Line 1:
Line 1:
−
<pre style="background-color: #ACC8E5; color: #112A46; border-radius: 10px; padding: 10px;">This constraint can be used to allow/prevent actions being run only when the device has been ADB hacked.</pre>
+
<span style="color: #0E9549; font-size: 24px;">'''About this restriction'''</span><br/>
+
<pre style="background-color: #ACC8E5; color: #112A46; border-radius: 10px; padding: 10px;">This constraint can be used to allow/prevent actions being run only when the device has been ADB hacked.
+
+
It is ideal for technically advanced users who require specific automations for devices that have been altered beyond the standard configurations.</pre>
<span style="color: #0E9549; font-size: 24px;">'''ADB Hack Permissions'''</span><br/>
<span style="color: #0E9549; font-size: 24px;">'''ADB Hack Permissions'''</span><br/>
+
+
<pre style="background-color: #ACC8E5; color: #112A46; border-radius: 10px; padding: 10px;">
* WRITE_SECURE_SETTINGS
* WRITE_SECURE_SETTINGS
+
</pre>
+
<pre style="background-color: #ACC8E5; color: #112A46; border-radius: 10px; padding: 10px;">
* READ_LOGS
* READ_LOGS
+
</pre>
+
<pre style="background-color: #ACC8E5; color: #112A46; border-radius: 10px; padding: 10px;">
* SET_VOLUME_KEY_LONG_PRESS_ LISTENER
* SET_VOLUME_KEY_LONG_PRESS_ LISTENER
+
</pre>
+
<pre style="background-color: #ACC8E5; color: #112A46; border-radius: 10px; padding: 10px;">
* CHANGE CONFIGURATION
* CHANGE CONFIGURATION
+
</pre>
+
<pre style="background-color: #ACC8E5; color: #112A46; border-radius: 10px; padding: 10px;">
* DUMP
* DUMP
+
</pre>