Changes

m
no edit summary
Line 1: Line 1: −
<pre style="background-color: #ACC8E5; color: #112A46; border-radius: 10px; padding: 10px;">This constraint can be used to allow/prevent actions being run only when the device has been ADB hacked.</pre>
+
<span style="color: #0E9549; font-size: 24px;">'''About this constraint '''</span><br/>
 +
This constraint can be used to allow/prevent actions being run only when the device has been ADB hacked.
 +
 
 +
It is ideal for technically advanced users who require specific automations for devices that have been altered beyond the standard configurations.<br/>
 +
 
 
<span style="color: #0E9549; font-size: 24px;">'''ADB Hack Permissions'''</span><br/>
 
<span style="color: #0E9549; font-size: 24px;">'''ADB Hack Permissions'''</span><br/>
* WRITE_SECURE_SETTINGS
+
 
* READ_LOGS
+
* ''WRITE_SECURE_SETTINGS''
* SET_VOLUME_KEY_LONG_PRESS_ LISTENER
+
<br/>
* CHANGE CONFIGURATION
+
* ''READ_LOGS''
* DUMP
+
<br/>
 +
* ''SET_VOLUME_KEY_LONG_PRESS_ LISTENER''
 +
<br/>
 +
* ''CHANGE CONFIGURATION''
 +
<br/>
 +
* ''DUMP''
 +
<br/>
editors
1,599

edits