Line 1:
Line 1:
−
<span style="color: #0E9549; font-size: 24px;">'''About this constraint '''</span>
+
<span style="color: #0E9549; font-size: 24px;">'''About this constraint '''</span><br/>
−
<pre style="background-color: #ACC8E5; color: #112A46; border-radius: 10px; padding: 10px;">This constraint can be used to allow/prevent actions being run only when the device has been ADB hacked.
+
This constraint can be used to allow/prevent actions being run only when the device has been ADB hacked.
−
It is ideal for technically advanced users who require specific automations for devices that have been altered beyond the standard configurations.</pre>
+
It is ideal for technically advanced users who require specific automations for devices that have been altered beyond the standard configurations.<br/>
<span style="color: #0E9549; font-size: 24px;">'''ADB Hack Permissions'''</span><br/>
<span style="color: #0E9549; font-size: 24px;">'''ADB Hack Permissions'''</span><br/>
−
<pre style="background-color: #ACC8E5; color: #112A46; border-radius: 10px; padding: 10px;">
+
* ''WRITE_SECURE_SETTINGS''
−
* WRITE_SECURE_SETTINGS
+
<br/>
−
</pre>
+
* ''READ_LOGS''
−
<pre style="background-color: #ACC8E5; color: #112A46; border-radius: 10px; padding: 10px;">
+
<br/>
−
* READ_LOGS
+
* ''SET_VOLUME_KEY_LONG_PRESS_ LISTENER''
−
</pre>
+
<br/>
−
<pre style="background-color: #ACC8E5; color: #112A46; border-radius: 10px; padding: 10px;">
+
* ''CHANGE CONFIGURATION''
−
* SET_VOLUME_KEY_LONG_PRESS_ LISTENER
+
<br/>
−
</pre>
+
* ''DUMP''
−
<pre style="background-color: #ACC8E5; color: #112A46; border-radius: 10px; padding: 10px;">
+
<br/>
−
* CHANGE CONFIGURATION
−
</pre>
−
<pre style="background-color: #ACC8E5; color: #112A46; border-radius: 10px; padding: 10px;">
−
* DUMP
−
</pre>