diff --git a/docs/html/about/versions/nougat/android-7.0-changes.jd b/docs/html/about/versions/nougat/android-7.0-changes.jd index 84a56d0614c57..cb92f19eb4c62 100644 --- a/docs/html/about/versions/nougat/android-7.0-changes.jd +++ b/docs/html/about/versions/nougat/android-7.0-changes.jd @@ -182,8 +182,8 @@ certain implicit intents.
- For more information about background optimizations in N and how to adapt your app, - see Background Optimizations.
@@ -427,12 +427,13 @@ see Sharing Fileslibandroid_runtime.so,libcutils.so,
libcrypto.so, and libssl.so—are temporarily
- accessible on N for apps targeting API level 23 or lower. If your app loads
- one of these libraries, logcat generates a warning and a toast appears on the
- target device to notify you. If you see these warnings, you should update
- your app to either include its own copy of those libraries or only use the
- public NDK APIs. Future releases of the Android platform may restrict the use
- of private libraries altogether and cause your app to crash.
+ accessible on Android 7.0 (API level 24) for apps targeting API level 23 or
+ lower. If your app loads one of these libraries, logcat generates a warning
+ and a toast appears on the target device to notify you. If you see these
+ warnings, you should update your app to either include its own copy of those
+ libraries or only use the public NDK APIs. Future releases of the Android
+ platform may restrict the use of private libraries altogether and cause your
+ app to crash.
@@ -441,9 +442,9 @@ see Sharing FilesSystem.loadLibrary and dlopen(3) both return
NULL, and may cause your app to crash. You should review your
app code to remove use of private platform APIs and thoroughly test your apps
- using a preview device or emulator. If you are unsure whether your app uses
- private libraries, you can check logcat to identify
- the runtime error.
+ using a device or emulator running Android 7.0 (API level 24). If you are
+ unsure whether your app uses private libraries, you can check logcat to identify the runtime error.
@@ -454,11 +455,6 @@ see Sharing Files
DevicePolicyManager.setCertInstallerPackage(). If the installer
is not already installed, the system throws an
@@ -747,12 +723,13 @@ JavaVM::AttachCurrentThread from <jni.h>.
DER-encoded format under a .crt or .cer file extension.
ENCRYPTION_STATUS_ACTIVE_PER_USER is
@@ -822,8 +799,9 @@ when killing the app manually via DDMS.
-Apps targeting N and above are not automatically killed on density changes; -however, they may still respond poorly to configuration changes. + Apps targeting Android 7.0 (API level 24) and above are not automatically + killed on density changes; however, they may still respond poorly to + configuration changes.
- To alleviate this issue, Android N applies the following + To alleviate this issue, Android 7.0 (API level 24) applies the following restrictions:
- If your app uses any of these intents, you should remove dependencies on - them as soon as possible so that you can target Android N devices properly. - The Android framework provides several solutions to mitigate the need for - these implicit broadcasts. For example, {@link android.app.job.JobScheduler} - and {@code GcmNetworkManager} provide robust mechanisms to schedule network operations when specified conditions, such as a connection to an unmetered @@ -101,7 +103,7 @@ page.image=images/cards/card-nyc_2x.jpg
- Apps targeting the Android N do not receive {@link + Apps targeting Android 7.0 (API level 24) do not receive {@link android.net.ConnectivityManager#CONNECTIVITY_ACTION} broadcasts if they register to receive them in their manifest, and processes that depend on this broadcast will not start. This could pose a problem for apps that want @@ -212,7 +214,7 @@ public static void scheduleJob(Context context) {
- To trigger jobs on content URI changes, Android N extends + To trigger jobs on content URI changes, Android 7.0 (API level 24) extends the {@link android.app.job.JobInfo} API with the following methods:
@@ -287,7 +289,7 @@ public static void scheduleJob(Context context) {- Android N also extends {@link android.app.job.JobParameters} to + Android 7.0 (API level 24) also extends {@link android.app.job.JobParameters} to allow your app to receive useful information about what content authorities and URIs triggered the job:
@@ -361,13 +363,13 @@ public boolean onStartJob(JobParameters params) { conditions, can improve performance and user experience. Removing dependencies on background services and statically-registered implicit broadcast receivers can help your app run better on such devices. Although - Android N takes steps to reduce some of these issues, it is + Android 7.0 (API level 24) takes steps to reduce some of these issues, it is recommended that you optimize your app to run without the use of these background processes entirely.- Android N introduces some additional Android Debug Bridge (ADB) commands that you can use to test app behavior with those background processes disabled:
@@ -379,7 +381,7 @@ public boolean onStartJob(JobParameters params) {
-{@code $ adb shell cmd appops set <package_name> RUN_IN_BACKGROUND ignore}
+{@code $ adb shell cmd appops set RUN_IN_BACKGROUND ignore}
-{@code $ adb shell cmd appops set <package_name> RUN_IN_BACKGROUND allow}
+{@code $ adb shell cmd appops set RUN_IN_BACKGROUND allow}
- The N Developer Preview extends the {@link android.net.ConnectivityManager} + Android 7.0 (API level 24) extends the {@link android.net.ConnectivityManager} API to provide apps with a way to retrieve the user’s Data Saver preferences and monitor preference changes. It is considered good practice for apps to check whether the @@ -58,7 +58,7 @@ next.link=xml.html
- In the N Developer Preview, apps can use the {@link + In Android 7.0 (API level 24), apps can use the {@link android.net.ConnectivityManager} API to determine what data usage restrictions are being applied. The {@code getRestrictBackgroundStatus()} method returns one of the following values: