Day13 ZXing二维码+LeakCanary使用
一.生成二维码和扫描二维码
1.依赖:
implementation 'cn.yipianfengye.android:zxing-library:2.2'
2.权限:
<!--网络权限-->
<uses-permission android:name="android.permission.INTERNET"/>
<!--震动权限-->
<uses-permission android:name="android.permission.VIBRATE"/>
<!--摄像头权限-->
<uses-permission android:name="android.permission.CAMERA"/>
<!--自动聚焦权限-->
<uses-feature android:name="android.hardware.camera.autofocus"/>
3.动态权限:
if (Build.VERSION.SDK_INT >= Build.VERSION_CODES.M) {
requestPermissions(new String[]{Manifest.permission.CAMERA,Manifest.permission.VIBRATE,Manifest.permission.WRITE_EXTERNAL_STORAGE}, 200);
}
4.application初始化ZXing:
public class App extends Application {
@Override
public void onCreate() {
super.onCreate();
//初始化Zxing库
ZXingLibrary.initDisplayOpinion(this);
}
}
5.清单文件:
6.生成二维码:
//生成二维码
private void create() {
Bitmap bitmap = BitmapFactory.decodeResource(getResources(), R.drawable.love);
Bitmap code = CodeUtils.createImage("安卓3哈哈哈", 400, 400, bitmap);
iv.setImageBitmap(code);
}
7.扫描二维码:
//扫描二维码
private void sao() {
Intent intent = new Intent(this, CaptureActivity.class);
startActivityForResult(intent,101);
}
//处理结果
@Override
protected void onActivityResult(int requestCode, int resultCode, @Nullable Intent data) {
super.onActivityResult(requestCode, resultCode, data);
if(requestCode == 101 &&data != null){
String name = data.getExtras().getString(CodeUtils.RESULT_STRING);//获得扫描二维码的结果
Log.d("ytx", "onActivityResult: " + name);
}
}
8.全部代码:
package com.example.android3_demo.zxing;
import android.Manifest;
import android.app.Activity;
import android.content.Intent;
import android.graphics.Bitmap;
import android.graphics.BitmapFactory;
import android.os.Build;
import android.os.Bundle;
import android.view.View;
import android.widget.Button;
import android.widget.ImageView;
import android.widget.Toast;
import com.example.android3_demo.R;
import com.uuzuche.lib_zxing.activity.CaptureActivity;
import com.uuzuche.lib_zxing.activity.CodeUtils;
import androidx.annotation.Nullable;
import androidx.appcompat.app.AppCompatActivity;
/**
1。倒入依赖: implementation 'cn.yipianfengye.android:zxing-library:2.2'
2。权限:
<!--网络权限-->
<uses-permission android:name="android.permission.INTERNET"/>
<!--震动权限-->
<uses-permission android:name="android.permission.VIBRATE"/>
<!--摄像头权限-->
<uses-permission android:name="android.permission.CAMERA"/>
<!--自动聚焦权限-->
<uses-feature android:name="android.hardware.camera.autofocus"/>
3.生成二维码
*/
public class ZXingActivity extends AppCompatActivity implements View.OnClickListener {
private Button bt_create;
private Button bt_sao;
private ImageView iv;
@Override
protected void onCreate(Bundle savedInstanceState) {
super.onCreate(savedInstanceState);
setContentView(R.layout.activity_zxing);
if (Build.VERSION.SDK_INT >= Build.VERSION_CODES.M) {
requestPermissions(new String[]{Manifest.permission.CAMERA,Manifest.permission.VIBRATE,Manifest.permission.WRITE_EXTERNAL_STORAGE}, 200);
}
initView();
}
private void initView() {
bt_create = (Button) findViewById(R.id.bt_create);
bt_sao = (Button) findViewById(R.id.bt_sao);
iv = (ImageView) findViewById(R.id.iv);
bt_create.setOnClickListener(this);
bt_sao.setOnClickListener(this);
}
@Override
public void onClick(View v) {
switch (v.getId()) {
case R.id.bt_create:
create();
break;
case R.id.bt_sao:
sao();
break;
}
}
//扫描二维码
private void sao() {
Intent intent = new Intent(this, CaptureActivity.class);
startActivityForResult(intent,101);
}
@Override
protected void onActivityResult(int requestCode, int resultCode, @Nullable Intent data) {
super.onActivityResult(requestCode, resultCode, data);
if(requestCode == 101 && resultCode == Activity.RESULT_OK &&data != null){
Bundle bundle = data.getExtras();//获得扫描的数据
if(bundle == null){
return;
}
if(bundle.getInt(CodeUtils.RESULT_TYPE) == CodeUtils.RESULT_SUCCESS){//判断是否成功
String string = bundle.getString(CodeUtils.RESULT_STRING);//获得二维码字符串
Toast.makeText(this, "扫描结果"+string, Toast.LENGTH_SHORT).show();
}
}
}
//生成二维码
private void create() {
Bitmap bitmap = BitmapFactory.decodeResource(getResources(), R.drawable.love);
Bitmap code = CodeUtils.createImage("安卓3哈哈哈", 400, 400, bitmap);
iv.setImageBitmap(code);
}
}
二.LeakCanary内存泄漏
1.什么是LeakCanary
LeakCanary是大名鼎鼎的square公司开源的内存泄漏检测工具,目前上大部分app在开发测试阶段都会接入此工具用于检测潜在的内存泄漏问题。
2.什么是内存溢出:
内存溢出(out of memory):是指程序在申请内存时,没有足够的内存空间供其使用,出现out of memory;比如申请一个integer,但给它存了long才能存下的数,那就是内存溢出。
3.什么是内存泄漏:
内存泄漏(memory leak):是指程序在申请内存后,无法释放已申请的内存空间,一次内存泄漏危害可以忽略,但内存泄漏堆积后果严重,无论多少内存,迟早会被占光。
总结:内存泄漏----->内存溢出
4.依赖:
//导入LeakCanary的依赖,去定位页面的内存泄漏问题。
debugImplementation 'com.squareup.leakcanary:leakcanary-android:1.6.3'
releaseImplementation 'com.squareup.leakcanary:leakcanary-android-no-op:1.6.3'
debugImplementation 'com.squareup.leakcanary:leakcanary-support-fragment:1.6.3'
5.application中部署:
public class App extends Application {
@Override
public void onCreate() {
super.onCreate();
//初始化Zxing库
ZXingLibrary.initDisplayOpinion(this);
//部署leakcanary,定位内存泄漏
if(!LeakCanary.isInAnalyzerProcess(this)){//如果没有部署
LeakCanary.install(this);//部署
}
}
}
6.制造内存泄漏现象:
/***
单例模式的TestManager
*/
public class TestManager {
private List<Activity> list = new ArrayList<>();
private static TestManager testManager;
public static TestManager getInstance(){
if(testManager == null){
testManager = new TestManager();
}
return testManager;
}
public void add(Activity activity){
list.add(activity);
}
}
然后写两个activity,第一个LeakActivity跳转到第二个Leak2Activity,然后Leak2Activity使用有内存泄漏的单例
public class LeakActivity extends AppCompatActivity {
@Override
protected void onCreate(Bundle savedInstanceState) {
super.onCreate(savedInstanceState);
setContentView(R.layout.activity_leak);
findViewById(R.id.bt).setOnClickListener(new View.OnClickListener() {
@Override
public void onClick(View view) {
Intent intent = new Intent(LeakActivity.this,Leak2Activity.class);
startActivity(intent);
}
});
}
}
public class Leak2Activity extends AppCompatActivity {
@Override
protected void onCreate(Bundle savedInstanceState) {
super.onCreate(savedInstanceState);
setContentView(R.layout.activity_leak2);
TestManager.getInstance().add(this);
}
}
我们启动app,当检测到内存泄漏的时候,会出现一个弹窗,然后手机桌面会出现一个Leaks的图标
点击即可看到内存泄漏的原因:
然后在一堆目录里找到我们的leaks生成的hprof文件:
那个result文件,我没有查到是什么文件,先不管它啦,我们只要双击hprof文件即可。
稍等一会以后会出现一个分析框: