Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more

Commit 12be21dc authored by Mathew Inwood's avatar Mathew Inwood
Browse files

Fix some @link tags in @ChangeId docs.

We now have javadoc based docs generated from these comments now. Ensure
the links can be resolved.

Bug: 144927670
Test: Test: m -j offline-sdk-docs
Change-Id: Ie9827ad02ad91ab7f01226a3a741c94fa46de730
parent 8fda7a56
Loading
Loading
Loading
Loading
+3 −2
Original line number Diff line number Diff line
@@ -372,8 +372,9 @@ public class NotificationManagerService extends SystemService {

    /**
     * Apps that post custom toasts in the background will have those blocked. Apps can
     * still post toasts created with {@link Toast#makeText(Context, CharSequence, int)} and its
     * variants while in the background.
     * still post toasts created with
     * {@link android.widget.Toast#makeText(Context, CharSequence, int)} and its variants while
     * in the background.
     *
     * TODO(b/144152069): Add @EnabledAfter(Q) to target R+ after assessing impact on dogfood
     */
+5 −5
Original line number Diff line number Diff line
@@ -522,11 +522,11 @@ public class DevicePolicyManagerService extends BaseIDevicePolicyManager {
    /**
     * For admin apps targeting R+, throw when the app sets password requirement
     * that is not taken into account at given quality. For example when quality is set
     * to {@link DevicePolicyManager#PASSWORD_QUALITY_UNSPECIFIED}, it doesn't make sense to
     * require certain password length. If the intent is to require a password of certain length
     * having at least NUMERIC quality, the admin should first call
     * {@link #setPasswordQuality(ComponentName, int, boolean)} and only then call
     * {@link #setPasswordMinimumLength(ComponentName, int, boolean)}.
     * to {@link android.app.admin.DevicePolicyManager#PASSWORD_QUALITY_UNSPECIFIED}, it doesn't
     * make sense to require certain password length. If the intent is to require a password of
     * certain length having at least NUMERIC quality, the admin should first call
     * {@link android.app.admin.DevicePolicyManager#setPasswordQuality} and only then call
     * {@link android.app.admin.DevicePolicyManager#setPasswordMinimumLength}.
     *
     * <p>Conversely when an admin app targeting R+ lowers password quality, those
     * requirements that stop making sense are reset to default values.
+1 −1
Original line number Diff line number Diff line
@@ -135,7 +135,7 @@ public final class PreciseDataConnectionState implements Parcelable {
    }

    /**
     * To check the SDK version for {@link PreciseDataConnectionState#getDataConnectionState}.
     * To check the SDK version for {@code PreciseDataConnectionState#getDataConnectionState}.
     */
    @ChangeId
    @EnabledAfter(targetSdkVersion = Build.VERSION_CODES.Q)