java.lang.Object | |
↳ | android.content.Context |
![]() |
![]() |
Interface to global information about an application environment. This is an abstract class whose implementation is provided by the Android system. It allows access to application-specific resources and classes, as well as up-calls for application-level operations such as launching activities, broadcasting and receiving intents, etc.
Constants | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
String | ACCESSIBILITY_SERVICE | Use with getSystemService(String) to retrieve a AccessibilityManager for giving the user feedback for UI events through the registered event listeners. |
|||||||||
String | ACCOUNT_SERVICE | Use with getSystemService(String) to retrieve a AccountManager for receiving intents at a time of your choosing. |
|||||||||
String | ACTIVITY_SERVICE | Use with getSystemService(String) to retrieve a ActivityManager for interacting with the global system state. |
|||||||||
String | ALARM_SERVICE | Use with getSystemService(String) to retrieve a AlarmManager for receiving intents at a time of your choosing. |
|||||||||
String | AUDIO_SERVICE | Use with getSystemService(String) to retrieve a AudioManager for handling management of volume, ringer modes and audio routing. |
|||||||||
int | BIND_ABOVE_CLIENT | Flag for bindService(Intent, ServiceConnection, int) : indicates that the client application binding to this service considers the service to be more important than the app itself. |
|||||||||
int | BIND_ADJUST_WITH_ACTIVITY | Flag for bindService(Intent, ServiceConnection, int) : If binding from an activity, allow the target service's process importance to be raised based on whether the activity is visible to the user, regardless whether another flag is used to reduce the amount that the client process's overall importance is used to impact it. |
|||||||||
int | BIND_ALLOW_OOM_MANAGEMENT | Flag for bindService(Intent, ServiceConnection, int) : allow the process hosting the bound service to go through its normal memory management. |
|||||||||
int | BIND_AUTO_CREATE | Flag for bindService(Intent, ServiceConnection, int) : automatically create the service as long as the binding exists. |
|||||||||
int | BIND_DEBUG_UNBIND | Flag for bindService(Intent, ServiceConnection, int) : include debugging help for mismatched calls to unbind. |
|||||||||
int | BIND_IMPORTANT | Flag for bindService(Intent, ServiceConnection, int) : this service is very important to the client, so should be brought to the foreground process level when the client is. |
|||||||||
int | BIND_NOT_FOREGROUND | Flag for bindService(Intent, ServiceConnection, int) : don't allow this binding to raise the target service's process to the foreground scheduling priority. |
|||||||||
int | BIND_WAIVE_PRIORITY | Flag for bindService(Intent, ServiceConnection, int) : don't impact the scheduling or memory management priority of the target service's hosting process. |
|||||||||
String | CLIPBOARD_SERVICE | Use with getSystemService(String) to retrieve a ClipboardManager for accessing and modifying the contents of the global clipboard. |
|||||||||
String | CONNECTIVITY_SERVICE | Use with getSystemService(String) to retrieve a ConnectivityManager for handling management of network connections. |
|||||||||
int | CONTEXT_IGNORE_SECURITY | Flag for use with createPackageContext(String, int) : ignore any security restrictions on the Context being requested, allowing it to always be loaded. |
|||||||||
int | CONTEXT_INCLUDE_CODE | Flag for use with createPackageContext(String, int) : include the application code with the context. |
|||||||||
int | CONTEXT_RESTRICTED | Flag for use with createPackageContext(String, int) : a restricted context may disable specific features. |
|||||||||
String | DEVICE_POLICY_SERVICE | Use with getSystemService(String) to retrieve a DevicePolicyManager for working with global device policy management. |
|||||||||
String | DISPLAY_SERVICE | Use with getSystemService(String) to retrieve a DisplayManager for interacting with display devices. |
|||||||||
String | DOWNLOAD_SERVICE | Use with getSystemService(String) to retrieve a DownloadManager for requesting HTTP downloads. |
|||||||||
String | DROPBOX_SERVICE | Use with getSystemService(String) to retrieve a DropBoxManager instance for recording diagnostic logs. |
|||||||||
String | INPUT_METHOD_SERVICE | Use with getSystemService(String) to retrieve a InputMethodManager for accessing input methods. |
|||||||||
String | INPUT_SERVICE | Use with getSystemService(String) to retrieve a InputManager for interacting with input devices. |
|||||||||
String | KEYGUARD_SERVICE | Use with getSystemService(String) to retrieve a NotificationManager for controlling keyguard. |
|||||||||
String | LAYOUT_INFLATER_SERVICE | Use with getSystemService(String) to retrieve a LayoutInflater for inflating layout resources in this context. |
|||||||||
String | LOCATION_SERVICE | Use with getSystemService(String) to retrieve a LocationManager for controlling location updates. |
|||||||||
String | MEDIA_ROUTER_SERVICE | Use with getSystemService(String) to retrieve a MediaRouter for controlling and managing routing of media. |
|||||||||
int | MODE_APPEND | File creation mode: for use with openFileOutput(String, int) , if the file already exists then write data to the end of the existing file instead of erasing it. |
|||||||||
int | MODE_ENABLE_WRITE_AHEAD_LOGGING | Database open flag: when set, the database is opened with write-ahead logging enabled by default. | |||||||||
int | MODE_MULTI_PROCESS | SharedPreference loading flag: when set, the file on disk will be checked for modification even if the shared preferences instance is already loaded in this process. | |||||||||
int | MODE_PRIVATE | File creation mode: the default mode, where the created file can only be accessed by the calling application (or all applications sharing the same user ID). | |||||||||
int | MODE_WORLD_READABLE | This constant was deprecated in API level 17. Creating world-readable files is very dangerous, and likely to cause security holes in applications. It is strongly discouraged; instead, applications should use more formal mechanism for interactions such as ContentProvider , BroadcastReceiver , and Service . There are no guarantees that this access mode will remain on a file, such as when it goes through a backup and restore. File creation mode: allow all other applications to have read access to the created file. |
|||||||||
int | MODE_WORLD_WRITEABLE | This constant was deprecated in API level 17. Creating world-writable files is very dangerous, and likely to cause security holes in applications. It is strongly discouraged; instead, applications should use more formal mechanism for interactions such as ContentProvider , BroadcastReceiver , and Service . There are no guarantees that this access mode will remain on a file, such as when it goes through a backup and restore. File creation mode: allow all other applications to have write access to the created file. |
|||||||||
String | NFC_SERVICE | Use with getSystemService(String) to retrieve a NfcManager for using NFC. |
|||||||||
String | NOTIFICATION_SERVICE | Use with getSystemService(String) to retrieve a NotificationManager for informing the user of background events. |
|||||||||
String | NSD_SERVICE | Use with getSystemService(String) to retrieve a NsdManager for handling management of network service discovery |
|||||||||
String | POWER_SERVICE | Use with getSystemService(String) to retrieve a PowerManager for controlling power management, including "wake locks," which let you keep the device on while you're running long tasks. |
|||||||||
String | SEARCH_SERVICE | Use with getSystemService(String) to retrieve a SearchManager for handling searches. |
|||||||||
String | SENSOR_SERVICE | Use with getSystemService(String) to retrieve a SensorManager for accessing sensors. |
|||||||||
String | STORAGE_SERVICE | Use with getSystemService(String) to retrieve a StorageManager for accessing system storage functions. |
|||||||||
String | TELEPHONY_SERVICE | Use with getSystemService(String) to retrieve a TelephonyManager for handling management the telephony features of the device. |
|||||||||
String | TEXT_SERVICES_MANAGER_SERVICE | Use with getSystemService(String) to retrieve a TextServicesManager for accessing text services. |
|||||||||
String | UI_MODE_SERVICE | Use with getSystemService(String) to retrieve a UiModeManager for controlling UI modes. |
|||||||||
String | USB_SERVICE | Use with getSystemService(String) to retrieve a UsbManager for access to USB devices (as a USB host) and for controlling this device's behavior as a USB device. |
|||||||||
String | USER_SERVICE | Use with getSystemService(String) to retrieve a UserManager for managing users on devices that support multiple users. |
|||||||||
String | VIBRATOR_SERVICE | Use with getSystemService(String) to retrieve a Vibrator for interacting with the vibration hardware. |
|||||||||
String | WALLPAPER_SERVICE | Use with getSystemService(String) to retrieve a com.android.server.WallpaperService for accessing wallpapers. |
|||||||||
String | WIFI_P2P_SERVICE | Use with getSystemService(String) to retrieve a WifiP2pManager for handling management of Wi-Fi peer-to-peer connections. |
|||||||||
String | WIFI_SERVICE | Use with getSystemService(String) to retrieve a WifiManager for handling management of Wi-Fi access. |
|||||||||
String | WINDOW_SERVICE | Use with getSystemService(String) to retrieve a WindowManager for accessing the system's window manager. |
Public Constructors | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
|
Public Methods | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
|
Connect to an application service, creating it if needed.
|
|||||||||
|
|
Determine whether the calling process of an IPC
or you have been granted a particular permission.
|
|||||||||
|
|
Determine whether the calling process of an IPC
or you has been granted permission to access a specific URI.
|
|||||||||
|
|
Determine whether the calling process of an IPC you are handling has been granted a particular permission.
|
|||||||||
|
|
Determine whether the calling process and user ID has been granted permission to access a specific URI.
|
|||||||||
|
|
Determine whether the given permission is allowed for a particular process and user ID running in the system.
|
|||||||||
|
|
Determine whether a particular process and user ID has been granted permission to access a specific URI.
|
|||||||||
|
|
Check both a Uri and normal permission.
|
|||||||||
|
|
This method was deprecated in API level 5. Use WallpaperManager.clear() instead.
This method requires the caller to hold the permission |
|||||||||
|
|
Return a new Context object for the current Context but whose resources are adjusted to match the given Configuration.
|
|||||||||
|
|
Return a new Context object for the current Context but whose resources are adjusted to match the metrics of the given Display.
|
|||||||||
|
|
Return a new Context object for the given application name.
|
|||||||||
|
|
Returns an array of strings naming the private databases associated with this Context's application package.
|
|||||||||
|
|
Delete an existing private SQLiteDatabase associated with this Context's application package.
|
|||||||||
|
|
Delete the given private file associated with this Context's application package.
|
|||||||||
|
|
If neither you nor the calling process of an IPC you are handling has been granted a particular permission, throw a
SecurityException .
|
|||||||||
|
|
If the calling process of an IPC
or you has not been granted permission to access a specific URI, throw
SecurityException .
|
|||||||||
|
|
If the calling process of an IPC you are handling has not been granted a particular permission, throw a
SecurityException .
|
|||||||||
|
|
If the calling process and user ID has not been granted permission to access a specific URI, throw
SecurityException .
|
|||||||||
|
|
If the given permission is not allowed for a particular process and user ID running in the system, throw a
SecurityException .
|
|||||||||
|
|
If a particular process and user ID has not been granted permission to access a specific URI, throw
SecurityException .
|
|||||||||
|
|
Enforce both a Uri and normal permission.
|
|||||||||
|
|
Returns an array of strings naming the private files associated with this Context's application package.
|
|||||||||
|
|
Return the context of the single, global Application object of the current process.
|
|||||||||
|
|
Return the full application info for this context's package.
|
|||||||||
|
|
Return an AssetManager instance for your application's package.
|
|||||||||
|
|
Returns the absolute path to the application specific cache directory on the filesystem.
|
|||||||||
|
|
Return a class loader you can use to retrieve classes in this package.
|
|||||||||
|
|
Return a ContentResolver instance for your application's package.
|
|||||||||
|
|
Returns the absolute path on the filesystem where a database created with
openOrCreateDatabase(String, int, SQLiteDatabase.CursorFactory) is stored.
|
|||||||||
|
|
Retrieve, creating if needed, a new directory in which the application can place its own custom data files.
|
|||||||||
|
|
Returns the absolute path to the directory on the external filesystem (that is somewhere on
Environment.getExternalStorageDirectory() where the application can place cache files it owns.
|
|||||||||
|
|
Returns the absolute path to the directory on the external filesystem (that is somewhere on
Environment.getExternalStorageDirectory() ) where the application can place persistent files it owns.
|
|||||||||
|
|
Returns the absolute path on the filesystem where a file created with
openFileOutput(String, int) is stored.
|
|||||||||
|
|
Returns the absolute path to the directory on the filesystem where files created with
openFileOutput(String, int) are stored.
|
|||||||||
|
|
Return the Looper for the main thread of the current process.
|
|||||||||
|
|
Return the directory where this application's OBB files (if there are any) can be found.
|
|||||||||
|
|
Return the full path to this context's primary Android package.
|
|||||||||
|
|
Return PackageManager instance to find global package information.
|
|||||||||
|
|
Return the name of this application's package.
|
|||||||||
|
|
Return the full path to this context's primary Android package.
|
|||||||||
|
|
Return a Resources instance for your application's package.
|
|||||||||
|
|
Retrieve and hold the contents of the preferences file 'name', returning a SharedPreferences through which you can retrieve and modify its values.
|
|||||||||
|
|
Return a localized string from the application's package's default string table.
|
|||||||||
|
|
Return a localized formatted string from the application's package's default string table, substituting the format arguments as defined in
Formatter and
format(String, Object...) .
|
|||||||||
|
|
Return the handle to a system-level service by name.
|
|||||||||
|
|
Return a localized, styled CharSequence from the application's package's default string table.
|
|||||||||
|
|
Return the Theme object associated with this Context.
|
|||||||||
|
|
This method was deprecated in API level 5. Use WallpaperManager.get() instead.
|
|||||||||
|
|
This method was deprecated in API level 5. Use WallpaperManager.getDesiredMinimumHeight() instead.
|
|||||||||
|
|
This method was deprecated in API level 5. Use WallpaperManager.getDesiredMinimumWidth() instead.
|
|||||||||
|
|
Grant permission to access a specific Uri to another package, regardless of whether that package has general permission to access the Uri's content provider.
|
|||||||||
|
|
Indicates whether this Context is restricted.
|
|||||||||
|
|
Retrieve styled attribute information in this Context's theme.
|
|||||||||
|
|
Retrieve styled attribute information in this Context's theme.
|
|||||||||
|
|
Retrieve styled attribute information in this Context's theme.
|
|||||||||
|
|
Retrieve styled attribute information in this Context's theme.
|
|||||||||
|
|
Open a private file associated with this Context's application package for reading.
|
|||||||||
|
|
Open a private file associated with this Context's application package for writing.
|
|||||||||
|
|
Open a new private SQLiteDatabase associated with this Context's application package.
|
|||||||||
|
|
Open a new private SQLiteDatabase associated with this Context's application package.
|
|||||||||
|
|
This method was deprecated in API level 5. Use WallpaperManager.peek() instead.
|
|||||||||
|
|
Add a new
ComponentCallbacks to the base application of the Context, which will be called at the same times as the ComponentCallbacks methods of activities and other components are called.
|
|||||||||
|
|
Register a BroadcastReceiver to be run in the main activity thread.
|
|||||||||
|
|
Register to receive intent broadcasts, to run in the context of
scheduler.
|
|||||||||
|
|
Remove the data previously sent with
sendStickyBroadcast(Intent) , so that it is as if the sticky broadcast had never happened.
|
|||||||||
|
|
Version of
removeStickyBroadcast(Intent) that allows you to specify the user the broadcast will be sent to.
|
|||||||||
|
|
Remove all permissions to access a particular content provider Uri that were previously added with
grantUriPermission(String, Uri, int) .
|
|||||||||
|
|
Broadcast the given intent to all interested BroadcastReceivers.
|
|||||||||
|
|
Broadcast the given intent to all interested BroadcastReceivers, allowing an optional required permission to be enforced.
|
|||||||||
|
|
Version of
sendBroadcast(Intent) that allows you to specify the user the broadcast will be sent to.
|
|||||||||
|
|
Version of
sendBroadcast(Intent, String) that allows you to specify the user the broadcast will be sent to.
|
|||||||||
|
|
Version of
sendBroadcast(Intent) that allows you to receive data back from the broadcast.
|
|||||||||
|
|
Broadcast the given intent to all interested BroadcastReceivers, delivering them one at a time to allow more preferred receivers to consume the broadcast before it is delivered to less preferred receivers.
|
|||||||||
|
|
Version of
sendOrderedBroadcast(Intent, String, BroadcastReceiver, Handler, int, String, Bundle) that allows you to specify the user the broadcast will be sent to.
|
|||||||||
|
|
Perform a
sendBroadcast(Intent) that is "sticky," meaning the Intent you are sending stays around after the broadcast is complete, so that others can quickly retrieve that data through the return value of
registerReceiver(BroadcastReceiver, IntentFilter) .
|
|||||||||
|
|
Version of
sendStickyBroadcast(Intent) that allows you to specify the user the broadcast will be sent to.
|
|||||||||
|
|
Version of
sendStickyBroadcast(Intent) that allows you to receive data back from the broadcast.
|
|||||||||
|
|
Version of
sendStickyOrderedBroadcast(Intent, BroadcastReceiver, Handler, int, String, Bundle) that allows you to specify the user the broadcast will be sent to.
|
|||||||||
|
|
Set the base theme for this context.
|
|||||||||
|
|
This method was deprecated in API level 5. Use WallpaperManager.set() instead.
This method requires the caller to hold the permission |
|||||||||
|
|
This method was deprecated in API level 5. Use WallpaperManager.set() instead.
This method requires the caller to hold the permission |
|||||||||
|
|
Same as
startActivities(Intent[], Bundle) with no options specified.
|
|||||||||
|
|
Launch multiple new activities.
|
|||||||||
|
|
Same as
startActivity(Intent, Bundle) with no options specified.
|
|||||||||
|
|
Launch a new activity.
|
|||||||||
|
|
Start executing an
Instrumentation class.
|
|||||||||
|
|
Like
startActivity(Intent, Bundle) , but taking a IntentSender to start.
|
|||||||||
|
|
Same as
startIntentSender(IntentSender, Intent, int, int, int, Bundle) with no options specified.
|
|||||||||
|
|
Request that a given application service be started.
|
|||||||||
|
|
Request that a given application service be stopped.
|
|||||||||
|
|
Disconnect from an application service.
|
|||||||||
|
|
Remove a
ComponentCallbacks objec that was previously registered with
registerComponentCallbacks(ComponentCallbacks) .
|
|||||||||
|
|
Unregister a previously registered BroadcastReceiver.
|
[Expand]
Inherited Methods
|
|||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
![]() |
Use with getSystemService(String)
to retrieve a AccessibilityManager
for giving the user feedback for UI events through the registered event listeners.
Use with getSystemService(String)
to retrieve a AccountManager
for receiving intents at a time of your choosing.
Use with getSystemService(String)
to retrieve a ActivityManager
for interacting with the global system state.
Use with getSystemService(String)
to retrieve a AlarmManager
for receiving intents at a time of your choosing.
Use with getSystemService(String)
to retrieve a AudioManager
for handling management of volume, ringer modes and audio routing.
Flag for bindService(Intent, ServiceConnection, int)
: indicates that the client application binding to this service considers the service to be more important than the app itself. When set, the platform will try to have the out of memory killer kill the app before it kills the service it is bound to, though this is not guaranteed to be the case.
Flag for bindService(Intent, ServiceConnection, int)
: If binding from an activity, allow the target service's process importance to be raised based on whether the activity is visible to the user, regardless whether another flag is used to reduce the amount that the client process's overall importance is used to impact it.
Flag for bindService(Intent, ServiceConnection, int)
: allow the process hosting the bound service to go through its normal memory management. It will be treated more like a running service, allowing the system to (temporarily) expunge the process if low on memory or for some other whim it may have, and being more aggressive about making it a candidate to be killed (and restarted) if running for a long time.
Flag for bindService(Intent, ServiceConnection, int)
: automatically create the service as long as the binding exists. Note that while this will create the service, its onStartCommand(Intent, int, int)
method will still only be called due to an explicit call to startService(Intent)
. Even without that, though, this still provides you with access to the service object while the service is created.
Note that prior to ICE_CREAM_SANDWICH
, not supplying this flag would also impact how important the system consider's the target service's process to be. When set, the only way for it to be raised was by binding from a service in which case it will only be important when that activity is in the foreground. Now to achieve this behavior you must explicitly supply the new flag BIND_ADJUST_WITH_ACTIVITY
. For compatibility, old applications that don't specify BIND_AUTO_CREATE
will automatically have the flags BIND_WAIVE_PRIORITY
and BIND_ADJUST_WITH_ACTIVITY
set for them in order to achieve the same result.
Flag for bindService(Intent, ServiceConnection, int)
: include debugging help for mismatched calls to unbind. When this flag is set, the callstack of the following unbindService(ServiceConnection)
call is retained, to be printed if a later incorrect unbind call is made. Note that doing this requires retaining information about the binding that was made for the lifetime of the app, resulting in a leak -- this should only be used for debugging.
Flag for bindService(Intent, ServiceConnection, int)
: this service is very important to the client, so should be brought to the foreground process level when the client is. Normally a process can only be raised to the visibility level by a client, even if that client is in the foreground.
Flag for bindService(Intent, ServiceConnection, int)
: don't allow this binding to raise the target service's process to the foreground scheduling priority. It will still be raised to at least the same memory priority as the client (so that its process will not be killable in any situation where the client is not killable), but for CPU scheduling purposes it may be left in the background. This only has an impact in the situation where the binding client is a foreground process and the target service is in a background process.
Flag for bindService(Intent, ServiceConnection, int)
: don't impact the scheduling or memory management priority of the target service's hosting process. Allows the service's process to be managed on the background LRU list just like a regular application process in the background.
Use with getSystemService(String)
to retrieve a ClipboardManager
for accessing and modifying the contents of the global clipboard.
Use with getSystemService(String)
to retrieve a ConnectivityManager
for handling management of network connections.
Flag for use with createPackageContext(String, int)
: ignore any security restrictions on the Context being requested, allowing it to always be loaded. For use with CONTEXT_INCLUDE_CODE
to allow code to be loaded into a process even when it isn't safe to do so. Use with extreme care!
Flag for use with createPackageContext(String, int)
: include the application code with the context. This means loading code into the caller's process, so that getClassLoader()
can be used to instantiate the application's classes. Setting this flags imposes security restrictions on what application context you can access; if the requested application can not be safely loaded into your process, java.lang.SecurityException will be thrown. If this flag is not set, there will be no restrictions on the packages that can be loaded, but getClassLoader()
will always return the default system class loader.
Flag for use with createPackageContext(String, int)
: a restricted context may disable specific features. For instance, a View associated with a restricted context would ignore particular XML attributes.
Use with getSystemService(String)
to retrieve a DevicePolicyManager
for working with global device policy management.
Use with getSystemService(String)
to retrieve a DisplayManager
for interacting with display devices.
Use with getSystemService(String)
to retrieve a DownloadManager
for requesting HTTP downloads.
Use with getSystemService(String)
to retrieve a DropBoxManager
instance for recording diagnostic logs.
Use with getSystemService(String)
to retrieve a InputMethodManager
for accessing input methods.
Use with getSystemService(String)
to retrieve a InputManager
for interacting with input devices.
Use with getSystemService(String)
to retrieve a NotificationManager
for controlling keyguard.
Use with getSystemService(String)
to retrieve a LayoutInflater
for inflating layout resources in this context.
Use with getSystemService(String)
to retrieve a LocationManager
for controlling location updates.
Use with getSystemService(String)
to retrieve a MediaRouter
for controlling and managing routing of media.
File creation mode: for use with openFileOutput(String, int)
, if the file already exists then write data to the end of the existing file instead of erasing it.
Database open flag: when set, the database is opened with write-ahead logging enabled by default.
SharedPreference loading flag: when set, the file on disk will be checked for modification even if the shared preferences instance is already loaded in this process. This behavior is sometimes desired in cases where the application has multiple processes, all writing to the same SharedPreferences file. Generally there are better forms of communication between processes, though.
This was the legacy (but undocumented) behavior in and before Gingerbread (Android 2.3) and this flag is implied when targetting such releases. For applications targetting SDK versions greater than Android 2.3, this flag must be explicitly set if desired.
File creation mode: the default mode, where the created file can only be accessed by the calling application (or all applications sharing the same user ID).
This constant was deprecated in API level 17.
Creating world-readable files is very dangerous, and likely to cause security holes in applications. It is strongly discouraged; instead, applications should use more formal mechanism for interactions such as ContentProvider
, BroadcastReceiver
, and Service
. There are no guarantees that this access mode will remain on a file, such as when it goes through a backup and restore. File creation mode: allow all other applications to have read access to the created file.
This constant was deprecated in API level 17.
Creating world-writable files is very dangerous, and likely to cause security holes in applications. It is strongly discouraged; instead, applications should use more formal mechanism for interactions such as ContentProvider
, BroadcastReceiver
, and Service
. There are no guarantees that this access mode will remain on a file, such as when it goes through a backup and restore. File creation mode: allow all other applications to have write access to the created file.
Use with getSystemService(String)
to retrieve a NfcManager
for using NFC.
Use with getSystemService(String)
to retrieve a NotificationManager
for informing the user of background events.
Use with getSystemService(String)
to retrieve a NsdManager
for handling management of network service discovery
Use with getSystemService(String)
to retrieve a PowerManager
for controlling power management, including "wake locks," which let you keep the device on while you're running long tasks.
Use with getSystemService(String)
to retrieve a SearchManager
for handling searches.
Use with getSystemService(String)
to retrieve a SensorManager
for accessing sensors.
Use with getSystemService(String)
to retrieve a StorageManager
for accessing system storage functions.
Use with getSystemService(String)
to retrieve a TelephonyManager
for handling management the telephony features of the device.
Use with getSystemService(String)
to retrieve a TextServicesManager
for accessing text services.
Use with getSystemService(String)
to retrieve a UiModeManager
for controlling UI modes.
Use with getSystemService(String)
to retrieve a UsbManager
for access to USB devices (as a USB host) and for controlling this device's behavior as a USB device.
Use with getSystemService(String)
to retrieve a UserManager
for managing users on devices that support multiple users.
Use with getSystemService(String)
to retrieve a Vibrator
for interacting with the vibration hardware.
Use with getSystemService(String)
to retrieve a com.android.server.WallpaperService for accessing wallpapers.
Use with getSystemService(String)
to retrieve a WifiP2pManager
for handling management of Wi-Fi peer-to-peer connections.
Use with getSystemService(String)
to retrieve a WifiManager
for handling management of Wi-Fi access.
Use with getSystemService(String)
to retrieve a WindowManager
for accessing the system's window manager.
Connect to an application service, creating it if needed. This defines a dependency between your application and the service. The given conn will receive the service object when it is created and be told if it dies and restarts. The service will be considered required by the system only for as long as the calling context exists. For example, if this Context is an Activity that is stopped, the service will not be required to continue running until the Activity is resumed.
This function will throw SecurityException
if you do not have permission to bind to the given service.
Note: this method can not be called from a BroadcastReceiver
component. A pattern you can use to communicate from a BroadcastReceiver to a Service is to call startService(Intent)
with the arguments containing the command to be sent, with the service calling its stopSelf(int)
method when done executing that command. See the API demo App/Service/Service Start Arguments Controller for an illustration of this. It is okay, however, to use this method from a BroadcastReceiver that has been registered with registerReceiver(BroadcastReceiver, IntentFilter)
, since the lifetime of this BroadcastReceiver is tied to another object (the one that registered it).
service | Identifies the service to connect to. The Intent may specify either an explicit component name, or a logical description (action, category, etc) to match an IntentFilter published by a service. |
---|---|
conn | Receives information as the service is started and stopped. This must be a valid ServiceConnection object; it must not be null. |
flags | Operation options for the binding. May be 0, BIND_AUTO_CREATE , BIND_DEBUG_UNBIND , BIND_NOT_FOREGROUND , BIND_ABOVE_CLIENT , BIND_ALLOW_OOM_MANAGEMENT , or BIND_WAIVE_PRIORITY . |
SecurityException |
Determine whether the calling process of an IPC or you have been granted a particular permission. This is the same as checkCallingPermission(String)
, except it grants your own permissions if you are not currently processing an IPC. Use with care!
permission | The name of the permission being checked. |
---|
PERMISSION_GRANTED
if the calling pid/uid is allowed that permission, or PERMISSION_DENIED
if it is not.Determine whether the calling process of an IPC or you has been granted permission to access a specific URI. This is the same as checkCallingUriPermission(Uri, int)
, except it grants your own permissions if you are not currently processing an IPC. Use with care!
uri | The uri that is being checked. |
---|---|
modeFlags | The type of access to grant. May be one or both of Intent.FLAG_GRANT_READ_URI_PERMISSION or Intent.FLAG_GRANT_WRITE_URI_PERMISSION . |
PERMISSION_GRANTED
if the caller is allowed to access that uri, or PERMISSION_DENIED
if it is not.Determine whether the calling process of an IPC you are handling has been granted a particular permission. This is basically the same as calling checkPermission(String, int, int)
with the pid and uid returned by getCallingPid()
and getCallingUid()
. One important difference is that if you are not currently processing an IPC, this function will always fail. This is done to protect against accidentally leaking permissions; you can use checkCallingOrSelfPermission(String)
to avoid this protection.
permission | The name of the permission being checked. |
---|
PERMISSION_GRANTED
if the calling pid/uid is allowed that permission, or PERMISSION_DENIED
if it is not.Determine whether the calling process and user ID has been granted permission to access a specific URI. This is basically the same as calling checkUriPermission(Uri, int, int, int)
with the pid and uid returned by getCallingPid()
and getCallingUid()
. One important difference is that if you are not currently processing an IPC, this function will always fail.
uri | The uri that is being checked. |
---|---|
modeFlags | The type of access to grant. May be one or both of Intent.FLAG_GRANT_READ_URI_PERMISSION or Intent.FLAG_GRANT_WRITE_URI_PERMISSION . |
PERMISSION_GRANTED
if the caller is allowed to access that uri, or PERMISSION_DENIED
if it is not.Determine whether the given permission is allowed for a particular process and user ID running in the system.
permission | The name of the permission being checked. |
---|---|
pid | The process ID being checked against. Must be > 0. |
uid | The user ID being checked against. A uid of 0 is the root user, which will pass every permission check. |
PERMISSION_GRANTED
if the given pid/uid is allowed that permission, or PERMISSION_DENIED
if it is not.Determine whether a particular process and user ID has been granted permission to access a specific URI. This only checks for permissions that have been explicitly granted -- if the given process/uid has more general access to the URI's content provider then this check will always fail.
uri | The uri that is being checked. |
---|---|
pid | The process ID being checked against. Must be > 0. |
uid | The user ID being checked against. A uid of 0 is the root user, which will pass every permission check. |
modeFlags | The type of access to grant. May be one or both of Intent.FLAG_GRANT_READ_URI_PERMISSION or Intent.FLAG_GRANT_WRITE_URI_PERMISSION . |
PERMISSION_GRANTED
if the given pid/uid is allowed to access that uri, or PERMISSION_DENIED
if it is not.Check both a Uri and normal permission. This allows you to perform both checkPermission(String, int, int)
and checkUriPermission(Uri, int, int, int)
in one call.
uri | The Uri whose permission is to be checked, or null to not do this check. |
---|---|
readPermission | The permission that provides overall read access, or null to not do this check. |
writePermission | The permission that provides overall write acess, or null to not do this check. |
pid | The process ID being checked against. Must be > 0. |
uid | The user ID being checked against. A uid of 0 is the root user, which will pass every permission check. |
modeFlags | The type of access to grant. May be one or both of Intent.FLAG_GRANT_READ_URI_PERMISSION or Intent.FLAG_GRANT_WRITE_URI_PERMISSION . |
PERMISSION_GRANTED
if the caller is allowed to access that uri or holds one of the given permissions, or PERMISSION_DENIED
if it is not.
This method was deprecated in API level 5.
Use WallpaperManager.clear()
instead.
This method requires the caller to hold the permission SET_WALLPAPER
.
IOException |
---|
Return a new Context object for the current Context but whose resources are adjusted to match the given Configuration. Each call to this method returns a new instance of a Context object; Context objects are not shared, however common state (ClassLoader, other Resources for the same configuration) may be so the Context itself can be fairly lightweight.
overrideConfiguration | A Configuration specifying what values to modify in the base Configuration of the original Context's resources. If the base configuration changes (such as due to an orientation change), the resources of this context will also change except for those that have been explicitly overridden with a value here. |
---|
Return a new Context object for the current Context but whose resources are adjusted to match the metrics of the given Display. Each call to this method returns a new instance of a Context object; Context objects are not shared, however common state (ClassLoader, other Resources for the same configuration) may be so the Context itself can be fairly lightweight. The returned display Context provides a WindowManager
(see getSystemService(String)
) that is configured to show windows on the given display. The WindowManager's getDefaultDisplay()
method can be used to retrieve the Display from the returned Context.
display | A Display object specifying the display for whose metrics the Context's resources should be tailored and upon which new windows should be shown. |
---|
Return a new Context object for the given application name. This Context is the same as what the named application gets when it is launched, containing the same resources and class loader. Each call to this method returns a new instance of a Context object; Context objects are not shared, however they share common state (Resources, ClassLoader, etc) so the Context instance itself is fairly lightweight.
Throws PackageManager.NameNotFoundException
if there is no application with the given package name.
Throws SecurityException
if the Context requested can not be loaded into the caller's process for security reasons (see CONTEXT_INCLUDE_CODE
for more information}.
packageName | Name of the application's package. |
---|---|
flags | Option flags, one of CONTEXT_INCLUDE_CODE or CONTEXT_IGNORE_SECURITY . |
java.lang.SecurityException | |
if there is no application with the given package name | |
PackageManager.NameNotFoundException |
Returns an array of strings naming the private databases associated with this Context's application package.
Delete an existing private SQLiteDatabase associated with this Context's application package.
name | The name (unique in the application package) of the database. |
---|
Delete the given private file associated with this Context's application package.
name | The name of the file to delete; can not contain path separators. |
---|
If neither you nor the calling process of an IPC you are handling has been granted a particular permission, throw a SecurityException
. This is the same as enforceCallingPermission(String, String)
, except it grants your own permissions if you are not currently processing an IPC. Use with care!
permission | The name of the permission being checked. |
---|---|
message | A message to include in the exception if it is thrown. |
If the calling process of an IPC or you has not been granted permission to access a specific URI, throw SecurityException
. This is the same as enforceCallingUriPermission(Uri, int, String)
, except it grants your own permissions if you are not currently processing an IPC. Use with care!
uri | The uri that is being checked. |
---|---|
modeFlags | The type of access to grant. May be one or both of Intent.FLAG_GRANT_READ_URI_PERMISSION or Intent.FLAG_GRANT_WRITE_URI_PERMISSION . |
message | A message to include in the exception if it is thrown. |
If the calling process of an IPC you are handling has not been granted a particular permission, throw a SecurityException
. This is basically the same as calling enforcePermission(String, int, int, String)
with the pid and uid returned by getCallingPid()
and getCallingUid()
. One important difference is that if you are not currently processing an IPC, this function will always throw the SecurityException. This is done to protect against accidentally leaking permissions; you can use enforceCallingOrSelfPermission(String, String)
to avoid this protection.
permission | The name of the permission being checked. |
---|---|
message | A message to include in the exception if it is thrown. |
If the calling process and user ID has not been granted permission to access a specific URI, throw SecurityException
. This is basically the same as calling enforceUriPermission(Uri, int, int, int, String)
with the pid and uid returned by getCallingPid()
and getCallingUid()
. One important difference is that if you are not currently processing an IPC, this function will always throw a SecurityException.
uri | The uri that is being checked. |
---|---|
modeFlags | The type of access to grant. May be one or both of Intent.FLAG_GRANT_READ_URI_PERMISSION or Intent.FLAG_GRANT_WRITE_URI_PERMISSION . |
message | A message to include in the exception if it is thrown. |
If the given permission is not allowed for a particular process and user ID running in the system, throw a SecurityException
.
permission | The name of the permission being checked. |
---|---|
pid | The process ID being checked against. Must be > 0. |
uid | The user ID being checked against. A uid of 0 is the root user, which will pass every permission check. |
message | A message to include in the exception if it is thrown. |
If a particular process and user ID has not been granted permission to access a specific URI, throw SecurityException
. This only checks for permissions that have been explicitly granted -- if the given process/uid has more general access to the URI's content provider then this check will always fail.
uri | The uri that is being checked. |
---|---|
pid | The process ID being checked against. Must be > 0. |
uid | The user ID being checked against. A uid of 0 is the root user, which will pass every permission check. |
modeFlags | The type of access to grant. May be one or both of Intent.FLAG_GRANT_READ_URI_PERMISSION or Intent.FLAG_GRANT_WRITE_URI_PERMISSION . |
message | A message to include in the exception if it is thrown. |
Enforce both a Uri and normal permission. This allows you to perform both enforcePermission(String, int, int, String)
and enforceUriPermission(Uri, int, int, int, String)
in one call.
uri | The Uri whose permission is to be checked, or null to not do this check. |
---|---|
readPermission | The permission that provides overall read access, or null to not do this check. |
writePermission | The permission that provides overall write acess, or null to not do this check. |
pid | The process ID being checked against. Must be > 0. |
uid | The user ID being checked against. A uid of 0 is the root user, which will pass every permission check. |
modeFlags | The type of access to grant. May be one or both of Intent.FLAG_GRANT_READ_URI_PERMISSION or Intent.FLAG_GRANT_WRITE_URI_PERMISSION . |
message | A message to include in the exception if it is thrown. |
Returns an array of strings naming the private files associated with this Context's application package.
Return the context of the single, global Application object of the current process. This generally should only be used if you need a Context whose lifecycle is separate from the current context, that is tied to the lifetime of the process rather than the current component.
Consider for example how this interacts with registerReceiver(BroadcastReceiver, IntentFilter)
:
If used from an Activity context, the receiver is being registered within that activity. This means that you are expected to unregister before the activity is done being destroyed; in fact if you do not do so, the framework will clean up your leaked registration as it removes the activity and log an error. Thus, if you use the Activity context to register a receiver that is static (global to the process, not associated with an Activity instance) then that registration will be removed on you at whatever point the activity you used is destroyed.
If used from the Context returned here, the receiver is being registered with the global state associated with your application. Thus it will never be unregistered for you. This is necessary if the receiver is associated with static data, not a particular component. However using the ApplicationContext elsewhere can easily lead to serious leaks if you forget to unregister, unbind, etc.
Return the full application info for this context's package.
Return an AssetManager instance for your application's package.
Returns the absolute path to the application specific cache directory on the filesystem. These files will be ones that get deleted first when the device runs low on storage. There is no guarantee when these files will be deleted. Note: you should not rely on the system deleting these files for you; you should always have a reasonable maximum, such as 1 MB, for the amount of space you consume with cache files, and prune those files when exceeding that space.
Return a class loader you can use to retrieve classes in this package.
Return a ContentResolver instance for your application's package.
Returns the absolute path on the filesystem where a database created with openOrCreateDatabase(String, int, SQLiteDatabase.CursorFactory)
is stored.
name | The name of the database for which you would like to get its path. |
---|
Retrieve, creating if needed, a new directory in which the application can place its own custom data files. You can use the returned File object to create and access files in this directory. Note that files created through a File object will only be accessible by your own application; you can only set the mode of the entire directory, not of individual files.
name | Name of the directory to retrieve. This is a directory that is created as part of your application data. |
---|---|
mode | Operating mode. Use 0 or MODE_PRIVATE for the default operation, MODE_WORLD_READABLE and MODE_WORLD_WRITEABLE to control permissions. |
Returns the absolute path to the directory on the external filesystem (that is somewhere on Environment.getExternalStorageDirectory()
where the application can place cache files it owns.
This is like getCacheDir()
in that these files will be deleted when the application is uninstalled, however there are some important differences:
JELLY_BEAN_MR1
or later and Environment.isExternalStorageEmulated()
returns true. Note that you should be managing the maximum space you will use for these anyway, just like with getCacheDir()
. Environment
for information in the storage state. On devices with multiple users (as described by UserManager
), each user has their own isolated external storage. Applications only have access to the external storage for the user they're running as.
Writing to this path requires the WRITE_EXTERNAL_STORAGE
permission.
Returns the absolute path to the directory on the external filesystem (that is somewhere on Environment.getExternalStorageDirectory()
) where the application can place persistent files it owns. These files are private to the applications, and not typically visible to the user as media.
This is like getFilesDir()
in that these files will be deleted when the application is uninstalled, however there are some important differences:
Environment
for information in the storage state. On devices with multiple users (as described by UserManager
), each user has their own isolated external storage. Applications only have access to the external storage for the user they're running as.
Here is an example of typical code to manipulate a file in an application's private storage:
void createExternalStoragePrivateFile() { // Create a path where we will place our private file on external // storage. File file = new File(getExternalFilesDir(null), "DemoFile.jpg"); try { // Very simple code to copy a picture from the application's // resource into the external file. Note that this code does // no error checking, and assumes the picture is small (does not // try to copy it in chunks). Note that if external storage is // not currently mounted this will silently fail. InputStream is = getResources().openRawResource(R.drawable.balloons); OutputStream os = new FileOutputStream(file); byte[] data = new byte[is.available()]; is.read(data); os.write(data); is.close(); os.close(); } catch (IOException e) { // Unable to create file, likely because external storage is // not currently mounted. Log.w("ExternalStorage", "Error writing " + file, e); } } void deleteExternalStoragePrivateFile() { // Get path for the file on external storage. If external // storage is not currently mounted this will fail. File file = new File(getExternalFilesDir(null), "DemoFile.jpg"); if (file != null) { file.delete(); } } boolean hasExternalStoragePrivateFile() { // Get path for the file on external storage. If external // storage is not currently mounted this will fail. File file = new File(getExternalFilesDir(null), "DemoFile.jpg"); if (file != null) { return file.exists(); } return false; }
If you supply a non-null type to this function, the returned file will be a path to a sub-directory of the given type. Though these files are not automatically scanned by the media scanner, you can explicitly add them to the media database with MediaScannerConnection.scanFile
. Note that this is not the same as Environment.getExternalStoragePublicDirectory()
, which provides directories of media shared by all applications. The directories returned here are owned by the application, and their contents will be removed when the application is uninstalled. Unlike Environment.getExternalStoragePublicDirectory()
, the directory returned here will be automatically created for you.
Here is an example of typical code to manipulate a picture in an application's private storage and add it to the media database:
void createExternalStoragePrivatePicture() { // Create a path where we will place our picture in our own private // pictures directory. Note that we don't really need to place a // picture in DIRECTORY_PICTURES, since the media scanner will see // all media in these directories; this may be useful with other // media types such as DIRECTORY_MUSIC however to help it classify // your media for display to the user. File path = getExternalFilesDir(Environment.DIRECTORY_PICTURES); File file = new File(path, "DemoPicture.jpg"); try { // Very simple code to copy a picture from the application's // resource into the external file. Note that this code does // no error checking, and assumes the picture is small (does not // try to copy it in chunks). Note that if external storage is // not currently mounted this will silently fail. InputStream is = getResources().openRawResource(R.drawable.balloons); OutputStream os = new FileOutputStream(file); byte[] data = new byte[is.available()]; is.read(data); os.write(data); is.close(); os.close(); // Tell the media scanner about the new file so that it is // immediately available to the user. MediaScannerConnection.scanFile(this, new String[] { file.toString() }, null, new MediaScannerConnection.OnScanCompletedListener() { public void onScanCompleted(String path, Uri uri) { Log.i("ExternalStorage", "Scanned " + path + ":"); Log.i("ExternalStorage", "-> uri=" + uri); } }); } catch (IOException e) { // Unable to create file, likely because external storage is // not currently mounted. Log.w("ExternalStorage", "Error writing " + file, e); } } void deleteExternalStoragePrivatePicture() { // Create a path where we will place our picture in the user's // public pictures directory and delete the file. If external // storage is not currently mounted this will fail. File path = getExternalFilesDir(Environment.DIRECTORY_PICTURES); if (path != null) { File file = new File(path, "DemoPicture.jpg"); file.delete(); } } boolean hasExternalStoragePrivatePicture() { // Create a path where we will place our picture in the user's // public pictures directory and check if the file exists. If // external storage is not currently mounted this will think the // picture doesn't exist. File path = getExternalFilesDir(Environment.DIRECTORY_PICTURES); if (path != null) { File file = new File(path, "DemoPicture.jpg"); return file.exists(); } return false; }
Writing to this path requires the WRITE_EXTERNAL_STORAGE
permission.
type | The type of files directory to return. May be null for the root of the files directory or one of the following Environment constants for a subdirectory: DIRECTORY_MUSIC , DIRECTORY_PODCASTS , DIRECTORY_RINGTONES , DIRECTORY_ALARMS , DIRECTORY_NOTIFICATIONS , DIRECTORY_PICTURES , or DIRECTORY_MOVIES . |
---|
Returns the absolute path on the filesystem where a file created with openFileOutput(String, int)
is stored.
name | The name of the file for which you would like to get its path. |
---|
Returns the absolute path to the directory on the filesystem where files created with openFileOutput(String, int)
are stored.
Return the Looper for the main thread of the current process. This is the thread used to dispatch calls to application components (activities, services, etc).
Return the directory where this application's OBB files (if there are any) can be found. Note if the application does not have any OBB files, this directory may not exist.
On devices with multiple users (as described by UserManager
), multiple users may share the same OBB storage location. Applications should ensure that multiple instances running under different users don't interfere with each other.
Return the full path to this context's primary Android package. The Android package is a ZIP file which contains application's primary code and assets.
Note: this is not generally useful for applications, since they should not be directly accessing the file system.
Return PackageManager instance to find global package information.
Return the name of this application's package.
Return the full path to this context's primary Android package. The Android package is a ZIP file which contains the application's primary resources.
Note: this is not generally useful for applications, since they should not be directly accessing the file system.
Return a Resources instance for your application's package.
Retrieve and hold the contents of the preferences file 'name', returning a SharedPreferences through which you can retrieve and modify its values. Only one instance of the SharedPreferences object is returned to any callers for the same name, meaning they will see each other's edits as soon as they are made.
name | Desired preferences file. If a preferences file by this name does not exist, it will be created when you retrieve an editor (SharedPreferences.edit()) and then commit changes (Editor.commit()). |
---|---|
mode | Operating mode. Use 0 or MODE_PRIVATE for the default operation, MODE_WORLD_READABLE and MODE_WORLD_WRITEABLE to control permissions. The bit MODE_MULTI_PROCESS can also be used if multiple processes are mutating the same SharedPreferences file. MODE_MULTI_PROCESS is always on in apps targetting Gingerbread (Android 2.3) and below, and off by default in later versions. |
Return a localized string from the application's package's default string table.
resId | Resource id for the string |
---|
Return a localized formatted string from the application's package's default string table, substituting the format arguments as defined in Formatter
and format(String, Object...)
.
resId | Resource id for the format string |
---|---|
formatArgs | The format arguments that will be used for substitution. |
Return the handle to a system-level service by name. The class of the returned object varies by the requested name. Currently available names are:
WINDOW_SERVICE
("window")
WindowManager
.
LAYOUT_INFLATER_SERVICE
("layout_inflater")
LayoutInflater
for inflating layout resources in this context.
ACTIVITY_SERVICE
("activity")
ActivityManager
for interacting with the global activity state of the system.
POWER_SERVICE
("power")
PowerManager
for controlling power management.
ALARM_SERVICE
("alarm")
AlarmManager
for receiving intents at the time of your choosing.
NOTIFICATION_SERVICE
("notification")
NotificationManager
for informing the user of background events.
KEYGUARD_SERVICE
("keyguard")
KeyguardManager
for controlling keyguard.
LOCATION_SERVICE
("location")
LocationManager
for controlling location (e.g., GPS) updates.
SEARCH_SERVICE
("search")
SearchManager
for handling search.
VIBRATOR_SERVICE
("vibrator")
Vibrator
for interacting with the vibrator hardware.
CONNECTIVITY_SERVICE
("connection")
ConnectivityManager
for handling management of network connections.
WIFI_SERVICE
("wifi")
WifiManager
for management of Wi-Fi connectivity.
INPUT_METHOD_SERVICE
("input_method")
InputMethodManager
for management of input methods.
UI_MODE_SERVICE
("uimode")
UiModeManager
for controlling UI modes.
DOWNLOAD_SERVICE
("download")
DownloadManager
for requesting HTTP downloads
Note: System services obtained via this API may be closely associated with the Context in which they are obtained from. In general, do not share the service objects between various different contexts (Activities, Applications, Services, Providers, etc.)
name | The name of the desired service. |
---|
WINDOW_SERVICE
WindowManager
LAYOUT_INFLATER_SERVICE
LayoutInflater
ACTIVITY_SERVICE
ActivityManager
POWER_SERVICE
PowerManager
ALARM_SERVICE
AlarmManager
NOTIFICATION_SERVICE
NotificationManager
KEYGUARD_SERVICE
KeyguardManager
LOCATION_SERVICE
LocationManager
SEARCH_SERVICE
SearchManager
SENSOR_SERVICE
SensorManager
STORAGE_SERVICE
StorageManager
VIBRATOR_SERVICE
Vibrator
CONNECTIVITY_SERVICE
ConnectivityManager
WIFI_SERVICE
WifiManager
AUDIO_SERVICE
AudioManager
MEDIA_ROUTER_SERVICE
MediaRouter
TELEPHONY_SERVICE
TelephonyManager
INPUT_METHOD_SERVICE
InputMethodManager
UI_MODE_SERVICE
UiModeManager
DOWNLOAD_SERVICE
DownloadManager
Return a localized, styled CharSequence from the application's package's default string table.
resId | Resource id for the CharSequence text |
---|
Return the Theme object associated with this Context.
Grant permission to access a specific Uri to another package, regardless of whether that package has general permission to access the Uri's content provider. This can be used to grant specific, temporary permissions, typically in response to user interaction (such as the user opening an attachment that you would like someone else to display).
Normally you should use Intent.FLAG_GRANT_READ_URI_PERMISSION
or Intent.FLAG_GRANT_WRITE_URI_PERMISSION
with the Intent being used to start an activity instead of this function directly. If you use this function directly, you should be sure to call revokeUriPermission(Uri, int)
when the target should no longer be allowed to access it.
To succeed, the content provider owning the Uri must have set the grantUriPermissions
attribute in its manifest or included the <grant-uri-permissions>
tag.
toPackage | The package you would like to allow to access the Uri. |
---|---|
uri | The Uri you would like to grant access to. |
modeFlags | The desired access modes. Any combination of Intent.FLAG_GRANT_READ_URI_PERMISSION or Intent.FLAG_GRANT_WRITE_URI_PERMISSION . |
Indicates whether this Context is restricted.
Retrieve styled attribute information in this Context's theme. See obtainStyledAttributes(int[])
for more information.
Retrieve styled attribute information in this Context's theme. See obtainStyledAttributes(AttributeSet, int[], int, int)
for more information.
Retrieve styled attribute information in this Context's theme. See obtainStyledAttributes(int, int[])
for more information.
Resources.NotFoundException |
---|
Retrieve styled attribute information in this Context's theme. See obtainStyledAttributes(AttributeSet, int[], int, int)
for more information.
Open a private file associated with this Context's application package for reading.
name | The name of the file to open; can not contain path separators. |
---|
FileNotFoundException |
---|
Open a private file associated with this Context's application package for writing. Creates the file if it doesn't already exist.
name | The name of the file to open; can not contain path separators. |
---|---|
mode | Operating mode. Use 0 or MODE_PRIVATE for the default operation, MODE_APPEND to append to an existing file, MODE_WORLD_READABLE and MODE_WORLD_WRITEABLE to control permissions. |
FileNotFoundException |
---|
Open a new private SQLiteDatabase associated with this Context's application package. Create the database file if it doesn't exist.
name | The name (unique in the application package) of the database. |
---|---|
mode | Operating mode. Use 0 or MODE_PRIVATE for the default operation, MODE_WORLD_READABLE and MODE_WORLD_WRITEABLE to control permissions. Use MODE_ENABLE_WRITE_AHEAD_LOGGING to enable write-ahead logging by default. |
factory | An optional factory class that is called to instantiate a cursor when query is called. |
SQLiteException | if the database file could not be opened. |
---|
Open a new private SQLiteDatabase associated with this Context's application package. Creates the database file if it doesn't exist.
Accepts input param: a concrete instance of DatabaseErrorHandler
to be used to handle corruption when sqlite reports database corruption.
name | The name (unique in the application package) of the database. |
---|---|
mode | Operating mode. Use 0 or MODE_PRIVATE for the default operation, MODE_WORLD_READABLE and MODE_WORLD_WRITEABLE to control permissions. Use MODE_ENABLE_WRITE_AHEAD_LOGGING to enable write-ahead logging by default. |
factory | An optional factory class that is called to instantiate a cursor when query is called. |
errorHandler | the DatabaseErrorHandler to be used when sqlite reports database corruption. if null, DefaultDatabaseErrorHandler is assumed. |
SQLiteException | if the database file could not be opened. |
---|
Add a new ComponentCallbacks
to the base application of the Context, which will be called at the same times as the ComponentCallbacks methods of activities and other components are called. Note that you must be sure to use unregisterComponentCallbacks(ComponentCallbacks)
when appropriate in the future; this will not be removed for you.
callback | The interface to call. This can be either a ComponentCallbacks or ComponentCallbacks2 interface. |
---|
Register a BroadcastReceiver to be run in the main activity thread. The receiver will be called with any broadcast Intent that matches filter, in the main application thread.
The system may broadcast Intents that are "sticky" -- these stay around after the broadcast as finished, to be sent to any later registrations. If your IntentFilter matches one of these sticky Intents, that Intent will be returned by this function and sent to your receiver as if it had just been broadcast.
There may be multiple sticky Intents that match filter, in which case each of these will be sent to receiver. In this case, only one of these can be returned directly by the function; which of these that is returned is arbitrarily decided by the system.
If you know the Intent your are registering for is sticky, you can supply null for your receiver. In this case, no receiver is registered -- the function simply returns the sticky Intent that matches filter. In the case of multiple matches, the same rules as described above apply.
See BroadcastReceiver
for more information on Intent broadcasts.
As of ICE_CREAM_SANDWICH
, receivers registered with this method will correctly respect the setPackage(String)
specified for an Intent being broadcast. Prior to that, it would be ignored and delivered to all matching registered receivers. Be careful if using this for security.
Note: this method cannot be called from a BroadcastReceiver
component; that is, from a BroadcastReceiver that is declared in an application's manifest. It is okay, however, to call this method from another BroadcastReceiver that has itself been registered at run time with registerReceiver(BroadcastReceiver, IntentFilter)
, since the lifetime of such a registered BroadcastReceiver is tied to the object that registered it.
receiver | The BroadcastReceiver to handle the broadcast. |
---|---|
filter | Selects the Intent broadcasts to be received. |
Register to receive intent broadcasts, to run in the context of scheduler. See registerReceiver(BroadcastReceiver, IntentFilter)
for more information. This allows you to enforce permissions on who can broadcast intents to your receiver, or have the receiver run in a different thread than the main application thread.
See BroadcastReceiver
for more information on Intent broadcasts.
As of ICE_CREAM_SANDWICH
, receivers registered with this method will correctly respect the setPackage(String)
specified for an Intent being broadcast. Prior to that, it would be ignored and delivered to all matching registered receivers. Be careful if using this for security.
receiver | The BroadcastReceiver to handle the broadcast. |
---|---|
filter | Selects the Intent broadcasts to be received. |
broadcastPermission | String naming a permissions that a broadcaster must hold in order to send an Intent to you. If null, no permission is required. |
scheduler | Handler identifying the thread that will receive the Intent. If null, the main thread of the process will be used. |
Remove the data previously sent with sendStickyBroadcast(Intent)
, so that it is as if the sticky broadcast had never happened.
You must hold the BROADCAST_STICKY
permission in order to use this API. If you do not hold that permission, SecurityException
will be thrown.
intent | The Intent that was previously broadcast. |
---|
Version of removeStickyBroadcast(Intent)
that allows you to specify the user the broadcast will be sent to. This is not available to applications that are not pre-installed on the system image. Using it requires holding the INTERACT_ACROSS_USERS permission.
You must hold the BROADCAST_STICKY
permission in order to use this API. If you do not hold that permission, SecurityException
will be thrown.
intent | The Intent that was previously broadcast. |
---|---|
user | UserHandle to remove the sticky broadcast from. |
Remove all permissions to access a particular content provider Uri that were previously added with grantUriPermission(String, Uri, int)
. The given Uri will match all previously granted Uris that are the same or a sub-path of the given Uri. That is, revoking "content://foo/one" will revoke both "content://foo/target" and "content://foo/target/sub", but not "content://foo".
uri | The Uri you would like to revoke access to. |
---|---|
modeFlags | The desired access modes. Any combination of Intent.FLAG_GRANT_READ_URI_PERMISSION or Intent.FLAG_GRANT_WRITE_URI_PERMISSION . |
Broadcast the given intent to all interested BroadcastReceivers. This call is asynchronous; it returns immediately, and you will continue executing while the receivers are run. No results are propagated from receivers and receivers can not abort the broadcast. If you want to allow receivers to propagate results or abort the broadcast, you must send an ordered broadcast using sendOrderedBroadcast(Intent, String)
.
See BroadcastReceiver
for more information on Intent broadcasts.
intent | The Intent to broadcast; all receivers matching this Intent will receive the broadcast. |
---|
Broadcast the given intent to all interested BroadcastReceivers, allowing an optional required permission to be enforced. This call is asynchronous; it returns immediately, and you will continue executing while the receivers are run. No results are propagated from receivers and receivers can not abort the broadcast. If you want to allow receivers to propagate results or abort the broadcast, you must send an ordered broadcast using sendOrderedBroadcast(Intent, String)
.
See BroadcastReceiver
for more information on Intent broadcasts.
intent | The Intent to broadcast; all receivers matching this Intent will receive the broadcast. |
---|---|
receiverPermission | (optional) String naming a permission that a receiver must hold in order to receive your broadcast. If null, no permission is required. |
Version of sendBroadcast(Intent)
that allows you to specify the user the broadcast will be sent to. This is not available to applications that are not pre-installed on the system image. Using it requires holding the INTERACT_ACROSS_USERS permission.
intent | The intent to broadcast |
---|---|
user | UserHandle to send the intent to. |
Version of sendBroadcast(Intent, String)
that allows you to specify the user the broadcast will be sent to. This is not available to applications that are not pre-installed on the system image. Using it requires holding the INTERACT_ACROSS_USERS permission.
intent | The Intent to broadcast; all receivers matching this Intent will receive the broadcast. |
---|---|
user | UserHandle to send the intent to. |
receiverPermission | (optional) String naming a permission that a receiver must hold in order to receive your broadcast. If null, no permission is required. |
Version of sendBroadcast(Intent)
that allows you to receive data back from the broadcast. This is accomplished by supplying your own BroadcastReceiver when calling, which will be treated as a final receiver at the end of the broadcast -- its onReceive(Context, Intent)
method will be called with the result values collected from the other receivers. The broadcast will be serialized in the same way as calling sendOrderedBroadcast(Intent, String)
.
Like sendBroadcast(Intent)
, this method is asynchronous; it will return before resultReceiver.onReceive() is called.
See BroadcastReceiver
for more information on Intent broadcasts.
intent | The Intent to broadcast; all receivers matching this Intent will receive the broadcast. |
---|---|
receiverPermission | String naming a permissions that a receiver must hold in order to receive your broadcast. If null, no permission is required. |
resultReceiver | Your own BroadcastReceiver to treat as the final receiver of the broadcast. |
scheduler | A custom Handler with which to schedule the resultReceiver callback; if null it will be scheduled in the Context's main thread. |
initialCode | An initial value for the result code. Often Activity.RESULT_OK. |
initialData | An initial value for the result data. Often null. |
initialExtras | An initial value for the result extras. Often null. |
Broadcast the given intent to all interested BroadcastReceivers, delivering them one at a time to allow more preferred receivers to consume the broadcast before it is delivered to less preferred receivers. This call is asynchronous; it returns immediately, and you will continue executing while the receivers are run.
See BroadcastReceiver
for more information on Intent broadcasts.
intent | The Intent to broadcast; all receivers matching this Intent will receive the broadcast. |
---|---|
receiverPermission | (optional) String naming a permissions that a receiver must hold in order to receive your broadcast. If null, no permission is required. |
Version of sendOrderedBroadcast(Intent, String, BroadcastReceiver, Handler, int, String, Bundle)
that allows you to specify the user the broadcast will be sent to. This is not available to applications that are not pre-installed on the system image. Using it requires holding the INTERACT_ACROSS_USERS permission.
See BroadcastReceiver
for more information on Intent broadcasts.
intent | The Intent to broadcast; all receivers matching this Intent will receive the broadcast. |
---|---|
user | UserHandle to send the intent to. |
receiverPermission | String naming a permissions that a receiver must hold in order to receive your broadcast. If null, no permission is required. |
resultReceiver | Your own BroadcastReceiver to treat as the final receiver of the broadcast. |
scheduler | A custom Handler with which to schedule the resultReceiver callback; if null it will be scheduled in the Context's main thread. |
initialCode | An initial value for the result code. Often Activity.RESULT_OK. |
initialData | An initial value for the result data. Often null. |
initialExtras | An initial value for the result extras. Often null. |
Perform a sendBroadcast(Intent)
that is "sticky," meaning the Intent you are sending stays around after the broadcast is complete, so that others can quickly retrieve that data through the return value of registerReceiver(BroadcastReceiver, IntentFilter)
. In all other ways, this behaves the same as sendBroadcast(Intent)
.
You must hold the BROADCAST_STICKY
permission in order to use this API. If you do not hold that permission, SecurityException
will be thrown.
intent | The Intent to broadcast; all receivers matching this Intent will receive the broadcast, and the Intent will be held to be re-broadcast to future receivers. |
---|
Version of sendStickyBroadcast(Intent)
that allows you to specify the user the broadcast will be sent to. This is not available to applications that are not pre-installed on the system image. Using it requires holding the INTERACT_ACROSS_USERS permission.
intent | The Intent to broadcast; all receivers matching this Intent will receive the broadcast, and the Intent will be held to be re-broadcast to future receivers. |
---|---|
user | UserHandle to send the intent to. |
Version of sendStickyBroadcast(Intent)
that allows you to receive data back from the broadcast. This is accomplished by supplying your own BroadcastReceiver when calling, which will be treated as a final receiver at the end of the broadcast -- its onReceive(Context, Intent)
method will be called with the result values collected from the other receivers. The broadcast will be serialized in the same way as calling sendOrderedBroadcast(Intent, String)
.
Like sendBroadcast(Intent)
, this method is asynchronous; it will return before resultReceiver.onReceive() is called. Note that the sticky data stored is only the data you initially supply to the broadcast, not the result of any changes made by the receivers.
See BroadcastReceiver
for more information on Intent broadcasts.
intent | The Intent to broadcast; all receivers matching this Intent will receive the broadcast. |
---|---|
resultReceiver | Your own BroadcastReceiver to treat as the final receiver of the broadcast. |
scheduler | A custom Handler with which to schedule the resultReceiver callback; if null it will be scheduled in the Context's main thread. |
initialCode | An initial value for the result code. Often Activity.RESULT_OK. |
initialData | An initial value for the result data. Often null. |
initialExtras | An initial value for the result extras. Often null. |
Version of sendStickyOrderedBroadcast(Intent, BroadcastReceiver, Handler, int, String, Bundle)
that allows you to specify the user the broadcast will be sent to. This is not available to applications that are not pre-installed on the system image. Using it requires holding the INTERACT_ACROSS_USERS permission.
See BroadcastReceiver
for more information on Intent broadcasts.
intent | The Intent to broadcast; all receivers matching this Intent will receive the broadcast. |
---|---|
user | UserHandle to send the intent to. |
resultReceiver | Your own BroadcastReceiver to treat as the final receiver of the broadcast. |
scheduler | A custom Handler with which to schedule the resultReceiver callback; if null it will be scheduled in the Context's main thread. |
initialCode | An initial value for the result code. Often Activity.RESULT_OK. |
initialData | An initial value for the result data. Often null. |
initialExtras | An initial value for the result extras. Often null. |
Set the base theme for this context. Note that this should be called before any views are instantiated in the Context (for example before calling setContentView(View)
or inflate(int, ViewGroup)
).
resid | The style resource describing the theme. |
---|
This method was deprecated in API level 5.
Use WallpaperManager.set()
instead.
This method requires the caller to hold the permission SET_WALLPAPER
.
IOException |
---|
This method was deprecated in API level 5.
Use WallpaperManager.set()
instead.
This method requires the caller to hold the permission SET_WALLPAPER
.
IOException |
---|
Same as startActivities(Intent[], Bundle)
with no options specified.
intents | An array of Intents to be started. |
---|
ActivityNotFoundException |
Launch multiple new activities. This is generally the same as calling startActivity(Intent)
for the first Intent in the array, that activity during its creation calling startActivity(Intent)
for the second entry, etc. Note that unlike that approach, generally none of the activities except the last in the array will be created at this point, but rather will be created when the user first visits them (due to pressing back from the activity on top).
This method throws ActivityNotFoundException
if there was no Activity found for any given Intent. In this case the state of the activity stack is undefined (some Intents in the list may be on it, some not), so you probably want to avoid such situations.
intents | An array of Intents to be started. |
---|---|
options | Additional options for how the Activity should be started. See Context.startActivity(Intent, Bundle) for more details. |
ActivityNotFoundException |
Same as startActivity(Intent, Bundle)
with no options specified.
intent | The description of the activity to start. |
---|
ActivityNotFoundException |
Launch a new activity. You will not receive any information about when the activity exits.
Note that if this method is being called from outside of an Activity
Context, then the Intent must include the FLAG_ACTIVITY_NEW_TASK
launch flag. This is because, without being started from an existing Activity, there is no existing task in which to place the new activity and thus it needs to be placed in its own separate task.
This method throws ActivityNotFoundException
if there was no Activity found to run the given Intent.
intent | The description of the activity to start. |
---|---|
options | Additional options for how the Activity should be started. May be null if there are no options. See ActivityOptions for how to build the Bundle supplied here; there are no supported definitions for building it manually. |
ActivityNotFoundException |
Start executing an Instrumentation
class. The given Instrumentation component will be run by killing its target application (if currently running), starting the target process, instantiating the instrumentation component, and then letting it drive the application.
This function is not synchronous -- it returns as soon as the instrumentation has started and while it is running.
Instrumentation is normally only allowed to run against a package that is either unsigned or signed with a signature that the the instrumentation package is also signed with (ensuring the target trusts the instrumentation).
className | Name of the Instrumentation component to be run. |
---|---|
profileFile | Optional path to write profiling data as the instrumentation runs, or null for no profiling. |
arguments | Additional optional arguments to pass to the instrumentation, or null. |
Like startActivity(Intent, Bundle)
, but taking a IntentSender to start. If the IntentSender is for an activity, that activity will be started as if you had called the regular startActivity(Intent)
here; otherwise, its associated action will be executed (such as sending a broadcast) as if you had called IntentSender.sendIntent
on it.
intent | The IntentSender to launch. |
---|---|
fillInIntent | If non-null, this will be provided as the intent parameter to sendIntent(Context, int, Intent, IntentSender.OnFinished, Handler) . |
flagsMask | Intent flags in the original IntentSender that you would like to change. |
flagsValues | Desired values for any bits set in flagsMask |
extraFlags | Always set to 0. |
options | Additional options for how the Activity should be started. See Context.startActivity(Intent, Bundle) for more details. If options have also been supplied by the IntentSender, options given here will override any that conflict with those given by the IntentSender. |
Same as startIntentSender(IntentSender, Intent, int, int, int, Bundle)
with no options specified.
intent | The IntentSender to launch. |
---|---|
fillInIntent | If non-null, this will be provided as the intent parameter to sendIntent(Context, int, Intent, IntentSender.OnFinished, Handler) . |
flagsMask | Intent flags in the original IntentSender that you would like to change. |
flagsValues | Desired values for any bits set in flagsMask |
extraFlags | Always set to 0. |
Request that a given application service be started. The Intent can either contain the complete class name of a specific service implementation to start, or an abstract definition through the action and other fields of the kind of service to start. If this service is not already running, it will be instantiated and started (creating a process for it if needed); if it is running then it remains running.
Every call to this method will result in a corresponding call to the target service's onStartCommand(Intent, int, int)
method, with the intent given here. This provides a convenient way to submit jobs to a service without having to bind and call on to its interface.
Using startService() overrides the default service lifetime that is managed by bindService(Intent, ServiceConnection, int)
: it requires the service to remain running until stopService(Intent)
is called, regardless of whether any clients are connected to it. Note that calls to startService() are not nesting: no matter how many times you call startService(), a single call to stopService(Intent)
will stop it.
The system attempts to keep running services around as much as possible. The only time they should be stopped is if the current foreground application is using so many resources that the service needs to be killed. If any errors happen in the service's process, it will automatically be restarted.
This function will throw SecurityException
if you do not have permission to start the given service.
service | Identifies the service to be started. The Intent may specify either an explicit component name to start, or a logical description (action, category, etc) to match an IntentFilter published by a service. Additional values may be included in the Intent extras to supply arguments along with this specific start call. |
---|
ComponentName
of the actual service that was started is returned; else if the service does not exist null is returned.SecurityException |
Request that a given application service be stopped. If the service is not running, nothing happens. Otherwise it is stopped. Note that calls to startService() are not counted -- this stops the service no matter how many times it was started.
Note that if a stopped service still has ServiceConnection
objects bound to it with the BIND_AUTO_CREATE
set, it will not be destroyed until all of these bindings are removed. See the Service
documentation for more details on a service's lifecycle.
This function will throw SecurityException
if you do not have permission to stop the given service.
service | Description of the service to be stopped. The Intent may specify either an explicit component name to start, or a logical description (action, category, etc) to match an IntentFilter published by a service. |
---|
SecurityException |
Disconnect from an application service. You will no longer receive calls as the service is restarted, and the service is now allowed to stop at any time.
conn | The connection interface previously supplied to bindService(). This parameter must not be null. |
---|
Remove a ComponentCallbacks
objec that was previously registered with registerComponentCallbacks(ComponentCallbacks)
.
Unregister a previously registered BroadcastReceiver. All filters that have been registered for this BroadcastReceiver will be removed.
receiver | The BroadcastReceiver to unregister. |
---|