編輯:中級開發
01.public final class Manifest {
02. public static final class permission {
03. /** Allows read/write Access to the "propertIEs" table in the checkin
04. database, to change values that get uploaded.
05. */
06. public static final String ACCESS_CHECKIN_PROPERTIES="android.permission.Access_CHECKIN_PROPERTIES";
07. /** Allows an application to Access coarse (e.g., Cell-ID, WiFi) location
08. */
09. public static final String ACCESS_COARSE_LOCATION="android.permission.Access_COARSE_LOCATION";
10. /** Allows an application to Access fine (e.g., GPS) location
11. */
12. public static final String ACCESS_FINE_LOCATION="android.permission.Access_FINE_LOCATION";
13. /** Allows an application to Access extra location provider commands
14. */
15. public static final String ACCESS_LOCATION_EXTRA_COMMANDS="android.permission.Access_LOCATION_EXTRA_COMMANDS";
16. /** Allows an application to create mock location providers for testing
17. */
18. public static final String ACCESS_MOCK_LOCATION="android.permission.Access_MOCK_LOCATION";
19. /** Allows applications to Access information about networks
20. */
21. public static final String ACCESS_NETWORK_STATE="android.permission.Access_NETWORK_STATE";
22. /** Allows an application to use SurfaceFlinger's low level features
23. */
24. public static final String ACCESS_SURFACE_FLINGER="android.permission.Access_SURFACE_FLINGER";
25. /** Allows applications to Access information about Wi-Fi networks
26. */
27. public static final String ACCESS_WIFI_STATE="android.permission.Access_WIFI_STATE";
28. /** Allows an application to publish system-level services. Such services
29. can only be published from processes that never go away, so this is
30. not something that any normal application can do.
31. */
32. public static final String ADD_SYSTEM_SERVICE="android.permission.ADD_SYSTEM_SERVICE";
33. /** Allows an application to update the collected battery statistics
34. */
35. public static final String BATTERY_STATS="android.permission.BATTERY_STATS";
36. /** Allows applications to connect to paired bluetooth devices
37. */
38. public static final String BLUETOOTH="android.permission.BLUETOOTH";
39. /** Allows applications to discover and pair bluetooth devices
40. */
41. public static final String BLUETOOTH_ADMIN="android.permission.BLUETOOTH_ADMIN";
42. /** Required to be able to disable the device (very dangerous!).
43. */
44. public static final String BRICK="android.permission.BRICK";
45. /** Allows an application to broadcast a notification that an application
46. package has been removed.
47. */
48. public static final String BROADCAST_PACKAGE_REMOVED="android.permission.BROADCAST_PACKAGE_REMOVED";
49. /** Allows an application to broadcast sticky intents. These are
50. broadcasts whose data is held by the system after being finished,
51. so that clients can quickly retrIEve that data without having
52. to wait for the next broadcast.
53. */
54. public static final String BROADCAST_STICKY="android.permission.BROADCAST_STICKY";
55. /** Allows an application to initiate a phone call without going through
56. the Dialer user interface for the user to confirm the call
57. being placed.
58. */
59. public static final String CALL_PHONE="android.permission.CALL_PHONE";
60. /** Allows an application to call any phone number, including emergency
61. numbers, without going through the Dialer user interface for the user
62. to confirm the call being placed.
63. */
64. public static final String CALL_PRIVILEGED="android.permission.CALL_PRIVILEGED";
65. /** Required to be able to Access the camera device.
66. */
67. public static final String CAMERA="android.permission.CAMERA";
68. /** Allows an application to change whether an application component (other than its own) is
69. enabled or not.
70. */
71. public static final String CHANGE_COMPONENT_ENABLED_STATE="android.permission.CHANGE_COMPONENT_ENABLED_STATE";
72. /** Allows an application to modify the current configuration, such
73. as locale.
74. */
75. public static final String CHANGE_CONFIGURATION="android.permission.CHANGE_CONFIGURATION";
76. /** Allows applications to change network connectivity state
77. */
78. public static final String CHANGE_NETWORK_STATE="android.permission.CHANGE_NETWORK_STATE";
79. /** Allows applications to change Wi-Fi connectivity state
80. */
81. public static final String CHANGE_WIFI_STATE="android.permission.CHANGE_WIFI_STATE";
82. /** Allows an application to clear the caches of all installed
83. applications on the device.
84. */
85. public static final String CLEAR_APP_CACHE="android.permission.CLEAR_APP_CACHE";
86. /** Allows an application to clear user data
87. */
88. public static final String CLEAR_APP_USER_DATA="android.permission.CLEAR_APP_USER_DATA";
89. /** Allows enabling/disabling location update notifications from
90. the radio. Not for use by normal applications.
91. */
92. public static final String CONTROL_LOCATION_UPDATES="android.permission.CONTROL_LOCATION_UPDATES";
93. /** Allows an application to delete cache files.
94. */
95. public static final String DELETE_CACHE_FILES="android.permission.DELETE_CACHE_FILES";
96. /** Allows an application to delete packages.
97. */
98. public static final String DELETE_PACKAGES="android.permission.DELETE_PACKAGES";
99. /** Allows low-level Access to power management
100. */
101. public static final String DEVICE_POWER="android.permission.DEVICE_POWER";
102. /** Allows applications to RW to diagnostic resources.
103. */
104. public static final String DIAGNOSTIC="android.permission.DIAGNOSTIC";
105. /** Allows applications to disable the keyguard
106. */
107. public static final String DISABLE_KEYGUARD="android.permission.DISABLE_KEYGUARD";
108. /** Allows an application to retrIEve state dump information from system
109. services.
110. */
111. public static final String DUMP="android.permission.DUMP";
112. /** Allows an application to expand or collapse the status bar.
113. */
114. public static final String EXPAND_STATUS_BAR="android.permission.EXPAND_STATUS_BAR";
115. /** Run as a manufacturer test application, running as the root user.
116. Only available when the device is running in manufacturer test mode.
117. */
118. public static final String FACTORY_TEST="android.permission.FACTORY_TEST";
119. /** Allows Access to the Flashlight
120. */
121. public static final String FlashLIGHT="android.permission.FlashLIGHT";
122. /** Allows an application to force a BACK Operation on whatever is the
123. top activity.
124. */
125. public static final String FORCE_BACK="android.permission.FORCE_BACK";
126. public static final String FOTA_UPDATE="android.permission.FOTA_UPDATE";
127. /** Allows Access to the list of accounts in the Accounts Service
128. */
129. public static final String GET_ACCOUNTS="android.permission.GET_ACCOUNTS";
130. /** Allows an application to find out the space used by any package.
131. */
132. public static final String GET_PACKAGE_SIZE="android.permission.GET_PACKAGE_SIZE";
133. /** Allows an application to get information about the currently
134. or recently running tasks: a thumbnail representation of the tasks,
135. what activitIEs are running in it, etc.
136. */
137. public static final String GET_TASKS="android.permission.GET_TASKS";
138. /** Allows Access to hardware peripherals. Intended only for hardware testing
139. */
140. public static final String HARDWARE_TEST="android.permission.HARDWARE_TEST";
141. /** Allows an application to inject user events (keys, touch, trackball)
142. into the event stream and deliver them to ANY window. Without this
143. permission, you can only deliver events to Windows in your own process.
144. Very few applications should need to use this permission.
145. */
146. public static final String INJECT_EVENTS="android.permission.INJECT_EVENTS";
147. /** Allows an application to install packages.
148. */
149. public static final String INSTALL_PACKAGES="android.permission.INSTALL_PACKAGES";
150. /** Allows an application to open Windows that are for use by parts
151. of the system user interface. Not for use by third party aPPS.
152. */
153. public static final String INTERNAL_SYSTEM_WINDOW="android.permission.INTERNAL_SYSTEM_WINDOW";
154. /** Allows applications to open network sockets.
155. */
156. public static final String INTERNET="android.permission.INTERNET";
157. /** Allows an application to manage (create, destroy,
158. Z-order) application tokens in the window manager. This is only
159. for use by the system.
160. */
161. public static final String MANAGE_APP_TOKENS="android.permission.MANAGE_APP_TOKENS";
162. public static final String MASTER_CLEAR="android.permission.MASTER_CLEAR";
163. /** Allows an application to modify global audio settings
164. */
165. public static final String MODIFY_AUDIO_SETTINGS="android.permission.MODIFY_AUDIO_SETTINGS";
166. /** Allows modification of the telephony state - power on, mmi, etc.
167. Does not include placing calls.
168. */
169. public static final String MODIFY_PHONE_STATE="android.permission.MODIFY_PHONE_STATE";
170. /** Allows mounting and unmounting file systems for removable storage.
171. */
172. public static final String MOUNT_UNMOUNT_FILESYSTEMS="android.permission.MOUNT_UNMOUNT_FILESYSTEMS";
173. /** Allow an application to make its activitIEs persistent.
174. */
175. public static final String PERSISTENT_ACTIVITY="android.permission.PERSISTENT_ACTIVITY";
176. /** Allows an application to monitor, modify, or abort outgoing
177. calls.
178. */
179. public static final String PROCESS_OUTGOING_CALLS="android.permission.PROCESS_OUTGOING_CALLS";
180. /** Allows an application to read the user's calendar data.
181. */
182. public static final String READ_CALENDAR="android.permission.READ_CALENDAR";
183. /** Allows an application to read the user's contacts data.
184. */
185. public static final String READ_CONTACTS="android.permission.READ_CONTACTS";
186. /** Allows an application to take screen shots and more generally
187. get Access to the frame buffer data
188. */
189. public static final String READ_FRAME_BUFFER="android.permission.READ_FRAME_BUFFER";
190. /** Allows an application to retrIEve the current state of keys and
191. switches. This is only for use by the system.
192. */
193. public static final String READ_INPUT_STATE="android.permission.READ_INPUT_STATE";
194. /** Allows an application to read the low-level system log files.
195. These can contain slightly private information about what is
196. happening on the device, but should never contain the user's
197. private information.
198. */
199. public static final String READ_LOGS="android.permission.READ_LOGS";
200. /** Allows an application to read the owner's data.
201. */
202. public static final String READ_OWNER_DATA="android.permission.READ_OWNER_DATA";
203. /** Allows read only Access to phone state.
204. */
205. public static final String READ_PHONE_STATE="android.permission.READ_PHONE_STATE";
206. /** Allows an application to read SMS messages.
207. */
208. public static final String READ_SMS="android.permission.READ_SMS";
209. /** Allows applications to read the sync settings
210. */
211. public static final String READ_SYNC_SETTINGS="android.permission.READ_SYNC_SETTINGS";
212. /** Allows applications to read the sync stats
213. */
214. public static final String READ_SYNC_STATS="android.permission.READ_SYNC_STATS";
215. /** Required to be able to reboot the device.
216. */
217. public static final String REBOOT="android.permission.REBOOT";
218. /** Allows an application to receive the
219. {@linkandroid.content.Intent#ACTION_BOOT_COMPLETED} that is
220. broadcast after the system finishes booting. If you don't
221. request this permission, you will not receive the broadcast at
222. that time. Though holding this permission does not have any
223. security implications, it can have a negative impact on the
224. user experIEnce by increasing the amount of time it takes the
225. system to start and allowing applications to have themselves
226. running without the user being aware of them. As such, you must
227. explicitly declare your use of this facility to make that visible
228. to the user.
229. */
230. public static final String RECEIVE_BOOT_COMPLETED="android.permission.RECEIVE_BOOT_COMPLETED";
231. /** Allows an application to monitor incoming MMS messages, to record
232. or perform processing on them.
233. */
234. public static final String RECEIVE_MMS="android.permission.RECEIVE_MMS";
235. /** Allows an application to monitor incoming SMS messages, to record
236. or perform processing on them.
237. */
238. public static final String RECEIVE_SMS="android.permission.RECEIVE_SMS";
239. /** Allows an application to monitor incoming WAP push messages.
240. */
241. public static final String RECEIVE_WAP_PUSH="android.permission.RECEIVE_WAP_PUSH";
242. /** Allows an application to record audio
243. */
244. public static final String RECORD_AUDIO="android.permission.RECORD_AUDIO";
245. /** Allows an application to change the Z-order of tasks
246. */
247. public static final String REORDER_TASKS="android.permission.REORDER_TASKS";
248. /** Allows an application to restart other applications.
249. */
250. public static final String RESTART_PACKAGES="android.permission.RESTART_PACKAGES";
251. /** Allows an application to send SMS messages.
252. */
253. public static final String SEND_SMS="android.permission.SEND_SMS";
254. /** Allows an application to watch and control how activitIEs are
255. started globally in the system. Only for is in debugging
256. (usually the monkey command).
257. */
258. public static final String SET_ACTIVITY_WATCHER="android.permission.SET_ACTIVITY_WATCHER";
259. /** Allows an application to control whether activitIEs are immediately
260. finished when put in the background.
261. */
262. public static final String SET_ALWAYS_FINISH="android.permission.SET_ALWAYS_FINISH";
263. /** Modify the global animation scaling factor.
264. */
265. public static final String SET_ANIMATION_SCALE="android.permission.SET_ANIMATION_SCALE";
266. /** Configure an application for debugging.
267. */
268. public static final String SET_DEBUG_APP="android.permission.SET_DEBUG_APP";
269. /** Allows low-level Access to setting the orIEntation (actually
270. rotation) of the screen. Not for use by normal applications.
271. */
272. public static final String SET_ORIENTATION="android.permission.SET_ORIENTATION";
273. /** Allows an application to modify the list of preferred applications
274. with the {@linkandroid.content.pm.PackageManager#addPackageToPreferred
275. PackageManager.addPackageToPreferred()} and
276. {@linkandroid.content.pm.PackageManager#removePackageFromPreferred
277. PackageManager.removePackageFromPreferred()} methods.
278. */
279. public static final String SET_PREFERRED_APPLICATIONS="android.permission.SET_PREFERRED_APPLICATIONS";
280. /** Allows an application to force any currently running process to be
281. in the foreground.
282. */
283. public static final String SET_PROCESS_FOREGROUND="android.permission.SET_PROCESS_FOREGROUND";
284. /** Allows an application to set the maximum number of (not needed)
285. application processes that can be running.
286. */
287. public static final String SET_PROCESS_LIMIT="android.permission.SET_PROCESS_LIMIT";
288. /** Allows applications to set the system time zone
289. */
290. public static final String SET_TIME_ZONE="android.permission.SET_TIME_ZONE";
291. /** Allows applications to set the wallpaper
292. */
293. public static final String SET_WALLPAPER="android.permission.SET_WALLPAPER";
294. /** Allows applications to set the wallpaper hints
295. */
296. public static final String SET_WALLPAPER_HINTS="android.permission.SET_WALLPAPER_HINTS";
297. /** Allow an application to request that a signal be sent to all persistent processes
298. */
299. public static final String SIGNAL_PERSISTENT_PROCESSES="android.permission.SIGNAL_PERSISTENT_PROCESSES";
300. /** Allows an application to open, close, or disable the status bar
301. and its icons.
302. */
303. public static final String STATUS_BAR="android.permission.STATUS_BAR";
304. /** Allows an application to allow Access the subscribed feeds
305. ContentProvider.
306. */
307. public static final String SUBSCRIBED_FEEDS_READ="android.permission.SUBSCRIBED_FEEDS_READ";
308. public static final String SUBSCRIBED_FEEDS_WRITE="android.permission.SUBSCRIBED_FEEDS_WRITE";
309. /** Allows an application to open Windows using the type
310. {@linkandroid.vIEw.WindowManager.LayoutParams#TYPE_SYSTEM_ALERT},
311. shown on top of all other applications. Very few applications
312. should use this permission; these Windows are intended for
313. system-level interaction with the user.
314. */
315. public static final String SYSTEM_ALERT_WINDOW="android.permission.SYSTEM_ALERT_WINDOW";
316. /** Allows Access to the vibrator
317. */
318. public static final String VIBRATE="android.permission.VIBRATE";
319. /** Allows using PowerManager WakeLocks to keep processor from sleeping or screen
320. from dimming
321. */
322. public static final String WAKE_LOCK="android.permission.WAKE_LOCK";
323. /** Allows applications to write the apn settings
324. */
325. public static final String WRITE_APN_SETTINGS="android.permission.WRITE_APN_SETTINGS";
326. /** Allows an application to write (but not read) the user's
327. calendar data.
328. */
329. public static final String WRITE_CALENDAR="android.permission.WRITE_CALENDAR";
330. /** Allows an application to write (but not read) the user's
331. contacts data.
332. */
333. public static final String WRITE_CONTACTS="android.permission.WRITE_CONTACTS";
334. /** Allows an application to modify the Google service map.
335. */
336. public static final String WRITE_GSERVICES="android.permission.WRITE_GSERVICES";
337. /** Allows an application to write (but not read) the owner's data.
338. */
339. public static final String WRITE_OWNER_DATA="android.permission.WRITE_OWNER_DATA";
340. /** Allows an application to read or write the system settings.
341. */
342. public static final String WRITE_SETTINGS="android.permission.WRITE_SETTINGS";
343. /** Allows an application to write SMS messages.
344. */
345. public static final String WRITE_SMS="android.permission.WRITE_SMS";
346. /** Allows applications to write the sync settings
347. */
348. public static final String WRITE_SYNC_SETTINGS="android.permission.WRITE_SYNC_SETTINGS";
349. }
350. public static final class permission_group {
351. /** Permissions for direct Access to Google accounts.
352. Note that while right now this is only used for Google accounts,
353. we expect in the future to have a more general account management
354. facility so this is specifIEd as a general platform permission
355. group for Accessing accounts.
356. */
357. public static final String ACCOUNTS="android.permission-group.ACCOUNTS";
358. /** Used for permissions that can be used to make the user spend money
359. without their direct involvement. For example, this is the group
360. for permissions that allow you to directly place phone calls,
361. directly send SMS messages, etc.
362. */
363. public static final String COST_MONEY="android.permission-group.COST_MONEY";
364. /** Group of permissions that are related to development features. These
365. are not permissions that should appear in normal applications; they
366. protect APIs that are intended only to be used for development
367. purposes.
368. */
369. public static final String DEVELOPMENT_TOOLS="android.permission-group.DEVELOPMENT_TOOLS";
370. /** Used for permissions that provide direct Access to the hardware on
371. the device. This includes audio, the camera, vibrator, etc.
372. */
373. public static final String HARDWARE_CONTROLS="android.permission-group.HARDWARE_CONTROLS";
374. /** Used for permissions that allow Access to the user's current
375. location.
376. */
377. public static final String LOCATION="android.permission-group.LOCATION";
378. /** Used for permissions that allow an application to send messages
379. on behalf of the user or intercept messages being received by the
380. user. This is primarily intended for SMS/MMS messaging, such as
381. receiving or reading an MMS.
382. */
383. public static final String MESSAGES="android.permission-group.MESSAGES";
384. /** Used for permissions that provide Access to networking services. The
385. main permission here is internet Access, but this is also an
386. appropriate group for Accessing or modifying any network configuration
387. or other related network Operations.
388. */
389. public static final String NETWORK="android.permission-group.NetWORK";
390. /** Used for permissions that provide Access to the user's private data,
391. such as contacts, calendar events, e-mail messages, etc. This includes
392. both reading and writing of this data (which should generally be
393. expressed as two distinct permissions).
394. */
395. public static final String PERSONAL_INFO="android.permission-group.PERSONAL_INFO";
396. /** Used for permissions that are associated with Accessing and modifyign
397. telephony state: intercepting outgoing calls, reading
398. and modifying the phone state. Note that
399. placing phone calls is not in this group, since that is in the
400. more important "takin' yer moneys" group.
401. */
402. public static final String PHONE_CALLS="android.permission-group.PHONE_CALLS";
403. /** Group of permissions that are related to system APIs. Many
404. of these are not permissions the user will be expected to understand,
405. and such permissions should generally be marked as "normal" protection
406. level so they don't get displayed. This can also, however, be used
407. for miscellaneous features that provide Access to the Operating system,
408. such as writing the global system settings.
409. */
410. public static final String SYSTEM_TOOLS="android.permission-group.SYSTEM_TOOLS";
411. }
412.}
本文來自CSDN博客,轉載請標明出處:http://blog.csdn.Net/ghd2000/archive/2010/12/15/6077660.ASPx
本文為個人總結,不代表官方觀點。 分為幾個階段: 1、整個android的多媒體框架OpenCore 2、Player和Author的詳細介紹 2、OpenCo
Fragment是Android honeycomb 3.0新增的概念,Fragment名為碎片不過卻和Activity十分相似,下面Android123介紹下andr
對於Android 3.x honeycomb系統來說屏幕的兼容性很重要,這裡目前我們就主流的Android 1.5~2.3.4的軟件如何兼容android 3.0有關
簡介: HTML 5 中一個最有用的新特性是本地存儲的標准化。最終,Web 開發人員可以不再試圖將所有客戶端數據都填塞到 4 KB 的 CookIEs 中。現