The M Developer Preview gives you an advance look at the upcoming release for the Android platform, which offers new features for users and app developers. This document provides an introduction to the most notable APIs.
The M Developer Preview is intended for developer early adopters and testers. If you are interested in influencing the direction of the Android framework, give the M Developer Preview a try and send us your feedback!
Caution: Do not not publish apps that use the M Developer Preview to the Google Play store.
Note: This document often refers to classes and
methods that do not yet have reference material available on developer.android.com. These API elements are
code style in this document (without hyperlinks). For the
preliminary API documentation for these elements, download the preview reference.
Important behavior changes
If you have previously published an app for Android, be aware that your app might be affected by changes in the platform.
Please see Behavior Changes for complete information.
This preview enhances Android’s intent system by providing more powerful app linking. This feature allows you to associate an app with a web domain you own. Based on this association, the platform can determine the default app to use to handle a particular web link and skip prompting users to select an app. To learn how to implement this feature, see App Linking.
Auto Backup for Apps
The system now performs automatic full data backup and restore for apps. This behavior is enabled by default for apps targeting M Preview; you do not need to add any additional code. If users delete their Google accounts, their backup data is deleted as well. To learn how this feature works and how to configure what to back up on the file system, see Auto Backup for Apps.
This preview offers new APIs to let you authenticate users by using their fingerprint scans on supported devices, and check how recently the user was last authenticated using a device unlocking mechanism (such as a lockscreen password). Use these APIs in conjunction with the Android Keystore system.
To authenticate users via fingerprint scan, get an instance of the new
android.hardware.fingerprint.FingerprintManager class and call the
FingerprintManager.authenticate() method. Your app must be running on a compatible
device with a fingerprint sensor. You must implement the user interface for the fingerprint
authentication flow on your app, and use the standard Android fingerprint icon in your UI.
The Android fingerprint icon (
c_fp_40px.png) is included in the
sample app. If you are developing multiple apps that use fingerprint
authentication, note that each app must authenticate the user’s fingerprint independently.
To use this feature in your app, first add the
USE_FINGERPRINT permission in your
<uses-permission android:name="android.permission.USE_FINGERPRINT" />
To see an app implementation of fingerprint authentication, refer to the Fingerprint Dialog sample.
If you are testing this feature, follow these steps:
- Install Android SDK Tools Revision 24.3, if you have not done so.
- Enroll a new fingerprint in the emulator by going to Settings > Security > Fingerprint, then follow the enrollment instructions.
- Use an emulator to emulate fingerprint touch events with the
following command. Use the same command to emulate fingerprint touch events on the lockscreen or
in your app.
adb -e emu finger touch <finger_id>
On Windows, you may have to run
telnet 127.0.0.1 <emulator-id>followed by
finger touch <finger_id>.
Your app can authenticate users based on how recently they last unlocked their device. This feature frees users from having to remember additional app-specific passwords, and avoids the need for you to implement your own authentication user interface. Your app should use this feature in conjunction with a public or secret key implementation for user authentication.
To set the timeout duration for which the same key can be re-used after a user is successfully
authenticated, call the new
method when you set up a
KeyPairGenerator. This feature currently works for symmetric cryptographic
Avoid showing the re-authentication dialog excessively -- your apps should try using the
cryptographic object first and if the the timeout expires, use the
method to re-authenticate the user within your app.
To see an app implementation of this feature, refer to the Confirm Credentials sample.
This preview provides you with APIs to make sharing intuitive and quick for users. You can now define direct share targets that launch a specific activity in your app. These direct share targets are exposed to users via the Share menu. This feature allows users to share content to targets, such as contacts, within other apps. For example, the direct share target might launch an activity in another social network app, which lets the user share content directly to a specific friend or community in that app.
To enable direct share targets you must define a class that extends the
chooser.ChooserTargetService class. Declare your
ChooserTargetService in the manifest. Within that declaration, specify the
BIND_CHOOSER_TARGET_SERVICE permission and an intent filter with the
The following example shows how you might declare the
ChooserTargetService in your
<service android:name=".ChooserTargetService" android:label="@string/service_name" android:permission="android.permission.BIND_CHOOSER_TARGET_SERVICE"> <intent-filter> <action android:name="android.service.chooser.ChooserTargetService" /> </intent-filter> </service>
For each activity that you want to expose to the
ChooserTargetService, add a
<meta-data> element with the name
"android.service.chooser.chooser_target_service" in your app manifest.
<activity android:name=".MyShareActivity” android:label="@string/share_activity_label"> <intent-filter> <action android:name="android.intent.action.SEND" /> </intent-filter> <meta-data android:name="android.service.chooser.chooser_target_service" android:value=".ChooserTargetService" /> </activity>
This preview provides a new voice interaction API which, together with
allows you to build conversational voice experiences into your apps. Call the
android.app.Activity.isVoiceInteraction() method to determine if your activity was
started in response to a voice action. If so, your app can use the
android.app.VoiceInteractor class to request a voice confirmation from the user, select
from a list of options, and more. To learn more about implementing voice actions, see the
Voice Actions developer site.
This preview offers a new way for users to engage with your apps through an assistant. To use this feature, the user must enable the assistant to use the current context. Once enabled, the user can summon the assistant within any app, by long-pressing on the Home button.
Your app can elect to not share the current context with the assistant by setting the
FLAG_SECURE flag. In addition to the
standard set of information that the platform passes to the assistant, your app can share
additional information by using the new
To provide the assistant with additional context from your app, follow these steps:
- Implement the
- Register this listener by using
- In order to provide activity-specific contextual information, override the
onProvideAssistData()callback and, optionally, the new
This preview adds the following API changes for notifications:
NotificationListenerService.INTERRUPTION_FILTER_ALARMSfilter level that corresponds to the new Alarms only do not disturb mode.
Notification.CATEGORY_REMINDERcategory value that is used to distinguish user-scheduled reminders from other events (
CATEGORY_EVENT) and alarms (
android.graphics.drawable.Iconclass which can be attached to your notifications via the
NotificationManager.getActiveNotifications()method that allows your apps to find out which of their notifications are currently alive. To see an app implementation that uses this feature, see the Active Notifications sample.
Bluetooth Stylus Support
This preview provides improved support for user input using a Bluetooth stylus. Users can pair
and connect a compatible Bluetooth stylus with their phone or tablet. While connected, position
information from the touch screen is fused with pressure and button information from the stylus to
provide a greater range of expression than with the touch screen alone. Your app can listen for
stylus button presses and perform secondary actions, by registering the new
callbacks in your activity.
MotionEvent methods and constants to detect stylus button
- If the user touches a stylus with a button on the screen of your app, the
- For apps targeting M Preview, the
MotionEvent.STYLUS_BUTTON_PRIMARYwhen the user presses the primary stylus button. If the stylus has a second button, the same method returns
MotionEvent.STYLUS_BUTTON_SECONDARYwhen the user presses it. If the user presses both buttons simultaneously, the method returns both values OR'ed together (
For apps targeting a lower platform version, the
BUTTON_SECONDARY(for primary stylus button press),
BUTTON_TERTIARY(for secondary stylus button press), or both.
Improved Bluetooth Low Energy Scanning
If your app performs performs Bluetooth Low Energy scans, you can use the new
android.bluetooth.le.ScanSettings.Builder.setCallbackType() method to specify that
you want callbacks to only be notified when an advertisement packet matching the set
ScanFilter is first found, and when it is not seen for a period of
time. This approach to scanning is more power-efficient than what’s provided in the previous
Hotspot 2.0 Release 1 Support
This preview adds support for the Hotspot 2.0 Release 1 spec on Nexus 6 and Nexus 9 devices. To
provision Hotspot 2.0 credentials in your app, use the new methods of the
WifiEnterpriseConfig class, such as
setRealm(). In the
WifiConfiguration object, you can set the
FQDN and the
ScanResult.PasspointNetwork property indicates if a detected
network represents a Hotspot 2.0 access point.
4K Display Mode
The platform now allows apps to request that the display resolution be upgraded to 4K rendering
on compatible hardware. To query the current physical resolution, use the new
android.view.Display.Mode APIs. If the UI is drawn at a lower logical resolution and is
upscaled to a larger physical resolution, be aware that the physical resolution the
Display.Mode.getPhysicalWidth() method returns may differ from the logical
resolution reported by
You can request the system to change the physical resolution in your app as it runs, by setting
WindowManager.LayoutParams.preferredDisplayModeId property of your app’s window. This
feature is useful if you want to switch to 4K display resolution. While in 4K display mode, the
UI continues to be rendered at the original resolution (such as 1080p) and is upscaled to 4K, but
SurfaceView objects may show content at the native resolution.
Theme attributes are now supported in
ColorStateList for devices running the M Preview. The
getColor() methods have been deprecated. If
you are calling these APIs, call the new
Context.getColor() methods instead. These methods are also available in the
v4 appcompat library via
This preview adds enhancements to audio processing on Android, including:
- Support for the MIDI
protocol, with the new
android.media.midiAPIs. Use these APIs to send and receive MIDI events.
android.media.AudioTrack.Builderclasses to create digital audio capture and playback objects respectively, and configure audio source and sink properties to override the system defaults.
- API hooks for associating audio and input devices. This is particularly useful if your app
allows users to start a voice search from a game controller or remote control connected to Android
TV. The system invokes the new
android.app.Activity.onSearchRequested()callback when the user starts a search. To determine if the user's input device has a built-in microphone, retrieve the
InputDeviceobject from that callback, then call the new
android.media.AudioDevicesManagerclass which lets you retrieve a list of all attached source and sink audio devices. You can also specify an
android.media.OnAudioDeviceConnectionListenerobject if you want your app to be notified when an audio device is connected or disconnected.
This preview adds new capabilities to the video processing APIs, including:
android.media.MediaSyncclass which helps applications to synchronously render audio and video streams. The audio buffers are submitted in non-blocking fashion and are returned via a callback. It also supports dynamic playback rate.
MediaDrm.EVENT_SESSION_RECLAIMEDevent, which indicates that a session opened by the app has been reclaimed by the resource manager. If your app uses DRM sessions, you should handle this event and make sure not to use a reclaimed session.
MediaCodec.CodecException.ERROR_RECLAIMEDerror code, which indicates that the resource manager reclaimed the media resource used by the codec. With this exception, the codec must be released, as it has moved to terminal state.
MediaCodecInfo.CodecCapabilities.getMaxSupportedInstances()interface to get a hint for the max number of the supported concurrent codec instances.
MediaPlayer.setPlaybackParams()method to set the media playback rate for fast or slow motion playback. It also stretches or speeds up the audio playback automatically in conjunction with the video.
This preview includes the following new APIs for accessing the camera’s flashlight and for camera reprocessing of images:
If a camera device has a flash unit, you can call the
method to switch the flash unit’s torch mode on or off without opening the camera device. The app
does not have exclusive ownership of the flash unit or the camera device. The torch mode is turned
off and becomes unavailable whenever the camera device becomes unavailable, or when other camera
resources keeping the torch on become unavailable. Other apps can also call
to turn off the torch mode. When the last app that turned on the torch mode is closed, the torch
mode is turned off.
You can register a callback to be notified about torch mode status by calling the
CameraManager.registerTorchCallback() method. The first time the callback is registered,
it is immediately called with the torch mode status of all currently known camera devices with a
flash unit. If the torch mode is turned on or off successfully, the
CameraManager.TorchCallback.onTorchModeChanged() method is invoked.
Camera2 API is extended to support YUV and private
opaque format image reprocessing. Your app determine if the reprocessing capabilities are available
CameraCharacteristics.REQUEST_AVAILABLE_CAPABILITIES. If a device supports reprocessing,
you can create a reprocessable camera capture session by calling
CameraDevice.createReprocessableCaptureSession(), and create requests for input
ImageWriter class to connect the input buffer flow to the camera reprocessing
input. To get an empty buffer, follow this programming model:
- Call the
- Fill the data into the input buffer.
- Send the buffer to the camera by calling the
If you are using a
ImageWriter object together with an
android.graphics.ImageFormat.PRIVATE image, your app cannot access the image
data directly. Instead, pass the
ImageFormat.PRIVATE image directly to the
ImageWriter by calling the
ImageWriter.queueInputImage() method without any
ImageReader class now supports
image streams. This support allows your app to maintain a circular image queue of
ImageReader output images, select one or more images, and send them to the
ImageWriter for camera reprocessing.
Android for Work Features
This preview includes the following new APIs for Android for Work:
- Enhanced controls for Corporate-Owned, Single-Use devices: The Device Owner
can now control the following settings to improve management of
Corporate-Owned, Single-Use (COSU) devices:
- Disable or re-enable the keyguard with the
- Disable or re-enable the status bar (including quick settings, notifications, and the
navigation swipe-up gesture that launches Google Now) with the
- Disable or re-enable safe boot with the
- Prevent the screen from turning off while plugged in with the
- Disable or re-enable the keyguard with the
- Silent install and uninstall of apps by Device Owner: A Device Owner can now
silently install and uninstall applications using the
PackageInstallerAPIs, independent of Google Play for Work. You can now provision devices through a Device Owner that fetches and installs apps without user interaction. This feature is useful for enabling one-touch provisioning of kiosks or other such devices without activating a Google account.
- Silent enterprise certificate access: When an app calls
choosePrivateKeyAlias(), prior to the user being prompted to select a certificate, the Profile or Device Owner can now call the
DeviceAdminReceiver.onChoosePrivateKeyAlias()method to provide the alias silently to the requesting application. This feature lets you grant managed apps access to certificates without user interaction.
- Auto-acceptance of system updates. By setting a system update policy with
DevicePolicyManager.setSystemUpdatePolicy(), a Device Owner can now auto-accept a system update, for instance in the case of a kiosk device, or postpone the update and prevent it being taken by the user for up to 30 days. Furthermore, an administrator can set a daily time window in which an update must be taken, for example during the hours when a kiosk device is not in use. When a system update is available, the system checks if the Work Policy Controller app has set a system update policy, and behaves accordingly.
Delegated certificate installation: A Profile or Device Owner can now grant a
third-party app the ability to call these
DevicePolicyManagercertificate management APIs:
- Enterprise factory reset protection: When provisioning a Device Owner, you can
now configure parameters to unlock Factory Reset Protection (FRP) by setting the
DeviceManagerPolicy.EXTRA_PROVISIONING_RESET_PROTECTION_PARAMETERSbundle. An NFC Programmer app can provide these parameters after a device has been reset to unlock FRP and provision the device, without requiring the previously configured Google account. If you don't modify these parameters, FRP remains in-place and prevents the device from being activated without the previously activated Google credentials.
Additionally, by setting app restrictions on Google Play services, Device Owners can specify alternative Google accounts for unlocking FRP to replace the ones activated on the device.
- Data usage tracking. A Profile or Device Owner can now query for the
data usage statistics visible in Settings > Data usage by using the new
android.app.usage.NetworkStatsManagermethods. Profile Owners are automatically granted permission to query data on the profile they manage, while Device Owners get access to usage data of the managed primary user.
- Runtime permission management:
A Profile or Device Owner can set a permission policy for all runtime requests of all applications using
DevicePolicyManager.setPermissionPolicy(), to either prompt the user to grant the permission as normal or automatically grant or deny the permission silently. If the latter policy is set, the user cannot modify the selection made by the Profile or Device Owner within the app’s permissions screen in Settings.
- VPN in Settings: VPN apps are now visible in Settings > More > VPN. Additionally, the notifications that accompany VPN usage are now specific to how that VPN is configured. For Profile Owner, the notifications are specific to whether the VPN is configured for a managed profile, a personal profile, or both. For a Device Owner, the notifications are specific to whether the VPN is configured for the entire device.
- Work status notification: A status bar briefcase icon now appears whenever an app from the managed profile has an activity in the foreground. Furthermore, if the device is unlocked directly to the activity of an app in the managed profile, a toast is displayed notifying the user that they are within the work profile.
For a detailed view of all API changes in the M Developer Preview, see the API Differences Report.