths to application-specific directories on all
1083      * shared/external storage devices where the application's OBB files (if
1084      * there are any) can be found. Note if the application does not have any
1085      * OBB files, these directories may not exist.
1086      * <p>
1087      * This is like {@link #getFilesDir()} in that these files will be deleted
1088      * when the application is uninstalled, however there are some important
1089      * differences:
1090      * <ul>
1091      * <li>Shared storage may not always be available, since removable media can
1092      * be ejected by the user. Media state can be checked using
1093      * {@link Environment#getExternalStorageState(File)}.
1094      * <li>There is no security enforced with these files. For example, any
1095      * application holding
1096      * {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} can write to
1097      * these files.
1098      * </ul>
1099      * <p>
1100      * Shared storage devices returned here are considered a stable part of the
1101      * device, including physical media slots under a protective cover. The
1102      * returned paths do not include transient devices, such as USB flash drives
1103      * connected to handheld devices.
1104      * <p>
1105      * An application may store data on any or all of the returned devices. For
1106      * example, an app may choose to store large files on the device with the
1107      * most available space, as measured by {@link StatFs}.
1108      * <p>
1109      * No additional permissions are required for the calling app to read or
1110      * write files under the returned path. Write access outside of these paths
1111      * on secondary external storage devices is not available.
1112      *
1113      * @return the absolute paths to application-specific directories. Some
1114      *         individual paths may be {@code null} if that shared storage is
1115      *         not currently available. The first path returned is the same as
1116      *         {@link #getObbDir()}
1117      * @see #getObbDir()
1118      * @see Environment#getExternalStorageState(File)
1119      * @see Environment#isExternalStorageEmulated(File)
1120      * @see Environment#isExternalStorageRemovable(File)
1121      */
getObbDirs()1122     public abstract File[] getObbDirs();
1123 
1124     /**
1125      * Returns the absolute path to the application specific cache directory on
1126      * the filesystem. These files will be ones that get deleted first when the
1127      * device runs low on storage. There is no guarantee when these files will
1128      * be deleted.
1129      * <p>
1130      * <strong>Note: you should not <em>rely</em> on the system deleting these
1131      * files for you; you should always have a reasonable maximum, such as 1 MB,
1132      * for the amount of space you consume with cache files, and prune those
1133      * files when exceeding that space.</strong>
1134      * <p>
1135      * The returned path may change over time if the calling app is moved to an
1136      * adopted storage device, so only relative paths should be persisted.
1137      * <p>
1138      * Apps require no extra permissions to read or write to the returned path,
1139      * since this path lives in their private storage.
1140      *
1141      * @return The path of the directory holding application cache files.
1142      * @see #openFileOutput
1143      * @see #getFileStreamPath
1144      * @see #getDir
1145      */
getCacheDir()1146     public abstract File getCacheDir();
1147 
1148     /**
1149      * Returns the absolute path to the application specific cache directory on
1150      * the filesystem designed for storing cached code. The system will delete
1151      * any files stored in this location both when your specific application is
1152      * upgraded, and when the entire platform is upgraded.
1153      * <p>
1154      * This location is optimal for storing compiled or optimized code generated
1155      * by your application at runtime.
1156      * <p>
1157      * The returned path may change over time if the calling app is moved to an
1158      * adopted storage device, so only relative paths should be persisted.
1159      * <p>
1160      * Apps require no extra permissions to read or write to the returned path,
1161      * since this path lives in their private storage.
1162      *
1163      * @return The path of the directory holding application code cache files.
1164      */
getCodeCacheDir()1165     public abstract File getCodeCacheDir();
1166 
1167     /**
1168      * Returns absolute path to application-specific directory on the primary
1169      * shared/external storage device where the application can place cache
1170      * files it owns. These files are internal to the application, and not
1171      * typically visible to the user as media.
1172      * <p>
1173      * This is like {@link #getCacheDir()} in that these files will be deleted
1174      * when the application is uninstalled, however there are some important
1175      * differences:
1176      * <ul>
1177      * <li>The platform does not always monitor the space available in shared
1178      * storage, and thus may not automatically delete these files. Apps should
1179      * always manage the maximum space used in this location. Currently the only
1180      * time files here will be deleted by the platform is when running on
1181      * {@link android.os.Build.VERSION_CODES#JELLY_BEAN_MR1} or later and
1182      * {@link Environment#isExternalStorageEmulated(File)} returns true.
1183      * <li>Shared storage may not always be available, since removable media can
1184      * be ejected by the user. Media state can be checked using
1185      * {@link Environment#getExternalStorageState(File)}.
1186      * <li>There is no security enforced with these files. For example, any
1187      * application holding
1188      * {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} can write to
1189      * these files.
1190      * </ul>
1191      * <p>
1192      * If a shared storage device is emulated (as determined by
1193      * {@link Environment#isExternalStorageEmulated(File)}), it's contents are
1194      * backed by a private user data partition, which means there is little
1195      * benefit to storing data here instead of the private directory returned by
1196      * {@link #getCacheDir()}.
1197      * <p>
1198      * Starting in {@link android.os.Build.VERSION_CODES#KITKAT}, no permissions
1199      * are required to read or write to the returned path; it's always
1200      * accessible to the calling app. This only applies to paths generated for
1201      * package name of the calling application. To access paths belonging to
1202      * other packages,
1203      * {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} and/or
1204      * {@link android.Manifest.permission#READ_EXTERNAL_STORAGE} are required.
1205      * <p>
1206      * On devices with multiple users (as described by {@link UserManager}),
1207      * each user has their own isolated shared storage. Applications only have
1208      * access to the shared storage for the user they're running as.
1209      * <p>
1210      * The returned path may change over time if different shared storage media
1211      * is inserted, so only relative paths should be persisted.
1212      *
1213      * @return the absolute path to application-specific directory. May return
1214      *         {@code null} if shared storage is not currently available.
1215      * @see #getCacheDir
1216      * @see #getExternalCacheDirs()
1217      * @see Environment#getExternalStorageState(File)
1218      * @see Environment#isExternalStorageEmulated(File)
1219      * @see Environment#isExternalStorageRemovable(File)
1220      */
1221     @Nullable
getExternalCacheDir()1222     public abstract File getExternalCacheDir();
1223 
1224     /**
1225      * Returns absolute paths to application-specific directories on all
1226      * shared/external storage devices where the application can place cache
1227      * files it owns. These files are internal to the application, and not
1228      * typically visible to the user as media.
1229      * <p>
1230      * This is like {@link #getCacheDir()} in that these files will be deleted
1231      * when the application is uninstalled, however there are some important
1232      * differences:
1233      * <ul>
1234      * <li>The platform does not always monitor the space available in shared
1235      * storage, and thus may not automatically delete these files. Apps should
1236      * always manage the maximum space used in this location. Currently the only
1237      * time files here will be deleted by the platform is when running on
1238      * {@link android.os.Build.VERSION_CODES#JELLY_BEAN_MR1} or later and
1239      * {@link Environment#isExternalStorageEmulated(File)} returns true.
1240      * <li>Shared storage may not always be available, since removable media can
1241      * be ejected by the user. Media state can be checked using
1242      * {@link Environment#getExternalStorageState(File)}.
1243      * <li>There is no security enforced with these files. For example, any
1244      * application holding
1245      * {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} can write to
1246      * these files.
1247      * </ul>
1248      * <p>
1249      * If a shared storage device is emulated (as determined by
1250      * {@link Environment#isExternalStorageEmulated(File)}), it's contents are
1251      * backed by a private user data partition, which means there is little
1252      * benefit to storing data here instead of the private directory returned by
1253      * {@link #getCacheDir()}.
1254      * <p>
1255      * Shared storage devices returned here are considered a stable part of the
1256      * device, including physical media slots under a protective cover. The
1257      * returned paths do not include transient devices, such as USB flash drives
1258      * connected to handheld devices.
1259      * <p>
1260      * An application may store data on any or all of the returned devices. For
1261      * example, an app may choose to store large files on the device with the
1262      * most available space, as measured by {@link StatFs}.
1263      * <p>
1264      * No additional permissions are required for the calling app to read or
1265      * write files under the returned path. Write access outside of these paths
1266      * on secondary external storage devices is not available.
1267      * <p>
1268      * The returned paths may change over time if different shared storage media
1269      * is inserted, so only relative paths should be persisted.
1270      *
1271      * @return the absolute paths to application-specific directories. Some
1272      *         individual paths may be {@code null} if that shared storage is
1273      *         not currently available. The first path returned is the same as
1274      *         {@link #getExternalCacheDir()}.
1275      * @see #getExternalCacheDir()
1276      * @see Environment#getExternalStorageState(File)
1277      * @see Environment#isExternalStorageEmulated(File)
1278      * @see Environment#isExternalStorageRemovable(File)
1279      */
getExternalCacheDirs()1280     public abstract File[] getExternalCacheDirs();
1281 
1282     /**
1283      * Returns absolute paths to application-specific directories on all
1284      * shared/external storage devices where the application can place media
1285      * files. These files are scanned and made available to other apps through
1286      * {@link MediaStore}.
1287      * <p>
1288      * This is like {@link #getExternalFilesDirs} in that these files will be
1289      * deleted when the application is uninstalled, however there are some
1290      * important differences:
1291      * <ul>
1292      * <li>Shared storage may not always be available, since removable media can
1293      * be ejected by the user. Media state can be checked using
1294      * {@link Environment#getExternalStorageState(File)}.
1295      * <li>There is no security enforced with these files. For example, any
1296      * application holding
1297      * {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} can write to
1298      * these files.
1299      * </ul>
1300      * <p>
1301      * Shared storage devices returned here are considered a stable part of the
1302      * device, including physical media slots under a protective cover. The
1303      * returned paths do not include transient devices, such as USB flash drives
1304      * connected to handheld devices.
1305      * <p>
1306      * An application may store data on any or all of the returned devices. For
1307      * example, an app may choose to store large files on the device with the
1308      * most available space, as measured by {@link StatFs}.
1309      * <p>
1310      * No additional permissions are required for the calling app to read or
1311      * write files under the returned path. Write access outside of these paths
1312      * on secondary external storage devices is not available.
1313      * <p>
1314      * The returned paths may change over time if different shared storage media
1315      * is inserted, so only relative paths should be persisted.
1316      *
1317      * @return the absolute paths to application-specific directories. Some
1318      *         individual paths may be {@code null} if that shared storage is
1319      *         not currently available.
1320      * @see Environment#getExternalStorageState(File)
1321      * @see Environment#isExternalStorageEmulated(File)
1322      * @see Environment#isExternalStorageRemovable(File)
1323      */
getExternalMediaDirs()1324     public abstract File[] getExternalMediaDirs();
1325 
1326     /**
1327      * Returns an array of strings naming the private files associated with
1328      * this Context's application package.
1329      *
1330      * @return Array of strings naming the private files.
1331      *
1332      * @see #openFileInput
1333      * @see #openFileOutput
1334      * @see #deleteFile
1335      */
fileList()1336     public abstract String[] fileList();
1337 
1338     /**
1339      * Retrieve, creating if needed, a new directory in which the application
1340      * can place its own custom data files.  You can use the returned File
1341      * object to create and access files in this directory.  Note that files
1342      * created through a File object will only be accessible by your own
1343      * application; you can only set the mode of the entire directory, not
1344      * of individual files.
1345      * <p>
1346      * The returned path may change over time if the calling app is moved to an
1347      * adopted storage device, so only relative paths should be persisted.
1348      * <p>
1349      * Apps require no extra permissions to read or write to the returned path,
1350      * since this path lives in their private storage.
1351      *
1352      * @param name Name of the directory to retrieve.  This is a directory
1353      * that is created as part of your application data.
1354      * @param mode Operating mode.  Use 0 or {@link #MODE_PRIVATE} for the
1355      * default operation.
1356      *
1357      * @return A {@link File} object for the requested directory.  The directory
1358      * will have been created if it does not already exist.
1359      *
1360      * @see #openFileOutput(String, int)
1361      */
getDir(String name, int mode)1362     public abstract File getDir(String name, int mode);
1363 
1364     /**
1365      * Open a new private SQLiteDatabase associated with this Context's
1366      * application package. Create the database file if it doesn't exist.
1367      *
1368      * @param name The name (unique in the application package) of the database.
1369      * @param mode Operating mode. Use 0 or {@link #MODE_PRIVATE} for the
1370      *            default operation. Use
1371      *            {@link #MODE_ENABLE_WRITE_AHEAD_LOGGING} to enable write-ahead
1372      *            logging by default. Use {@link #MODE_NO_LOCALIZED_COLLATORS}
1373      *            to disable localized collators.
1374      * @param factory An optional factory class that is called to instantiate a
1375      *            cursor when query is called.
1376      * @return The contents of a newly created database with the given name.
1377      * @throws android.database.sqlite.SQLiteException if the database file
1378      *             could not be opened.
1379      * @see #MODE_PRIVATE
1380      * @see #MODE_ENABLE_WRITE_AHEAD_LOGGING
1381      * @see #MODE_NO_LOCALIZED_COLLATORS
1382      * @see #deleteDatabase
1383      */
openOrCreateDatabase(String name, int mode, CursorFactory factory)1384     public abstract SQLiteDatabase openOrCreateDatabase(String name,
1385             int mode, CursorFactory factory);
1386 
1387     /**
1388      * Open a new private SQLiteDatabase associated with this Context's
1389      * application package. Creates the database file if it doesn't exist.
1390      * <p>
1391      * Accepts input param: a concrete instance of {@link DatabaseErrorHandler}
1392      * to be used to handle corruption when sqlite reports database corruption.
1393      * </p>
1394      *
1395      * @param name The name (unique in the application package) of the database.
1396      * @param mode Operating mode. Use 0 or {@link #MODE_PRIVATE} for the
1397      *            default operation. Use
1398      *            {@link #MODE_ENABLE_WRITE_AHEAD_LOGGING} to enable write-ahead
1399      *            logging by default. Use {@link #MODE_NO_LOCALIZED_COLLATORS}
1400      *            to disable localized collators.
1401      * @param factory An optional factory class that is called to instantiate a
1402      *            cursor when query is called.
1403      * @param errorHandler the {@link DatabaseErrorHandler} to be used when
1404      *            sqlite reports database corruption. if null,
1405      *            {@link android.database.DefaultDatabaseErrorHandler} is
1406      *            assumed.
1407      * @return The contents of a newly created database with the given name.
1408      * @throws android.database.sqlite.SQLiteException if the database file
1409      *             could not be opened.
1410      * @see #MODE_PRIVATE
1411      * @see #MODE_ENABLE_WRITE_AHEAD_LOGGING
1412      * @see #MODE_NO_LOCALIZED_COLLATORS
1413      * @see #deleteDatabase
1414      */
openOrCreateDatabase(String name, int mode, CursorFactory factory, @Nullable DatabaseErrorHandler errorHandler)1415     public abstract SQLiteDatabase openOrCreateDatabase(String name,
1416             int mode, CursorFactory factory,
1417             @Nullable DatabaseErrorHandler errorHandler);
1418 
1419     /**
1420      * Move an existing database file from the given source storage context to
1421      * this context. This is typically used to migrate data between storage
1422      * locations after an upgrade, such as migrating to device protected
1423      * storage.
1424      * <p>
1425      * The database must be closed before being moved.
1426      *
1427      * @param sourceContext The source context which contains the existing
1428      *            database to move.
1429      * @param name The name of the database file.
1430      * @return {@code true} if the move was successful or if the database didn't
1431      *         exist in the source context, otherwise {@code false}.
1432      * @see #createDeviceProtectedStorageContext()
1433      */
moveDatabaseFrom(Context sourceContext, String name)1434     public abstract boolean moveDatabaseFrom(Context sourceContext, String name);
1435 
1436     /** @removed */
1437     @Deprecated
migrateDatabaseFrom(Context sourceContext, String name)1438     public boolean migrateDatabaseFrom(Context sourceContext, String name) {
1439         return moveDatabaseFrom(sourceContext, name);
1440     }
1441 
1442     /**
1443      * Delete an existing private SQLiteDatabase associated with this Context's
1444      * application package.
1445      *
1446      * @param name The name (unique in the application package) of the
1447      *             database.
1448      *
1449      * @return {@code true} if the database was successfully deleted; else {@code false}.
1450      *
1451      * @see #openOrCreateDatabase
1452      */
deleteDatabase(String name)1453     public abstract boolean deleteDatabase(String name);
1454 
1455     /**
1456      * Returns the absolute path on the filesystem where a database created with
1457      * {@link #openOrCreateDatabase} is stored.
1458      * <p>
1459      * The returned path may change over time if the calling app is moved to an
1460      * adopted storage device, so only relative paths should be persisted.
1461      *
1462      * @param name The name of the database for which you would like to get
1463      *          its path.
1464      *
1465      * @return An absolute path to the given database.
1466      *
1467      * @see #openOrCreateDatabase
1468      */
getDatabasePath(String name)1469     public abstract File getDatabasePath(String name);
1470 
1471     /**
1472      * Returns an array of strings naming the private databases associated with
1473      * this Context's application package.
1474      *
1475      * @return Array of strings naming the private databases.
1476      *
1477      * @see #openOrCreateDatabase
1478      * @see #deleteDatabase
1479      */
databaseList()1480     public abstract String[] databaseList();
1481 
1482     /**
1483      * @deprecated Use {@link android.app.WallpaperManager#getDrawable
1484      * WallpaperManager.get()} instead.
1485      */
1486     @Deprecated
getWallpaper()1487     public abstract Drawable getWallpaper();
1488 
1489     /**
1490      * @deprecated Use {@link android.app.WallpaperManager#peekDrawable
1491      * WallpaperManager.peek()} instead.
1492      */
1493     @Deprecated
peekWallpaper()1494     public abstract Drawable peekWallpaper();
1495 
1496     /**
1497      * @deprecated Use {@link android.app.WallpaperManager#getDesiredMinimumWidth()
1498      * WallpaperManager.getDesiredMinimumWidth()} instead.
1499      */
1500     @Deprecated
getWallpaperDesiredMinimumWidth()1501     public abstract int getWallpaperDesiredMinimumWidth();
1502 
1503     /**
1504      * @deprecated Use {@link android.app.WallpaperManager#getDesiredMinimumHeight()
1505      * WallpaperManager.getDesiredMinimumHeight()} instead.
1506      */
1507     @Deprecated
getWallpaperDesiredMinimumHeight()1508     public abstract int getWallpaperDesiredMinimumHeight();
1509 
1510     /**
1511      * @deprecated Use {@link android.app.WallpaperManager#setBitmap(Bitmap)
1512      * WallpaperManager.set()} instead.
1513      * <p>This method requires the caller to hold the permission
1514      * {@link android.Manifest.permission#SET_WALLPAPER}.
1515      */
1516     @Deprecated
setWallpaper(Bitmap bitmap)1517     public abstract void setWallpaper(Bitmap bitmap) throws IOException;
1518 
1519     /**
1520      * @deprecated Use {@link android.app.WallpaperManager#setStream(InputStream)
1521      * WallpaperManager.set()} instead.
1522      * <p>This method requires the caller to hold the permission
1523      * {@link android.Manifest.permission#SET_WALLPAPER}.
1524      */
1525     @Deprecated
setWallpaper(InputStream data)1526     public abstract void setWallpaper(InputStream data) throws IOException;
1527 
1528     /**
1529      * @deprecated Use {@link android.app.WallpaperManager#clear
1530      * WallpaperManager.clear()} instead.
1531      * <p>This method requires the caller to hold the permission
1532      * {@link android.Manifest.permission#SET_WALLPAPER}.
1533      */
1534     @Deprecated
clearWallpaper()1535     public abstract void clearWallpaper() throws IOException;
1536 
1537     /**
1538      * Same as {@link #startActivity(Intent, Bundle)} with no options
1539      * specified.
1540      *
1541      * @param intent The description of the activity to start.
1542      *
1543      * @throws ActivityNotFoundException &nbsp;
1544      *`
1545      * @see #startActivity(Intent, Bundle)
1546      * @see PackageManager#resolveActivity
1547      */
startActivity(@equiresPermission Intent intent)1548     public abstract void startActivity(@RequiresPermission Intent intent);
1549 
1550     /**
1551      * Version of {@link #startActivity(Intent)} that allows you to specify the
1552      * user the activity will be started for.  This is not available to applications
1553      * that are not pre-installed on the system image.  Using it requires holding
1554      * the INTERACT_ACROSS_USERS_FULL permission.
1555      * @param intent The description of the activity to start.
1556      * @param user The UserHandle of the user to start this activity for.
1557      * @throws ActivityNotFoundException &nbsp;
1558      * @hide
1559      */
startActivityAsUser(@equiresPermission Intent intent, UserHandle user)1560     public void startActivityAsUser(@RequiresPermission Intent intent, UserHandle user) {
1561         throw new RuntimeException("Not implemented. Must override in a subclass.");
1562     }
1563 
1564     /**
1565      * Launch a new activity.  You will not receive any information about when
1566      * the activity exits.
1567      *
1568      * <p>Note that if this method is being called from outside of an
1569      * {@link android.app.Activity} Context, then the Intent must include
1570      * the {@link Intent#FLAG_ACTIVITY_NEW_TASK} launch flag.  This is because,
1571      * without being started from an existing Activity, there is no existing
1572      * task in which to place the new activity and thus it needs to be placed
1573      * in its own separate task.
1574      *
1575      * <p>This method throws {@link ActivityNotFoundException}
1576      * if there was no Activity found to run the given Intent.
1577      *
1578      * @param intent The description of the activity to start.
1579      * @param options Additional options for how the Activity should be started.
1580      * May be null if there are no options.  See {@link android.app.ActivityOptions}
1581      * for how to build the Bundle supplied here; there are no supported definitions
1582      * for building it manually.
1583      *
1584      * @throws ActivityNotFoundException &nbsp;
1585      *
1586      * @see #startActivity(Intent)
1587      * @see PackageManager#resolveActivity
1588      */
startActivity(@equiresPermission Intent intent, @Nullable Bundle options)1589     public abstract void startActivity(@RequiresPermission Intent intent,
1590             @Nullable Bundle options);
1591 
1592     /**
1593      * Version of {@link #startActivity(Intent, Bundle)} that allows you to specify the
1594      * user the activity will be started for.  This is not available to applications
1595      * that are not pre-installed on the system image.  Using it requires holding
1596      * the INTERACT_ACROSS_USERS_FULL permission.
1597      * @param intent The description of the activity to start.
1598      * @param options Additional options for how the Activity should be started.
1599      * May be null if there are no options.  See {@link android.app.ActivityOptions}
1600      * for how to build the Bundle supplied here; there are no supported definitions
1601      * for building it manually.
1602      * @param userId The UserHandle of the user to start this activity for.
1603      * @throws ActivityNotFoundException &nbsp;
1604      * @hide
1605      */
startActivityAsUser(@equiresPermission Intent intent, @Nullable Bundle options, UserHandle userId)1606     public void startActivityAsUser(@RequiresPermission Intent intent, @Nullable Bundle options,
1607             UserHandle userId) {
1608         throw new RuntimeException("Not implemented. Must override in a subclass.");
1609     }
1610 
1611     /**
1612      * Version of {@link #startActivity(Intent, Bundle)} that returns a result to the caller. This
1613      * is only supported for Views and Fragments.
1614      * @param who The identifier for the calling element that will receive the result.
1615      * @param intent The intent to start.
1616      * @param requestCode The code that will be returned with onActivityResult() identifying this
1617      *          request.
1618      * @param options Additional options for how the Activity should be started.
1619      *          May be null if there are no options.  See {@link android.app.ActivityOptions}
1620      *          for how to build the Bundle supplied here; there are no supported definitions
1621      *          for building it manually.
1622      * @hide
1623      */
startActivityForResult( @onNull String who, Intent intent, int requestCode, @Nullable Bundle options)1624     public void startActivityForResult(
1625             @NonNull String who, Intent intent, int requestCode, @Nullable Bundle options) {
1626         throw new RuntimeException("This method is only implemented for Activity-based Contexts. "
1627                 + "Check canStartActivityForResult() before calling.");
1628     }
1629 
1630     /**
1631      * Identifies whether this Context instance will be able to process calls to
1632      * {@link #startActivityForResult(String, Intent, int, Bundle)}.
1633      * @hide
1634      */
canStartActivityForResult()1635     public boolean canStartActivityForResult() {
1636         return false;
1637     }
1638 
1639     /**
1640      * Same as {@link #startActivities(Intent[], Bundle)} with no options
1641      * specified.
1642      *
1643      * @param intents An array of Intents to be started.
1644      *
1645      * @throws ActivityNotFoundException &nbsp;
1646      *
1647      * @see #startActivities(Intent[], Bundle)
1648      * @see PackageManager#resolveActivity
1649      */
startActivities(@equiresPermission Intent[] intents)1650     public abstract void startActivities(@RequiresPermission Intent[] intents);
1651 
1652     /**
1653      * Launch multiple new activities.  This is generally the same as calling
1654      * {@link #startActivity(Intent)} for the first Intent in the array,
1655      * that activity during its creation calling {@link #startActivity(Intent)}
1656      * for the second entry, etc.  Note that unlike that approach, generally
1657      * none of the activities except the last in the array will be created
1658      * at this point, but rather will be created when the user first visits
1659      * them (due to pressing back from the activity on top).
1660      *
1661      * <p>This method throws {@link ActivityNotFoundException}
1662      * if there was no Activity found for <em>any</em> given Intent.  In this
1663      * case the state of the activity stack is undefined (some Intents in the
1664      * list may be on it, some not), so you probably want to avoid such situations.
1665      *
1666      * @param intents An array of Intents to be started.
1667      * @param options Additional options for how the Activity should be started.
1668      * See {@link android.content.Context#startActivity(Intent, Bundle)
1669      * Context.startActivity(Intent, Bundle)} for more details.
1670      *
1671      * @throws ActivityNotFoundException &nbsp;
1672      *
1673      * @see #startActivities(Intent[])
1674      * @see PackageManager#resolveActivity
1675      */
startActivities(@equiresPermission Intent[] intents, Bundle options)1676     public abstract void startActivities(@RequiresPermission Intent[] intents, Bundle options);
1677 
1678     /**
1679      * @hide
1680      * Launch multiple new activities.  This is generally the same as calling
1681      * {@link #startActivity(Intent)} for the first Intent in the array,
1682      * that activity during its creation calling {@link #startActivity(Intent)}
1683      * for the second entry, etc.  Note that unlike that approach, generally
1684      * none of the activities except the last in the array will be created
1685      * at this point, but rather will be created when the user first visits
1686      * them (due to pressing back from the activity on top).
1687      *
1688      * <p>This method throws {@link ActivityNotFoundException}
1689      * if there was no Activity found for <em>any</em> given Intent.  In this
1690      * case the state of the activity stack is undefined (some Intents in the
1691      * list may be on it, some not), so you probably want to avoid such situations.
1692      *
1693      * @param intents An array of Intents to be started.
1694      * @param options Additional options for how the Activity should be started.
1695      * @param userHandle The user for whom to launch the activities
1696      * See {@link android.content.Context#startActivity(Intent, Bundle)
1697      * Context.startActivity(Intent, Bundle)} for more details.
1698      *
1699      * @throws ActivityNotFoundException &nbsp;
1700      *
1701      * @see #startActivities(Intent[])
1702      * @see PackageManager#resolveActivity
1703      */
startActivitiesAsUser(Intent[] intents, Bundle options, UserHandle userHandle)1704     public void startActivitiesAsUser(Intent[] intents, Bundle options, UserHandle userHandle) {
1705         throw new RuntimeException("Not implemented. Must override in a subclass.");
1706     }
1707 
1708     /**
1709      * Same as {@link #startIntentSender(IntentSender, Intent, int, int, int, Bundle)}
1710      * with no options specified.
1711      *
1712      * @param intent The IntentSender to launch.
1713      * @param fillInIntent If non-null, this will be provided as the
1714      * intent parameter to {@link IntentSender#sendIntent}.
1715      * @param flagsMask Intent flags in the original IntentSender that you
1716      * would like to change.
1717      * @param flagsValues Desired values for any bits set in
1718      * <var>flagsMask</var>
1719      * @param extraFlags Always set to 0.
1720      *
1721      * @see #startActivity(Intent)
1722      * @see #startIntentSender(IntentSender, Intent, int, int, int, Bundle)
1723      */
startIntentSender(IntentSender intent, Intent fillInIntent, int flagsMask, int flagsValues, int extraFlags)1724     public abstract void startIntentSender(IntentSender intent,
1725             Intent fillInIntent, int flagsMask, int flagsValues, int extraFlags)
1726             throws IntentSender.SendIntentException;
1727 
1728     /**
1729      * Like {@link #startActivity(Intent, Bundle)}, but taking a IntentSender
1730      * to start.  If the IntentSender is for an activity, that activity will be started
1731      * as if you had called the regular {@link #startActivity(Intent)}
1732      * here; otherwise, its associated action will be executed (such as
1733      * sending a broadcast) as if you had called
1734      * {@link IntentSender#sendIntent IntentSender.sendIntent} on it.
1735      *
1736      * @param intent The IntentSender to launch.
1737      * @param fillInIntent If non-null, this will be provided as the
1738      * intent parameter to {@link IntentSender#sendIntent}.
1739      * @param flagsMask Intent flags in the original IntentSender that you
1740      * would like to change.
1741      * @param flagsValues Desired values for any bits set in
1742      * <var>flagsMask</var>
1743      * @param extraFlags Always set to 0.
1744      * @param options Additional options for how the Activity should be started.
1745      * See {@link android.content.Context#startActivity(Intent, Bundle)
1746      * Context.startActivity(Intent, Bundle)} for more details.  If options
1747      * have also been supplied by the IntentSender, options given here will
1748      * override any that conflict with those given by the IntentSender.
1749      *
1750      * @see #startActivity(Intent, Bundle)
1751      * @see #startIntentSender(IntentSender, Intent, int, int, int)
1752      */
startIntentSender(IntentSender intent, @Nullable Intent fillInIntent, int flagsMask, int flagsValues, int extraFlags, Bundle options)1753     public abstract void startIntentSender(IntentSender intent,
1754             @Nullable Intent fillInIntent, int flagsMask, int flagsValues, int extraFlags,
1755             Bundle options) throws IntentSender.SendIntentException;
1756 
1757     /**
1758      * Broadcast the given intent to all interested BroadcastReceivers.  This
1759      * call is asynchronous; it returns immediately, and you will continue
1760      * executing while the receivers are run.  No results are propagated from
1761      * receivers and receivers can not abort the broadcast. If you want
1762      * to allow receivers to propagate results or abort the broadcast, you must
1763      * send an ordered broadcast using
1764      * {@link #sendOrderedBroadcast(Intent, String)}.
1765      *
1766      * <p>See {@link BroadcastReceiver} for more information on Intent broadcasts.
1767      *
1768      * @param intent The Intent to broadcast; all receivers matching this
1769      *               Intent will receive the broadcast.
1770      *
1771      * @see android.content.BroadcastReceiver
1772      * @see #registerReceiver
1773      * @see #sendBroadcast(Intent, String)
1774      * @see #sendOrderedBroadcast(Intent, String)
1775      * @see #sendOrderedBroadcast(Intent, String, BroadcastReceiver, Handler, int, String, Bundle)
1776      */
sendBroadcast(@equiresPermission Intent intent)1777     public abstract void sendBroadcast(@RequiresPermission Intent intent);
1778 
1779     /**
1780      * Broadcast the given intent to all interested BroadcastReceivers, allowing
1781      * an optional required permission to be enforced.  This
1782      * call is asynchronous; it returns immediately, and you will continue
1783      * executing while the receivers are run.  No results are propagated from
1784      * receivers and receivers can not abort the broadcast. If you want
1785      * to allow receivers to propagate results or abort the broadcast, you must
1786      * send an ordered broadcast using
1787      * {@link #sendOrderedBroadcast(Intent, String)}.
1788      *
1789      * <p>See {@link BroadcastReceiver} for more information on Intent broadcasts.
1790      *
1791      * @param intent The Intent to broadcast; all receivers matching this
1792      *               Intent will receive the broadcast.
1793      * @param receiverPermission (optional) String naming a permission that
1794      *               a receiver must hold in order to receive your broadcast.
1795      *               If null, no permission is required.
1796      *
1797      * @see android.content.BroadcastReceiver
1798      * @see #registerReceiver
1799      * @see #sendBroadcast(Intent)
1800      * @see #sendOrderedBroadcast(Intent, String)
1801      * @see #sendOrderedBroadcast(Intent, String, BroadcastReceiver, Handler, int, String, Bundle)
1802      */
sendBroadcast(@equiresPermission Intent intent, @Nullable String receiverPermission)1803     public abstract void sendBroadcast(@RequiresPermission Intent intent,
1804             @Nullable String receiverPermission);
1805 
1806 
1807     /**
1808      * Broadcast the given intent to all interested BroadcastReceivers, allowing
1809      * an array of required permissions to be enforced.  This call is asynchronous; it returns
1810      * immediately, and you will continue executing while the receivers are run.  No results are
1811      * propagated from receivers and receivers can not abort the broadcast. If you want to allow
1812      * receivers to propagate results or abort the broadcast, you must send an ordered broadcast
1813      * using {@link #sendOrderedBroadcast(Intent, String)}.
1814      *
1815      * <p>See {@link BroadcastReceiver} for more information on Intent broadcasts.
1816      *
1817      * @param intent The Intent to broadcast; all receivers matching this
1818      *               Intent will receive the broadcast.
1819      * @param receiverPermissions Array of names of permissions that a receiver must hold
1820      *                            in order to receive your broadcast.
1821      *                            If null or empty, no permissions are required.
1822      *
1823      * @see android.content.BroadcastReceiver
1824      * @see #registerReceiver
1825      * @see #sendBroadcast(Intent)
1826      * @see #sendOrderedBroadcast(Intent, String)
1827      * @see #sendOrderedBroadcast(Intent, String, BroadcastReceiver, Handler, int, String, Bundle)
1828      * @hide
1829      */
sendBroadcastMultiplePermissions(Intent intent, String[] receiverPermissions)1830     public abstract void sendBroadcastMultiplePermissions(Intent intent,
1831             String[] receiverPermissions);
1832 
1833     /**
1834      * Broadcast the given intent to all interested BroadcastReceivers, allowing
1835      * an optional required permission to be enforced.  This
1836      * call is asynchronous; it returns immediately, and you will continue
1837      * executing while the receivers are run.  No results are propagated from
1838      * receivers and receivers can not abort the broadcast. If you want
1839      * to allow receivers to propagate results or abort the broadcast, you must
1840      * send an ordered broadcast using
1841      * {@link #sendOrderedBroadcast(Intent, String)}.
1842      *
1843      * <p>See {@link BroadcastReceiver} for more information on Intent broadcasts.
1844      *
1845      * @param intent The Intent to broadcast; all receivers matching this
1846      *               Intent will receive the broadcast.
1847      * @param receiverPermission (optional) String naming a permission that
1848      *               a receiver must hold in order to receive your broadcast.
1849      *               If null, no permission is required.
1850      * @param options (optional) Additional sending options, generated from a
1851      * {@link android.app.BroadcastOptions}.
1852      *
1853      * @see android.content.BroadcastReceiver
1854      * @see #registerReceiver
1855      * @see #sendBroadcast(Intent)
1856      * @see #sendOrderedBroadcast(Intent, String)
1857      * @see #sendOrderedBroadcast(Intent, String, BroadcastReceiver, Handler, int, String, Bundle)
1858      * @hide
1859      */
1860     @SystemApi
sendBroadcast(Intent intent, @Nullable String receiverPermission, @Nullable Bundle options)1861     public abstract void sendBroadcast(Intent intent,
1862             @Nullable String receiverPermission,
1863             @Nullable Bundle options);
1864 
1865     /**
1866      * Like {@link #sendBroadcast(Intent, String)}, but also allows specification
1867      * of an associated app op as per {@link android.app.AppOpsManager}.
1868      * @hide
1869      */
sendBroadcast(Intent intent, String receiverPermission, int appOp)1870     public abstract void sendBroadcast(Intent intent,
1871             String receiverPermission, int appOp);
1872 
1873     /**
1874      * Broadcast the given intent to all interested BroadcastReceivers, delivering
1875      * them one at a time to allow more preferred receivers to consume the
1876      * broadcast before it is delivered to less preferred receivers.  This
1877      * call is asynchronous; it returns immediately, and you will continue
1878      * executing while the receivers are run.
1879      *
1880      * <p>See {@link BroadcastReceiver} for more information on Intent broadcasts.
1881      *
1882      * @param intent The Intent to broadcast; all receivers matching this
1883      *               Intent will receive the broadcast.
1884      * @param receiverPermission (optional) String naming a permissions that
1885      *               a receiver must hold in order to receive your broadcast.
1886      *               If null, no permission is required.
1887      *
1888      * @see android.content.BroadcastReceiver
1889      * @see #registerReceiver
1890      * @see #sendBroadcast(Intent)
1891      * @see #sendOrderedBroadcast(Intent, String, BroadcastReceiver, Handler, int, String, Bundle)
1892      */
sendOrderedBroadcast(@equiresPermission Intent intent, @Nullable String receiverPermission)1893     public abstract void sendOrderedBroadcast(@RequiresPermission Intent intent,
1894             @Nullable String receiverPermission);
1895 
1896     /**
1897      * Version of {@link #sendBroadcast(Intent)} that allows you to
1898      * receive data back from the broadcast.  This is accomplished by
1899      * supplying your own BroadcastReceiver when calling, which will be
1900      * treated as a final receiver at the end of the broadcast -- its
1901      * {@link BroadcastReceiver#onReceive} method will be called with
1902      * the result values collected from the other receivers.  The broadcast will
1903      * be serialized in the same way as calling
1904      * {@link #sendOrderedBroadcast(Intent, String)}.
1905      *
1906      * <p>Like {@link #sendBroadcast(Intent)}, this method is
1907      * asynchronous; it will return before
1908      * resultReceiver.onReceive() is called.
1909      *
1910      * <p>See {@link BroadcastReceiver} for more information on Intent broadcasts.
1911      *
1912      * @param intent The Intent to broadcast; all receivers matching this
1913      *               Intent will receive the broadcast.
1914      * @param receiverPermission String naming a permissions that
1915      *               a receiver must hold in order to receive your broadcast.
1916      *               If null, no permission is required.
1917      * @param resultReceiver Your own BroadcastReceiver to treat as the final
1918      *                       receiver of the broadcast.
1919      * @param scheduler A custom Handler with which to schedule the
1920      *                  resultReceiver callback; if null it will be
1921      *                  scheduled in the Context's main thread.
1922      * @param initialCode An initial value for the result code.  Often
1923      *                    Activity.RESULT_OK.
1924      * @param initialData An initial value for the result data.  Often
1925      *                    null.
1926      * @param initialExtras An initial value for the result extras.  Often
1927      *                      null.
1928      *
1929      * @see #sendBroadcast(Intent)
1930      * @see #sendBroadcast(Intent, String)
1931      * @see #sendOrderedBroadcast(Intent, String)
1932      * @see android.content.BroadcastReceiver
1933      * @see #registerReceiver
1934      * @see android.app.Activity#RESULT_OK
1935      */
sendOrderedBroadcast(@equiresPermission @onNull Intent intent, @Nullable String receiverPermission, @Nullable BroadcastReceiver resultReceiver, @Nullable Handler scheduler, int initialCode, @Nullable String initialData, @Nullable Bundle initialExtras)1936     public abstract void sendOrderedBroadcast(@RequiresPermission @NonNull Intent intent,
1937             @Nullable String receiverPermission, @Nullable BroadcastReceiver resultReceiver,
1938             @Nullable Handler scheduler, int initialCode, @Nullable String initialData,
1939             @Nullable Bundle initialExtras);
1940 
1941     /**
1942      * Version of {@link #sendBroadcast(Intent)} that allows you to
1943      * receive data back from the broadcast.  This is accomplished by
1944      * supplying your own BroadcastReceiver when calling, which will be
1945      * treated as a final receiver at the end of the broadcast -- its
1946      * {@link BroadcastReceiver#onReceive} method will be called with
1947      * the result values collected from the other receivers.  The broadcast will
1948      * be serialized in the same way as calling
1949      * {@link #sendOrderedBroadcast(Intent, String)}.
1950      *
1951      * <p>Like {@link #sendBroadcast(Intent)}, this method is
1952      * asynchronous; it will return before
1953      * resultReceiver.onReceive() is called.
1954      *
1955      * <p>See {@link BroadcastReceiver} for more information on Intent broadcasts.
1956      *
1957      *
1958      * @param intent The Intent to broadcast; all receivers matching this
1959      *               Intent will receive the broadcast.
1960      * @param receiverPermission String naming a permissions that
1961      *               a receiver must hold in order to receive your broadcast.
1962      *               If null, no permission is required.
1963      * @param options (optional) Additional sending options, generated from a
1964      * {@link android.app.BroadcastOptions}.
1965      * @param resultReceiver Your own BroadcastReceiver to treat as the final
1966      *                       receiver of the broadcast.
1967      * @param scheduler A custom Handler with which to schedule the
1968      *                  resultReceiver callback; if null it will be
1969      *                  scheduled in the Context's main thread.
1970      * @param initialCode An initial value for the result code.  Often
1971      *                    Activity.RESULT_OK.
1972      * @param initialData An initial value for the result data.  Often
1973      *                    null.
1974      * @param initialExtras An initial value for the result extras.  Often
1975      *                      null.
1976      * @see #sendBroadcast(Intent)
1977      * @see #sendBroadcast(Intent, String)
1978      * @see #sendOrderedBroadcast(Intent, String)
1979      * @see android.content.BroadcastReceiver
1980      * @see #registerReceiver
1981      * @see android.app.Activity#RESULT_OK
1982      * @hide
1983      */
1984     @SystemApi
sendOrderedBroadcast(@onNull Intent intent, @Nullable String receiverPermission, @Nullable Bundle options, @Nullable BroadcastReceiver resultReceiver, @Nullable Handler scheduler, int initialCode, @Nullable String initialData, @Nullable Bundle initialExtras)1985     public abstract void sendOrderedBroadcast(@NonNull Intent intent,
1986             @Nullable String receiverPermission, @Nullable Bundle options,
1987             @Nullable BroadcastReceiver resultReceiver, @Nullable Handler scheduler,
1988             int initialCode, @Nullable String initialData, @Nullable Bundle initialExtras);
1989 
1990     /**
1991      * Like {@link #sendOrderedBroadcast(Intent, String, BroadcastReceiver, android.os.Handler,
1992      * int, String, android.os.Bundle)}, but also allows specification
1993      * of an associated app op as per {@link android.app.AppOpsManager}.
1994      * @hide
1995      */
sendOrderedBroadcast(Intent intent, String receiverPermission, int appOp, BroadcastReceiver resultReceiver, Handler scheduler, int initialCode, String initialData, Bundle initialExtras)1996     public abstract void sendOrderedBroadcast(Intent intent,
1997             String receiverPermission, int appOp, BroadcastReceiver resultReceiver,
1998             Handler scheduler, int initialCode, String initialData,
1999             Bundle initialExtras);
2000 
2001     /**
2002      * Version of {@link #sendBroadcast(Intent)} that allows you to specify the
2003      * user the broadcast will be sent to.  This is not available to applications
2004      * that are not pre-installed on the system image.  Using it requires holding
2005      * the INTERACT_ACROSS_USERS permission.
2006      * @param intent The intent to broadcast
2007      * @param user UserHandle to send the intent to.
2008      * @see #sendBroadcast(Intent)
2009      */
sendBroadcastAsUser(@equiresPermission Intent intent, UserHandle user)2010     public abstract void sendBroadcastAsUser(@RequiresPermission Intent intent,
2011             UserHandle user);
2012 
2013     /**
2014      * Version of {@link #sendBroadcast(Intent, String)} that allows you to specify the
2015      * user the broadcast will be sent to.  This is not available to applications
2016      * that are not pre-installed on the system image.  Using it requires holding
2017      * the INTERACT_ACROSS_USERS permission.
2018      *
2019      * @param intent The Intent to broadcast; all receivers matching this
2020      *               Intent will receive the broadcast.
2021      * @param user UserHandle to send the intent to.
2022      * @param receiverPermission (optional) String naming a permission that
2023      *               a receiver must hold in order to receive your broadcast.
2024      *               If null, no permission is required.
2025      *
2026      * @see #sendBroadcast(Intent, String)
2027      */
sendBroadcastAsUser(@equiresPermission Intent intent, UserHandle user, @Nullable String receiverPermission)2028     public abstract void sendBroadcastAsUser(@RequiresPermission Intent intent,
2029             UserHandle user, @Nullable String receiverPermission);
2030 
2031 
2032     /**
2033      * Version of {@link #sendBroadcast(Intent, String)} that allows you to specify the
2034      * user the broadcast will be sent to.  This is not available to applications
2035      * that are not pre-installed on the system image.  Using it requires holding
2036      * the INTERACT_ACROSS_USERS permission.
2037      *
2038      * @param intent The Intent to broadcast; all receivers matching this
2039      *               Intent will receive the broadcast.
2040      * @param user UserHandle to send the intent to.
2041      * @param receiverPermission (optional) String naming a permission that
2042      *               a receiver must hold in order to receive your broadcast.
2043      *               If null, no permission is required.
2044      * @param appOp The app op associated with the broadcast.
2045      *
2046      * @see #sendBroadcast(Intent, String)
2047      *
2048      * @hide
2049      */
sendBroadcastAsUser(@equiresPermission Intent intent, UserHandle user, @Nullable String receiverPermission, int appOp)2050     public abstract void sendBroadcastAsUser(@RequiresPermission Intent intent,
2051             UserHandle user, @Nullable String receiverPermission, int appOp);
2052 
2053     /**
2054      * Version of
2055      * {@link #sendOrderedBroadcast(Intent, String, BroadcastReceiver, Handler, int, String, Bundle)}
2056      * that allows you to specify the
2057      * user the broadcast will be sent to.  This is not available to applications
2058      * that are not pre-installed on the system image.  Using it requires holding
2059      * the INTERACT_ACROSS_USERS permission.
2060      *
2061      * <p>See {@link BroadcastReceiver} for more information on Intent broadcasts.
2062      *
2063      * @param intent The Intent to broadcast; all receivers matching this
2064      *               Intent will receive the broadcast.
2065      * @param user UserHandle to send the intent to.
2066      * @param receiverPermission String naming a permissions that
2067      *               a receiver must hold in order to receive your broadcast.
2068      *               If null, no permission is required.
2069      * @param resultReceiver Your own BroadcastReceiver to treat as the final
2070      *                       receiver of the broadcast.
2071      * @param scheduler A custom Handler with which to schedule the
2072      *                  resultReceiver callback; if null it will be
2073      *                  scheduled in the Context's main thread.
2074      * @param initialCode An initial value for the result code.  Often
2075      *                    Activity.RESULT_OK.
2076      * @param initialData An initial value for the result data.  Often
2077      *                    null.
2078      * @param initialExtras An initial value for the result extras.  Often
2079      *                      null.
2080      *
2081      * @see #sendOrderedBroadcast(Intent, String, BroadcastReceiver, Handler, int, String, Bundle)
2082      */
sendOrderedBroadcastAsUser(@equiresPermission Intent intent, UserHandle user, @Nullable String receiverPermission, BroadcastReceiver resultReceiver, @Nullable Handler scheduler, int initialCode, @Nullable String initialData, @Nullable Bundle initialExtras)2083     public abstract void sendOrderedBroadcastAsUser(@RequiresPermission Intent intent,
2084             UserHandle user, @Nullable String receiverPermission, BroadcastReceiver resultReceiver,
2085             @Nullable Handler scheduler, int initialCode, @Nullable String initialData,
2086             @Nullable  Bundle initialExtras);
2087 
2088     /**
2089      * Similar to above but takes an appOp as well, to enforce restrictions.
2090      * @see #sendOrderedBroadcastAsUser(Intent, UserHandle, String,
2091      *       BroadcastReceiver, Handler, int, String, Bundle)
2092      * @hide
2093      */
sendOrderedBroadcastAsUser(Intent intent, UserHandle user, @Nullable String receiverPermission, int appOp, BroadcastReceiver resultReceiver, @Nullable Handler scheduler, int initialCode, @Nullable String initialData, @Nullable Bundle initialExtras)2094     public abstract void sendOrderedBroadcastAsUser(Intent intent, UserHandle user,
2095             @Nullable String receiverPermission, int appOp, BroadcastReceiver resultReceiver,
2096             @Nullable Handler scheduler, int initialCode, @Nullable String initialData,
2097             @Nullable  Bundle initialExtras);
2098 
2099     /**
2100      * Similar to above but takes an appOp as well, to enforce restrictions, and an options Bundle.
2101      * @see #sendOrderedBroadcastAsUser(Intent, UserHandle, String,
2102      *       BroadcastReceiver, Handler, int, String, Bundle)
2103      * @hide
2104      */
sendOrderedBroadcastAsUser(Intent intent, UserHandle user, @Nullable String receiverPermission, int appOp, @Nullable Bundle options, BroadcastReceiver resultReceiver, @Nullable Handler scheduler, int initialCode, @Nullable String initialData, @Nullable Bundle initialExtras)2105     public abstract void sendOrderedBroadcastAsUser(Intent intent, UserHandle user,
2106             @Nullable String receiverPermission, int appOp, @Nullable Bundle options,
2107             BroadcastReceiver resultReceiver, @Nullable Handler scheduler, int initialCode,
2108             @Nullable String initialData, @Nullable  Bundle initialExtras);
2109 
2110     /**
2111      * <p>Perform a {@link #sendBroadcast(Intent)} that is "sticky," meaning the
2112      * Intent you are sending stays around after the broadcast is complete,
2113      * so that others can quickly retrieve that data through the return
2114      * value of {@link #registerReceiver(BroadcastReceiver, IntentFilter)}.  In
2115      * all other ways, this behaves the same as
2116      * {@link #sendBroadcast(Intent)}.
2117      *
2118      * <p>You must hold the {@link android.Manifest.permission#BROADCAST_STICKY}
2119      * permission in order to use this API.  If you do not hold that
2120      * permission, {@link SecurityException} will be thrown.
2121      *
2122      * @deprecated Sticky broadcasts should not be used.  They provide no security (anyone
2123      * can access them), no protection (anyone can modify them), and many other problems.
2124      * The recommended pattern is to use a non-sticky broadcast to report that <em>something</em>
2125      * has changed, with another mechanism for apps to retrieve the current value whenever
2126      * desired.
2127      *
2128      * @param intent The Intent to broadcast; all receivers matching this
2129      * Intent will receive the broadcast, and the Intent will be held to
2130      * be re-broadcast to future receivers.
2131      *
2132      * @see #sendBroadcast(Intent)
2133      * @see #sendStickyOrderedBroadcast(Intent, BroadcastReceiver, Handler, int, String, Bundle)
2134      */
2135     @Deprecated
sendStickyBroadcast(@equiresPermission Intent intent)2136     public abstract void sendStickyBroadcast(@RequiresPermission Intent intent);
2137 
2138     /**
2139      * <p>Version of {@link #sendStickyBroadcast} that allows you to
2140      * receive data back from the broadcast.  This is accomplished by
2141      * supplying your own BroadcastReceiver when calling, which will be
2142      * treated as a final receiver at the end of the broadcast -- its
2143      * {@link BroadcastReceiver#onReceive} method will be called with
2144      * the result values collected from the other receivers.  The broadcast will
2145      * be serialized in the same way as calling
2146      * {@link #sendOrderedBroadcast(Intent, String)}.
2147      *
2148      * <p>Like {@link #sendBroadcast(Intent)}, this method is
2149      * asynchronous; it will return before
2150      * resultReceiver.onReceive() is called.  Note that the sticky data
2151      * stored is only the data you initially supply to the broadcast, not
2152      * the result of any changes made by the receivers.
2153      *
2154      * <p>See {@link BroadcastReceiver} for more information on Intent broadcasts.
2155      *
2156      * @deprecated Sticky broadcasts should not be used.  They provide no security (anyone
2157      * can access them), no protection (anyone can modify them), and many other problems.
2158      * The recommended pattern is to use a non-sticky broadcast to report that <em>something</em>
2159      * has changed, with another mechanism for apps to retrieve the current value whenever
2160      * desired.
2161      *
2162      * @param intent The Intent to broadcast; all receivers matching this
2163      *               Intent will receive the broadcast.
2164      * @param resultReceiver Your own BroadcastReceiver to treat as the final
2165      *                       receiver of the broadcast.
2166      * @param scheduler A custom Handler with which to schedule the
2167      *                  resultReceiver callback; if null it will be
2168      *                  scheduled in the Context's main thread.
2169      * @param initialCode An initial value for the result code.  Often
2170      *                    Activity.RESULT_OK.
2171      * @param initialData An initial value for the result data.  Often
2172      *                    null.
2173      * @param initialExtras An initial value for the result extras.  Often
2174      *                      null.
2175      *
2176      * @see #sendBroadcast(Intent)
2177      * @see #sendBroadcast(Intent, String)
2178      * @see #sendOrderedBroadcast(Intent, String)
2179      * @see #sendStickyBroadcast(Intent)
2180      * @see android.content.BroadcastReceiver
2181      * @see #registerReceiver
2182      * @see android.app.Activity#RESULT_OK
2183      */
2184     @Deprecated
sendStickyOrderedBroadcast(@equiresPermission Intent intent, BroadcastReceiver resultReceiver, @Nullable Handler scheduler, int initialCode, @Nullable String initialData, @Nullable Bundle initialExtras)2185     public abstract void sendStickyOrderedBroadcast(@RequiresPermission Intent intent,
2186             BroadcastReceiver resultReceiver,
2187             @Nullable Handler scheduler, int initialCode, @Nullable String initialData,
2188             @Nullable Bundle initialExtras);
2189 
2190     /**
2191      * <p>Remove the data previously sent with {@link #sendStickyBroadcast},
2192      * so that it is as if the sticky broadcast had never happened.
2193      *
2194      * <p>You must hold the {@link android.Manifest.permission#BROADCAST_STICKY}
2195      * permission in order to use this API.  If you do not hold that
2196      * permission, {@link SecurityException} will be thrown.
2197      *
2198      * @deprecated Sticky broadcasts should not be used.  They provide no security (anyone
2199      * can access them), no protection (anyone can modify them), and many other problems.
2200      * The recommended pattern is to use a non-sticky broadcast to report that <em>something</em>
2201      * has changed, with another mechanism for apps to retrieve the current value whenever
2202      * desired.
2203      *
2204      * @param intent The Intent that was previously broadcast.
2205      *
2206      * @see #sendStickyBroadcast
2207      */
2208     @Deprecated
removeStickyBroadcast(@equiresPermission Intent intent)2209     public abstract void removeStickyBroadcast(@RequiresPermission Intent intent);
2210 
2211     /**
2212      * <p>Version of {@link #sendStickyBroadcast(Intent)} that allows you to specify the
2213      * user the broadcast will be sent to.  This is not available to applications
2214      * that are not pre-installed on the system image.  Using it requires holding
2215      * the INTERACT_ACROSS_USERS permission.
2216      *
2217      * @deprecated Sticky broadcasts should not be used.  They provide no security (anyone
2218      * can access them), no protection (anyone can modify them), and many other problems.
2219      * The recommended pattern is to use a non-sticky broadcast to report that <em>something</em>
2220      * has changed, with another mechanism for apps to retrieve the current value whenever
2221      * desired.
2222      *
2223      * @param intent The Intent to broadcast; all receivers matching this
2224      * Intent will receive the broadcast, and the Intent will be held to
2225      * be re-broadcast to future receivers.
2226      * @param user UserHandle to send the intent to.
2227      *
2228      * @see #sendBroadcast(Intent)
2229      */
2230     @Deprecated
sendStickyBroadcastAsUser(@equiresPermission Intent intent, UserHandle user)2231     public abstract void sendStickyBroadcastAsUser(@RequiresPermission Intent intent,
2232             UserHandle user);
2233 
2234     /**
2235      * @hide
2236      * This is just here for sending CONNECTIVITY_ACTION.
2237      */
2238     @Deprecated
sendStickyBroadcastAsUser(@equiresPermission Intent intent, UserHandle user, Bundle options)2239     public abstract void sendStickyBroadcastAsUser(@RequiresPermission Intent intent,
2240             UserHandle user, Bundle options);
2241 
2242     /**
2243      * <p>Version of
2244      * {@link #sendStickyOrderedBroadcast(Intent, BroadcastReceiver, Handler, int, String, Bundle)}
2245      * that allows you to specify the
2246      * user the broadcast will be sent to.  This is not available to applications
2247      * that are not pre-installed on the system image.  Using it requires holding
2248      * the INTERACT_ACROSS_USERS permission.
2249      *
2250      * <p>See {@link BroadcastReceiver} for more information on Intent broadcasts.
2251      *
2252      * @deprecated Sticky broadcasts should not be used.  They provide no security (anyone
2253      * can access them), no protection (anyone can modify them), and many other problems.
2254      * The recommended pattern is to use a non-sticky broadcast to report that <em>something</em>
2255      * has changed, with another mechanism for apps to retrieve the current value whenever
2256      * desired.
2257      *
2258      * @param intent The Intent to broadcast; all receivers matching this
2259      *               Intent will receive the broadcast.
2260      * @param user UserHandle to send the intent to.
2261      * @param resultReceiver Your own BroadcastReceiver to treat as the final
2262      *                       receiver of the broadcast.
2263      * @param scheduler A custom Handler with which to schedule the
2264      *                  resultReceiver callback; if null it will be
2265      *                  scheduled in the Context's main thread.
2266      * @param initialCode An initial value for the result code.  Often
2267      *                    Activity.RESULT_OK.
2268      * @param initialData An initial value for the result data.  Often
2269      *                    null.
2270      * @param initialExtras An initial value for the result extras.  Often
2271      *                      null.
2272      *
2273      * @see #sendStickyOrderedBroadcast(Intent, BroadcastReceiver, Handler, int, String, Bundle)
2274      */
2275     @Deprecated
sendStickyOrderedBroadcastAsUser(@equiresPermission Intent intent, UserHandle user, BroadcastReceiver resultReceiver, @Nullable Handler scheduler, int initialCode, @Nullable String initialData, @Nullable Bundle initialExtras)2276     public abstract void sendStickyOrderedBroadcastAsUser(@RequiresPermission Intent intent,
2277             UserHandle user, BroadcastReceiver resultReceiver,
2278             @Nullable Handler scheduler, int initialCode, @Nullable String initialData,
2279             @Nullable Bundle initialExtras);
2280 
2281     /**
2282      * <p>Version of {@link #removeStickyBroadcast(Intent)} that allows you to specify the
2283      * user the broadcast will be sent to.  This is not available to applications
2284      * that are not pre-installed on the system image.  Using it requires holding
2285      * the INTERACT_ACROSS_USERS permission.
2286      *
2287      * <p>You must hold the {@link android.Manifest.permission#BROADCAST_STICKY}
2288      * permission in order to use this API.  If you do not hold that
2289      * permission, {@link SecurityException} will be thrown.
2290      *
2291      * @deprecated Sticky broadcasts should not be used.  They provide no security (anyone
2292      * can access them), no protection (anyone can modify them), and many other problems.
2293      * The recommended pattern is to use a non-sticky broadcast to report that <em>something</em>
2294      * has changed, with another mechanism for apps to retrieve the current value whenever
2295      * desired.
2296      *
2297      * @param intent The Intent that was previously broadcast.
2298      * @param user UserHandle to remove the sticky broadcast from.
2299      *
2300      * @see #sendStickyBroadcastAsUser
2301      */
2302     @Deprecated
removeStickyBroadcastAsUser(@equiresPermission Intent intent, UserHandle user)2303     public abstract void removeStickyBroadcastAsUser(@RequiresPermission Intent intent,
2304             UserHandle user);
2305 
2306     /**
2307      * Register a BroadcastReceiver to be run in the main activity thread.  The
2308      * <var>receiver</var> will be called with any broadcast Intent that
2309      * matches <var>filter</var>, in the main application thread.
2310      *
2311      * <p>The system may broadcast Intents that are "sticky" -- these stay
2312      * around after the broadcast as finished, to be sent to any later
2313      * registrations. If your IntentFilter matches one of these sticky
2314      * Intents, that Intent will be returned by this function
2315      * <strong>and</strong> sent to your <var>receiver</var> as if it had just
2316      * been broadcast.
2317      *
2318      * <p>There may be multiple sticky Intents that match <var>filter</var>,
2319      * in which case each of these will be sent to <var>receiver</var>.  In
2320      * this case, only one of these can be returned directly by the function;
2321      * which of these that is returned is arbitrarily decided by the system.
2322      *
2323      * <p>If you know the Intent your are registering for is sticky, you can
2324      * supply null for your <var>receiver</var>.  In this case, no receiver is
2325      * registered -- the function simply returns the sticky Intent that
2326      * matches <var>filter</var>.  In the case of multiple matches, the same
2327      * rules as described above apply.
2328      *
2329      * <p>See {@link BroadcastReceiver} for more information on Intent broadcasts.
2330      *
2331      * <p>As of {@link android.os.Build.VERSION_CODES#ICE_CREAM_SANDWICH}, receivers
2332      * registered with this method will correctly respect the
2333      * {@link Intent#setPackage(String)} specified for an Intent being broadcast.
2334      * Prior to that, it would be ignored and delivered to all matching registered
2335      * receivers.  Be careful if using this for security.</p>
2336      *
2337      * <p class="note">Note: this method <em>cannot be called from a
2338      * {@link BroadcastReceiver} component;</em> that is, from a BroadcastReceiver
2339      * that is declared in an application's manifest.  It is okay, however, to call
2340      * this method from another BroadcastReceiver that has itself been registered
2341      * at run time with {@link #registerReceiver}, since the lifetime of such a
2342      * registered BroadcastReceiver is tied to the object that registered it.</p>
2343      *
2344      * @param receiver The BroadcastReceiver to handle the broadcast.
2345      * @param filter Selects the Intent broadcasts to be received.
2346      *
2347      * @return The first sticky intent found that matches <var>filter</var>,
2348      *         or null if there are none.
2349      *
2350      * @see #registerReceiver(BroadcastReceiver, IntentFilter, String, Handler)
2351      * @see #sendBroadcast
2352      * @see #unregisterReceiver
2353      */
2354     @Nullable
registerReceiver(@ullable BroadcastReceiver receiver, IntentFilter filter)2355     public abstract Intent registerReceiver(@Nullable BroadcastReceiver receiver,
2356                                             IntentFilter filter);
2357 
2358     /**
2359      * Register to receive intent broadcasts, to run in the context of
2360      * <var>scheduler</var>.  See
2361      * {@link #registerReceiver(BroadcastReceiver, IntentFilter)} for more
2362      * information.  This allows you to enforce permissions on who can
2363      * broadcast intents to your receiver, or have the receiver run in
2364      * a different thread than the main application thread.
2365      *
2366      * <p>See {@link BroadcastReceiver} for more information on Intent broadcasts.
2367      *
2368      * <p>As of {@link android.os.Build.VERSION_CODES#ICE_CREAM_SANDWICH}, receivers
2369      * registered with this method will correctly respect the
2370      * {@link Intent#setPackage(String)} specified for an Intent being broadcast.
2371      * Prior to that, it would be ignored and delivered to all matching registered
2372      * receivers.  Be careful if using this for security.</p>
2373      *
2374      * @param receiver The BroadcastReceiver to handle the broadcast.
2375      * @param filter Selects the Intent broadcasts to be received.
2376      * @param broadcastPermission String naming a permissions that a
2377      *      broadcaster must hold in order to send an Intent to you.  If null,
2378      *      no permission is required.
2379      * @param scheduler Handler identifying the thread that will receive
2380      *      the Intent.  If null, the main thread of the process will be used.
2381      *
2382      * @return The first sticky intent found that matches <var>filter</var>,
2383      *         or null if there are none.
2384      *
2385      * @see #registerReceiver(BroadcastReceiver, IntentFilter)
2386      * @see #sendBroadcast
2387      * @see #unregisterReceiver
2388      */
2389     @Nullable
registerReceiver(BroadcastReceiver receiver, IntentFilter filter, @Nullable String broadcastPermission, @Nullable Handler scheduler)2390     public abstract Intent registerReceiver(BroadcastReceiver receiver,
2391             IntentFilter filter, @Nullable String broadcastPermission,
2392             @Nullable Handler scheduler);
2393 
2394     /**
2395      * @hide
2396      * Same as {@link #registerReceiver(BroadcastReceiver, IntentFilter, String, Handler)
2397      * but for a specific user.  This receiver will receiver broadcasts that
2398      * are sent to the requested user.  It
2399      * requires holding the {@link android.Manifest.permission#INTERACT_ACROSS_USERS_FULL}
2400      * permission.
2401      *
2402      * @param receiver The BroadcastReceiver to handle the broadcast.
2403      * @param user UserHandle to send the intent to.
2404      * @param filter Selects the Intent broadcasts to be received.
2405      * @param broadcastPermission String naming a permissions that a
2406      *      broadcaster must hold in order to send an Intent to you.  If null,
2407      *      no permission is required.
2408      * @param scheduler Handler identifying the thread that will receive
2409      *      the Intent.  If null, the main thread of the process will be used.
2410      *
2411      * @return The first sticky intent found that matches <var>filter</var>,
2412      *         or null if there are none.
2413      *
2414      * @see #registerReceiver(BroadcastReceiver, IntentFilter, String, Handler)
2415      * @see #sendBroadcast
2416      * @see #unregisterReceiver
2417      */
2418     @Nullable
registerReceiverAsUser(BroadcastReceiver receiver, UserHandle user, IntentFilter filter, @Nullable String broadcastPermission, @Nullable Handler scheduler)2419     public abstract Intent registerReceiverAsUser(BroadcastReceiver receiver,
2420             UserHandle user, IntentFilter filter, @Nullable String broadcastPermission,
2421             @Nullable Handler scheduler);
2422 
2423     /**
2424      * Unregister a previously registered BroadcastReceiver.  <em>All</em>
2425      * filters that have been registered for this BroadcastReceiver will be
2426      * removed.
2427      *
2428      * @param receiver The BroadcastReceiver to unregister.
2429      *
2430      * @see #registerReceiver
2431      */
unregisterReceiver(BroadcastReceiver receiver)2432     public abstract void unregisterReceiver(BroadcastReceiver receiver);
2433 
2434     /**
2435      * Request that a given application service be started.  The Intent
2436      * should contain either contain the complete class name of a specific service
2437      * implementation to start or a specific package name to target.  If the
2438      * Intent is less specified, it log a warning about this and which of the
2439      * multiple matching services it finds and uses will be undefined.  If this service
2440      * is not already running, it will be instantiated and started (creating a
2441      * process for it if needed); if it is running then it remains running.
2442      *
2443      * <p>Every call to this method will result in a corresponding call to
2444      * the target service's {@link android.app.Service#onStartCommand} method,
2445      * with the <var>intent</var> given here.  This provides a convenient way
2446      * to submit jobs to a service without having to bind and call on to its
2447      * interface.
2448      *
2449      * <p>Using startService() overrides the default service lifetime that is
2450      * managed by {@link #bindService}: it requires the service to remain
2451      * running until {@link #stopService} is called, regardless of whether
2452      * any clients are connected to it.  Note that calls to startService()
2453      * are not nesting: no matter how many times you call startService(),
2454      * a single call to {@link #stopService} will stop it.
2455      *
2456      * <p>The system attempts to keep running services around as much as
2457      * possible.  The only time they should be stopped is if the current
2458      * foreground application is using so many resources that the service needs
2459      * to be killed.  If any errors happen in the service's process, it will
2460      * automatically be restarted.
2461      *
2462      * <p>This function will throw {@link SecurityException} if you do not
2463      * have permission to start the given service.
2464      *
2465      * <p class="note"><strong>Note:</strong> Each call to startService()
2466      * results in significant work done by the system to manage service
2467      * lifecycle surrounding the processing of the intent, which can take
2468      * multiple milliseconds of CPU time. Due to this cost, startService()
2469      * should not be used for frequent intent delivery to a service, and only
2470      * for scheduling significant work. Use {@link #bindService bound services}
2471      * for high frequency calls.
2472      * </p>
2473      *
2474      * @param service Identifies the service to be started.  The Intent must be either
2475      *      fully explicit (supplying a component name) or specify a specific package
2476      *      name it is targetted to.  Additional values
2477      *      may be included in the Intent extras to supply arguments along with
2478      *      this specific start call.
2479      *
2480      * @return If the service is being started or is already running, the
2481      * {@link ComponentName} of the actual service that was started is
2482      * returned; else if the service does not exist null is returned.
2483      *
2484      * @throws SecurityException &nbsp;
2485      *
2486      * @see #stopService
2487      * @see #bindService
2488      */
2489     @Nullable
startService(Intent service)2490     public abstract ComponentName startService(Intent service);
2491 
2492     /**
2493      * Request that a given application service be stopped.  If the service is
2494      * not running, nothing happens.  Otherwise it is stopped.  Note that calls
2495      * to startService() are not counted -- this stops the service no matter
2496      * how many times it was started.
2497      *
2498      * <p>Note that if a stopped service still has {@link ServiceConnection}
2499      * objects bound to it with the {@link #BIND_AUTO_CREATE} set, it will
2500      * not be destroyed until all of these bindings are removed.  See
2501      * the {@link android.app.Service} documentation for more details on a
2502      * service's lifecycle.
2503      *
2504      * <p>This function will throw {@link SecurityException} if you do not
2505      * have permission to stop the given service.
2506      *
2507      * @param service Description of the service to be stopped.  The Intent must be either
2508      *      fully explicit (supplying a component name) or specify a specific package
2509      *      name it is targetted to.
2510      *
2511      * @return If there is a service matching the given Intent that is already
2512      * running, then it is stopped and {@code true} is returned; else {@code false} is returned.
2513      *
2514      * @throws SecurityException &nbsp;
2515      *
2516      * @see #startService
2517      */
stopService(Intent service)2518     public abstract boolean stopService(Intent service);
2519 
2520     /**
2521      * @hide like {@link #startService(Intent)} but for a specific user.
2522      */
startServiceAsUser(Intent service, UserHandle user)2523     public abstract ComponentName startServiceAsUser(Intent service, UserHandle user);
2524 
2525     /**
2526      * @hide like {@link #stopService(Intent)} but for a specific user.
2527      */
stopServiceAsUser(Intent service, UserHandle user)2528     public abstract boolean stopServiceAsUser(Intent service, UserHandle user);
2529 
2530     /**
2531      * Connect to an application service, creating it if needed.  This defines
2532      * a dependency between your application and the service.  The given
2533      * <var>conn</var> will receive the service object when it is created and be
2534      * told if it dies and restarts.  The service will be considered required
2535      * by the system only for as long as the calling context exists.  For
2536      * example, if this Context is an Activity that is stopped, the service will
2537      * not be required to continue running until the Activity is resumed.
2538      *
2539      * <p>This function will throw {@link SecurityException} if you do not
2540      * have permission to bind to the given service.
2541      *
2542      * <p class="note">Note: this method <em>can not be called from a
2543      * {@link BroadcastReceiver} component</em>.  A pattern you can use to
2544      * communicate from a BroadcastReceiver to a Service is to call
2545      * {@link #startService} with the arguments containing the command to be
2546      * sent, with the service calling its
2547      * {@link android.app.Service#stopSelf(int)} method when done executing
2548      * that command.  See the API demo App/Service/Service Start Arguments
2549      * Controller for an illustration of this.  It is okay, however, to use
2550      * this method from a BroadcastReceiver that has been registered with
2551      * {@link #registerReceiver}, since the lifetime of this BroadcastReceiver
2552      * is tied to another object (the one that registered it).</p>
2553      *
2554      * @param service Identifies the service to connect to.  The Intent may
2555      *      specify either an explicit component name, or a logical
2556      *      description (action, category, etc) to match an
2557      *      {@link IntentFilter} published by a service.
2558      * @param conn Receives information as the service is started and stopped.
2559      *      This must be a valid ServiceConnection object; it must not be null.
2560      * @param flags Operation options for the binding.  May be 0,
2561      *          {@link #BIND_AUTO_CREATE}, {@link #BIND_DEBUG_UNBIND},
2562      *          {@link #BIND_NOT_FOREGROUND}, {@link #BIND_ABOVE_CLIENT},
2563      *          {@link #BIND_ALLOW_OOM_MANAGEMENT}, or
2564      *          {@link #BIND_WAIVE_PRIORITY}.
2565      * @return If you have successfully bound to the service, {@code true} is returned;
2566      *         {@code false} is returned if the connection is not made so you will not
2567      *         receive the service object.
2568      *
2569      * @throws SecurityException &nbsp;
2570      *
2571      * @see #unbindService
2572      * @see #startService
2573      * @see #BIND_AUTO_CREATE
2574      * @see #BIND_DEBUG_UNBIND
2575      * @see #BIND_NOT_FOREGROUND
2576      */
bindService(@equiresPermission Intent service, @NonNull ServiceConnection conn, @BindServiceFlags int flags)2577     public abstract boolean bindService(@RequiresPermission Intent service,
2578             @NonNull ServiceConnection conn, @BindServiceFlags int flags);
2579 
2580     /**
2581      * Same as {@link #bindService(Intent, ServiceConnection, int)}, but with an explicit userHandle
2582      * argument for use by system server and other multi-user aware code.
2583      * @hide
2584      */
2585     @SystemApi
2586     @SuppressWarnings("unused")
bindServiceAsUser(@equiresPermission Intent service, ServiceConnection conn, int flags, UserHandle user)2587     public boolean bindServiceAsUser(@RequiresPermission Intent service, ServiceConnection conn,
2588             int flags, UserHandle user) {
2589         throw new RuntimeException("Not implemented. Must override in a subclass.");
2590     }
2591 
2592     /**
2593      * Same as {@link #bindService(Intent, ServiceConnection, int, UserHandle)}, but with an
2594      * explicit non-null Handler to run the ServiceConnection callbacks on.
2595      *
2596      * @hide
2597      */
bindServiceAsUser(Intent service, ServiceConnection conn, int flags, Handler handler, UserHandle user)2598     public boolean bindServiceAsUser(Intent service, ServiceConnection conn, int flags,
2599             Handler handler, UserHandle user) {
2600         throw new RuntimeException("Not implemented. Must override in a subclass.");
2601     }
2602 
2603     /**
2604      * Disconnect from an application service.  You will no longer receive
2605      * calls as the service is restarted, and the service is now allowed to
2606      * stop at any time.
2607      *
2608      * @param conn The connection interface previously supplied to
2609      *             bindService().  This parameter must not be null.
2610      *
2611      * @see #bindService
2612      */
unbindService(@onNull ServiceConnection conn)2613     public abstract void unbindService(@NonNull ServiceConnection conn);
2614 
2615     /**
2616      * Start executing an {@link android.app.Instrumentation} class.  The given
2617      * Instrumentation component will be run by killing its target application
2618      * (if currently running), starting the target process, instantiating the
2619      * instrumentation component, and then letting it drive the application.
2620      *
2621      * <p>This function is not synchronous -- it returns as soon as the
2622      * instrumentation has started and while it is running.
2623      *
2624      * <p>Instrumentation is normally only allowed to run against a package
2625      * that is either unsigned or signed with a signature that the
2626      * the instrumentation package is also signed with (ensuring the target
2627      * trusts the instrumentation).
2628      *
2629      * @param className Name of the Instrumentation component to be run.
2630      * @param profileFile Optional path to write profiling data as the
2631      * instrumentation runs, or null for no profiling.
2632      * @param arguments Additional optional arguments to pass to the
2633      * instrumentation, or null.
2634      *
2635      * @return {@code true} if the instrumentation was successfully started,
2636      * else {@code false} if it could not be found.
2637      */
startInstrumentation(@onNull ComponentName className, @Nullable String profileFile, @Nullable Bundle arguments)2638     public abstract boolean startInstrumentation(@NonNull ComponentName className,
2639             @Nullable String profileFile, @Nullable Bundle arguments);
2640 
2641     /** @hide */
2642     @StringDef({
2643             POWER_SERVICE,
2644             WINDOW_SERVICE,
2645             LAYOUT_INFLATER_SERVICE,
2646             ACCOUNT_SERVICE,
2647             ACTIVITY_SERVICE,
2648             ALARM_SERVICE,
2649             NOTIFICATION_SERVICE,
2650             ACCESSIBILITY_SERVICE,
2651             CAPTIONING_SERVICE,
2652             KEYGUARD_SERVICE,
2653             LOCATION_SERVICE,
2654             //@hide: COUNTRY_DETECTOR,
2655             SEARCH_SERVICE,
2656             SENSOR_SERVICE,
2657             STORAGE_SERVICE,
2658             WALLPAPER_SERVICE,
2659             VIBRATOR_SERVICE,
2660             //@hide: STATUS_BAR_SERVICE,
2661             CONNECTIVITY_SERVICE,
2662             //@hide: UPDATE_LOCK_SERVICE,
2663             //@hide: NETWORKMANAGEMENT_SERVICE,
2664             NETWORK_STATS_SERVICE,
2665             //@hide: NETWORK_POLICY_SERVICE,
2666             WIFI_SERVICE,
2667             WIFI_NAN_SERVICE,
2668             WIFI_P2P_SERVICE,
2669             WIFI_SCANNING_SERVICE,
2670             //@hide: WIFI_RTT_SERVICE,
2671             //@hide: ETHERNET_SERVICE,
2672             WIFI_RTT_SERVICE,
2673             NSD_SERVICE,
2674             AUDIO_SERVICE,
2675             FINGERPRINT_SERVICE,
2676             MEDIA_ROUTER_SERVICE,
2677             TELEPHONY_SERVICE,
2678             TELEPHONY_SUBSCRIPTION_SERVICE,
2679             CARRIER_CONFIG_SERVICE,
2680             TELECOM_SERVICE,
2681             CLIPBOARD_SERVICE,
2682             INPUT_METHOD_SERVICE,
2683             TEXT_SERVICES_MANAGER_SERVICE,
2684             APPWIDGET_SERVICE,
2685             //@hide: VOICE_INTERACTION_MANAGER_SERVICE,
2686             //@hide: BACKUP_SERVICE,
2687             DROPBOX_SERVICE,
2688             //@hide: DEVICE_IDLE_CONTROLLER,
2689             DEVICE_POLICY_SERVICE,
2690             UI_MODE_SERVICE,
2691             DOWNLOAD_SERVICE,
2692             NFC_SERVICE,
2693             BLUETOOTH_SERVICE,
2694             //@hide: SIP_SERVICE,
2695             USB_SERVICE,
2696             LAUNCHER_APPS_SERVICE,
2697             //@hide: SERIAL_SERVICE,
2698             //@hide: HDMI_CONTROL_SERVICE,
2699             INPUT_SERVICE,
2700             DISPLAY_SERVICE,
2701             USER_SERVICE,
2702             RESTRICTIONS_SERVICE,
2703             APP_OPS_SERVICE,
2704             CAMERA_SERVICE,
2705             PRINT_SERVICE,
2706             CONSUMER_IR_SERVICE,
2707             //@hide: TRUST_SERVICE,
2708             TV_INPUT_SERVICE,
2709             //@hide: NETWORK_SCORE_SERVICE,
2710             USAGE_STATS_SERVICE,
2711             MEDIA_SESSION_SERVICE,
2712             BATTERY_SERVICE,
2713             JOB_SCHEDULER_SERVICE,
2714             //@hide: PERSISTENT_DATA_BLOCK_SERVICE,
2715             MEDIA_PROJECTION_SERVICE,
2716             MIDI_SERVICE,
2717             RADIO_SERVICE,
2718             HARDWARE_PROPERTIES_SERVICE,
2719             //@hide: SOUND_TRIGGER_SERVICE,
2720             SHORTCUT_SERVICE,
2721             //@hide: CONTEXTHUB_SERVICE,
2722     })
2723     @Retention(RetentionPolicy.SOURCE)
2724     public @interface ServiceName {}
2725 
2726     /**
2727      * Return the handle to a system-level service by name. The class of the
2728      * returned object varies by the requested name. Currently available names
2729      * are:
2730      *
2731      * <dl>
2732      *  <dt> {@link #WINDOW_SERVICE} ("window")
2733      *  <dd> The top-level window manager in which you can place custom
2734      *  windows.  The returned object is a {@link android.view.WindowManager}.
2735      *  <dt> {@link #LAYOUT_INFLATER_SERVICE} ("layout_inflater")
2736      *  <dd> A {@link android.view.LayoutInflater} for inflating layout resources
2737      *  in this context.
2738      *  <dt> {@link #ACTIVITY_SERVICE} ("activity")
2739      *  <dd> A {@link android.app.ActivityManager} for interacting with the
2740      *  global activity state of the system.
2741      *  <dt> {@link #POWER_SERVICE} ("power")
2742      *  <dd> A {@link android.os.PowerManager} for controlling power
2743      *  management.
2744      *  <dt> {@link #ALARM_SERVICE} ("alarm")
2745      *  <dd> A {@link android.app.AlarmManager} for receiving intents at the
2746      *  time of your choosing.
2747      *  <dt> {@link #NOTIFICATION_SERVICE} ("notification")
2748      *  <dd> A {@link android.app.NotificationManager} for informing the user
2749      *   of background events.
2750      *  <dt> {@link #KEYGUARD_SERVICE} ("keyguard")
2751      *  <dd> A {@link android.app.KeyguardManager} for controlling keyguard.
2752      *  <dt> {@link #LOCATION_SERVICE} ("location")
2753      *  <dd> A {@link android.location.LocationManager} for controlling location
2754      *   (e.g., GPS) updates.
2755      *  <dt> {@link #SEARCH_SERVICE} ("search")
2756      *  <dd> A {@link android.app.SearchManager} for handling search.
2757      *  <dt> {@link #VIBRATOR_SERVICE} ("vibrator")
2758      *  <dd> A {@link android.os.Vibrator} for interacting with the vibrator
2759      *  hardware.
2760      *  <dt> {@link #CONNECTIVITY_SERVICE} ("connection")
2761      *  <dd> A {@link android.net.ConnectivityManager ConnectivityManager} for
2762      *  handling management of network connections.
2763      *  <dt> {@link #WIFI_SERVICE} ("wifi")
2764      *  <dd> A {@link android.net.wifi.WifiManager WifiManager} for management of
2765      * Wi-Fi connectivity.
2766      *  <dt> {@link #WIFI_P2P_SERVICE} ("wifip2p")
2767      *  <dd> A {@link android.net.wifi.p2p.WifiP2pManager WifiP2pManager} for management of
2768      * Wi-Fi Direct connectivity.
2769      * <dt> {@link #INPUT_METHOD_SERVICE} ("input_method")
2770      * <dd> An {@link android.view.inputmethod.InputMethodManager InputMethodManager}
2771      * for management of input methods.
2772      * <dt> {@link #UI_MODE_SERVICE} ("uimode")
2773      * <dd> An {@link android.app.UiModeManager} for controlling UI modes.
2774      * <dt> {@link #DOWNLOAD_SERVICE} ("download")
2775      * <dd> A {@link android.app.DownloadManager} for requesting HTTP downloads
2776      * <dt> {@link #BATTERY_SERVICE} ("batterymanager")
2777      * <dd> A {@link android.os.BatteryManager} for managing battery state
2778      * <dt> {@link #JOB_SCHEDULER_SERVICE} ("taskmanager")
2779      * <dd>  A {@link android.app.job.JobScheduler} for managing scheduled tasks
2780      * <dt> {@link #NETWORK_STATS_SERVICE} ("netstats")
2781      * <dd> A {@link android.app.usage.NetworkStatsManager NetworkStatsManager} for querying network
2782      * usage statistics.
2783      * <dt> {@link #HARDWARE_PROPERTIES_SERVICE} ("hardware_properties")
2784      * <dd> A {@link android.os.HardwarePropertiesManager} for accessing hardware properties.
2785      * </dl>
2786      *
2787      * <p>Note:  System services obtained via this API may be closely associated with
2788      * the Context in which they are obtained from.  In general, do not share the
2789      * service objects between various different contexts (Activities, Applications,
2790      * Services, Providers, etc.)
2791      *
2792      * @param name The name of the desired service.
2793      *
2794      * @return The service or null if the name does not exist.
2795      *
2796      * @see #WINDOW_SERVICE
2797      * @see android.view.WindowManager
2798      * @see #LAYOUT_INFLATER_SERVICE
2799      * @see android.view.LayoutInflater
2800      * @see #ACTIVITY_SERVICE
2801      * @see android.app.ActivityManager
2802      * @see #POWER_SERVICE
2803      * @see android.os.PowerManager
2804      * @see #ALARM_SERVICE
2805      * @see android.app.AlarmManager
2806      * @see #NOTIFICATION_SERVICE
2807      * @see android.app.NotificationManager
2808      * @see #KEYGUARD_SERVICE
2809      * @see android.app.KeyguardManager
2810      * @see #LOCATION_SERVICE
2811      * @see android.location.LocationManager
2812      * @see #SEARCH_SERVICE
2813      * @see android.app.SearchManager
2814      * @see #SENSOR_SERVICE
2815      * @see android.hardware.SensorManager
2816      * @see #STORAGE_SERVICE
2817      * @see android.os.storage.StorageManager
2818      * @see #VIBRATOR_SERVICE
2819      * @see android.os.Vibrator
2820      * @see #CONNECTIVITY_SERVICE
2821      * @see android.net.ConnectivityManager
2822      * @see #WIFI_SERVICE
2823      * @see android.net.wifi.WifiManager
2824      * @see #AUDIO_SERVICE
2825      * @see android.media.AudioManager
2826      * @see #MEDIA_ROUTER_SERVICE
2827      * @see android.media.MediaRouter
2828      * @see #TELEPHONY_SERVICE
2829      * @see android.telephony.TelephonyManager
2830      * @see #TELEPHONY_SUBSCRIPTION_SERVICE
2831      * @see android.telephony.SubscriptionManager
2832      * @see #CARRIER_CONFIG_SERVICE
2833      * @see android.telephony.CarrierConfigManager
2834      * @see #INPUT_METHOD_SERVICE
2835      * @see android.view.inputmethod.InputMethodManager
2836      * @see #UI_MODE_SERVICE
2837      * @see android.app.UiModeManager
2838      * @see #DOWNLOAD_SERVICE
2839      * @see android.app.DownloadManager
2840      * @see #BATTERY_SERVICE
2841      * @see android.os.BatteryManager
2842      * @see #JOB_SCHEDULER_SERVICE
2843      * @see android.app.job.JobScheduler
2844      * @see #NETWORK_STATS_SERVICE
2845      * @see android.app.usage.NetworkStatsManager
2846      * @see android.os.HardwarePropertiesManager
2847      * @see #HARDWARE_PROPERTIES_SERVICE
2848      */
getSystemService(@erviceName @onNull String name)2849     public abstract Object getSystemService(@ServiceName @NonNull String name);
2850 
2851     /**
2852      * Return the handle to a system-level service by class.
2853      * <p>
2854      * Currently available classes are:
2855      * {@link android.view.WindowManager}, {@link android.view.LayoutInflater},
2856      * {@link android.app.ActivityManager}, {@link android.os.PowerManager},
2857      * {@link android.app.AlarmManager}, {@link android.app.NotificationManager},
2858      * {@link android.app.KeyguardManager}, {@link android.location.LocationManager},
2859      * {@link android.app.SearchManager}, {@link android.os.Vibrator},
2860      * {@link android.net.ConnectivityManager},
2861      * {@link android.net.wifi.WifiManager},
2862      * {@link android.media.AudioManager}, {@link android.media.MediaRouter},
2863      * {@link android.telephony.TelephonyManager}, {@link android.telephony.SubscriptionManager},
2864      * {@link android.view.inputmethod.InputMethodManager},
2865      * {@link android.app.UiModeManager}, {@link android.app.DownloadManager},
2866      * {@link android.os.BatteryManager}, {@link android.app.job.JobScheduler},
2867      * {@link android.app.usage.NetworkStatsManager}.
2868      * </p><p>
2869      * Note: System services obtained via this API may be closely associated with
2870      * the Context in which they are obtained from.  In general, do not share the
2871      * service objects between various different contexts (Activities, Applications,
2872      * Services, Providers, etc.)
2873      * </p>
2874      *
2875      * @param serviceClass The class of the desired service.
2876      * @return The service or null if the class is not a supported system service.
2877      */
2878     @SuppressWarnings("unchecked")
getSystemService(Class<T> serviceClass)2879     public final <T> T getSystemService(Class<T> serviceClass) {
2880         // Because subclasses may override getSystemService(String) we cannot
2881         // perform a lookup by class alone.  We must first map the class to its
2882         // service name then invoke the string-based method.
2883         String serviceName = getSystemServiceName(serviceClass);
2884         return serviceName != null ? (T)getSystemService(serviceName) : null;
2885     }
2886 
2887     /**
2888      * Gets the name of the system-level service that is represented by the specified class.
2889      *
2890      * @param serviceClass The class of the desired service.
2891      * @return The service name or null if the class is not a supported system service.
2892      */
getSystemServiceName(Class<?> serviceClass)2893     public abstract String getSystemServiceName(Class<?> serviceClass);
2894 
2895     /**
2896      * Use with {@link #getSystemService} to retrieve a
2897      * {@link android.os.PowerManager} for controlling power management,
2898      * including "wake locks," which let you keep the device on while
2899      * you're running long tasks.
2900      */
2901     public static final String POWER_SERVICE = "power";
2902 
2903     /**
2904      * Use with {@link #getSystemService} to retrieve a
2905      * {@link android.os.RecoverySystem} for accessing the recovery system
2906      * service.
2907      *
2908      * @see #getSystemService
2909      * @hide
2910      */
2911     public static final String RECOVERY_SERVICE = "recovery";
2912 
2913     /**
2914      * Use with {@link #getSystemService} to retrieve a
2915      * {@link android.view.WindowManager} for accessing the system's window
2916      * manager.
2917      *
2918      * @see #getSystemService
2919      * @see android.view.WindowManager
2920      */
2921     public static final String WINDOW_SERVICE = "window";
2922 
2923     /**
2924      * Use with {@link #getSystemService} to retrieve a
2925      * {@link android.view.LayoutInflater} for inflating layout resources in this
2926      * context.
2927      *
2928      * @see #getSystemService
2929      * @see android.view.LayoutInflater
2930      */
2931     public static final String LAYOUT_INFLATER_SERVICE = "layout_inflater";
2932 
2933     /**
2934      * Use with {@link #getSystemService} to retrieve a
2935      * {@link android.accounts.AccountManager} for receiving intents at a
2936      * time of your choosing.
2937      *
2938      * @see #getSystemService
2939      * @see android.accounts.AccountManager
2940      */
2941     public static final String ACCOUNT_SERVICE = "account";
2942 
2943     /**
2944      * Use with {@link #getSystemService} to retrieve a
2945      * {@link android.app.ActivityManager} for interacting with the global
2946      * system state.
2947      *
2948      * @see #getSystemService
2949      * @see android.app.ActivityManager
2950      */
2951     public static final String ACTIVITY_SERVICE = "activity";
2952 
2953     /**
2954      * Use with {@link #getSystemService} to retrieve a
2955      * {@link android.app.AlarmManager} for receiving intents at a
2956      * time of your choosing.
2957      *
2958      * @see #getSystemService
2959      * @see android.app.AlarmManager
2960      */
2961     public static final String ALARM_SERVICE = "alarm";
2962 
2963     /**
2964      * Use with {@link #getSystemService} to retrieve a
2965      * {@link android.app.NotificationManager} for informing the user of
2966      * background events.
2967      *
2968      * @see #getSystemService
2969      * @see android.app.NotificationManager
2970      */
2971     public static final String NOTIFICATION_SERVICE = "notification";
2972 
2973     /**
2974      * Use with {@link #getSystemService} to retrieve a
2975      * {@link android.view.accessibility.AccessibilityManager} for giving the user
2976      * feedback for UI events through the registered event listeners.
2977      *
2978      * @see #getSystemService
2979      * @see android.view.accessibility.AccessibilityManager
2980      */
2981     public static final String ACCESSIBILITY_SERVICE = "accessibility";
2982 
2983     /**
2984      * Use with {@link #getSystemService} to retrieve a
2985      * {@link android.view.accessibility.CaptioningManager} for obtaining
2986      * captioning properties and listening for changes in captioning
2987      * preferences.
2988      *
2989      * @see #getSystemService
2990      * @see android.view.accessibility.CaptioningManager
2991      */
2992     public static final String CAPTIONING_SERVICE = "captioning";
2993 
2994     /**
2995      * Use with {@link #getSystemService} to retrieve a
2996      * {@link android.app.NotificationManager} for controlling keyguard.
2997      *
2998      * @see #getSystemService
2999      * @see android.app.KeyguardManager
3000      */
3001     public static final String KEYGUARD_SERVICE = "keyguard";
3002 
3003     /**
3004      * Use with {@link #getSystemService} to retrieve a {@link
3005      * android.location.LocationManager} for controlling location
3006      * updates.
3007      *
3008      * @see #getSystemService
3009      * @see android.location.LocationManager
3010      */
3011     public static final String LOCATION_SERVICE = "location";
3012 
3013     /**
3014      * Use with {@link #getSystemService} to retrieve a
3015      * {@link android.location.CountryDetector} for detecting the country that
3016      * the user is in.
3017      *
3018      * @hide
3019      */
3020     public static final String COUNTRY_DETECTOR = "country_detector";
3021 
3022     /**
3023      * Use with {@link #getSystemService} to retrieve a {@link
3024      * android.app.SearchManager} for handling searches.
3025      *
3026      * @see #getSystemService
3027      * @see android.app.SearchManager
3028      */
3029     public static final String SEARCH_SERVICE = "search";
3030 
3031     /**
3032      * Use with {@link #getSystemService} to retrieve a {@link
3033      * android.hardware.SensorManager} for accessing sensors.
3034      *
3035      * @see #getSystemService
3036      * @see android.hardware.SensorManager
3037      */
3038     public static final String SENSOR_SERVICE = "sensor";
3039 
3040     /**
3041      * Use with {@link #getSystemService} to retrieve a {@link
3042      * android.os.storage.StorageManager} for accessing system storage
3043      * functions.
3044      *
3045      * @see #getSystemService
3046      * @see android.os.storage.StorageManager
3047      */
3048     public static final String STORAGE_SERVICE = "storage";
3049 
3050     /**
3051      * Use with {@link #getSystemService} to retrieve a
3052      * com.android.server.WallpaperService for accessing wallpapers.
3053      *
3054      * @see #getSystemService
3055      */
3056     public static final String WALLPAPER_SERVICE = "wallpaper";
3057 
3058     /**
3059      * Use with {@link #getSystemService} to retrieve a {@link
3060      * android.os.Vibrator} for interacting with the vibration hardware.
3061      *
3062      * @see #getSystemService
3063      * @see android.os.Vibrator
3064      */
3065     public static final String VIBRATOR_SERVICE = "vibrator";
3066 
3067     /**
3068      * Use with {@link #getSystemService} to retrieve a {@link
3069      * android.app.StatusBarManager} for interacting with the status bar.
3070      *
3071      * @see #getSystemService
3072      * @see android.app.StatusBarManager
3073      * @hide
3074      */
3075     public static final String STATUS_BAR_SERVICE = "statusbar";
3076 
3077     /**
3078      * Use with {@link #getSystemService} to retrieve a {@link
3079      * android.net.ConnectivityManager} for handling management of
3080      * network connections.
3081      *
3082      * @see #getSystemService
3083      * @see android.net.ConnectivityManager
3084      */
3085     public static final String CONNECTIVITY_SERVICE = "connectivity";
3086 
3087     /**
3088      * Use with {@link #getSystemService} to retrieve a {@link
3089      * android.os.IUpdateLock} for managing runtime sequences that
3090      * must not be interrupted by headless OTA application or similar.
3091      *
3092      * @hide
3093      * @see #getSystemService
3094      * @see android.os.UpdateLock
3095      */
3096     public static final String UPDATE_LOCK_SERVICE = "updatelock";
3097 
3098     /**
3099      * Constant for the internal network management service, not really a Context service.
3100      * @hide
3101      */
3102     public static final String NETWORKMANAGEMENT_SERVICE = "network_management";
3103 
3104     /**
3105      * Use with {@link #getSystemService} to retrieve a {@link
3106      * android.app.usage.NetworkStatsManager} for querying network usage stats.
3107      *
3108      * @see #getSystemService
3109      * @see android.app.usage.NetworkStatsManager
3110      */
3111     public static final String NETWORK_STATS_SERVICE = "netstats";
3112     /** {@hide} */
3113     public static final String NETWORK_POLICY_SERVICE = "netpolicy";
3114 
3115     /**
3116      * Use with {@link #getSystemService} to retrieve a {@link
3117      * android.net.wifi.WifiManager} for handling management of
3118      * Wi-Fi access.
3119      *
3120      * @see #getSystemService
3121      * @see android.net.wifi.WifiManager
3122      */
3123     public static final String WIFI_SERVICE = "wifi";
3124 
3125     /**
3126      * Use with {@link #getSystemService} to retrieve a {@link
3127      * android.net.wifi.p2p.WifiP2pManager} for handling management of
3128      * Wi-Fi peer-to-peer connections.
3129      *
3130      * @see #getSystemService
3131      * @see android.net.wifi.p2p.WifiP2pManager
3132      */
3133     public static final String WIFI_P2P_SERVICE = "wifip2p";
3134 
3135     /**
3136      * Use with {@link #getSystemService} to retrieve a
3137      * {@link android.net.wifi.nan.WifiNanManager} for handling management of
3138      * Wi-Fi NAN discovery and connections.
3139      *
3140      * @see #getSystemService
3141      * @see android.net.wifi.nan.WifiNanManager
3142      * @hide PROPOSED_NAN_API
3143      */
3144     public static final String WIFI_NAN_SERVICE = "wifinan";
3145 
3146     /**
3147      * Use with {@link #getSystemService} to retrieve a {@link
3148      * android.net.wifi.WifiScanner} for scanning the wifi universe
3149      *
3150      * @see #getSystemService
3151      * @see android.net.wifi.WifiScanner
3152      * @hide
3153      */
3154     @SystemApi
3155     public static final String WIFI_SCANNING_SERVICE = "wifiscanner";
3156 
3157     /**
3158      * Use with {@link #getSystemService} to retrieve a {@link
3159      * android.net.wifi.RttManager} for ranging devices with wifi
3160      *
3161      * @see #getSystemService
3162      * @see android.net.wifi.RttManager
3163      * @hide
3164      */
3165     @SystemApi
3166     public static final String WIFI_RTT_SERVICE = "rttmanager";
3167 
3168     /**
3169      * Use with {@link #getSystemService} to retrieve a {@link
3170      * android.net.EthernetManager} for handling management of
3171      * Ethernet access.
3172      *
3173      * @see #getSystemService
3174      * @see android.net.EthernetManager
3175      *
3176      * @hide
3177      */
3178     public static final String ETHERNET_SERVICE = "ethernet";
3179 
3180     /**
3181      * Use with {@link #getSystemService} to retrieve a {@link
3182      * android.net.nsd.NsdManager} for handling management of network service
3183      * discovery
3184      *
3185      * @see #getSystemService
3186      * @see android.net.nsd.NsdManager
3187      */
3188     public static final String NSD_SERVICE = "servicediscovery";
3189 
3190     /**
3191      * Use with {@link #getSystemService} to retrieve a
3192      * {@link android.media.AudioManager} for handling management of volume,
3193      * ringer modes and audio routing.
3194      *
3195      * @see #getSystemService
3196      * @see android.media.AudioManager
3197      */
3198     public static final String AUDIO_SERVICE = "audio";
3199 
3200     /**
3201      * Use with {@link #getSystemService} to retrieve a
3202      * {@link android.hardware.fingerprint.FingerprintManager} for handling management
3203      * of fingerprints.
3204      *
3205      * @see #getSystemService
3206      * @see android.hardware.fingerprint.FingerprintManager
3207      */
3208     public static final String FINGERPRINT_SERVICE = "fingerprint";
3209 
3210     /**
3211      * Use with {@link #getSystemService} to retrieve a
3212      * {@link android.media.MediaRouter} for controlling and managing
3213      * routing of media.
3214      *
3215      * @see #getSystemService
3216      * @see android.media.MediaRouter
3217      */
3218     public static final String MEDIA_ROUTER_SERVICE = "media_router";
3219 
3220     /**
3221      * Use with {@link #getSystemService} to retrieve a
3222      * {@link android.media.session.MediaSessionManager} for managing media Sessions.
3223      *
3224      * @see #getSystemService
3225      * @see android.media.session.MediaSessionManager
3226      */
3227     public static final String MEDIA_SESSION_SERVICE = "media_session";
3228 
3229     /**
3230      * Use with {@link #getSystemService} to retrieve a
3231      * {@link android.telephony.TelephonyManager} for handling management the
3232      * telephony features of the device.
3233      *
3234      * @see #getSystemService
3235      * @see android.telephony.TelephonyManager
3236      */
3237     public static final String TELEPHONY_SERVICE = "phone";
3238 
3239     /**
3240      * Use with {@link #getSystemService} to retrieve a
3241      * {@link android.telephony.SubscriptionManager} for handling management the
3242      * telephony subscriptions of the device.
3243      *
3244      * @see #getSystemService
3245      * @see android.telephony.SubscriptionManager
3246      */
3247     public static final String TELEPHONY_SUBSCRIPTION_SERVICE = "telephony_subscription_service";
3248 
3249     /**
3250      * Use with {@link #getSystemService} to retrieve a
3251      * {@link android.telecom.TelecomManager} to manage telecom-related features
3252      * of the device.
3253      *
3254      * @see #getSystemService
3255      * @see android.telecom.TelecomManager
3256      */
3257     public static final String TELECOM_SERVICE = "telecom";
3258 
3259     /**
3260      * Use with {@link #getSystemService} to retrieve a
3261      * {@link android.telephony.CarrierConfigManager} for reading carrier configuration values.
3262      *
3263      * @see #getSystemService
3264      * @see android.telephony.CarrierConfigManager
3265      */
3266     public static final String CARRIER_CONFIG_SERVICE = "carrier_config";
3267 
3268     /**
3269      * Use with {@link #getSystemService} to retrieve a
3270      * {@link android.text.ClipboardManager} for accessing and modifying
3271      * {@link android.content.ClipboardManager} for accessing and modifying
3272      * the contents of the global clipboard.
3273      *
3274      * @see #getSystemService
3275      * @see android.content.ClipboardManager
3276      */
3277     public static final String CLIPBOARD_SERVICE = "clipboard";
3278 
3279     /**
3280      * Use with {@link #getSystemService} to retrieve a
3281      * {@link android.view.inputmethod.InputMethodManager} for accessing input
3282      * methods.
3283      *
3284      * @see #getSystemService
3285      */
3286     public static final String INPUT_METHOD_SERVICE = "input_method";
3287 
3288     /**
3289      * Use with {@link #getSystemService} to retrieve a
3290      * {@link android.view.textservice.TextServicesManager} for accessing
3291      * text services.
3292      *
3293      * @see #getSystemService
3294      */
3295     public static final String TEXT_SERVICES_MANAGER_SERVICE = "textservices";
3296 
3297     /**
3298      * Use with {@link #getSystemService} to retrieve a
3299      * {@link android.appwidget.AppWidgetManager} for accessing AppWidgets.
3300      *
3301      * @see #getSystemService
3302      */
3303     public static final String APPWIDGET_SERVICE = "appwidget";
3304 
3305     /**
3306      * Official published name of the (internal) voice interaction manager service.
3307      *
3308      * @hide
3309      * @see #getSystemService
3310      */
3311     public static final String VOICE_INTERACTION_MANAGER_SERVICE = "voiceinteraction";
3312 
3313     /**
3314      * Use with {@link #getSystemService} to access the
3315      * {@link com.android.server.voiceinteraction.SoundTriggerService}.
3316      *
3317      * @hide
3318      * @see #getSystemService
3319      */
3320     public static final String SOUND_TRIGGER_SERVICE = "soundtrigger";
3321 
3322 
3323     /**
3324      * Use with {@link #getSystemService} to retrieve an
3325      * {@link android.app.backup.IBackupManager IBackupManager} for communicating
3326      * with the backup mechanism.
3327      * @hide
3328      *
3329      * @see #getSystemService
3330      */
3331     @SystemApi
3332     public static final String BACKUP_SERVICE = "backup";
3333 
3334     /**
3335      * Use with {@link #getSystemService} to retrieve a
3336      * {@link android.os.DropBoxManager} instance for recording
3337      * diagnostic logs.
3338      * @see #getSystemService
3339      */
3340     public static final String DROPBOX_SERVICE = "dropbox";
3341 
3342     /**
3343      * System service name for the DeviceIdleController.  There is no Java API for this.
3344      * @see #getSystemService
3345      * @hide
3346      */
3347     public static final String DEVICE_IDLE_CONTROLLER = "deviceidle";
3348 
3349     /**
3350      * Use with {@link #getSystemService} to retrieve a
3351      * {@link android.app.admin.DevicePolicyManager} for working with global
3352      * device policy management.
3353      *
3354      * @see #getSystemService
3355      */
3356     public static final String DEVICE_POLICY_SERVICE = "device_policy";
3357 
3358     /**
3359      * Use with {@link #getSystemService} to retrieve a
3360      * {@link android.app.UiModeManager} for controlling UI modes.
3361      *
3362      * @see #getSystemService
3363      */
3364     public static final String UI_MODE_SERVICE = "uimode";
3365 
3366     /**
3367      * Use with {@link #getSystemService} to retrieve a
3368      * {@link android.app.DownloadManager} for requesting HTTP downloads.
3369      *
3370      * @see #getSystemService
3371      */
3372     public static final String DOWNLOAD_SERVICE = "download";
3373 
3374     /**
3375      * Use with {@link #getSystemService} to retrieve a
3376      * {@link android.os.BatteryManager} for managing battery state.
3377      *
3378      * @see #getSystemService
3379      */
3380     public static final String BATTERY_SERVICE = "batterymanager";
3381 
3382     /**
3383      * Use with {@link #getSystemService} to retrieve a
3384      * {@link android.nfc.NfcManager} for using NFC.
3385      *
3386      * @see #getSystemService
3387      */
3388     public static final String NFC_SERVICE = "nfc";
3389 
3390     /**
3391      * Use with {@link #getSystemService} to retrieve a
3392      * {@link android.bluetooth.BluetoothManager} for using Bluetooth.
3393      *
3394      * @see #getSystemService
3395      */
3396     public static final String BLUETOOTH_SERVICE = "bluetooth";
3397 
3398     /**
3399      * Use with {@link #getSystemService} to retrieve a
3400      * {@link android.net.sip.SipManager} for accessing the SIP related service.
3401      *
3402      * @see #getSystemService
3403      */
3404     /** @hide */
3405     public static final String SIP_SERVICE = "sip";
3406 
3407     /**
3408      * Use with {@link #getSystemService} to retrieve a {@link
3409      * android.hardware.usb.UsbManager} for access to USB devices (as a USB host)
3410      * and for controlling this device's behavior as a USB device.
3411      *
3412      * @see #getSystemService
3413      * @see android.hardware.usb.UsbManager
3414      */
3415     public static final String USB_SERVICE = "usb";
3416 
3417     /**
3418      * Use with {@link #getSystemService} to retrieve a {@link
3419      * android.hardware.SerialManager} for access to serial ports.
3420      *
3421      * @see #getSystemService
3422      * @see android.hardware.SerialManager
3423      *
3424      * @hide
3425      */
3426     public static final String SERIAL_SERVICE = "serial";
3427 
3428     /**
3429      * Use with {@link #getSystemService} to retrieve a
3430      * {@link android.hardware.hdmi.HdmiControlManager} for controlling and managing
3431      * HDMI-CEC protocol.
3432      *
3433      * @see #getSystemService
3434      * @see android.hardware.hdmi.HdmiControlManager
3435      * @hide
3436      */
3437     @SystemApi
3438     public static final String HDMI_CONTROL_SERVICE = "hdmi_control";
3439 
3440     /**
3441      * Use with {@link #getSystemService} to retrieve a
3442      * {@link android.hardware.input.InputManager} for interacting with input devices.
3443      *
3444      * @see #getSystemService
3445      * @see android.hardware.input.InputManager
3446      */
3447     public static final String INPUT_SERVICE = "input";
3448 
3449     /**
3450      * Use with {@link #getSystemService} to retrieve a
3451      * {@link android.hardware.display.DisplayManager} for interacting with display devices.
3452      *
3453      * @see #getSystemService
3454      * @see android.hardware.display.DisplayManager
3455      */
3456     public static final String DISPLAY_SERVICE = "display";
3457 
3458     /**
3459      * Use with {@link #getSystemService} to retrieve a
3460      * {@link android.os.UserManager} for managing users on devices that support multiple users.
3461      *
3462      * @see #getSystemService
3463      * @see android.os.UserManager
3464      */
3465     public static final String USER_SERVICE = "user";
3466 
3467     /**
3468      * Use with {@link #getSystemService} to retrieve a
3469      * {@link android.content.pm.LauncherApps} for querying and monitoring launchable apps across
3470      * profiles of a user.
3471      *
3472      * @see #getSystemService
3473      * @see android.content.pm.LauncherApps
3474      */
3475     public static final String LAUNCHER_APPS_SERVICE = "launcherapps";
3476 
3477     /**
3478      * Use with {@link #getSystemService} to retrieve a
3479      * {@link android.content.RestrictionsManager} for retrieving application restrictions
3480      * and requesting permissions for restricted operations.
3481      * @see #getSystemService
3482      * @see android.content.RestrictionsManager
3483      */
3484     public static final String RESTRICTIONS_SERVICE = "restrictions";
3485 
3486     /**
3487      * Use with {@link #getSystemService} to retrieve a
3488      * {@link android.app.AppOpsManager} for tracking application operations
3489      * on the device.
3490      *
3491      * @see #getSystemService
3492      * @see android.app.AppOpsManager
3493      */
3494     public static final String APP_OPS_SERVICE = "appops";
3495 
3496     /**
3497      * Use with {@link #getSystemService} to retrieve a
3498      * {@link android.hardware.camera2.CameraManager} for interacting with
3499      * camera devices.
3500      *
3501      * @see #getSystemService
3502      * @see android.hardware.camera2.CameraManager
3503      */
3504     public static final String CAMERA_SERVICE = "camera";
3505 
3506     /**
3507      * {@link android.print.PrintManager} for printing and managing
3508      * printers and print tasks.
3509      *
3510      * @see #getSystemService
3511      * @see android.print.PrintManager
3512      */
3513     public static final String PRINT_SERVICE = "print";
3514 
3515     /**
3516      * Use with {@link #getSystemService} to retrieve a
3517      * {@link android.hardware.ConsumerIrManager} for transmitting infrared
3518      * signals from the device.
3519      *
3520      * @see #getSystemService
3521      * @see android.hardware.ConsumerIrManager
3522      */
3523     public static final String CONSUMER_IR_SERVICE = "consumer_ir";
3524 
3525     /**
3526      * {@link android.app.trust.TrustManager} for managing trust agents.
3527      * @see #getSystemService
3528      * @see android.app.trust.TrustManager
3529      * @hide
3530      */
3531     public static final String TRUST_SERVICE = "trust";
3532 
3533     /**
3534      * Use with {@link #getSystemService} to retrieve a
3535      * {@link android.media.tv.TvInputManager} for interacting with TV inputs
3536      * on the device.
3537      *
3538      * @see #getSystemService
3539      * @see android.media.tv.TvInputManager
3540      */
3541     public static final String TV_INPUT_SERVICE = "tv_input";
3542 
3543     /**
3544      * {@link android.net.NetworkScoreManager} for managing network scoring.
3545      * @see #getSystemService
3546      * @see android.net.NetworkScoreManager
3547      * @hide
3548      */
3549     @SystemApi
3550     public static final String NETWORK_SCORE_SERVICE = "network_score";
3551 
3552     /**
3553      * Use with {@link #getSystemService} to retrieve a {@link
3554      * android.app.usage.UsageStatsManager} for querying device usage stats.
3555      *
3556      * @see #getSystemService
3557      * @see android.app.usage.UsageStatsManager
3558      */
3559     public static final String USAGE_STATS_SERVICE = "usagestats";
3560 
3561     /**
3562      * Use with {@link #getSystemService} to retrieve a {@link
3563      * android.app.job.JobScheduler} instance for managing occasional
3564      * background tasks.
3565      * @see #getSystemService
3566      * @see android.app.job.JobScheduler
3567      */
3568     public static final String JOB_SCHEDULER_SERVICE = "jobscheduler";
3569 
3570     /**
3571      * Use with {@link #getSystemService} to retrieve a {@link
3572      * android.service.persistentdata.PersistentDataBlockManager} instance
3573      * for interacting with a storage device that lives across factory resets.
3574      *
3575      * @see #getSystemService
3576      * @see android.service.persistentdata.PersistentDataBlockManager
3577      * @hide
3578      */
3579     @SystemApi
3580     public static final String PERSISTENT_DATA_BLOCK_SERVICE = "persistent_data_block";
3581 
3582     /**
3583      * Use with {@link #getSystemService} to retrieve a {@link
3584      * android.media.projection.MediaProjectionManager} instance for managing
3585      * media projection sessions.
3586      * @see #getSystemService
3587      * @see android.media.projection.MediaProjectionManager
3588      */
3589     public static final String MEDIA_PROJECTION_SERVICE = "media_projection";
3590 
3591     /**
3592      * Use with {@link #getSystemService} to retrieve a
3593      * {@link android.media.midi.MidiManager} for accessing the MIDI service.
3594      *
3595      * @see #getSystemService
3596      */
3597     public static final String MIDI_SERVICE = "midi";
3598 
3599 
3600     /**
3601      * Use with {@link #getSystemService} to retrieve a
3602      * {@link android.hardware.radio.RadioManager} for accessing the broadcast radio service.
3603      *
3604      * @see #getSystemService
3605      * @hide
3606      */
3607     public static final String RADIO_SERVICE = "radio";
3608 
3609     /**
3610      * Use with {@link #getSystemService} to retrieve a
3611      * {@link android.os.HardwarePropertiesManager} for accessing the hardware properties service.
3612      *
3613      * @see #getSystemService
3614      */
3615     public static final String HARDWARE_PROPERTIES_SERVICE = "hardware_properties";
3616 
3617     /**
3618      * Use with {@link #getSystemService} to retrieve a
3619      * {@link android.content.pm.ShortcutManager} for accessing the launcher shortcut service.
3620      *
3621      * @see #getSystemService
3622      * @see android.content.pm.ShortcutManager
3623      */
3624     public static final String SHORTCUT_SERVICE = "shortcut";
3625 
3626     /**
3627      * Use with {@link #getSystemService} to retrieve a {@link
3628      * android.hardware.location.ContextHubManager} for accessing context hubs.
3629      *
3630      * @see #getSystemService
3631      * @see android.hardware.location.ContextHubManager
3632      *
3633      * @hide
3634      */
3635     @SystemApi
3636     public static final String CONTEXTHUB_SERVICE = "contexthub";
3637 
3638     /**
3639      * Use with {@link #getSystemService} to retrieve a
3640      * {@link android.os.health.SystemHealthManager} for accessing system health (battery, power,
3641      * memory, etc) metrics.
3642      *
3643      * @see #getSystemService
3644      */
3645     public static final String SYSTEM_HEALTH_SERVICE = "systemhealth";
3646 
3647     /**
3648      * Gatekeeper Service.
3649      * @hide
3650      */
3651     public static final String GATEKEEPER_SERVICE = "android.service.gatekeeper.IGateKeeperService";
3652 
3653     /**
3654      * Determine whether the given permission is allowed for a particular
3655      * process and user ID running in the system.
3656      *
3657      * @param permission The name of the permission being checked.
3658      * @param pid The process ID being checked against.  Must be > 0.
3659      * @param uid The user ID being checked against.  A uid of 0 is the root
3660      * user, which will pass every permission check.
3661      *
3662      * @return {@link PackageManager#PERMISSION_GRANTED} if the given
3663      * pid/uid is allowed that permission, or
3664      * {@link PackageManager#PERMISSION_DENIED} if it is not.
3665      *
3666      * @see PackageManager#checkPermission(String, String)
3667      * @see #checkCallingPermission
3668      */
3669     @CheckResult(suggest="#enforcePermission(String,int,int,String)")
3670     @PackageManager.PermissionResult
checkPermission(@onNull String permission, int pid, int uid)3671     public abstract int checkPermission(@NonNull String permission, int pid, int uid);
3672 
3673     /** @hide */
3674     @PackageManager.PermissionResult
checkPermission(@onNull String permission, int pid, int uid, IBinder callerToken)3675     public abstract int checkPermission(@NonNull String permission, int pid, int uid,
3676             IBinder callerToken);
3677 
3678     /**
3679      * Determine whether the calling process of an IPC you are handling has been
3680      * granted a particular permission.  This is basically the same as calling
3681      * {@link #checkPermission(String, int, int)} with the pid and uid returned
3682      * by {@link android.os.Binder#getCallingPid} and
3683      * {@link android.os.Binder#getCallingUid}.  One important difference
3684      * is that if you are not currently processing an IPC, this function
3685      * will always fail.  This is done to protect against accidentally
3686      * leaking permissions; you can use {@link #checkCallingOrSelfPermission}
3687      * to avoid this protection.
3688      *
3689      * @param permission The name of the permission being checked.
3690      *
3691      * @return {@link PackageManager#PERMISSION_GRANTED} if the calling
3692      * pid/uid is allowed that permission, or
3693      * {@link PackageManager#PERMISSION_DENIED} if it is not.
3694      *
3695      * @see PackageManager#checkPermission(String, String)
3696      * @see #checkPermission
3697      * @see #checkCallingOrSelfPermission
3698      */
3699     @CheckResult(suggest="#enforceCallingPermission(String,String)")
3700     @PackageManager.PermissionResult
checkCallingPermission(@onNull String permission)3701     public abstract int checkCallingPermission(@NonNull String permission);
3702 
3703     /**
3704      * Determine whether the calling process of an IPC <em>or you</em> have been
3705      * granted a particular permission.  This is the same as
3706      * {@link #checkCallingPermission}, except it grants your own permissions
3707      * if you are not currently processing an IPC.  Use with care!
3708      *
3709      * @param permission The name of the permission being checked.
3710      *
3711      * @return {@link PackageManager#PERMISSION_GRANTED} if the calling
3712      * pid/uid is allowed that permission, or
3713      * {@link PackageManager#PERMISSION_DENIED} if it is not.
3714      *
3715      * @see PackageManager#checkPermission(String, String)
3716      * @see #checkPermission
3717      * @see #checkCallingPermission
3718      */
3719     @CheckResult(suggest="#enforceCallingOrSelfPermission(String,String)")
3720     @PackageManager.PermissionResult
checkCallingOrSelfPermission(@onNull String permission)3721     public abstract int checkCallingOrSelfPermission(@NonNull String permission);
3722 
3723     /**
3724      * Determine whether <em>you</em> have been granted a particular permission.
3725      *
3726      * @param permission The name of the permission being checked.
3727      *
3728      * @return {@link PackageManager#PERMISSION_GRANTED} if you have the
3729      * permission, or {@link PackageManager#PERMISSION_DENIED} if not.
3730      *
3731      * @see PackageManager#checkPermission(String, String)
3732      * @see #checkCallingPermission(String)
3733      */
3734     @PackageManager.PermissionResult
checkSelfPermission(@onNull String permission)3735     public abstract int checkSelfPermission(@NonNull String permission);
3736 
3737     /**
3738      * If the given permission is not allowed for a particular process
3739      * and user ID running in the system, throw a {@link SecurityException}.
3740      *
3741      * @param permission The name of the permission being checked.
3742      * @param pid The process ID being checked against.  Must be &gt; 0.
3743      * @param uid The user ID being checked against.  A uid of 0 is the root
3744      * user, which will pass every permission check.
3745      * @param message A message to include in the exception if it is thrown.
3746      *
3747      * @see #checkPermission(String, int, int)
3748      */
enforcePermission( @onNull String permission, int pid, int uid, @Nullable String message)3749     public abstract void enforcePermission(
3750             @NonNull String permission, int pid, int uid, @Nullable String message);
3751 
3752     /**
3753      * If the calling process of an IPC you are handling has not been
3754      * granted a particular permission, throw a {@link
3755      * SecurityException}.  This is basically the same as calling
3756      * {@link #enforcePermission(String, int, int, String)} with the
3757      * pid and uid returned by {@link android.os.Binder#getCallingPid}
3758      * and {@link android.os.Binder#getCallingUid}.  One important
3759      * difference is that if you are not currently processing an IPC,
3760      * this function will always throw the SecurityException.  This is
3761      * done to protect against accidentally leaking permissions; you
3762      * can use {@link #enforceCallingOrSelfPermission} to avoid this
3763      * protection.
3764      *
3765      * @param permission The name of the permission being checked.
3766      * @param message A message to include in the exception if it is thrown.
3767      *
3768      * @see #checkCallingPermission(String)
3769      */
enforceCallingPermission( @onNull String permission, @Nullable String message)3770     public abstract void enforceCallingPermission(
3771             @NonNull String permission, @Nullable String message);
3772 
3773     /**
3774      * If neither you nor the calling process of an IPC you are
3775      * handling has been granted a particular permission, throw a
3776      * {@link SecurityException}.  This is the same as {@link
3777      * #enforceCallingPermission}, except it grants your own
3778      * permissions if you are not currently processing an IPC.  Use
3779      * with care!
3780      *
3781      * @param permission The name of the permission being checked.
3782      * @param message A message to include in the exception if it is thrown.
3783      *
3784      * @see #checkCallingOrSelfPermission(String)
3785      */
enforceCallingOrSelfPermission( @onNull String permission, @Nullable String message)3786     public abstract void enforceCallingOrSelfPermission(
3787             @NonNull String permission, @Nullable String message);
3788 
3789     /**
3790      * Grant permission to access a specific Uri to another package, regardless
3791      * of whether that package has general permission to access the Uri's
3792      * content provider.  This can be used to grant specific, temporary
3793      * permissions, typically in response to user interaction (such as the
3794      * user opening an attachment that you would like someone else to
3795      * display).
3796      *
3797      * <p>Normally you should use {@link Intent#FLAG_GRANT_READ_URI_PERMISSION
3798      * Intent.FLAG_GRANT_READ_URI_PERMISSION} or
3799      * {@link Intent#FLAG_GRANT_WRITE_URI_PERMISSION
3800      * Intent.FLAG_GRANT_WRITE_URI_PERMISSION} with the Intent being used to
3801      * start an activity instead of this function directly.  If you use this
3802      * function directly, you should be sure to call
3803      * {@link #revokeUriPermission} when the target should no longer be allowed
3804      * to access it.
3805      *
3806      * <p>To succeed, the content provider owning the Uri must have set the
3807      * {@link android.R.styleable#AndroidManifestProvider_grantUriPermissions
3808      * grantUriPermissions} attribute in its manifest or included the
3809      * {@link android.R.styleable#AndroidManifestGrantUriPermission
3810      * &lt;grant-uri-permissions&gt;} tag.
3811      *
3812      * @param toPackage The package you would like to allow to access the Uri.
3813      * @param uri The Uri you would like to grant access to.
3814      * @param modeFlags The desired access modes.  Any combination of
3815      * {@link Intent#FLAG_GRANT_READ_URI_PERMISSION
3816      * Intent.FLAG_GRANT_READ_URI_PERMISSION},
3817      * {@link Intent#FLAG_GRANT_WRITE_URI_PERMISSION
3818      * Intent.FLAG_GRANT_WRITE_URI_PERMISSION},
3819      * {@link Intent#FLAG_GRANT_PERSISTABLE_URI_PERMISSION
3820      * Intent.FLAG_GRANT_PERSISTABLE_URI_PERMISSION}, or
3821      * {@link Intent#FLAG_GRANT_PREFIX_URI_PERMISSION
3822      * Intent.FLAG_GRANT_PREFIX_URI_PERMISSION}.
3823      *
3824      * @see #revokeUriPermission
3825      */
grantUriPermission(String toPackage, Uri uri, @Intent.GrantUriMode int modeFlags)3826     public abstract void grantUriPermission(String toPackage, Uri uri,
3827             @Intent.GrantUriMode int modeFlags);
3828 
3829     /**
3830      * Remove all permissions to access a particular content provider Uri
3831      * that were previously added with {@link #grantUriPermission}.  The given
3832      * Uri will match all previously granted Uris that are the same or a
3833      * sub-path of the given Uri.  That is, revoking "content://foo/target" will
3834      * revoke both "content://foo/target" and "content://foo/target/sub", but not
3835      * "content://foo".  It will not remove any prefix grants that exist at a
3836      * higher level.
3837      *
3838      * <p>Prior to {@link android.os.Build.VERSION_CODES#LOLLIPOP}, if you did not have
3839      * regular permission access to a Uri, but had received access to it through
3840      * a specific Uri permission grant, you could not revoke that grant with this
3841      * function and a {@link SecurityException} would be thrown.  As of
3842      * {@link android.os.Build.VERSION_CODES#LOLLIPOP}, this function will not throw a security exception,
3843      * but will remove whatever permission grants to the Uri had been given to the app
3844      * (or none).</p>
3845      *
3846      * @param uri The Uri you would like to revoke access to.
3847      * @param modeFlags The desired access modes.  Any combination of
3848      * {@link Intent#FLAG_GRANT_READ_URI_PERMISSION
3849      * Intent.FLAG_GRANT_READ_URI_PERMISSION} or
3850      * {@link Intent#FLAG_GRANT_WRITE_URI_PERMISSION
3851      * Intent.FLAG_GRANT_WRITE_URI_PERMISSION}.
3852      *
3853      * @see #grantUriPermission
3854      */
revokeUriPermission(Uri uri, @Intent.AccessUriMode int modeFlags)3855     public abstract void revokeUriPermission(Uri uri, @Intent.AccessUriMode int modeFlags);
3856 
3857     /**
3858      * Determine whether a particular process and user ID has been granted
3859      * permission to access a specific URI.  This only checks for permissions
3860      * that have been explicitly granted -- if the given process/uid has
3861      * more general access to the URI's content provider then this check will
3862      * always fail.
3863      *
3864      * @param uri The uri that is being checked.
3865      * @param pid The process ID being checked against.  Must be &gt; 0.
3866      * @param uid The user ID being checked against.  A uid of 0 is the root
3867      * user, which will pass every permission check.
3868      * @param modeFlags The type of access to grant.  May be one or both of
3869      * {@link Intent#FLAG_GRANT_READ_URI_PERMISSION Intent.FLAG_GRANT_READ_URI_PERMISSION} or
3870      * {@link Intent#FLAG_GRANT_WRITE_URI_PERMISSION Intent.FLAG_GRANT_WRITE_URI_PERMISSION}.
3871      *
3872      * @return {@link PackageManager#PERMISSION_GRANTED} if the given
3873      * pid/uid is allowed to access that uri, or
3874      * {@link PackageManager#PERMISSION_DENIED} if it is not.
3875      *
3876      * @see #checkCallingUriPermission
3877      */
3878     @CheckResult(suggest="#enforceUriPermission(Uri,int,int,String)")
checkUriPermission(Uri uri, int pid, int uid, @Intent.AccessUriMode int modeFlags)3879     public abstract int checkUriPermission(Uri uri, int pid, int uid,
3880             @Intent.AccessUriMode int modeFlags);
3881 
3882     /** @hide */
checkUriPermission(Uri uri, int pid, int uid, @Intent.AccessUriMode int modeFlags, IBinder callerToken)3883     public abstract int checkUriPermission(Uri uri, int pid, int uid,
3884             @Intent.AccessUriMode int modeFlags, IBinder callerToken);
3885 
3886     /**
3887      * Determine whether the calling process and user ID has been
3888      * granted permission to access a specific URI.  This is basically
3889      * the same as calling {@link #checkUriPermission(Uri, int, int,
3890      * int)} with the pid and uid returned by {@link
3891      * android.os.Binder#getCallingPid} and {@link
3892      * android.os.Binder#getCallingUid}.  One important difference is
3893      * that if you are not currently processing an IPC, this function
3894      * will always fail.
3895      *
3896      * @param uri The uri that is being checked.
3897      * @param modeFlags The type of access to grant.  May be one or both of
3898      * {@link Intent#FLAG_GRANT_READ_URI_PERMISSION Intent.FLAG_GRANT_READ_URI_PERMISSION} or
3899      * {@link Intent#FLAG_GRANT_WRITE_URI_PERMISSION Intent.FLAG_GRANT_WRITE_URI_PERMISSION}.
3900      *
3901      * @return {@link PackageManager#PERMISSION_GRANTED} if the caller
3902      * is allowed to access that uri, or
3903      * {@link PackageManager#PERMISSION_DENIED} if it is not.
3904      *
3905      * @see #checkUriPermission(Uri, int, int, int)
3906      */
3907     @CheckResult(suggest="#enforceCallingUriPermission(Uri,int,String)")
checkCallingUriPermission(Uri uri, @Intent.AccessUriMode int modeFlags)3908     public abstract int checkCallingUriPermission(Uri uri, @Intent.AccessUriMode int modeFlags);
3909 
3910     /**
3911      * Determine whether the calling process of an IPC <em>or you</em> has been granted
3912      * permission to access a specific URI.  This is the same as
3913      * {@link #checkCallingUriPermission}, except it grants your own permissions
3914      * if you are not currently processing an IPC.  Use with care!
3915      *
3916      * @param uri The uri that is being checked.
3917      * @param modeFlags The type of access to grant.  May be one or both of
3918      * {@link Intent#FLAG_GRANT_READ_URI_PERMISSION Intent.FLAG_GRANT_READ_URI_PERMISSION} or
3919      * {@link Intent#FLAG_GRANT_WRITE_URI_PERMISSION Intent.FLAG_GRANT_WRITE_URI_PERMISSION}.
3920      *
3921      * @return {@link PackageManager#PERMISSION_GRANTED} if the caller
3922      * is allowed to access that uri, or
3923      * {@link PackageManager#PERMISSION_DENIED} if it is not.
3924      *
3925      * @see #checkCallingUriPermission
3926      */
3927     @CheckResult(suggest="#enforceCallingOrSelfUriPermission(Uri,int,String)")
checkCallingOrSelfUriPermission(Uri uri, @Intent.AccessUriMode int modeFlags)3928     public abstract int checkCallingOrSelfUriPermission(Uri uri,
3929             @Intent.AccessUriMode int modeFlags);
3930 
3931     /**
3932      * Check both a Uri and normal permission.  This allows you to perform
3933      * both {@link #checkPermission} and {@link #checkUriPermission} in one
3934      * call.
3935      *
3936      * @param uri The Uri whose permission is to be checked, or null to not
3937      * do this check.
3938      * @param readPermission The permission that provides overall read access,
3939      * or null to not do this check.
3940      * @param writePermission The permission that provides overall write
3941      * access, or null to not do this check.
3942      * @param pid The process ID being checked against.  Must be &gt; 0.
3943      * @param uid The user ID being checked against.  A uid of 0 is the root
3944      * user, which will pass every permission check.
3945      * @param modeFlags The type of access to grant.  May be one or both of
3946      * {@link Intent#FLAG_GRANT_READ_URI_PERMISSION Intent.FLAG_GRANT_READ_URI_PERMISSION} or
3947      * {@link Intent#FLAG_GRANT_WRITE_URI_PERMISSION Intent.FLAG_GRANT_WRITE_URI_PERMISSION}.
3948      *
3949      * @return {@link PackageManager#PERMISSION_GRANTED} if the caller
3950      * is allowed to access that uri or holds one of the given permissions, or
3951      * {@link PackageManager#PERMISSION_DENIED} if it is not.
3952      */
3953     @CheckResult(suggest="#enforceUriPermission(Uri,String,String,int,int,int,String)")
checkUriPermission(@ullable Uri uri, @Nullable String readPermission, @Nullable String writePermission, int pid, int uid, @Intent.AccessUriMode int modeFlags)3954     public abstract int checkUriPermission(@Nullable Uri uri, @Nullable String readPermission,
3955             @Nullable String writePermission, int pid, int uid,
3956             @Intent.AccessUriMode int modeFlags);
3957 
3958     /**
3959      * If a particular process and user ID has not been granted
3960      * permission to access a specific URI, throw {@link
3961      * SecurityException}.  This only checks for permissions that have
3962      * been explicitly granted -- if the given process/uid has more
3963      * general access to the URI's content provider then this check
3964      * will always fail.
3965      *
3966      * @param uri The uri that is being checked.
3967      * @param pid The process ID being checked against.  Must be &gt; 0.
3968      * @param uid The user ID being checked against.  A uid of 0 is the root
3969      * user, which will pass every permission check.
3970      * @param modeFlags The type of access to grant.  May be one or both of
3971      * {@link Intent#FLAG_GRANT_READ_URI_PERMISSION Intent.FLAG_GRANT_READ_URI_PERMISSION} or
3972      * {@link Intent#FLAG_GRANT_WRITE_URI_PERMISSION Intent.FLAG_GRANT_WRITE_URI_PERMISSION}.
3973      * @param message A message to include in the exception if it is thrown.
3974      *
3975      * @see #checkUriPermission(Uri, int, int, int)
3976      */
enforceUriPermission( Uri uri, int pid, int uid, @Intent.AccessUriMode int modeFlags, String message)3977     public abstract void enforceUriPermission(
3978             Uri uri, int pid, int uid, @Intent.AccessUriMode int modeFlags, String message);
3979 
3980     /**
3981      * If the calling process and user ID has not been granted
3982      * permission to access a specific URI, throw {@link
3983      * SecurityException}.  This is basically the same as calling
3984      * {@link #enforceUriPermission(Uri, int, int, int, String)} with
3985      * the pid and uid returned by {@link
3986      * android.os.Binder#getCallingPid} and {@link
3987      * android.os.Binder#getCallingUid}.  One important difference is
3988      * that if you are not currently processing an IPC, this function
3989      * will always throw a SecurityException.
3990      *
3991      * @param uri The uri that is being checked.
3992      * @param modeFlags The type of access to grant.  May be one or both of
3993      * {@link Intent#FLAG_GRANT_READ_URI_PERMISSION Intent.FLAG_GRANT_READ_URI_PERMISSION} or
3994      * {@link Intent#FLAG_GRANT_WRITE_URI_PERMISSION Intent.FLAG_GRANT_WRITE_URI_PERMISSION}.
3995      * @param message A message to include in the exception if it is thrown.
3996      *
3997      * @see #checkCallingUriPermission(Uri, int)
3998      */
enforceCallingUriPermission( Uri uri, @Intent.AccessUriMode int modeFlags, String message)3999     public abstract void enforceCallingUriPermission(
4000             Uri uri, @Intent.AccessUriMode int modeFlags, String message);
4001 
4002     /**
4003      * If the calling process of an IPC <em>or you</em> has not been
4004      * granted permission to access a specific URI, throw {@link
4005      * SecurityException}.  This is the same as {@link
4006      * #enforceCallingUriPermission}, except it grants your own
4007      * permissions if you are not currently processing an IPC.  Use
4008      * with care!
4009      *
4010      * @param uri The uri that is being checked.
4011      * @param modeFlags The type of access to grant.  May be one or both of
4012      * {@link Intent#FLAG_GRANT_READ_URI_PERMISSION Intent.FLAG_GRANT_READ_URI_PERMISSION} or
4013      * {@link Intent#FLAG_GRANT_WRITE_URI_PERMISSION Intent.FLAG_GRANT_WRITE_URI_PERMISSION}.
4014      * @param message A message to include in the exception if it is thrown.
4015      *
4016      * @see #checkCallingOrSelfUriPermission(Uri, int)
4017      */
enforceCallingOrSelfUriPermission( Uri uri, @Intent.AccessUriMode int modeFlags, String message)4018     public abstract void enforceCallingOrSelfUriPermission(
4019             Uri uri, @Intent.AccessUriMode int modeFlags, String message);
4020 
4021     /**
4022      * Enforce both a Uri and normal permission.  This allows you to perform
4023      * both {@link #enforcePermission} and {@link #enforceUriPermission} in one
4024      * call.
4025      *
4026      * @param uri The Uri whose permission is to be checked, or null to not
4027      * do this check.
4028      * @param readPermission The permission that provides overall read access,
4029      * or null to not do this check.
4030      * @param writePermission The permission that provides overall write
4031      * access, or null to not do this check.
4032      * @param pid The process ID being checked against.  Must be &gt; 0.
4033      * @param uid The user ID being checked against.  A uid of 0 is the root
4034      * user, which will pass every permission check.
4035      * @param modeFlags The type of access to grant.  May be one or both of
4036      * {@link Intent#FLAG_GRANT_READ_URI_PERMISSION Intent.FLAG_GRANT_READ_URI_PERMISSION} or
4037      * {@link Intent#FLAG_GRANT_WRITE_URI_PERMISSION Intent.FLAG_GRANT_WRITE_URI_PERMISSION}.
4038      * @param message A message to include in the exception if it is thrown.
4039      *
4040      * @see #checkUriPermission(Uri, String, String, int, int, int)
4041      */
enforceUriPermission( @ullable Uri uri, @Nullable String readPermission, @Nullable String writePermission, int pid, int uid, @Intent.AccessUriMode int modeFlags, @Nullable String message)4042     public abstract void enforceUriPermission(
4043             @Nullable Uri uri, @Nullable String readPermission,
4044             @Nullable String writePermission, int pid, int uid, @Intent.AccessUriMode int modeFlags,
4045             @Nullable String message);
4046 
4047     /** @hide */
4048     @IntDef(flag = true,
4049             value = {CONTEXT_INCLUDE_CODE, CONTEXT_IGNORE_SECURITY, CONTEXT_RESTRICTED})
4050     @Retention(RetentionPolicy.SOURCE)
4051     public @interface CreatePackageOptions {}
4052 
4053     /**
4054      * Flag for use with {@link #createPackageContext}: include the application
4055      * code with the context.  This means loading code into the caller's
4056      * process, so that {@link #getClassLoader()} can be used to instantiate
4057      * the application's classes.  Setting this flags imposes security
4058      * restrictions on what application context you can access; if the
4059      * requested application can not be safely loaded into your process,
4060      * java.lang.SecurityException will be thrown.  If this flag is not set,
4061      * there will be no restrictions on the packages that can be loaded,
4062      * but {@link #getClassLoader} will always return the default system
4063      * class loader.
4064      */
4065     public static final int CONTEXT_INCLUDE_CODE = 0x00000001;
4066 
4067     /**
4068      * Flag for use with {@link #createPackageContext}: ignore any security
4069      * restrictions on the Context being requested, allowing it to always
4070      * be loaded.  For use with {@link #CONTEXT_INCLUDE_CODE} to allow code
4071      * to be loaded into a process even when it isn't safe to do so.  Use
4072      * with extreme care!
4073      */
4074     public static final int CONTEXT_IGNORE_SECURITY = 0x00000002;
4075 
4076     /**
4077      * Flag for use with {@link #createPackageContext}: a restricted context may
4078      * disable specific features. For instance, a View associated with a restricted
4079      * context would ignore particular XML attributes.
4080      */
4081     public static final int CONTEXT_RESTRICTED = 0x00000004;
4082 
4083     /**
4084      * Flag for use with {@link #createPackageContext}: point all file APIs at
4085      * device-protected storage.
4086      *
4087      * @hide
4088      */
4089     public static final int CONTEXT_DEVICE_PROTECTED_STORAGE = 0x00000008;
4090 
4091     /**
4092      * Flag for use with {@link #createPackageContext}: point all file APIs at
4093      * credential-protected storage.
4094      *
4095      * @hide
4096      */
4097     public static final int CONTEXT_CREDENTIAL_PROTECTED_STORAGE = 0x00000010;
4098 
4099     /**
4100      * @hide Used to indicate we should tell the activity manager about the process
4101      * loading this code.
4102      */
4103     public static final int CONTEXT_REGISTER_PACKAGE = 0x40000000;
4104 
4105     /**
4106      * Return a new Context object for the given application name.  This
4107      * Context is the same as what the named application gets when it is
4108      * launched, containing the same resources and class loader.  Each call to
4109      * this method returns a new instance of a Context object; Context objects
4110      * are not shared, however they share common state (Resources, ClassLoader,
4111      * etc) so the Context instance itself is fairly lightweight.
4112      *
4113      * <p>Throws {@link android.content.pm.PackageManager.NameNotFoundException} if there is no
4114      * application with the given package name.
4115      *
4116      * <p>Throws {@link java.lang.SecurityException} if the Context requested
4117      * can not be loaded into the caller's process for security reasons (see
4118      * {@link #CONTEXT_INCLUDE_CODE} for more information}.
4119      *
4120      * @param packageName Name of the application's package.
4121      * @param flags Option flags, one of {@link #CONTEXT_INCLUDE_CODE}
4122      *              or {@link #CONTEXT_IGNORE_SECURITY}.
4123      *
4124      * @return A {@link Context} for the application.
4125      *
4126      * @throws SecurityException &nbsp;
4127      * @throws PackageManager.NameNotFoundException if there is no application with
4128      * the given package name.
4129      */
createPackageContext(String packageName, @CreatePackageOptions int flags)4130     public abstract Context createPackageContext(String packageName,
4131             @CreatePackageOptions int flags) throws PackageManager.NameNotFoundException;
4132 
4133     /**
4134      * Similar to {@link #createPackageContext(String, int)}, but with a
4135      * different {@link UserHandle}. For example, {@link #getContentResolver()}
4136      * will open any {@link Uri} as the given user.
4137      *
4138      * @hide
4139      */
createPackageContextAsUser( String packageName, int flags, UserHandle user)4140     public abstract Context createPackageContextAsUser(
4141             String packageName, int flags, UserHandle user)
4142             throws PackageManager.NameNotFoundException;
4143 
4144     /**
4145      * Creates a context given an {@link android.content.pm.ApplicationInfo}.
4146      *
4147      * @hide
4148      */
createApplicationContext(ApplicationInfo application, int flags)4149     public abstract Context createApplicationContext(ApplicationInfo application,
4150             int flags) throws PackageManager.NameNotFoundException;
4151 
4152     /**
4153      * Get the userId associated with this context
4154      * @return user id
4155      *
4156      * @hide
4157      */
4158     @TestApi
getUserId()4159     public abstract @UserIdInt int getUserId();
4160 
4161     /**
4162      * Return a new Context object for the current Context but whose resources
4163      * are adjusted to match the given Configuration.  Each call to this method
4164      * returns a new instance of a Context object; Context objects are not
4165      * shared, however common state (ClassLoader, other Resources for the
4166      * same configuration) may be so the Context itself can be fairly lightweight.
4167      *
4168      * @param overrideConfiguration A {@link Configuration} specifying what
4169      * values to modify in the base Configuration of the original Context's
4170      * resources.  If the base configuration changes (such as due to an
4171      * orientation change), the resources of this context will also change except
4172      * for those that have been explicitly overridden with a value here.
4173      *
4174      * @return A {@link Context} with the given configuration override.
4175      */
createConfigurationContext( @onNull Configuration overrideConfiguration)4176     public abstract Context createConfigurationContext(
4177             @NonNull Configuration overrideConfiguration);
4178 
4179     /**
4180      * Return a new Context object for the current Context but whose resources
4181      * are adjusted to match the metrics of the given Display.  Each call to this method
4182      * returns a new instance of a Context object; Context objects are not
4183      * shared, however common state (ClassLoader, other Resources for the
4184      * same configuration) may be so the Context itself can be fairly lightweight.
4185      *
4186      * The returned display Context provides a {@link WindowManager}
4187      * (see {@link #getSystemService(String)}) that is configured to show windows
4188      * on the given display.  The WindowManager's {@link WindowManager#getDefaultDisplay}
4189      * method can be used to retrieve the Display from the returned Context.
4190      *
4191      * @param display A {@link Display} object specifying the display
4192      * for whose metrics the Context's resources should be tailored and upon which
4193      * new windows should be shown.
4194      *
4195      * @return A {@link Context} for the display.
4196      */
createDisplayContext(@onNull Display display)4197     public abstract Context createDisplayContext(@NonNull Display display);
4198 
4199     /**
4200      * Return a new Context object for the current Context but whose storage
4201      * APIs are backed by device-protected storage.
4202      * <p>
4203      * On devices with direct boot, data stored in this location is encrypted
4204      * with a key tied to the physical device, and it can be accessed
4205      * immediately after the device has booted successfully, both
4206      * <em>before and after</em> the user has authenticated with their
4207      * credentials (such as a lock pattern or PIN).
4208      * <p>
4209      * Because device-protected data is available without user authentication,
4210      * you should carefully limit the data you store using this Context. For
4211      * example, storing sensitive authentication tokens or passwords in the
4212      * device-protected area is strongly discouraged.
4213      * <p>
4214      * If the underlying device does not have the ability to store
4215      * device-protected and credential-protected data using different keys, then
4216      * both storage areas will become available at the same time. They remain as
4217      * two distinct storage locations on disk, and only the window of
4218      * availability changes.
4219      * <p>
4220      * Each call to this method returns a new instance of a Context object;
4221      * Context objects are not shared, however common state (ClassLoader, other
4222      * Resources for the same configuration) may be so the Context itself can be
4223      * fairly lightweight.
4224      *
4225      * @see #isDeviceProtectedStorage()
4226      */
createDeviceProtectedStorageContext()4227     public abstract Context createDeviceProtectedStorageContext();
4228 
4229     /** @removed */
4230     @Deprecated
createDeviceEncryptedStorageContext()4231     public Context createDeviceEncryptedStorageContext() {
4232         return createDeviceProtectedStorageContext();
4233     }
4234 
4235     /**
4236      * Return a new Context object for the current Context but whose storage
4237      * APIs are backed by credential-protected storage. This is the default
4238      * storage area for apps unless
4239      * {@link android.R.attr#defaultToDeviceProtectedStorage} was requested.
4240      * <p>
4241      * On devices with direct boot, data stored in this location is encrypted
4242      * with a key tied to user credentials, which can be accessed
4243      * <em>only after</em> the user has entered their credentials (such as a
4244      * lock pattern or PIN).
4245      * <p>
4246      * If the underlying device does not have the ability to store
4247      * device-protected and credential-protected data using different keys, then
4248      * both storage areas will become available at the same time. They remain as
4249      * two distinct storage locations on disk, and only the window of
4250      * availability changes.
4251      * <p>
4252      * Each call to this method returns a new instance of a Context object;
4253      * Context objects are not shared, however common state (ClassLoader, other
4254      * Resources for the same configuration) may be so the Context itself can be
4255      * fairly lightweight.
4256      *
4257      * @see #isCredentialProtectedStorage()
4258      * @hide
4259      */
4260     @SystemApi
createCredentialProtectedStorageContext()4261     public abstract Context createCredentialProtectedStorageContext();
4262 
4263     /** @removed */
4264     @Deprecated
createCredentialEncryptedStorageContext()4265     public Context createCredentialEncryptedStorageContext() {
4266         return createCredentialProtectedStorageContext();
4267     }
4268 
4269     /**
4270      * Gets the display adjustments holder for this context.  This information
4271      * is provided on a per-application or activity basis and is used to simulate lower density
4272      * display metrics for legacy applications and restricted screen sizes.
4273      *
4274      * @param displayId The display id for which to get compatibility info.
4275      * @return The compatibility info holder, or null if not required by the application.
4276      * @hide
4277      */
getDisplayAdjustments(int displayId)4278     public abstract DisplayAdjustments getDisplayAdjustments(int displayId);
4279 
4280     /**
4281      * @hide
4282      */
getDisplay()4283     public abstract Display getDisplay();
4284 
4285     /**
4286      * Indicates whether this Context is restricted.
4287      *
4288      * @return {@code true} if this Context is restricted, {@code false} otherwise.
4289      *
4290      * @see #CONTEXT_RESTRICTED
4291      */
isRestricted()4292     public boolean isRestricted() {
4293         return false;
4294     }
4295 
4296     /**
4297      * Indicates if the storage APIs of this Context are backed by
4298      * device-protected storage.
4299      *
4300      * @see #createDeviceProtectedStorageContext()
4301      */
isDeviceProtectedStorage()4302     public abstract boolean isDeviceProtectedStorage();
4303 
4304     /** @removed */
4305     @Deprecated
isDeviceEncryptedStorage()4306     public boolean isDeviceEncryptedStorage() {
4307         return isDeviceProtectedStorage();
4308     }
4309 
4310     /**
4311      * Indicates if the storage APIs of this Context are backed by
4312      * credential-protected storage.
4313      *
4314      * @see #createCredentialProtectedStorageContext()
4315      * @hide
4316      */
4317     @SystemApi
isCredentialProtectedStorage()4318     public abstract boolean isCredentialProtectedStorage();
4319 
4320     /** @removed */
4321     @Deprecated
isCredentialEncryptedStorage()4322     public boolean isCredentialEncryptedStorage() {
4323         return isCredentialProtectedStorage();
4324     }
4325 }
4326