Skip to content

Commit 48be17b

Browse files
CI Update
Build.Reason:Manual by Peter Collins Build.Url:https://apidrop.visualstudio.com/Content%20CI/_build/results?buildId=488550&view=results source_repo.branch:dev/pjc/net-android-35 source_repo.url:https://apidrop.visualstudio.com/_git/binaries
1 parent 540a95e commit 48be17b

File tree

269 files changed

+1749
-2462
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

269 files changed

+1749
-2462
lines changed

docs/xml/Android.AccessibilityServices/AccessibilityService.xml

Lines changed: 10 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -85,22 +85,19 @@
8585
</intent-filter>
8686
<meta-data android:name="android.accessibilityservice" android:resource="@xml/accessibilityservice" />
8787
&amp;lt;/service&amp;gt;</code>
88-
<para>&lt;p class="note"&gt;
89-
&lt;strong&gt;Note:&lt;/strong&gt; This approach enables setting all properties.
90-
&lt;/p&gt;</para>
88+
<para>&lt;strong&gt;Note:&lt;/strong&gt; This approach enables setting all properties.</para>
9189
<para>For more details refer to <c>#SERVICE_META_DATA</c> and
9290
<c>&amp;lt;{@link android.R.styleable#AccessibilityService accessibility-service}&amp;gt;</c>.</para>
9391
<para>&lt;/li&gt;
9492
&lt;li&gt;
9593
Calling <c>AccessibilityService#setServiceInfo(AccessibilityServiceInfo)</c>. Note
96-
that this method can be called any time to dynamically change the service configuration.
97-
&lt;p class="note"&gt;
98-
&lt;strong&gt;Note:&lt;/strong&gt; This approach enables setting only dynamically configurable properties:
94+
that this method can be called any time to dynamically change the service configuration.</para>
95+
<para>&lt;strong&gt;Note:&lt;/strong&gt; This approach enables setting only dynamically configurable properties:
9996
<c>AccessibilityServiceInfo#eventTypes</c>,
10097
<c>AccessibilityServiceInfo#feedbackType</c>,
10198
<c>AccessibilityServiceInfo#flags</c>,
10299
<c>AccessibilityServiceInfo#notificationTimeout</c>,
103-
<c>AccessibilityServiceInfo#packageNames</c>&lt;/p&gt;</para>
100+
<c>AccessibilityServiceInfo#packageNames</c></para>
104101
<para>For more details refer to <c>AccessibilityServiceInfo</c>.</para>
105102
<para>&lt;/li&gt;
106103
&lt;/ul&gt;
@@ -115,13 +112,11 @@
115112
<c>AccessibilityService#findFocus(int)</c>,
116113
<c>AccessibilityService#getWindows()</c>, or
117114
<c>AccessibilityService#getRootInActiveWindow()</c>.</para>
118-
<para>&lt;p class="note"&gt;
119-
&lt;strong&gt;Note&lt;/strong&gt; An accessibility service may have requested to be notified for
115+
<para>&lt;strong&gt;Note&lt;/strong&gt; An accessibility service may have requested to be notified for
120116
a subset of the event types, and thus be unaware when the node hierarchy has changed. It is also
121117
possible for a node to contain outdated information because the window content may change at any
122-
time.
123-
&lt;/p&gt;
124-
&lt;h3&gt;Drawing Accessibility Overlays&lt;/h3&gt;</para>
118+
time.</para>
119+
<para>&lt;h3&gt;Drawing Accessibility Overlays&lt;/h3&gt;</para>
125120
<para>Accessibility services can draw overlays on top of existing screen contents.
126121
Accessibility overlays can be used to visually highlight items on the screen
127122
e.g. indicate the current item with accessibility focus.
@@ -144,12 +139,11 @@
144139
<para>&lt;h3&gt;Notification strategy&lt;/h3&gt;</para>
145140
<para>All accessibility services are notified of all events they have requested, regardless of their
146141
feedback type.</para>
147-
<para>&lt;p class="note"&gt;
148-
&lt;strong&gt;Note:&lt;/strong&gt; The event notification timeout is useful to avoid propagating
142+
<para>&lt;strong&gt;Note:&lt;/strong&gt; The event notification timeout is useful to avoid propagating
149143
events to the client too frequently since this is accomplished via an expensive
150144
interprocess call. One can think of the timeout as a criteria to determine when
151-
event generation has settled down.&lt;/p&gt;
152-
&lt;h3&gt;Event types&lt;/h3&gt;
145+
event generation has settled down.</para>
146+
<para>&lt;h3&gt;Event types&lt;/h3&gt;
153147
&lt;ul&gt;
154148
&lt;li&gt;<c>AccessibilityEvent#TYPE_VIEW_CLICKED</c>&lt;/li&gt;
155149
&lt;li&gt;<c>AccessibilityEvent#TYPE_VIEW_LONG_CLICKED</c>&lt;/li&gt;

docs/xml/Android.Animation/AnimatorSet+Builder.xml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -30,23 +30,23 @@
3030
intention of the <c>Builder</c> methods, along with the <c>AnimatorSet#play(Animator) play()</c> method of <c>AnimatorSet</c> is to make it possible
3131
to express the dependency relationships of animations in a natural way. Developers can also
3232
use the <c>AnimatorSet#playTogether(Animator[]) playTogether()</c> and <c>AnimatorSet#playSequentially(Animator[]) playSequentially()</c> methods if these suit the need,
33-
but it might be easier in some situations to express the AnimatorSet of animations in pairs.
34-
&lt;p/&gt;</para>
33+
but it might be easier in some situations to express the AnimatorSet of animations in pairs.</para>
34+
<para />
3535
<para>The <c>Builder</c> object cannot be constructed directly, but is rather constructed
3636
internally via a call to <c>AnimatorSet#play(Animator)</c>.</para>
37-
<para>&lt;p/&gt;</para>
37+
<para />
3838
<para>For example, this sets up a AnimatorSet to play anim1 and anim2 at the same time, anim3 to
3939
play when anim2 finishes, and anim4 to play when anim3 finishes:</para>
4040
<code lang="text/java">AnimatorSet s = new AnimatorSet();
4141
s.play(anim1).with(anim2);
4242
s.play(anim2).before(anim3);
4343
s.play(anim4).after(anim3);
4444
</code>
45-
<para>&lt;p/&gt;</para>
45+
<para />
4646
<para>Note in the example that both <c>Builder#before(Animator)</c> and <c>Builder#after(Animator)</c> are used. These are just different ways of expressing the same
4747
relationship and are provided to make it easier to say things in a way that is more natural,
4848
depending on the situation.</para>
49-
<para>&lt;p/&gt;</para>
49+
<para />
5050
<para>It is possible to make several calls into the same <c>Builder</c> object to express
5151
multiple relationships. However, note that it is only the animation passed into the initial
5252
<c>AnimatorSet#play(Animator)</c> method that is the dependency in any of the successive
@@ -62,7 +62,7 @@
6262
s.play(anim1).before(anim2);
6363
s.play(anim2).before(anim3);
6464
</code>
65-
<para>&lt;p/&gt;</para>
65+
<para />
6666
<para>Note that it is possible to express relationships that cannot be resolved and will not
6767
result in sensible results. For example, <c>play(anim1).after(anim1)</c> makes no
6868
sense. In general, circular dependencies like this one (or more indirect ones where a depends

docs/xml/Android.App.Admin/DevicePolicyManager.xml

Lines changed: 39 additions & 56 deletions
Original file line numberDiff line numberDiff line change
@@ -29,22 +29,19 @@
2929
apps running on the device.</para>
3030
<para>This class contains three types of methods:
3131
&lt;ol&gt;&lt;li&gt;Those aimed at managing apps&lt;li&gt;Those aimed at the Device Policy Management Role Holder&lt;li&gt;Those aimed at apps which wish to respect device policy&lt;/ol&gt;</para>
32-
<para>The intended caller for each API is indicated in its Javadoc.
33-
34-
&lt;p id="managingapps"&gt;&lt;b&gt;Managing Apps&lt;/b&gt;</para>
32+
<para>The intended caller for each API is indicated in its Javadoc.</para>
33+
<para>&lt;b&gt;Managing Apps&lt;/b&gt;</para>
3534
<para>Apps can be made capable of setting device policy ("Managing Apps") either by
3635
being set as a Device Administrator, being set as a
3736
Device Policy Controller, or by holding the
38-
appropriate Permissions.
39-
40-
&lt;p id="deviceadmin"&gt;A &lt;b&gt;Device Administrator&lt;/b&gt; is an app which is able to enforce device
37+
appropriate Permissions.</para>
38+
<para>A &lt;b&gt;Device Administrator&lt;/b&gt; is an app which is able to enforce device
4139
policies that it has declared in its device admin XML file. An app can prompt the user to give it
4240
device administator privileges using the <c>#ACTION_ADD_DEVICE_ADMIN</c> action.</para>
4341
<para>For more information about Device Administration, read the
4442
<see href="https://developer.android.com/guide/topics/admin/device-admin.html">Device Administration</see>
45-
developer guide.
46-
47-
&lt;p id="devicepolicycontroller"&gt;Through Managed Provisioning,
43+
developer guide.</para>
44+
<para>Through Managed Provisioning,
4845
Device Administrator apps can also be recognised as &lt;b&gt;
4946
Device Policy Controllers&lt;/b&gt;. Device Policy Controllers can be one of
5047
two types:
@@ -74,35 +71,30 @@
7471
Controller</see>.</para>
7572
<para>Permissions are generally only given to apps
7673
fulfilling particular key roles on the device (such as managing <c>DeviceLockManager
77-
device locks</c>).
78-
79-
&lt;p id="roleholder"&gt;&lt;b&gt;Device Policy Management Role Holder&lt;/b&gt;</para>
74+
device locks</c>).</para>
75+
<para>&lt;b&gt;Device Policy Management Role Holder&lt;/b&gt;</para>
8076
<para>One app on the device fulfills the <c>RoleManager#ROLE_DEVICE_POLICY_MANAGEMENT Device
8177
Policy Management Role</c> and is trusted with managing the overall state of
8278
Device Policy. This has access to much more powerful methods than
83-
managing apps.
84-
85-
&lt;p id="querying"&gt;&lt;b&gt;Querying Device Policy&lt;/b&gt;</para>
79+
managing apps.</para>
80+
<para>&lt;b&gt;Querying Device Policy&lt;/b&gt;</para>
8681
<para>In most cases, regular apps do not need to concern themselves with device
8782
policy, and restrictions will be enforced automatically. There are some cases
8883
where an app may wish to query device policy to provide a better user
8984
experience. Only a small number of policies allow apps to query them directly.
90-
These APIs will typically have no special required permissions.
91-
92-
&lt;p id="managedprovisioning"&gt;&lt;b&gt;Managed Provisioning&lt;/b&gt;</para>
85+
These APIs will typically have no special required permissions.</para>
86+
<para>&lt;b&gt;Managed Provisioning&lt;/b&gt;</para>
9387
<para>Managed Provisioning is the process of recognising an app as a
9488
Profile Owner. It
9589
involves presenting education and consent screens to the user to ensure they
9690
are aware of the capabilities this grants the Device Policy
9791
Controller</para>
9892
<para>For more information on provisioning, see <see href="https://developer.android.com/work/dpc/build-dpc">Building a
99-
Device Policy Controller</see>.
100-
101-
&lt;p id="managed_profile"&gt;A &lt;b&gt;Managed Profile&lt;/b&gt; enables data separation. For example to use
93+
Device Policy Controller</see>.</para>
94+
<para>A &lt;b&gt;Managed Profile&lt;/b&gt; enables data separation. For example to use
10295
a device both for personal and corporate usage. The managed profile and its
103-
<c>UserManager#getProfileParent parent</c> share a launcher.
104-
105-
&lt;p id="affiliated"&gt;&lt;b&gt;Affiliation&lt;/b&gt;</para>
96+
<c>UserManager#getProfileParent parent</c> share a launcher.</para>
97+
<para>&lt;b&gt;Affiliation&lt;/b&gt;</para>
10698
<para>Using the <c>#setAffiliationIds</c> method, a
10799
Device Owner can set a list of affiliation ids for the
108100
<c>UserManager#isSystemUser System User</c>. Any Profile Owner on
@@ -116,22 +108,19 @@
116108
that of the Device Owner. It also allows use of the
117109
<c>#bindDeviceAdminServiceAsUser</c> APIs for direct communication between the
118110
Device Owner and
119-
affiliated Profile Owners.
120-
121-
&lt;p id="organization-owned"&gt;&lt;b&gt;Organization Owned&lt;/b&gt;</para>
111+
affiliated Profile Owners.</para>
112+
<para>&lt;b&gt;Organization Owned&lt;/b&gt;</para>
122113
<para>An organization owned device is one which is not owned by the person making use of the device and
123114
is instead owned by an organization such as their employer or education provider. These devices
124115
are recognised as being organization owned either by the presence of a
125116
device owner or of a
126117
<c>#isOrganizationOwnedDeviceWithManagedProfile profile which has a profile owner is marked
127-
as organization owned</c>.
128-
129-
&lt;p id="profile-on-parent-organization-owned"&gt;Profile owners running on an
118+
as organization owned</c>.</para>
119+
<para>Profile owners running on an
130120
organization owned device can exercise additional capabilities
131121
using the <c>#getParentProfileInstance(ComponentName)</c> API which apply to the parent user.
132-
Each API will indicate if it is usable in this way.
133-
134-
&lt;p id="automotive"&gt;&lt;b&gt;Android Automotive&lt;/b&gt;</para>
122+
Each API will indicate if it is usable in this way.</para>
123+
<para>&lt;b&gt;Android Automotive&lt;/b&gt;</para>
135124
<para>On <c>android.content.pm.PackageManager#FEATURE_AUTOMOTIVE
136125
"Android Automotive builds"</c>, some methods can throw
137126
<c>UnsafeStateException "an exception"</c> if an action is unsafe (for example, if the vehicle
@@ -351,10 +340,9 @@
351340
<remarks>
352341
<para>Broadcast Action: Sent after application delegation scopes are changed. The new delegation
353342
scopes will be sent in an <c>ArrayList&lt;String&gt;</c> extra identified by the
354-
<c>#EXTRA_DELEGATION_SCOPES</c> key.
355-
356-
&lt;p class="note"&gt;&lt;b&gt;Note:&lt;/b&gt; This is a protected intent that can only be sent by the
357-
system.&lt;/p&gt;</para>
343+
<c>#EXTRA_DELEGATION_SCOPES</c> key.</para>
344+
<para>&lt;b&gt;Note:&lt;/b&gt; This is a protected intent that can only be sent by the
345+
system.</para>
358346
<para>
359347
<format type="text/html">
360348
<a href="https://developer.android.com/reference/android/app/admin/DevicePolicyManager#ACTION_APPLICATION_DELEGATION_SCOPES_CHANGED" title="Reference documentation">Java documentation for <code>android.app.admin.DevicePolicyManager.ACTION_APPLICATION_DELEGATION_SCOPES_CHANGED</code>.</a>
@@ -12461,7 +12449,8 @@
1246112449
A device owner app is a special device admin that cannot be deactivated by the user, once
1246212450
activated as a device admin. It also cannot be uninstalled. To check whether a particular
1246312451
package is currently registered as the device owner app, pass in the package name from
12464-
<c>Context#getPackageName()</c> to this method.&lt;p/&gt;This is useful for device
12452+
<c>Context#getPackageName()</c> to this method.</para>
12453+
<para>This is useful for device
1246512454
admin apps that want to check whether they are also registered as the device owner app. The
1246612455
exact mechanism by which a device admin app is registered as a device owner app is defined by
1246712456
the setup process.</para>
@@ -22223,20 +22212,16 @@
2222322212
cannot manage it through the UI, and <c>#PERMISSION_GRANT_STATE_GRANTED granted</c> in which
2222422213
the permission is granted and the user cannot manage it through the UI. This method can only
2222522214
be called by a profile owner, device owner, or a delegate given the
22226-
<c>#DELEGATION_PERMISSION_GRANT</c> scope via <c>#setDelegatedScopes</c>.
22227-
&lt;p/&gt;
22228-
Note that user cannot manage other permissions in the affected group through the UI
22215+
<c>#DELEGATION_PERMISSION_GRANT</c> scope via <c>#setDelegatedScopes</c>.</para>
22216+
<para>Note that user cannot manage other permissions in the affected group through the UI
2222922217
either and their granted state will be kept as the current value. Thus, it's recommended that
22230-
you set the grant state of all the permissions in the affected group.
22231-
&lt;p/&gt;
22232-
Setting the grant state to <c>#PERMISSION_GRANT_STATE_DEFAULT default</c> does not revoke
22233-
the permission. It retains the previous grant, if any.
22234-
&lt;p/&gt;
22235-
Device admins with a <c>targetSdkVersion</c> &amp;lt; <c>android.os.Build.VERSION_CODES#Q</c>
22218+
you set the grant state of all the permissions in the affected group.</para>
22219+
<para>Setting the grant state to <c>#PERMISSION_GRANT_STATE_DEFAULT default</c> does not revoke
22220+
the permission. It retains the previous grant, if any.</para>
22221+
<para>Device admins with a <c>targetSdkVersion</c> &amp;lt; <c>android.os.Build.VERSION_CODES#Q</c>
2223622222
cannot grant and revoke permissions for applications built with a <c>targetSdkVersion</c>
22237-
&amp;lt; <c>android.os.Build.VERSION_CODES#M</c>.
22238-
&lt;p/&gt;
22239-
Admins with a <c>targetSdkVersion</c> &amp;ge; <c>android.os.Build.VERSION_CODES#Q</c> can
22223+
&amp;lt; <c>android.os.Build.VERSION_CODES#M</c>.</para>
22224+
<para>Admins with a <c>targetSdkVersion</c> &amp;ge; <c>android.os.Build.VERSION_CODES#Q</c> can
2224022225
grant and revoke permissions of all apps. Similar to the user revoking a permission from a
2224122226
application built with a <c>targetSdkVersion</c> &amp;lt;
2224222227
<c>android.os.Build.VERSION_CODES#M</c> the app-op matching the permission is set to
@@ -22338,9 +22323,8 @@
2233822323
can allow automatic granting or denying of runtime permission requests by an application.
2233922324
This also applies to new permissions declared by app updates. When a permission is denied or
2234022325
granted this way, the effect is equivalent to setting the permission * grant state via
22341-
<c>#setPermissionGrantState</c>.
22342-
&lt;p/&gt;
22343-
As this policy only acts on runtime permission requests, it only applies to applications
22326+
<c>#setPermissionGrantState</c>.</para>
22327+
<para>As this policy only acts on runtime permission requests, it only applies to applications
2234422328
built with a <c>targetSdkVersion</c> of <c>android.os.Build.VERSION_CODES#M</c> or later.</para>
2234522329
<para>NOTE: On devices running <c>android.os.Build.VERSION_CODES#S</c> and above, an auto-grant
2234622330
policy will not apply to certain sensors-related permissions on some configurations.
@@ -22960,9 +22944,8 @@
2296022944
local or remote administrator of the user.</summary>
2296122945
<remarks>
2296222946
<para>Designates a specific service component as the provider for making permission requests of a
22963-
local or remote administrator of the user.
22964-
&lt;p/&gt;
22965-
Only a device owner or profile owner can designate the restrictions provider.</para>
22947+
local or remote administrator of the user.</para>
22948+
<para>Only a device owner or profile owner can designate the restrictions provider.</para>
2296622949
<para>
2296722950
<format type="text/html">
2296822951
<a href="https://developer.android.com/reference/android/app/admin/DevicePolicyManager#setRestrictionsProvider(android.content.ComponentName,%20android.content.ComponentName)" title="Reference documentation">Java documentation for <code>android.app.admin.DevicePolicyManager.setRestrictionsProvider(android.content.ComponentName, android.content.ComponentName)</code>.</a>

0 commit comments

Comments
 (0)