diff --git a/permission_handler_android/lib/src/android_object_mirrors/manifest.dart b/permission_handler_android/lib/src/android_object_mirrors/manifest.dart index 826ea4354..0a298358b 100644 --- a/permission_handler_android/lib/src/android_object_mirrors/manifest.dart +++ b/permission_handler_android/lib/src/android_object_mirrors/manifest.dart @@ -1,5 +1,3 @@ -// ignore_for_file: non_constant_identifier_names - /// See https://developer.android.com/reference/android/Manifest. class Manifest { const Manifest._(); @@ -9,7 +7,7 @@ class Manifest { static const _ManifestPermission _permission = _ManifestPermission(); /// Provides access to all permission group strings known to Android. - static _ManifestPermissionGroup get permission_group => _permissionGroup; + static _ManifestPermissionGroup get permissionGroup => _permissionGroup; static const _ManifestPermissionGroup _permissionGroup = _ManifestPermissionGroup(); } @@ -27,7 +25,7 @@ class _ManifestPermission { /// Protection level: dangerous /// /// Constant Value: "android.permission.ACCEPT_HANDOVER" - final String ACCEPT_HANDOVER = 'android.permission.ACCEPT_HANDOVER'; + final String acceptHandover = 'android.permission.ACCEPT_HANDOVER'; /// Allows an app to access location in the background. If you're requesting this permission, you must also request either ACCESS_COARSE_LOCATION or ACCESS_FINE_LOCATION. Requesting this permission by itself doesn't give you location access. /// @@ -36,13 +34,13 @@ class _ManifestPermission { /// This is a hard restricted permission which cannot be held by an app until the installer on record allowlists the permission. For more details see PackageInstaller.SessionParams.setWhitelistedRestrictedPermissions(Set). /// /// Constant Value: "android.permission.ACCESS_BACKGROUND_LOCATION" - final String ACCESS_BACKGROUND_LOCATION = + final String accessBackgroundLocation = 'android.permission.ACCESS_BACKGROUND_LOCATION'; /// Allows an application to access data blobs across users. /// /// Constant Value: "android.permission.ACCESS_BLOBS_ACROSS_USERS" - final String ACCESS_BLOBS_ACROSS_USERS = + final String accessBlobsAcrossUsers = 'android.permission.ACCESS_BLOBS_ACROSS_USERS'; /// Allows read/write access to the "properties" table in the checkin database, to change values that get uploaded. @@ -50,7 +48,7 @@ class _ManifestPermission { /// Not for use by third-party applications. /// /// Constant Value: "android.permission.ACCESS_CHECKIN_PROPERTIES" - final String ACCESS_CHECKIN_PROPERTIES = + final String accessCheckinProperties = 'android.permission.ACCESS_CHECKIN_PROPERTIES'; /// Allows an app to access approximate location. Alternatively, you might want ACCESS_FINE_LOCATION. @@ -58,7 +56,7 @@ class _ManifestPermission { /// Protection level: dangerous /// /// Constant Value: "android.permission.ACCESS_COARSE_LOCATION" - final String ACCESS_COARSE_LOCATION = + final String accessCoarseLocation = 'android.permission.ACCESS_COARSE_LOCATION'; /// Allows an app to access precise location. Alternatively, you might want ACCESS_COARSE_LOCATION. @@ -66,14 +64,14 @@ class _ManifestPermission { /// Protection level: dangerous /// /// Constant Value: "android.permission.ACCESS_FINE_LOCATION" - final String ACCESS_FINE_LOCATION = 'android.permission.ACCESS_FINE_LOCATION'; + final String accessFineLocation = 'android.permission.ACCESS_FINE_LOCATION'; /// Allows an application to access extra location provider commands. /// /// Protection level: normal /// /// Constant Value: "android.permission.ACCESS_LOCATION_EXTRA_COMMANDS" - final String ACCESS_LOCATION_EXTRA_COMMANDS = + final String accessLocationExtraCommands = 'android.permission.ACCESS_LOCATION_EXTRA_COMMANDS'; /// Allows an application to access any geographic locations persisted in the user's shared collection. @@ -81,22 +79,21 @@ class _ManifestPermission { /// Protection level: dangerous /// /// Constant Value: "android.permission.ACCESS_MEDIA_LOCATION" - final String ACCESS_MEDIA_LOCATION = - 'android.permission.ACCESS_MEDIA_LOCATION'; + final String accessMediaLocation = 'android.permission.ACCESS_MEDIA_LOCATION'; /// Allows applications to access information about networks. /// /// Protection level: normal /// /// Constant Value: "android.permission.ACCESS_NETWORK_STATE" - final String ACCESS_NETWORK_STATE = 'android.permission.ACCESS_NETWORK_STATE'; + final String accessNetworkState = 'android.permission.ACCESS_NETWORK_STATE'; /// Marker permission for applications that wish to access notification policy. This permission is not supported on managed profiles. /// /// Protection level: normal /// /// Constant Value: "android.permission.ACCESS_NOTIFICATION_POLICY" - final String ACCESS_NOTIFICATION_POLICY = + final String accessNotificationPolicy = 'android.permission.ACCESS_NOTIFICATION_POLICY'; /// Allows applications to access information about Wi-Fi networks. @@ -104,49 +101,49 @@ class _ManifestPermission { /// Protection level: normal /// /// Constant Value: "android.permission.ACCESS_WIFI_STATE" - final String ACCESS_WIFI_STATE = 'android.permission.ACCESS_WIFI_STATE'; + final String accessWifiState = 'android.permission.ACCESS_WIFI_STATE'; /// Allows applications to call into AccountAuthenticators. /// /// Not for use by third-party applications. /// /// Constant Value: "android.permission.ACCOUNT_MANAGER" - final String ACCOUNT_MANAGER = 'android.permission.ACCOUNT_MANAGER'; + final String accountManager = 'android.permission.ACCOUNT_MANAGER'; /// Allows an application to recognize physical activity. /// /// Protection level: dangerous /// /// Constant Value: "android.permission.ACTIVITY_RECOGNITION" - final String ACTIVITY_RECOGNITION = 'android.permission.ACTIVITY_RECOGNITION'; + final String activityRecognition = 'android.permission.ACTIVITY_RECOGNITION'; /// Allows an application to add voicemails into the system. /// /// Protection level: dangerous /// /// Constant Value: "com.android.voicemail.permission.ADD_VOICEMAIL" - final String ADD_VOICEMAIL = 'com.android.voicemail.permission.ADD_VOICEMAIL'; + final String addVoicemail = 'com.android.voicemail.permission.ADD_VOICEMAIL'; /// Allows the app to answer an incoming phone call. /// /// Protection level: dangerous /// /// Constant Value: "android.permission.ANSWER_PHONE_CALLS" - final String ANSWER_PHONE_CALLS = 'android.permission.ANSWER_PHONE_CALLS'; + final String answerPhoneCalls = 'android.permission.ANSWER_PHONE_CALLS'; /// Allows an application to collect battery statistics /// /// Protection level: signature|privileged|development /// /// Constant Value: "android.permission.BATTERY_STATS" - final String BATTERY_STATS = 'android.permission.BATTERY_STATS'; + final String batteryStats = 'android.permission.BATTERY_STATS'; /// Must be required by an AccessibilityService, to ensure that only the system can bind to it. /// /// Protection level: signature /// /// Constant Value: "android.permission.BIND_ACCESSIBILITY_SERVICE" - final String BIND_ACCESSIBILITY_SERVICE = + final String bindAccessibilityService = 'android.permission.BIND_ACCESSIBILITY_SERVICE'; /// Allows an application to tell the AppWidget service which application can access AppWidget's data. The normal user flow is that a user picks an AppWidget to go into a particular host, thereby giving that host application access to the private data from the AppWidget app. An application that has this permission should honor that contract. @@ -154,22 +151,21 @@ class _ManifestPermission { /// Not for use by third-party applications. /// /// Constant Value: "android.permission.BIND_APPWIDGET" - final String BIND_APPWIDGET = 'android.permission.BIND_APPWIDGET'; + final String bindAppwidget = 'android.permission.BIND_APPWIDGET'; /// Must be required by a AutofillService, to ensure that only the system can bind to it. /// /// Protection level: signature /// /// Constant Value: "android.permission.BIND_AUTOFILL_SERVICE" - final String BIND_AUTOFILL_SERVICE = - 'android.permission.BIND_AUTOFILL_SERVICE'; + final String bindAutofillService = 'android.permission.BIND_AUTOFILL_SERVICE'; /// Must be required by a CallRedirectionService, to ensure that only the system can bind to it. /// /// Protection level: signature|privileged /// /// Constant Value: "android.permission.BIND_CALL_REDIRECTION_SERVICE" - final String BIND_CALL_REDIRECTION_SERVICE = + final String bindCallRedirectionService = 'android.permission.BIND_CALL_REDIRECTION_SERVICE'; /// A subclass of CarrierMessagingClientService must be protected with this permission. @@ -177,13 +173,13 @@ class _ManifestPermission { /// Protection level: signature /// /// Constant Value: "android.permission.BIND_CARRIER_MESSAGING_CLIENT_SERVICE" - final String BIND_CARRIER_MESSAGING_CLIENT_SERVICE = + final String bindCarrierMessagingClientService = 'android.permission.BIND_CARRIER_MESSAGING_CLIENT_SERVICE'; /// Constant Value: "android.permission.BIND_CARRIER_MESSAGING_SERVICE" @Deprecated( 'This constant was deprecated in API level 23. Use BIND_CARRIER_SERVICES instead.') - final String BIND_CARRIER_MESSAGING_SERVICE = + final String bindCarrierMessagingService = 'android.permission.BIND_CARRIER_MESSAGING_SERVICE'; /// The system process that is allowed to bind to services in carrier apps will have this permission. Carrier apps should use this permission to protect their services that only the system is allowed to bind to. @@ -191,8 +187,7 @@ class _ManifestPermission { /// Protection level: signature|privileged /// /// Constant Value: "android.permission.BIND_CARRIER_SERVICES" - final String BIND_CARRIER_SERVICES = - 'android.permission.BIND_CARRIER_SERVICES'; + final String bindCarrierServices = 'android.permission.BIND_CARRIER_SERVICES'; /// Must be required by a ChooserTargetService, to ensure that only the system can bind to it. /// @@ -201,13 +196,13 @@ class _ManifestPermission { /// Constant Value: "android.permission.BIND_CHOOSER_TARGET_SERVICE" @Deprecated( 'This constant was deprecated in API level 30. For publishing direct share targets, please follow the instructions in https://developer.android.com/training/sharing/receive.html#providing-direct-share-targets instead.') - final String BIND_CHOOSER_TARGET_SERVICE = + final String bindChooserTargetService = 'android.permission.BIND_CHOOSER_TARGET_SERVICE'; /// Must be required by any CompanionDeviceServices to ensure that only the system can bind to it. /// /// Constant Value: "android.permission.BIND_COMPANION_DEVICE_SERVICE" - final String BIND_COMPANION_DEVICE_SERVICE = + final String bindCompanionDeviceService = 'android.permission.BIND_COMPANION_DEVICE_SERVICE'; /// Must be required by a ConditionProviderService, to ensure that only the system can bind to it. @@ -215,7 +210,7 @@ class _ManifestPermission { /// Protection level: signature /// /// Constant Value: "android.permission.BIND_CONDITION_PROVIDER_SERVICE" - final String BIND_CONDITION_PROVIDER_SERVICE = + final String bindConditionProviderService = 'android.permission.BIND_CONDITION_PROVIDER_SERVICE'; /// Allows SystemUI to request third party controls. @@ -223,14 +218,14 @@ class _ManifestPermission { /// Should only be requested by the System and required by ControlsProviderService declarations. /// /// Constant Value: "android.permission.BIND_CONTROLS" - final String BIND_CONTROLS = 'android.permission.BIND_CONTROLS'; + final String bindControls = 'android.permission.BIND_CONTROLS'; /// Must be required by a CredentialProviderService to ensure that only the system can bind to it. /// /// Protection level: signature /// /// Constant Value: "android.permission.BIND_CREDENTIAL_PROVIDER_SERVICE" - final String BIND_CREDENTIAL_PROVIDER_SERVICE = + final String bindCredentialProviderService = 'android.permission.BIND_CREDENTIAL_PROVIDER_SERVICE'; /// Must be required by device administration receiver, to ensure that only the system can interact with it. @@ -238,35 +233,35 @@ class _ManifestPermission { /// Protection level: signature /// /// Constant Value: "android.permission.BIND_DEVICE_ADMIN" - final String BIND_DEVICE_ADMIN = 'android.permission.BIND_DEVICE_ADMIN'; + final String bindDeviceAdmin = 'android.permission.BIND_DEVICE_ADMIN'; /// Must be required by an DreamService, to ensure that only the system can bind to it. /// /// Protection level: signature /// /// Constant Value: "android.permission.BIND_DREAM_SERVICE" - final String BIND_DREAM_SERVICE = 'android.permission.BIND_DREAM_SERVICE'; + final String bindDreamService = 'android.permission.BIND_DREAM_SERVICE'; /// Must be required by a InCallService, to ensure that only the system can bind to it. /// /// Protection level: signature|privileged /// /// Constant Value: "android.permission.BIND_INCALL_SERVICE" - final String BIND_INCALL_SERVICE = 'android.permission.BIND_INCALL_SERVICE'; + final String bindIncallService = 'android.permission.BIND_INCALL_SERVICE'; /// Must be required by an InputMethodService, to ensure that only the system can bind to it. /// /// Protection level: signature /// /// Constant Value: "android.permission.BIND_INPUT_METHOD" - final String BIND_INPUT_METHOD = 'android.permission.BIND_INPUT_METHOD'; + final String bindInputMethod = 'android.permission.BIND_INPUT_METHOD'; /// Must be required by an MidiDeviceService, to ensure that only the system can bind to it. /// /// Protection level: signature /// /// Constant Value: "android.permission.BIND_MIDI_DEVICE_SERVICE" - final String BIND_MIDI_DEVICE_SERVICE = + final String bindMidiDeviceService = 'android.permission.BIND_MIDI_DEVICE_SERVICE'; /// Must be required by a HostApduService or OffHostApduService to ensure that only the system can bind to it. @@ -274,14 +269,14 @@ class _ManifestPermission { /// Protection level: signature /// /// Constant Value: "android.permission.BIND_NFC_SERVICE" - final String BIND_NFC_SERVICE = 'android.permission.BIND_NFC_SERVICE'; + final String bindNfcService = 'android.permission.BIND_NFC_SERVICE'; /// Must be required by an NotificationListenerService, to ensure that only the system can bind to it. /// /// Protection level: signature /// /// Constant Value: "android.permission.BIND_NOTIFICATION_LISTENER_SERVICE" - final String BIND_NOTIFICATION_LISTENER_SERVICE = + final String bindNotificationListenerService = 'android.permission.BIND_NOTIFICATION_LISTENER_SERVICE'; /// Must be required by a PrintService, to ensure that only the system can bind to it. @@ -289,14 +284,14 @@ class _ManifestPermission { /// Protection level: signature /// /// Constant Value: "android.permission.BIND_PRINT_SERVICE" - final String BIND_PRINT_SERVICE = 'android.permission.BIND_PRINT_SERVICE'; + final String bindPrintService = 'android.permission.BIND_PRINT_SERVICE'; /// Must be required by a QuickAccessWalletService to ensure that only the system can bind to it. /// /// Protection level: signature /// /// Constant Value: "android.permission.BIND_QUICK_ACCESS_WALLET_SERVICE" - final String BIND_QUICK_ACCESS_WALLET_SERVICE = + final String bindQuickAccessWalletService = 'android.permission.BIND_QUICK_ACCESS_WALLET_SERVICE'; /// Allows an application to bind to third party quick settings tiles. @@ -304,7 +299,7 @@ class _ManifestPermission { /// Should only be requested by the System, should be required by TileService declarations. /// /// Constant Value: "android.permission.BIND_QUICK_SETTINGS_TILE" - final String BIND_QUICK_SETTINGS_TILE = + final String bindQuickSettingsTile = 'android.permission.BIND_QUICK_SETTINGS_TILE'; /// Must be required by a RemoteViewsService, to ensure that only the system can bind to it. @@ -312,14 +307,14 @@ class _ManifestPermission { /// Protection level: signature|privileged /// /// Constant Value: "android.permission.BIND_REMOTEVIEWS" - final String BIND_REMOTEVIEWS = 'android.permission.BIND_REMOTEVIEWS'; + final String bindRemoteviews = 'android.permission.BIND_REMOTEVIEWS'; /// Must be required by a CallScreeningService, to ensure that only the system can bind to it. /// /// Protection level: signature|privileged /// /// Constant Value: "android.permission.BIND_SCREENING_SERVICE" - final String BIND_SCREENING_SERVICE = + final String bindScreeningService = 'android.permission.BIND_SCREENING_SERVICE'; /// Must be required by a ConnectionService, to ensure that only the system can bind to it. @@ -327,7 +322,7 @@ class _ManifestPermission { /// Protection level: signature|privileged /// /// Constant Value: "android.permission.BIND_TELECOM_CONNECTION_SERVICE" - final String BIND_TELECOM_CONNECTION_SERVICE = + final String bindTelecomConnectionService = 'android.permission.BIND_TELECOM_CONNECTION_SERVICE'; /// Must be required by a TextService (e.g. SpellCheckerService) to ensure that only the system can bind to it. @@ -335,21 +330,21 @@ class _ManifestPermission { /// Protection level: signature /// /// Constant Value: "android.permission.BIND_TEXT_SERVICE" - final String BIND_TEXT_SERVICE = 'android.permission.BIND_TEXT_SERVICE'; + final String bindTextService = 'android.permission.BIND_TEXT_SERVICE'; /// Must be required by a TvInputService to ensure that only the system can bind to it. /// /// Protection level: signature|privileged /// /// Constant Value: "android.permission.BIND_TV_INPUT" - final String BIND_TV_INPUT = 'android.permission.BIND_TV_INPUT'; + final String bindTvInput = 'android.permission.BIND_TV_INPUT'; /// Must be required by a TvInteractiveAppService to ensure that only the system can bind to it. /// /// Protection level: signature|privileged /// /// Constant Value: "android.permission.BIND_TV_INTERACTIVE_APP" - final String BIND_TV_INTERACTIVE_APP = + final String bindTvInteractiveApp = 'android.permission.BIND_TV_INTERACTIVE_APP'; /// Must be required by a link VisualVoicemailService to ensure that only the system can bind to it. @@ -357,7 +352,7 @@ class _ManifestPermission { /// Protection level: signature|privileged /// /// Constant Value: "android.permission.BIND_VISUAL_VOICEMAIL_SERVICE" - final String BIND_VISUAL_VOICEMAIL_SERVICE = + final String bindVisualVoicemailService = 'android.permission.BIND_VISUAL_VOICEMAIL_SERVICE'; /// Must be required by a VoiceInteractionService, to ensure that only the system can bind to it. @@ -365,7 +360,7 @@ class _ManifestPermission { /// Protection level: signature /// /// Constant Value: "android.permission.BIND_VOICE_INTERACTION" - final String BIND_VOICE_INTERACTION = + final String bindVoiceInteraction = 'android.permission.BIND_VOICE_INTERACTION'; /// Must be required by a VpnService, to ensure that only the system can bind to it. @@ -373,14 +368,14 @@ class _ManifestPermission { /// Protection level: signature /// /// Constant Value: "android.permission.BIND_VPN_SERVICE" - final String BIND_VPN_SERVICE = 'android.permission.BIND_VPN_SERVICE'; + final String bindVpnService = 'android.permission.BIND_VPN_SERVICE'; /// Must be required by an VrListenerService, to ensure that only the system can bind to it. /// /// Protection level: signature /// /// Constant Value: "android.permission.BIND_VR_LISTENER_SERVICE" - final String BIND_VR_LISTENER_SERVICE = + final String bindVrListenerService = 'android.permission.BIND_VR_LISTENER_SERVICE'; /// Must be required by a WallpaperService, to ensure that only the system can bind to it. @@ -388,56 +383,56 @@ class _ManifestPermission { /// Protection level: signature|privileged /// /// Constant Value: "android.permission.BIND_WALLPAPER" - final String BIND_WALLPAPER = 'android.permission.BIND_WALLPAPER'; + final String bindWallpaper = 'android.permission.BIND_WALLPAPER'; /// Allows applications to connect to paired bluetooth devices. /// /// Protection level: normal /// /// Constant Value: "android.permission.BLUETOOTH" - final String BLUETOOTH = 'android.permission.BLUETOOTH'; + final String bluetooth = 'android.permission.BLUETOOTH'; /// Allows applications to discover and pair bluetooth devices. /// /// Protection level: normal /// /// Constant Value: "android.permission.BLUETOOTH_ADMIN" - final String BLUETOOTH_ADMIN = 'android.permission.BLUETOOTH_ADMIN'; + final String bluetoothAdmin = 'android.permission.BLUETOOTH_ADMIN'; /// Required to be able to advertise to nearby Bluetooth devices. /// /// Protection level: dangerous /// /// Constant Value: "android.permission.BLUETOOTH_ADVERTISE" - final String BLUETOOTH_ADVERTISE = 'android.permission.BLUETOOTH_ADVERTISE'; + final String bluetoothAdvertise = 'android.permission.BLUETOOTH_ADVERTISE'; /// Required to be able to connect to paired Bluetooth devices. /// /// Protection level: dangerous /// /// Constant Value: "android.permission.BLUETOOTH_CONNECT" - final String BLUETOOTH_CONNECT = 'android.permission.BLUETOOTH_CONNECT'; + final String bluetoothConnect = 'android.permission.BLUETOOTH_CONNECT'; /// Allows applications to pair bluetooth devices without user interaction, and to allow or disallow phonebook access or message access. /// /// Not for use by third-party applications. /// /// Constant Value: "android.permission.BLUETOOTH_PRIVILEGED" - final String BLUETOOTH_PRIVILEGED = 'android.permission.BLUETOOTH_PRIVILEGED'; + final String bluetoothPrivileged = 'android.permission.BLUETOOTH_PRIVILEGED'; /// Required to be able to discover and pair nearby Bluetooth devices. /// /// Protection level: dangerous /// /// Constant Value: "android.permission.BLUETOOTH_SCAN" - final String BLUETOOTH_SCAN = 'android.permission.BLUETOOTH_SCAN'; + final String bluetoothScan = 'android.permission.BLUETOOTH_SCAN'; /// Allows an application to access data from sensors that the user uses to measure what is happening inside their body, such as heart rate. /// /// Protection level: dangerous /// /// Constant Value: "android.permission.BODY_SENSORS" - final String BODY_SENSORS = 'android.permission.BODY_SENSORS'; + final String bodySensors = 'android.permission.BODY_SENSORS'; /// Allows an application to access data from sensors that the user uses to measure what is happening inside their body, such as heart rate. If you're requesting this permission, you must also request BODY_SENSORS. Requesting this permission by itself doesn't give you Body sensors access. /// @@ -446,7 +441,7 @@ class _ManifestPermission { /// This is a hard restricted permission which cannot be held by an app until the installer on record allowlists the permission. For more details see PackageInstaller.SessionParams.setWhitelistedRestrictedPermissions(Set). /// /// Constant Value: "android.permission.BODY_SENSORS_BACKGROUND" - final String BODY_SENSORS_BACKGROUND = + final String bodySensorsBackground = 'android.permission.BODY_SENSORS_BACKGROUND'; /// Allows an application to broadcast a notification that an application package has been removed. @@ -454,7 +449,7 @@ class _ManifestPermission { /// Not for use by third-party applications. /// /// Constant Value: "android.permission.BROADCAST_PACKAGE_REMOVED" - final String BROADCAST_PACKAGE_REMOVED = + final String broadcastPackageRemoved = 'android.permission.BROADCAST_PACKAGE_REMOVED'; /// Allows an application to broadcast an SMS receipt notification. @@ -462,28 +457,28 @@ class _ManifestPermission { /// Not for use by third-party applications. /// /// Constant Value: "android.permission.BROADCAST_SMS" - final String BROADCAST_SMS = 'android.permission.BROADCAST_SMS'; + final String broadcastSms = 'android.permission.BROADCAST_SMS'; /// Allows an application to broadcast sticky intents. These are broadcasts whose data is held by the system after being finished, so that clients can quickly retrieve that data without having to wait for the next broadcast. /// /// Protection level: normal /// /// Constant Value: "android.permission.BROADCAST_STICKY" - final String BROADCAST_STICKY = 'android.permission.BROADCAST_STICKY'; + final String broadcastSticky = 'android.permission.BROADCAST_STICKY'; /// Allows an application to broadcast a WAP PUSH receipt notification. /// /// Not for use by third-party applications. /// /// Constant Value: "android.permission.BROADCAST_WAP_PUSH" - final String BROADCAST_WAP_PUSH = 'android.permission.BROADCAST_WAP_PUSH'; + final String broadcastWapPush = 'android.permission.BROADCAST_WAP_PUSH'; /// Allows an app which implements the InCallService API to be eligible to be enabled as a calling companion app. This means that the Telecom framework will bind to the app's InCallService implementation when there are calls active. The app can use the InCallService API to view information about calls on the system and control these calls. /// /// Protection level: normal /// /// Constant Value: "android.permission.CALL_COMPANION_APP" - final String CALL_COMPANION_APP = 'android.permission.CALL_COMPANION_APP'; + final String callCompanionApp = 'android.permission.CALL_COMPANION_APP'; /// Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. /// @@ -492,14 +487,14 @@ class _ManifestPermission { /// Protection level: dangerous /// /// Constant Value: "android.permission.CALL_PHONE" - final String CALL_PHONE = 'android.permission.CALL_PHONE'; + final String callPhone = 'android.permission.CALL_PHONE'; /// Allows an application to call any phone number, including emergency numbers, without going through the Dialer user interface for the user to confirm the call being placed. /// /// Not for use by third-party applications. /// /// Constant Value: "android.permission.CALL_PRIVILEGED" - final String CALL_PRIVILEGED = 'android.permission.CALL_PRIVILEGED'; + final String callPrivileged = 'android.permission.CALL_PRIVILEGED'; /// Required to be able to access the camera device. /// @@ -508,21 +503,21 @@ class _ManifestPermission { /// Protection level: dangerous /// /// Constant Value: "android.permission.CAMERA" - final String CAMERA = 'android.permission.CAMERA'; + final String camera = 'android.permission.CAMERA'; /// Allows an application to capture audio output. Use the CAPTURE_MEDIA_OUTPUT permission if only the USAGE_UNKNOWN), USAGE_MEDIA) or USAGE_GAME) usages are intended to be captured. /// /// Not for use by third-party applications. /// /// Constant Value: "android.permission.CAPTURE_AUDIO_OUTPUT" - final String CAPTURE_AUDIO_OUTPUT = 'android.permission.CAPTURE_AUDIO_OUTPUT'; + final String captureAudioOutput = 'android.permission.CAPTURE_AUDIO_OUTPUT'; /// Allows an application to change whether an application component (other than its own) is enabled or not. /// /// Not for use by third-party applications. /// /// Constant Value: "android.permission.CHANGE_COMPONENT_ENABLED_STATE" - final String CHANGE_COMPONENT_ENABLED_STATE = + final String changeComponentEnabledState = 'android.permission.CHANGE_COMPONENT_ENABLED_STATE'; /// Allows an application to modify the current configuration, such as locale. @@ -530,21 +525,21 @@ class _ManifestPermission { /// Protection level: signature|privileged|development /// /// Constant Value: "android.permission.CHANGE_CONFIGURATION" - final String CHANGE_CONFIGURATION = 'android.permission.CHANGE_CONFIGURATION'; + final String changeConfiguration = 'android.permission.CHANGE_CONFIGURATION'; /// Allows applications to change network connectivity state. /// /// Protection level: normal /// /// Constant Value: "android.permission.CHANGE_NETWORK_STATE" - final String CHANGE_NETWORK_STATE = 'android.permission.CHANGE_NETWORK_STATE'; + final String changeNetworkState = 'android.permission.CHANGE_NETWORK_STATE'; /// Allows applications to enter Wi-Fi Multicast mode. /// /// Protection level: normal /// /// Constant Value: "android.permission.CHANGE_WIFI_MULTICAST_STATE" - final String CHANGE_WIFI_MULTICAST_STATE = + final String changeWifiMulticastState = 'android.permission.CHANGE_WIFI_MULTICAST_STATE'; /// Allows applications to change Wi-Fi connectivity state. @@ -552,19 +547,19 @@ class _ManifestPermission { /// Protection level: normal /// /// Constant Value: "android.permission.CHANGE_WIFI_STATE" - final String CHANGE_WIFI_STATE = 'android.permission.CHANGE_WIFI_STATE'; + final String changeWifiState = 'android.permission.CHANGE_WIFI_STATE'; /// Allows an application to clear the caches of all installed applications on the device. /// /// Protection level: signature|privileged /// /// Constant Value: "android.permission.CLEAR_APP_CACHE" - final String CLEAR_APP_CACHE = 'android.permission.CLEAR_APP_CACHE'; + final String clearAppCache = 'android.permission.CLEAR_APP_CACHE'; /// Allows an application to configure and connect to Wifi displays /// /// Constant Value: "android.permission.CONFIGURE_WIFI_DISPLAY" - final String CONFIGURE_WIFI_DISPLAY = + final String configureWifiDisplay = 'android.permission.CONFIGURE_WIFI_DISPLAY'; /// Allows enabling/disabling location update notifications from the radio. @@ -572,7 +567,7 @@ class _ManifestPermission { /// Not for use by third-party applications. /// /// Constant Value: "android.permission.CONTROL_LOCATION_UPDATES" - final String CONTROL_LOCATION_UPDATES = + final String controlLocationUpdates = 'android.permission.CONTROL_LOCATION_UPDATES'; /// Allows a browser to invoke the set of query apis to get metadata about credential candidates prepared during the CredentialManager.prepareGetCredential API. @@ -580,7 +575,7 @@ class _ManifestPermission { /// Protection level: normal /// /// Constant Value: "android.permission.CREDENTIAL_MANAGER_QUERY_CANDIDATE_CREDENTIALS" - final String CREDENTIAL_MANAGER_QUERY_CANDIDATE_CREDENTIALS = + final String credentialManagerQueryCandidateCredentials = 'android.permission.CREDENTIAL_MANAGER_QUERY_CANDIDATE_CREDENTIALS'; /// Allows specifying candidate credential providers to be queried in Credential Manager get flows, or to be preferred as a default in the Credential Manager create flows. @@ -588,7 +583,7 @@ class _ManifestPermission { /// Protection level: normal /// /// Constant Value: "android.permission.CREDENTIAL_MANAGER_SET_ALLOWED_PROVIDERS" - final String CREDENTIAL_MANAGER_SET_ALLOWED_PROVIDERS = + final String credentialManagerSetAllowedProviders = 'android.permission.CREDENTIAL_MANAGER_SET_ALLOWED_PROVIDERS'; /// Allows a browser to invoke credential manager APIs on behalf of another RP. @@ -596,7 +591,7 @@ class _ManifestPermission { /// Protection level: normal /// /// Constant Value: "android.permission.CREDENTIAL_MANAGER_SET_ORIGIN" - final String CREDENTIAL_MANAGER_SET_ORIGIN = + final String credentialManagerSetOrigin = 'android.permission.CREDENTIAL_MANAGER_SET_ORIGIN'; /// Old permission for deleting an app's cache files, no longer used, but signals for us to quietly ignore calls instead of throwing an exception. @@ -604,7 +599,7 @@ class _ManifestPermission { /// Protection level: signature|privileged /// /// Constant Value: "android.permission.DELETE_CACHE_FILES" - final String DELETE_CACHE_FILES = 'android.permission.DELETE_CACHE_FILES'; + final String deleteCacheFiles = 'android.permission.DELETE_CACHE_FILES'; /// Allows an application to delete packages. /// @@ -613,12 +608,12 @@ class _ManifestPermission { /// Starting in Build.VERSION_CODES.N, user confirmation is requested when the application deleting the package is not the same application that installed the package. /// /// Constant Value: "android.permission.DELETE_PACKAGES" - final String DELETE_PACKAGES = 'android.permission.DELETE_PACKAGES'; + final String deletePackages = 'android.permission.DELETE_PACKAGES'; /// Allows an application to deliver companion messages to system /// /// Constant Value: "android.permission.DELIVER_COMPANION_MESSAGES" - final String DELIVER_COMPANION_MESSAGES = + final String deliverCompanionMessages = 'android.permission.DELIVER_COMPANION_MESSAGES'; /// Allows an application to get notified when a screen capture of its windows is attempted. @@ -626,36 +621,35 @@ class _ManifestPermission { /// Protection level: normal /// /// Constant Value: "android.permission.DETECT_SCREEN_CAPTURE" - final String DETECT_SCREEN_CAPTURE = - 'android.permission.DETECT_SCREEN_CAPTURE'; + final String detectScreenCapture = 'android.permission.DETECT_SCREEN_CAPTURE'; /// Allows applications to RW to diagnostic resources. /// /// Not for use by third-party applications. /// /// Constant Value: "android.permission.DIAGNOSTIC" - final String DIAGNOSTIC = 'android.permission.DIAGNOSTIC'; + final String diagnostic = 'android.permission.DIAGNOSTIC'; /// Allows applications to disable the keyguard if it is not secure. /// /// Protection level: normal /// /// Constant Value: "android.permission.DISABLE_KEYGUARD" - final String DISABLE_KEYGUARD = 'android.permission.DISABLE_KEYGUARD'; + final String disableKeyguard = 'android.permission.DISABLE_KEYGUARD'; /// Allows an application to retrieve state dump information from system services. /// /// Not for use by third-party applications. /// /// Constant Value: "android.permission.DUMP" - final String DUMP = 'android.permission.DUMP'; + final String dump = 'android.permission.DUMP'; /// Allows an application to indicate via PackageInstaller.SessionParams.setRequestUpdateOwnership(boolean) that it has the intention of becoming the update owner. /// /// Protection level: normal /// /// Constant Value: "android.permission.ENFORCE_UPDATE_OWNERSHIP" - final String ENFORCE_UPDATE_OWNERSHIP = + final String enforceUpdateOwnership = 'android.permission.ENFORCE_UPDATE_OWNERSHIP'; /// Allows an assistive application to perform actions on behalf of users inside of applications. @@ -665,35 +659,35 @@ class _ManifestPermission { /// Protection level: internal|role /// /// Constant Value: "android.permission.EXECUTE_APP_ACTION" - final String EXECUTE_APP_ACTION = 'android.permission.EXECUTE_APP_ACTION'; + final String executeAppAction = 'android.permission.EXECUTE_APP_ACTION'; /// Allows an application to expand or collapse the status bar. /// /// Protection level: normal /// /// Constant Value: "android.permission.EXPAND_STATUS_BAR" - final String EXPAND_STATUS_BAR = 'android.permission.EXPAND_STATUS_BAR'; + final String expandStatusBar = 'android.permission.EXPAND_STATUS_BAR'; /// Run as a manufacturer test application, running as the root user. Only available when the device is running in manufacturer test mode. /// /// Not for use by third-party applications. /// /// Constant Value: "android.permission.FACTORY_TEST" - final String FACTORY_TEST = 'android.permission.FACTORY_TEST'; + final String factoryTest = 'android.permission.FACTORY_TEST'; /// Allows a regular application to use Service.startForeground. /// /// Protection level: normal /// /// Constant Value: "android.permission.FOREGROUND_SERVICE" - final String FOREGROUND_SERVICE = 'android.permission.FOREGROUND_SERVICE'; + final String foregroundService = 'android.permission.FOREGROUND_SERVICE'; /// Allows a regular application to use Service.startForeground with the type "camera". /// /// Protection level: normal|instant /// /// Constant Value: "android.permission.FOREGROUND_SERVICE_CAMERA" - final String FOREGROUND_SERVICE_CAMERA = + final String foregroundServiceCamera = 'android.permission.FOREGROUND_SERVICE_CAMERA'; /// Allows a regular application to use Service.startForeground with the type "connectedDevice". @@ -701,7 +695,7 @@ class _ManifestPermission { /// Protection level: normal|instant /// /// Constant Value: "android.permission.FOREGROUND_SERVICE_CONNECTED_DEVICE" - final String FOREGROUND_SERVICE_CONNECTED_DEVICE = + final String foregroundServiceConnectedDevice = 'android.permission.FOREGROUND_SERVICE_CONNECTED_DEVICE'; /// Allows a regular application to use Service.startForeground with the type "dataSync". @@ -709,7 +703,7 @@ class _ManifestPermission { /// Protection level: normal|instant /// /// Constant Value: "android.permission.FOREGROUND_SERVICE_DATA_SYNC" - final String FOREGROUND_SERVICE_DATA_SYNC = + final String foregroundServiceDataSync = 'android.permission.FOREGROUND_SERVICE_DATA_SYNC'; /// Allows a regular application to use Service.startForeground with the type "health". @@ -717,7 +711,7 @@ class _ManifestPermission { /// Protection level: normal|instant /// /// Constant Value: "android.permission.FOREGROUND_SERVICE_HEALTH" - final String FOREGROUND_SERVICE_HEALTH = + final String foregroundServiceHealth = 'android.permission.FOREGROUND_SERVICE_HEALTH'; /// Allows a regular application to use Service.startForeground with the type "location". @@ -725,7 +719,7 @@ class _ManifestPermission { /// Protection level: normal|instant /// /// Constant Value: "android.permission.FOREGROUND_SERVICE_LOCATION" - final String FOREGROUND_SERVICE_LOCATION = + final String foregroundServiceLocation = 'android.permission.FOREGROUND_SERVICE_LOCATION'; /// Allows a regular application to use Service.startForeground with the type "mediaPlayback". @@ -733,7 +727,7 @@ class _ManifestPermission { /// Protection level: normal|instant /// /// Constant Value: "android.permission.FOREGROUND_SERVICE_MEDIA_PLAYBACK" - final String FOREGROUND_SERVICE_MEDIA_PLAYBACK = + final String foregroundServiceMediaPlayback = 'android.permission.FOREGROUND_SERVICE_MEDIA_PLAYBACK'; /// Allows a regular application to use Service.startForeground with the type "mediaProjection". @@ -741,7 +735,7 @@ class _ManifestPermission { /// Protection level: normal|instant /// /// Constant Value: "android.permission.FOREGROUND_SERVICE_MEDIA_PROJECTION" - final String FOREGROUND_SERVICE_MEDIA_PROJECTION = + final String foregroundServiceMediaProjection = 'android.permission.FOREGROUND_SERVICE_MEDIA_PROJECTION'; /// Allows a regular application to use Service.startForeground with the type "microphone". @@ -749,7 +743,7 @@ class _ManifestPermission { /// Protection level: normal|instant /// /// Constant Value: "android.permission.FOREGROUND_SERVICE_MICROPHONE" - final String FOREGROUND_SERVICE_MICROPHONE = + final String foregroundServiceMicrophone = 'android.permission.FOREGROUND_SERVICE_MICROPHONE'; /// Allows a regular application to use Service.startForeground with the type "phoneCall". @@ -757,7 +751,7 @@ class _ManifestPermission { /// Protection level: normal|instant /// /// Constant Value: "android.permission.FOREGROUND_SERVICE_PHONE_CALL" - final String FOREGROUND_SERVICE_PHONE_CALL = + final String foregroundServicePhoneCall = 'android.permission.FOREGROUND_SERVICE_PHONE_CALL'; /// Allows a regular application to use Service.startForeground with the type "remoteMessaging". @@ -765,7 +759,7 @@ class _ManifestPermission { /// Protection level: normal|instant /// /// Constant Value: "android.permission.FOREGROUND_SERVICE_REMOTE_MESSAGING" - final String FOREGROUND_SERVICE_REMOTE_MESSAGING = + final String foregroundServiceRemoteMessaging = 'android.permission.FOREGROUND_SERVICE_REMOTE_MESSAGING'; /// Allows a regular application to use Service.startForeground with the type "specialUse". @@ -773,7 +767,7 @@ class _ManifestPermission { /// Protection level: normal|appop|instant /// /// Constant Value: "android.permission.FOREGROUND_SERVICE_SPECIAL_USE" - final String FOREGROUND_SERVICE_SPECIAL_USE = + final String foregroundServiceSpecialUse = 'android.permission.FOREGROUND_SERVICE_SPECIAL_USE'; /// Allows a regular application to use Service.startForeground with the type "systemExempted". Apps are allowed to use this type only in the use cases listed in ServiceInfo.FOREGROUND_SERVICE_TYPE_SYSTEM_EXEMPTED. @@ -781,7 +775,7 @@ class _ManifestPermission { /// Protection level: normal|instant /// /// Constant Value: "android.permission.FOREGROUND_SERVICE_SYSTEM_EXEMPTED" - final String FOREGROUND_SERVICE_SYSTEM_EXEMPTED = + final String foregroundServiceSystemExempted = 'android.permission.FOREGROUND_SERVICE_SYSTEM_EXEMPTED'; /// Allows access to the list of accounts in the Accounts Service. @@ -791,14 +785,14 @@ class _ManifestPermission { /// Protection level: dangerous /// /// Constant Value: "android.permission.GET_ACCOUNTS" - final String GET_ACCOUNTS = 'android.permission.GET_ACCOUNTS'; + final String getAccounts = 'android.permission.GET_ACCOUNTS'; /// Allows access to the list of accounts in the Accounts Service. /// /// Protection level: signature|privileged /// /// Constant Value: "android.permission.GET_ACCOUNTS_PRIVILEGED" - final String GET_ACCOUNTS_PRIVILEGED = + final String getAccountsPrivileged = 'android.permission.GET_ACCOUNTS_PRIVILEGED'; /// Allows an application to find out the space used by any package. @@ -806,31 +800,31 @@ class _ManifestPermission { /// Protection level: normal /// /// Constant Value: "android.permission.GET_PACKAGE_SIZE" - final String GET_PACKAGE_SIZE = 'android.permission.GET_PACKAGE_SIZE'; + final String getPackageSize = 'android.permission.GET_PACKAGE_SIZE'; /// Constant Value: "android.permission.GET_TASKS" @Deprecated( 'This constant was deprecated in API level 21. No longer enforced.') - final String GET_TASKS = 'android.permission.GET_TASKS'; + final String getTasks = 'android.permission.GET_TASKS'; /// This permission can be used on content providers to allow the global search system to access their data. Typically it used when the provider has some permissions protecting it (which global search would not be expected to hold), and added as a read-only permission to the path in the provider where global search queries are performed. This permission can not be held by regular applications; it is used by applications to protect themselves from everyone else besides global search. /// /// Protection level: signature|privileged /// /// Constant Value: "android.permission.GLOBAL_SEARCH" - final String GLOBAL_SEARCH = 'android.permission.GLOBAL_SEARCH'; + final String globalSearch = 'android.permission.GLOBAL_SEARCH'; /// Allows an app to prevent non-system-overlay windows from being drawn on top of it /// /// Constant Value: "android.permission.HIDE_OVERLAY_WINDOWS" - final String HIDE_OVERLAY_WINDOWS = 'android.permission.HIDE_OVERLAY_WINDOWS'; + final String hideOverlayWindows = 'android.permission.HIDE_OVERLAY_WINDOWS'; /// Allows an app to access sensor data with a sampling rate greater than 200 Hz. /// /// Protection level: normal /// /// Constant Value: "android.permission.HIGH_SAMPLING_RATE_SENSORS" - final String HIGH_SAMPLING_RATE_SENSORS = + final String highSamplingRateSensors = 'android.permission.HIGH_SAMPLING_RATE_SENSORS'; /// Allows an application to install a location provider into the Location Manager. @@ -838,7 +832,7 @@ class _ManifestPermission { /// Not for use by third-party applications. /// /// Constant Value: "android.permission.INSTALL_LOCATION_PROVIDER" - final String INSTALL_LOCATION_PROVIDER = + final String installLocationProvider = 'android.permission.INSTALL_LOCATION_PROVIDER'; /// Allows an application to install packages. @@ -846,7 +840,7 @@ class _ManifestPermission { /// Not for use by third-party applications. /// /// Constant Value: "android.permission.INSTALL_PACKAGES" - final String INSTALL_PACKAGES = 'android.permission.INSTALL_PACKAGES'; + final String installPackages = 'android.permission.INSTALL_PACKAGES'; /// Allows an application to install a shortcut in Launcher. /// @@ -855,7 +849,7 @@ class _ManifestPermission { /// Protection level: normal /// /// Constant Value: "com.android.launcher.permission.INSTALL_SHORTCUT" - final String INSTALL_SHORTCUT = + final String installShortcut = 'com.android.launcher.permission.INSTALL_SHORTCUT'; /// Allows an instant app to create foreground services. @@ -863,13 +857,13 @@ class _ManifestPermission { /// Protection level: signature|development|instant|appop /// /// Constant Value: "android.permission.INSTANT_APP_FOREGROUND_SERVICE" - final String INSTANT_APP_FOREGROUND_SERVICE = + final String instantAppForegroundService = 'android.permission.INSTANT_APP_FOREGROUND_SERVICE'; /// Allows interaction across profiles in the same profile group. /// /// Constant Value: "android.permission.INTERACT_ACROSS_PROFILES" - final String INTERACT_ACROSS_PROFILES = + final String interactAcrossProfiles = 'android.permission.INTERACT_ACROSS_PROFILES'; /// Allows applications to open network sockets. @@ -877,7 +871,7 @@ class _ManifestPermission { /// Protection level: normal /// /// Constant Value: "android.permission.INTERNET" - final String INTERNET = 'android.permission.INTERNET'; + final String internet = 'android.permission.INTERNET'; /// Allows an application to call ActivityManager.killBackgroundProcesses(String). /// @@ -886,7 +880,7 @@ class _ManifestPermission { /// Protection level: normal /// /// Constant Value: "android.permission.KILL_BACKGROUND_PROCESSES" - final String KILL_BACKGROUND_PROCESSES = + final String killBackgroundProcesses = 'android.permission.KILL_BACKGROUND_PROCESSES'; /// Allows an application to capture screen content to perform a screenshot using the intent action Intent.ACTION_LAUNCH_CAPTURE_CONTENT_ACTIVITY_FOR_NOTE. @@ -896,13 +890,13 @@ class _ManifestPermission { /// Intended for use by ROLE_NOTES only. /// /// Constant Value: "android.permission.LAUNCH_CAPTURE_CONTENT_ACTIVITY_FOR_NOTE" - final String LAUNCH_CAPTURE_CONTENT_ACTIVITY_FOR_NOTE = + final String launchCaptureContentActivityForNote = 'android.permission.LAUNCH_CAPTURE_CONTENT_ACTIVITY_FOR_NOTE'; /// An application needs this permission for Settings.ACTION_SETTINGS_EMBED_DEEP_LINK_ACTIVITY to show its Activity embedded in Settings app. /// /// Constant Value: "android.permission.LAUNCH_MULTI_PANE_SETTINGS_DEEP_LINK" - final String LAUNCH_MULTI_PANE_SETTINGS_DEEP_LINK = + final String launchMultiPaneSettingsDeepLink = 'android.permission.LAUNCH_MULTI_PANE_SETTINGS_DEEP_LINK'; /// Allows a data loader to read a package's access logs. The access logs contain the set of pages referenced over time. @@ -916,14 +910,14 @@ class _ManifestPermission { /// A data loader has to have both permission:LOADER_USAGE_STATS AND appop:LOADER_USAGE_STATS allowed to be able to access the read logs. /// /// Constant Value: "android.permission.LOADER_USAGE_STATS" - final String LOADER_USAGE_STATS = 'android.permission.LOADER_USAGE_STATS'; + final String loaderUsageStats = 'android.permission.LOADER_USAGE_STATS'; /// Allows an application to use location features in hardware, such as the geofencing api. /// /// Not for use by third-party applications. /// /// Constant Value: "android.permission.LOCATION_HARDWARE" - final String LOCATION_HARDWARE = 'android.permission.LOCATION_HARDWARE'; + final String locationHardware = 'android.permission.LOCATION_HARDWARE'; /// Allows financed device kiosk apps to perform actions on the Device Lock service /// @@ -932,7 +926,7 @@ class _ManifestPermission { /// Intended for use by the FINANCED_DEVICE_KIOSK role only. /// /// Constant Value: "android.permission.MANAGE_DEVICE_LOCK_STATE" - final String MANAGE_DEVICE_LOCK_STATE = + final String manageDeviceLockState = 'android.permission.MANAGE_DEVICE_LOCK_STATE'; /// Allows an application to manage policy related to accessibility. @@ -940,7 +934,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_ACCESSIBILITY" - final String MANAGE_DEVICE_POLICY_ACCESSIBILITY = + final String manageDevicePolicyAccessibility = 'android.permission.MANAGE_DEVICE_POLICY_ACCESSIBILITY'; /// Allows an application to set policy related to account management. @@ -948,7 +942,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_ACCOUNT_MANAGEMENT" - final String MANAGE_DEVICE_POLICY_ACCOUNT_MANAGEMENT = + final String manageDevicePolicyAccountManagement = 'android.permission.MANAGE_DEVICE_POLICY_ACCOUNT_MANAGEMENT'; /// Allows an application to set device policies outside the current user that are required for securing device ownership without accessing user data. @@ -956,7 +950,7 @@ class _ManifestPermission { /// Holding this permission allows the use of other held MANAGE_DEVICE_POLICY_* permissions across all users on the device provided they do not grant access to user data. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS" - final String MANAGE_DEVICE_POLICY_ACROSS_USERS = + final String manageDevicePolicyAcrossUsers = 'android.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS'; /// Allows an application to set device policies outside the current user. @@ -966,7 +960,7 @@ class _ManifestPermission { /// Holding this permission allows the use of any other held MANAGE_DEVICE_POLICY_* permissions across all users on the device. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL" - final String MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL = + final String manageDevicePolicyAcrossUsersFull = 'android.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL'; /// Allows an application to set device policies outside the current user that are critical for securing data within the current user. @@ -974,7 +968,7 @@ class _ManifestPermission { /// Holding this permission allows the use of other held MANAGE_DEVICE_POLICY_* permissions across all users on the device provided they are required for securing data within the current user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_SECURITY_CRITICAL" - final String MANAGE_DEVICE_POLICY_ACROSS_USERS_SECURITY_CRITICAL = + final String manageDevicePolicyAcrossUsersSecurityCritical = 'android.permission.MANAGE_DEVICE_POLICY_ACROSS_USERS_SECURITY_CRITICAL'; /// Allows an application to set policy related to airplane mode. @@ -982,7 +976,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_AIRPLANE_MODE" - final String MANAGE_DEVICE_POLICY_AIRPLANE_MODE = + final String manageDevicePolicyAirplaneMode = 'android.permission.MANAGE_DEVICE_POLICY_AIRPLANE_MODE'; /// Allows an application to manage policy regarding modifying applications. @@ -990,7 +984,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_APPS_CONTROL" - final String MANAGE_DEVICE_POLICY_APPS_CONTROL = + final String manageDevicePolicyAppsControl = 'android.permission.MANAGE_DEVICE_POLICY_APPS_CONTROL'; /// Allows an application to manage application restrictions. @@ -998,7 +992,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_APP_RESTRICTIONS" - final String MANAGE_DEVICE_POLICY_APP_RESTRICTIONS = + final String manageDevicePolicyAppRestrictions = 'android.permission.MANAGE_DEVICE_POLICY_APP_RESTRICTIONS'; /// Allows an application to manage policy related to application user data. @@ -1006,7 +1000,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_APP_USER_DATA" - final String MANAGE_DEVICE_POLICY_APP_USER_DATA = + final String manageDevicePolicyAppUserData = 'android.permission.MANAGE_DEVICE_POLICY_APP_USER_DATA'; /// Allows an application to set policy related to audio output. @@ -1014,7 +1008,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_AUDIO_OUTPUT" - final String MANAGE_DEVICE_POLICY_AUDIO_OUTPUT = + final String manageDevicePolicyAudioOutput = 'android.permission.MANAGE_DEVICE_POLICY_AUDIO_OUTPUT'; /// Allows an application to set policy related to autofill. @@ -1022,7 +1016,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_AUTOFILL" - final String MANAGE_DEVICE_POLICY_AUTOFILL = + final String manageDevicePolicyAutofill = 'android.permission.MANAGE_DEVICE_POLICY_AUTOFILL'; /// Allows an application to manage backup service policy. @@ -1030,7 +1024,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_BACKUP_SERVICE" - final String MANAGE_DEVICE_POLICY_BACKUP_SERVICE = + final String manageDevicePolicyBackupService = 'android.permission.MANAGE_DEVICE_POLICY_BACKUP_SERVICE'; /// Allows an application to set policy related to bluetooth. @@ -1038,7 +1032,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_BLUETOOTH" - final String MANAGE_DEVICE_POLICY_BLUETOOTH = + final String manageDevicePolicyBluetooth = 'android.permission.MANAGE_DEVICE_POLICY_BLUETOOTH'; /// Allows an application to request bugreports with user consent. @@ -1046,7 +1040,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_BUGREPORT" - final String MANAGE_DEVICE_POLICY_BUGREPORT = + final String manageDevicePolicyBugreport = 'android.permission.MANAGE_DEVICE_POLICY_BUGREPORT'; /// Allows an application to manage calling policy. @@ -1054,7 +1048,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_CALLS" - final String MANAGE_DEVICE_POLICY_CALLS = + final String manageDevicePolicyCalls = 'android.permission.MANAGE_DEVICE_POLICY_CALLS'; /// Allows an application to set policy related to restricting a user's ability to use or enable and disable the camera. @@ -1062,7 +1056,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_CAMERA" - final String MANAGE_DEVICE_POLICY_CAMERA = + final String manageDevicePolicyCamera = 'android.permission.MANAGE_DEVICE_POLICY_CAMERA'; /// Allows an application to set policy related to certificates. @@ -1070,7 +1064,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_CERTIFICATES" - final String MANAGE_DEVICE_POLICY_CERTIFICATES = + final String manageDevicePolicyCertificates = 'android.permission.MANAGE_DEVICE_POLICY_CERTIFICATES'; /// Allows an application to manage policy related to common criteria mode. @@ -1078,7 +1072,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_COMMON_CRITERIA_MODE" - final String MANAGE_DEVICE_POLICY_COMMON_CRITERIA_MODE = + final String manageDevicePolicyCommonCriteriaMode = 'android.permission.MANAGE_DEVICE_POLICY_COMMON_CRITERIA_MODE'; /// Allows an application to manage debugging features policy. @@ -1086,7 +1080,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_DEBUGGING_FEATURES" - final String MANAGE_DEVICE_POLICY_DEBUGGING_FEATURES = + final String manageDevicePolicyDebuggingFeatures = 'android.permission.MANAGE_DEVICE_POLICY_DEBUGGING_FEATURES'; /// Allows an application to set policy related to the default sms application. @@ -1094,13 +1088,13 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_DEFAULT_SMS" - final String MANAGE_DEVICE_POLICY_DEFAULT_SMS = + final String manageDevicePolicyDefaultSms = 'android.permission.MANAGE_DEVICE_POLICY_DEFAULT_SMS'; /// Allows an application to manage policy related to device identifiers. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_DEVICE_IDENTIFIERS" - final String MANAGE_DEVICE_POLICY_DEVICE_IDENTIFIERS = + final String manageDevicePolicyDeviceIdentifiers = 'android.permission.MANAGE_DEVICE_POLICY_DEVICE_IDENTIFIERS'; /// Allows an application to set policy related to the display. @@ -1108,7 +1102,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_DISPLAY" - final String MANAGE_DEVICE_POLICY_DISPLAY = + final String manageDevicePolicyDisplay = 'android.permission.MANAGE_DEVICE_POLICY_DISPLAY'; /// Allows an application to set policy related to factory reset. @@ -1116,7 +1110,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_FACTORY_RESET" - final String MANAGE_DEVICE_POLICY_FACTORY_RESET = + final String manageDevicePolicyFactoryReset = 'android.permission.MANAGE_DEVICE_POLICY_FACTORY_RESET'; /// Allows an application to set policy related to fun. @@ -1124,7 +1118,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_FUN" - final String MANAGE_DEVICE_POLICY_FUN = + final String manageDevicePolicyFun = 'android.permission.MANAGE_DEVICE_POLICY_FUN'; /// Allows an application to set policy related to input methods. @@ -1132,7 +1126,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_INPUT_METHODS" - final String MANAGE_DEVICE_POLICY_INPUT_METHODS = + final String manageDevicePolicyInputMethods = 'android.permission.MANAGE_DEVICE_POLICY_INPUT_METHODS'; /// Allows an application to manage installing from unknown sources policy. @@ -1140,7 +1134,7 @@ class _ManifestPermission { /// MANAGE_SECURITY_CRITICAL_DEVICE_POLICY_ACROSS_USERS is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_INSTALL_UNKNOWN_SOURCES" - final String MANAGE_DEVICE_POLICY_INSTALL_UNKNOWN_SOURCES = + final String manageDevicePolicyInstallUnknownSources = 'android.permission.MANAGE_DEVICE_POLICY_INSTALL_UNKNOWN_SOURCES'; /// Allows an application to set policy related to keeping uninstalled packages. @@ -1148,7 +1142,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_KEEP_UNINSTALLED_PACKAGES" - final String MANAGE_DEVICE_POLICY_KEEP_UNINSTALLED_PACKAGES = + final String manageDevicePolicyKeepUninstalledPackages = 'android.permission.MANAGE_DEVICE_POLICY_KEEP_UNINSTALLED_PACKAGES'; /// Allows an application to manage policy related to keyguard. @@ -1156,7 +1150,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_SECURITY_CRITICAL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_KEYGUARD" - final String MANAGE_DEVICE_POLICY_KEYGUARD = + final String manageDevicePolicyKeyguard = 'android.permission.MANAGE_DEVICE_POLICY_KEYGUARD'; /// Allows an application to set policy related to locale. @@ -1164,7 +1158,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_LOCALE" - final String MANAGE_DEVICE_POLICY_LOCALE = + final String manageDevicePolicyLocale = 'android.permission.MANAGE_DEVICE_POLICY_LOCALE'; /// Allows an application to set policy related to location. @@ -1172,7 +1166,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_LOCATION" - final String MANAGE_DEVICE_POLICY_LOCATION = + final String manageDevicePolicyLocation = 'android.permission.MANAGE_DEVICE_POLICY_LOCATION'; /// Allows an application to lock a profile or the device with the appropriate cross-user permission. @@ -1180,7 +1174,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_LOCK" - final String MANAGE_DEVICE_POLICY_LOCK = + final String manageDevicePolicyLock = 'android.permission.MANAGE_DEVICE_POLICY_LOCK'; /// Allows an application to set policy related to lock credentials. @@ -1188,7 +1182,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_SECURITY_CRITICAL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_LOCK_CREDENTIALS" - final String MANAGE_DEVICE_POLICY_LOCK_CREDENTIALS = + final String manageDevicePolicyLockCredentials = 'android.permission.MANAGE_DEVICE_POLICY_LOCK_CREDENTIALS'; /// Allows an application to manage lock task policy. @@ -1196,7 +1190,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_LOCK_TASK" - final String MANAGE_DEVICE_POLICY_LOCK_TASK = + final String manageDevicePolicyLockTask = 'android.permission.MANAGE_DEVICE_POLICY_LOCK_TASK'; /// Allows an application to manage policy related to metered data. @@ -1204,7 +1198,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_METERED_DATA" - final String MANAGE_DEVICE_POLICY_METERED_DATA = + final String manageDevicePolicyMeteredData = 'android.permission.MANAGE_DEVICE_POLICY_METERED_DATA'; /// Allows an application to set policy related to restricting a user's ability to use or enable and disable the microphone. @@ -1212,7 +1206,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_MICROPHONE" - final String MANAGE_DEVICE_POLICY_MICROPHONE = + final String manageDevicePolicyMicrophone = 'android.permission.MANAGE_DEVICE_POLICY_MICROPHONE'; /// Allows an application to set policy related to mobile networks. @@ -1220,7 +1214,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_MOBILE_NETWORK" - final String MANAGE_DEVICE_POLICY_MOBILE_NETWORK = + final String manageDevicePolicyMobileNetwork = 'android.permission.MANAGE_DEVICE_POLICY_MOBILE_NETWORK'; /// Allows an application to manage policy preventing users from modifying users. @@ -1228,13 +1222,13 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_MODIFY_USERS" - final String MANAGE_DEVICE_POLICY_MODIFY_USERS = + final String manageDevicePolicyModifyUsers = 'android.permission.MANAGE_DEVICE_POLICY_MODIFY_USERS'; /// Allows an application to manage policy related to the Memory Tagging Extension (MTE). /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_MTE" - final String MANAGE_DEVICE_POLICY_MTE = + final String manageDevicePolicyMte = 'android.permission.MANAGE_DEVICE_POLICY_MTE'; /// Allows an application to set policy related to nearby communications (e.g. Beam and nearby streaming). @@ -1242,7 +1236,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_NEARBY_COMMUNICATION" - final String MANAGE_DEVICE_POLICY_NEARBY_COMMUNICATION = + final String manageDevicePolicyNearbyCommunication = 'android.permission.MANAGE_DEVICE_POLICY_NEARBY_COMMUNICATION'; /// Allows an application to set policy related to network logging. @@ -1250,7 +1244,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_NETWORK_LOGGING" - final String MANAGE_DEVICE_POLICY_NETWORK_LOGGING = + final String manageDevicePolicyNetworkLogging = 'android.permission.MANAGE_DEVICE_POLICY_NETWORK_LOGGING'; /// Allows an application to manage the identity of the managing organization. @@ -1258,7 +1252,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_ORGANIZATION_IDENTITY" - final String MANAGE_DEVICE_POLICY_ORGANIZATION_IDENTITY = + final String manageDevicePolicyOrganizationIdentity = 'android.permission.MANAGE_DEVICE_POLICY_ORGANIZATION_IDENTITY'; /// Allows an application to set policy related to override APNs. @@ -1266,7 +1260,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_OVERRIDE_APN" - final String MANAGE_DEVICE_POLICY_OVERRIDE_APN = + final String manageDevicePolicyOverrideApn = 'android.permission.MANAGE_DEVICE_POLICY_OVERRIDE_APN'; /// Allows an application to set policy related to hiding and suspending packages. @@ -1274,7 +1268,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_PACKAGE_STATE" - final String MANAGE_DEVICE_POLICY_PACKAGE_STATE = + final String manageDevicePolicyPackageState = 'android.permission.MANAGE_DEVICE_POLICY_PACKAGE_STATE'; /// Allows an application to set policy related to physical media. @@ -1282,7 +1276,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_PHYSICAL_MEDIA" - final String MANAGE_DEVICE_POLICY_PHYSICAL_MEDIA = + final String manageDevicePolicyPhysicalMedia = 'android.permission.MANAGE_DEVICE_POLICY_PHYSICAL_MEDIA'; /// Allows an application to set policy related to printing. @@ -1290,7 +1284,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_PRINTING" - final String MANAGE_DEVICE_POLICY_PRINTING = + final String manageDevicePolicyPrinting = 'android.permission.MANAGE_DEVICE_POLICY_PRINTING'; /// Allows an application to set policy related to private DNS. @@ -1298,7 +1292,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_PRIVATE_DNS" - final String MANAGE_DEVICE_POLICY_PRIVATE_DNS = + final String manageDevicePolicyPrivateDns = 'android.permission.MANAGE_DEVICE_POLICY_PRIVATE_DNS'; /// Allows an application to set policy related to profiles. @@ -1306,7 +1300,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_PROFILES" - final String MANAGE_DEVICE_POLICY_PROFILES = + final String manageDevicePolicyProfiles = 'android.permission.MANAGE_DEVICE_POLICY_PROFILES'; /// Allows an application to set policy related to interacting with profiles (e.g. Disallowing cross-profile copy and paste). @@ -1314,7 +1308,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_PROFILE_INTERACTION" - final String MANAGE_DEVICE_POLICY_PROFILE_INTERACTION = + final String manageDevicePolicyProfileInteraction = 'android.permission.MANAGE_DEVICE_POLICY_PROFILE_INTERACTION'; /// Allows an application to set a network-independent global HTTP proxy. @@ -1322,7 +1316,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_PROXY" - final String MANAGE_DEVICE_POLICY_PROXY = + final String manageDevicePolicyProxy = 'android.permission.MANAGE_DEVICE_POLICY_PROXY'; /// Allows an application query system updates. @@ -1330,7 +1324,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_QUERY_SYSTEM_UPDATES" - final String MANAGE_DEVICE_POLICY_QUERY_SYSTEM_UPDATES = + final String manageDevicePolicyQuerySystemUpdates = 'android.permission.MANAGE_DEVICE_POLICY_QUERY_SYSTEM_UPDATES'; /// Allows an application to force set a new device unlock password or a managed profile challenge on current user. @@ -1338,7 +1332,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_RESET_PASSWORD" - final String MANAGE_DEVICE_POLICY_RESET_PASSWORD = + final String manageDevicePolicyResetPassword = 'android.permission.MANAGE_DEVICE_POLICY_RESET_PASSWORD'; /// Allows an application to set policy related to restricting the user from configuring private DNS. @@ -1346,7 +1340,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_RESTRICT_PRIVATE_DNS" - final String MANAGE_DEVICE_POLICY_RESTRICT_PRIVATE_DNS = + final String manageDevicePolicyRestrictPrivateDns = 'android.permission.MANAGE_DEVICE_POLICY_RESTRICT_PRIVATE_DNS'; /// Allows an application to set the grant state of runtime permissions on packages. @@ -1354,7 +1348,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_RUNTIME_PERMISSIONS" - final String MANAGE_DEVICE_POLICY_RUNTIME_PERMISSIONS = + final String manageDevicePolicyRuntimePermissions = 'android.permission.MANAGE_DEVICE_POLICY_RUNTIME_PERMISSIONS'; /// Allows an application to set policy related to users running in the background. @@ -1362,7 +1356,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_RUN_IN_BACKGROUND" - final String MANAGE_DEVICE_POLICY_RUN_IN_BACKGROUND = + final String manageDevicePolicyRunInBackground = 'android.permission.MANAGE_DEVICE_POLICY_RUN_IN_BACKGROUND'; /// Allows an application to manage safe boot policy. @@ -1370,7 +1364,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_SAFE_BOOT" - final String MANAGE_DEVICE_POLICY_SAFE_BOOT = + final String manageDevicePolicySafeBoot = 'android.permission.MANAGE_DEVICE_POLICY_SAFE_BOOT'; /// Allows an application to set policy related to screen capture. @@ -1378,7 +1372,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_SCREEN_CAPTURE" - final String MANAGE_DEVICE_POLICY_SCREEN_CAPTURE = + final String manageDevicePolicyScreenCapture = 'android.permission.MANAGE_DEVICE_POLICY_SCREEN_CAPTURE'; /// Allows an application to set policy related to the usage of the contents of the screen. @@ -1386,7 +1380,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_SCREEN_CONTENT" - final String MANAGE_DEVICE_POLICY_SCREEN_CONTENT = + final String manageDevicePolicyScreenContent = 'android.permission.MANAGE_DEVICE_POLICY_SCREEN_CONTENT'; /// Allows an application to set policy related to security logging. @@ -1394,7 +1388,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_SECURITY_LOGGING" - final String MANAGE_DEVICE_POLICY_SECURITY_LOGGING = + final String manageDevicePolicySecurityLogging = 'android.permission.MANAGE_DEVICE_POLICY_SECURITY_LOGGING'; /// Allows an application to set policy related to settings. @@ -1402,7 +1396,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_SETTINGS" - final String MANAGE_DEVICE_POLICY_SETTINGS = + final String manageDevicePolicySettings = 'android.permission.MANAGE_DEVICE_POLICY_SETTINGS'; /// Allows an application to set policy related to sms. @@ -1410,13 +1404,13 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_SMS" - final String MANAGE_DEVICE_POLICY_SMS = + final String manageDevicePolicySms = 'android.permission.MANAGE_DEVICE_POLICY_SMS'; /// Allows an application to set policy related to the status bar. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_STATUS_BAR" - final String MANAGE_DEVICE_POLICY_STATUS_BAR = + final String manageDevicePolicyStatusBar = 'android.permission.MANAGE_DEVICE_POLICY_STATUS_BAR'; /// Allows an application to set support messages for when a user action is affected by an active policy. @@ -1424,7 +1418,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_SUPPORT_MESSAGE" - final String MANAGE_DEVICE_POLICY_SUPPORT_MESSAGE = + final String manageDevicePolicySupportMessage = 'android.permission.MANAGE_DEVICE_POLICY_SUPPORT_MESSAGE'; /// Allows an application to set policy related to suspending personal apps. @@ -1432,7 +1426,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_SUSPEND_PERSONAL_APPS" - final String MANAGE_DEVICE_POLICY_SUSPEND_PERSONAL_APPS = + final String manageDevicePolicySuspendPersonalApps = 'android.permission.MANAGE_DEVICE_POLICY_SUSPEND_PERSONAL_APPS'; /// Allows an application to manage policy related to system apps. @@ -1440,7 +1434,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_SYSTEM_APPS" - final String MANAGE_DEVICE_POLICY_SYSTEM_APPS = + final String manageDevicePolicySystemApps = 'android.permission.MANAGE_DEVICE_POLICY_SYSTEM_APPS'; /// Allows an application to set policy related to system dialogs. @@ -1448,7 +1442,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_SYSTEM_DIALOGS" - final String MANAGE_DEVICE_POLICY_SYSTEM_DIALOGS = + final String manageDevicePolicySystemDialogs = 'android.permission.MANAGE_DEVICE_POLICY_SYSTEM_DIALOGS'; /// Allows an application to set policy related to system updates. @@ -1456,7 +1450,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_SYSTEM_UPDATES" - final String MANAGE_DEVICE_POLICY_SYSTEM_UPDATES = + final String manageDevicePolicySystemUpdates = 'android.permission.MANAGE_DEVICE_POLICY_SYSTEM_UPDATES'; /// Allows an application to manage device policy relating to time. @@ -1464,13 +1458,13 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_TIME" - final String MANAGE_DEVICE_POLICY_TIME = + final String manageDevicePolicyTime = 'android.permission.MANAGE_DEVICE_POLICY_TIME'; /// Allows an application to set policy related to usb data signalling. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_USB_DATA_SIGNALLING" - final String MANAGE_DEVICE_POLICY_USB_DATA_SIGNALLING = + final String manageDevicePolicyUsbDataSignalling = 'android.permission.MANAGE_DEVICE_POLICY_USB_DATA_SIGNALLING'; /// Allows an application to set policy related to usb file transfers. @@ -1478,7 +1472,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_USB_FILE_TRANSFER" - final String MANAGE_DEVICE_POLICY_USB_FILE_TRANSFER = + final String manageDevicePolicyUsbFileTransfer = 'android.permission.MANAGE_DEVICE_POLICY_USB_FILE_TRANSFER'; /// Allows an application to set policy related to users. @@ -1486,7 +1480,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_USERS" - final String MANAGE_DEVICE_POLICY_USERS = + final String manageDevicePolicyUsers = 'android.permission.MANAGE_DEVICE_POLICY_USERS'; /// Allows an application to set policy related to VPNs. @@ -1494,7 +1488,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_VPN" - final String MANAGE_DEVICE_POLICY_VPN = + final String manageDevicePolicyVpn = 'android.permission.MANAGE_DEVICE_POLICY_VPN'; /// Allows an application to set policy related to the wallpaper. @@ -1502,7 +1496,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_WALLPAPER" - final String MANAGE_DEVICE_POLICY_WALLPAPER = + final String manageDevicePolicyWallpaper = 'android.permission.MANAGE_DEVICE_POLICY_WALLPAPER'; /// Allows an application to set policy related to Wifi. @@ -1510,7 +1504,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_WIFI" - final String MANAGE_DEVICE_POLICY_WIFI = + final String manageDevicePolicyWifi = 'android.permission.MANAGE_DEVICE_POLICY_WIFI'; /// Allows an application to set policy related to windows. @@ -1518,7 +1512,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS_FULL is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_WINDOWS" - final String MANAGE_DEVICE_POLICY_WINDOWS = + final String manageDevicePolicyWindows = 'android.permission.MANAGE_DEVICE_POLICY_WINDOWS'; /// Allows an application to manage policy related to wiping data. @@ -1526,7 +1520,7 @@ class _ManifestPermission { /// Manifest.permission#MANAGE_DEVICE_POLICY_ACROSS_USERS is required to call APIs protected by this permission on users different to the calling user. /// /// Constant Value: "android.permission.MANAGE_DEVICE_POLICY_WIPE_DATA" - final String MANAGE_DEVICE_POLICY_WIPE_DATA = + final String manageDevicePolicyWipeData = 'android.permission.MANAGE_DEVICE_POLICY_WIPE_DATA'; /// Allows an application to manage access to documents, usually as part of a document picker. @@ -1534,14 +1528,14 @@ class _ManifestPermission { /// This permission should only be requested by the platform document management app. This permission cannot be granted to third-party apps. /// /// Constant Value: "android.permission.MANAGE_DOCUMENTS" - final String MANAGE_DOCUMENTS = 'android.permission.MANAGE_DOCUMENTS'; + final String manageDocuments = 'android.permission.MANAGE_DOCUMENTS'; /// Allows an application a broad access to external storage in scoped storage. Intended to be used by few apps that need to manage files on behalf of the users. /// /// Protection level: signature|appop|preinstalled /// /// Constant Value: "android.permission.MANAGE_EXTERNAL_STORAGE" - final String MANAGE_EXTERNAL_STORAGE = + final String manageExternalStorage = 'android.permission.MANAGE_EXTERNAL_STORAGE'; /// Allows an application to modify and delete media files on this device or any connected storage device without user confirmation. Applications must already be granted the READ_EXTERNAL_STORAGE or MANAGE_EXTERNAL_STORAGE} permissions for this permission to take effect. @@ -1555,28 +1549,28 @@ class _ManifestPermission { /// Protection level: signature|appop|preinstalled /// /// Constant Value: "android.permission.MANAGE_MEDIA" - final String MANAGE_MEDIA = 'android.permission.MANAGE_MEDIA'; + final String manageMedia = 'android.permission.MANAGE_MEDIA'; /// Allows to query ongoing call details and manage ongoing calls /// /// Protection level: signature|appop /// /// Constant Value: "android.permission.MANAGE_ONGOING_CALLS" - final String MANAGE_ONGOING_CALLS = 'android.permission.MANAGE_ONGOING_CALLS'; + final String manageOngoingCalls = 'android.permission.MANAGE_ONGOING_CALLS'; /// Allows a calling application which manages its own calls through the self-managed ConnectionService APIs. See PhoneAccount.CAPABILITY_SELF_MANAGED for more information on the self-managed ConnectionService APIs. /// /// Protection level: normal /// /// Constant Value: "android.permission.MANAGE_OWN_CALLS" - final String MANAGE_OWN_CALLS = 'android.permission.MANAGE_OWN_CALLS'; + final String manageOwnCalls = 'android.permission.MANAGE_OWN_CALLS'; /// Allows applications to get notified when a Wi-Fi interface request cannot be satisfied without tearing down one or more other interfaces, and provide a decision whether to approve the request or reject it. /// /// Not for use by third-party applications. /// /// Constant Value: "android.permission.MANAGE_WIFI_INTERFACES" - final String MANAGE_WIFI_INTERFACES = + final String manageWifiInterfaces = 'android.permission.MANAGE_WIFI_INTERFACES'; /// This permission is used to let OEMs grant their trusted app access to a subset of privileged wifi APIs to improve wifi performance. Allows applications to manage Wi-Fi network selection related features such as enable or disable global auto-join, modify connectivity scan intervals, and approve Wi-Fi Direct connections. @@ -1584,43 +1578,41 @@ class _ManifestPermission { /// Not for use by third-party applications. /// /// Constant Value: "android.permission.MANAGE_WIFI_NETWORK_SELECTION" - final String MANAGE_WIFI_NETWORK_SELECTION = + final String manageWifiNetworkSelection = 'android.permission.MANAGE_WIFI_NETWORK_SELECTION'; /// Not for use by third-party applications. /// /// Constant Value: "android.permission.MASTER_CLEAR" - final String MASTER_CLEAR = 'android.permission.MASTER_CLEAR'; + final String masterClear = 'android.permission.MASTER_CLEAR'; /// Allows an application to know what content is playing and control its playback. /// /// Not for use by third-party applications due to privacy of media consumption /// /// Constant Value: "android.permission.MEDIA_CONTENT_CONTROL" - final String MEDIA_CONTENT_CONTROL = - 'android.permission.MEDIA_CONTENT_CONTROL'; + final String mediaContentControl = 'android.permission.MEDIA_CONTENT_CONTROL'; /// Allows an application to modify global audio settings. /// /// Protection level: normal /// /// Constant Value: "android.permission.MODIFY_AUDIO_SETTINGS" - final String MODIFY_AUDIO_SETTINGS = - 'android.permission.MODIFY_AUDIO_SETTINGS'; + final String modifyAudioSettings = 'android.permission.MODIFY_AUDIO_SETTINGS'; /// Allows modification of the telephony state - power on, mmi, etc. Does not include placing calls. /// /// Not for use by third-party applications. /// /// Constant Value: "android.permission.MODIFY_PHONE_STATE" - final String MODIFY_PHONE_STATE = 'android.permission.MODIFY_PHONE_STATE'; + final String modifyPhoneState = 'android.permission.MODIFY_PHONE_STATE'; /// Allows formatting file systems for removable storage. /// /// Not for use by third-party applications. /// /// Constant Value: "android.permission.MOUNT_FORMAT_FILESYSTEMS" - final String MOUNT_FORMAT_FILESYSTEMS = + final String mountFormatFilesystems = 'android.permission.MOUNT_FORMAT_FILESYSTEMS'; /// Allows mounting and unmounting file systems for removable storage. @@ -1628,7 +1620,7 @@ class _ManifestPermission { /// Not for use by third-party applications. /// /// Constant Value: "android.permission.MOUNT_UNMOUNT_FILESYSTEMS" - final String MOUNT_UNMOUNT_FILESYSTEMS = + final String mountUnmountFilesystems = 'android.permission.MOUNT_UNMOUNT_FILESYSTEMS'; /// Required to be able to advertise and connect to nearby devices via Wi-Fi. @@ -1636,21 +1628,21 @@ class _ManifestPermission { /// Protection level: dangerous /// /// Constant Value: "android.permission.NEARBY_WIFI_DEVICES" - final String NEARBY_WIFI_DEVICES = 'android.permission.NEARBY_WIFI_DEVICES'; + final String nearbyWifiDevices = 'android.permission.NEARBY_WIFI_DEVICES'; /// Allows applications to perform I/O operations over NFC. /// /// Protection level: normal /// /// Constant Value: "android.permission.NFC" - final String NFC = 'android.permission.NFC'; + final String nfc = 'android.permission.NFC'; /// Allows applications to receive NFC preferred payment service information. /// /// Protection level: normal /// /// Constant Value: "android.permission.NFC_PREFERRED_PAYMENT_INFO" - final String NFC_PREFERRED_PAYMENT_INFO = + final String nfcPreferredPaymentInfo = 'android.permission.NFC_PREFERRED_PAYMENT_INFO'; /// Allows applications to receive NFC transaction events. @@ -1658,15 +1650,14 @@ class _ManifestPermission { /// Protection level: normal /// /// Constant Value: "android.permission.NFC_TRANSACTION_EVENT" - final String NFC_TRANSACTION_EVENT = - 'android.permission.NFC_TRANSACTION_EVENT'; + final String nfcTransactionEvent = 'android.permission.NFC_TRANSACTION_EVENT'; /// Allows an application to modify any wifi configuration, even if created by another application. Once reconfigured the original creator cannot make any further modifications. /// /// Not for use by third-party applications. /// /// Constant Value: "android.permission.OVERRIDE_WIFI_CONFIG" - final String OVERRIDE_WIFI_CONFIG = 'android.permission.OVERRIDE_WIFI_CONFIG'; + final String overrideWifiConfig = 'android.permission.OVERRIDE_WIFI_CONFIG'; /// Allows an application to collect component usage statistics /// @@ -1675,19 +1666,19 @@ class _ManifestPermission { /// Protection level: signature|privileged|development|appop|retailDemo /// /// Constant Value: "android.permission.PACKAGE_USAGE_STATS" - final String PACKAGE_USAGE_STATS = 'android.permission.PACKAGE_USAGE_STATS'; + final String packageUsageStats = 'android.permission.PACKAGE_USAGE_STATS'; /// Constant Value: "android.permission.PERSISTENT_ACTIVITY" @Deprecated( 'This constant was deprecated in API level 15. This functionality will be removed in the future; please do not use. Allow an application to make its activities persistent.') - final String PERSISTENT_ACTIVITY = 'android.permission.PERSISTENT_ACTIVITY'; + final String persistentActivity = 'android.permission.PERSISTENT_ACTIVITY'; /// Allows an app to post notifications /// /// Protection level: dangerous /// /// Constant Value: "android.permission.POST_NOTIFICATIONS" - final String POST_NOTIFICATIONS = 'android.permission.POST_NOTIFICATIONS'; + final String postNotifications = 'android.permission.POST_NOTIFICATIONS'; /// Allows an application to see the number being dialed during an outgoing call with the option to redirect the call to a different number or abort the call altogether. /// @@ -1698,7 +1689,7 @@ class _ManifestPermission { /// Constant Value: "android.permission.PROCESS_OUTGOING_CALLS" @Deprecated( 'This constant was deprecated in API level 29. Applications should use CallRedirectionService instead of the Intent.ACTION_NEW_OUTGOING_CALL broadcast.') - final String PROCESS_OUTGOING_CALLS = + final String processOutgoingCalls = 'android.permission.PROCESS_OUTGOING_CALLS'; /// Allows an application to display its suggestions using the autofill framework. @@ -1708,7 +1699,7 @@ class _ManifestPermission { /// Protection level: internal|role /// /// Constant Value: "android.permission.PROVIDE_OWN_AUTOFILL_SUGGESTIONS" - final String PROVIDE_OWN_AUTOFILL_SUGGESTIONS = + final String provideOwnAutofillSuggestions = 'android.permission.PROVIDE_OWN_AUTOFILL_SUGGESTIONS'; /// Allows an application to be able to store and retrieve credentials from a remote device. @@ -1716,7 +1707,7 @@ class _ManifestPermission { /// Protection level: signature|privileged|role /// /// Constant Value: "android.permission.PROVIDE_REMOTE_CREDENTIALS" - final String PROVIDE_REMOTE_CREDENTIALS = + final String provideRemoteCredentials = 'android.permission.PROVIDE_REMOTE_CREDENTIALS'; /// Allows query of any normal app on the device, regardless of manifest declarations. @@ -1724,18 +1715,18 @@ class _ManifestPermission { /// Protection level: normal /// /// Constant Value: "android.permission.QUERY_ALL_PACKAGES" - final String QUERY_ALL_PACKAGES = 'android.permission.QUERY_ALL_PACKAGES'; + final String queryAllPackages = 'android.permission.QUERY_ALL_PACKAGES'; /// Allows an application to query over global data in AppSearch that's visible to the ASSISTANT role. /// /// Constant Value: "android.permission.READ_ASSISTANT_APP_SEARCH_DATA" - final String READ_ASSISTANT_APP_SEARCH_DATA = + final String readAssistantAppSearchData = 'android.permission.READ_ASSISTANT_APP_SEARCH_DATA'; /// Allows read only access to phone state with a non dangerous permission, including the information like cellular network type, software version. /// /// Constant Value: "android.permission.READ_BASIC_PHONE_STATE" - final String READ_BASIC_PHONE_STATE = + final String readBasicPhoneState = 'android.permission.READ_BASIC_PHONE_STATE'; /// Allows an application to read the user's calendar data. @@ -1743,7 +1734,7 @@ class _ManifestPermission { /// Protection level: dangerous /// /// Constant Value: "android.permission.READ_CALENDAR" - final String READ_CALENDAR = 'android.permission.READ_CALENDAR'; + final String readCalendar = 'android.permission.READ_CALENDAR'; /// Allows an application to read the user's call log. /// @@ -1754,14 +1745,14 @@ class _ManifestPermission { /// This is a hard restricted permission which cannot be held by an app until the installer on record allowlists the permission. For more details see PackageInstaller.SessionParams.setWhitelistedRestrictedPermissions(Set). /// /// Constant Value: "android.permission.READ_CALL_LOG" - final String READ_CALL_LOG = 'android.permission.READ_CALL_LOG'; + final String readCallLog = 'android.permission.READ_CALL_LOG'; /// Allows an application to read the user's contacts data. /// /// Protection level: dangerous /// /// Constant Value: "android.permission.READ_CONTACTS" - final String READ_CONTACTS = 'android.permission.READ_CONTACTS'; + final String readContacts = 'android.permission.READ_CONTACTS'; /// Allows an application to read from external storage. /// @@ -1780,13 +1771,12 @@ class _ManifestPermission { /// Protection level: dangerous /// /// Constant Value: "android.permission.READ_EXTERNAL_STORAGE" - final String READ_EXTERNAL_STORAGE = - 'android.permission.READ_EXTERNAL_STORAGE'; + final String readExternalStorage = 'android.permission.READ_EXTERNAL_STORAGE'; /// Allows an application to query over global data in AppSearch that's visible to the HOME role. /// /// Constant Value: "android.permission.READ_HOME_APP_SEARCH_DATA" - final String READ_HOME_APP_SEARCH_DATA = + final String readHomeAppSearchData = 'android.permission.READ_HOME_APP_SEARCH_DATA'; /// Allows an application to retrieve the current state of keys and switches. @@ -1796,14 +1786,14 @@ class _ManifestPermission { /// Constant Value: "android.permission.READ_INPUT_STATE" @Deprecated( 'This constant was deprecated in API level 16. The API that used this permission has been removed.') - final String READ_INPUT_STATE = 'android.permission.READ_INPUT_STATE'; + final String readInputState = 'android.permission.READ_INPUT_STATE'; /// Allows an application to read the low-level system log files. /// /// Not for use by third-party applications, because Log entries can contain the user's private information. /// /// Constant Value: "android.permission.READ_LOGS" - final String READ_LOGS = 'android.permission.READ_LOGS'; + final String readLogs = 'android.permission.READ_LOGS'; /// Allows an application to read audio files from external storage. /// @@ -1812,7 +1802,7 @@ class _ManifestPermission { /// Protection level: dangerous /// /// Constant Value: "android.permission.READ_MEDIA_AUDIO" - final String READ_MEDIA_AUDIO = 'android.permission.READ_MEDIA_AUDIO'; + final String readMediaAudio = 'android.permission.READ_MEDIA_AUDIO'; /// Allows an application to read image files from external storage. /// @@ -1821,7 +1811,7 @@ class _ManifestPermission { /// Protection level: dangerous /// /// Constant Value: "android.permission.READ_MEDIA_IMAGES" - final String READ_MEDIA_IMAGES = 'android.permission.READ_MEDIA_IMAGES'; + final String readMediaImages = 'android.permission.READ_MEDIA_IMAGES'; /// Allows an application to read video files from external storage. /// @@ -1830,7 +1820,7 @@ class _ManifestPermission { /// Protection level: dangerous /// /// Constant Value: "android.permission.READ_MEDIA_VIDEO" - final String READ_MEDIA_VIDEO = 'android.permission.READ_MEDIA_VIDEO'; + final String readMediaVideo = 'android.permission.READ_MEDIA_VIDEO'; /// Allows an application to read image or video files from external storage that a user has selected via the permission prompt photo picker. Apps can check this permission to verify that a user has decided to use the photo picker, instead of granting access to READ_MEDIA_IMAGES or READ_MEDIA_VIDEO. It does not prevent apps from accessing the standard photo picker manually. This permission should be requested alongside READ_MEDIA_IMAGES and/or READ_MEDIA_VIDEO, depending on which type of media is desired. /// @@ -1839,13 +1829,13 @@ class _ManifestPermission { /// Protection level: dangerous /// /// Constant Value: "android.permission.READ_MEDIA_VISUAL_USER_SELECTED" - final String READ_MEDIA_VISUAL_USER_SELECTED = + final String readMediaVisualUserSelected = 'android.permission.READ_MEDIA_VISUAL_USER_SELECTED'; /// Allows an application to read nearby streaming policy. The policy controls whether to allow the device to stream its notifications and apps to nearby devices. Applications that are not the device owner will need this permission to call DevicePolicyManager.getNearbyNotificationStreamingPolicy() or DevicePolicyManager.getNearbyAppStreamingPolicy(). /// /// Constant Value: "android.permission.READ_NEARBY_STREAMING_POLICY" - final String READ_NEARBY_STREAMING_POLICY = + final String readNearbyStreamingPolicy = 'android.permission.READ_NEARBY_STREAMING_POLICY'; /// Allows read access to the device's phone number(s). This is a subset of the capabilities granted by READ_PHONE_STATE but is exposed to instant applications. @@ -1853,7 +1843,7 @@ class _ManifestPermission { /// Protection level: dangerous /// /// Constant Value: "android.permission.READ_PHONE_NUMBERS" - final String READ_PHONE_NUMBERS = 'android.permission.READ_PHONE_NUMBERS'; + final String readPhoneNumbers = 'android.permission.READ_PHONE_NUMBERS'; /// Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. /// @@ -1862,12 +1852,12 @@ class _ManifestPermission { /// Protection level: dangerous /// /// Constant Value: "android.permission.READ_PHONE_STATE" - final String READ_PHONE_STATE = 'android.permission.READ_PHONE_STATE'; + final String readPhoneState = 'android.permission.READ_PHONE_STATE'; /// Allows read only access to precise phone state. Allows reading of detailed information about phone state for special-use applications such as dialers, carrier applications, or ims applications. /// /// Constant Value: "android.permission.READ_PRECISE_PHONE_STATE" - final String READ_PRECISE_PHONE_STATE = + final String readPrecisePhoneState = 'android.permission.READ_PRECISE_PHONE_STATE'; /// Allows an application to read SMS messages. @@ -1877,28 +1867,28 @@ class _ManifestPermission { /// This is a hard restricted permission which cannot be held by an app until the installer on record allowlists the permission. For more details see PackageInstaller.SessionParams.setWhitelistedRestrictedPermissions(Set). /// /// Constant Value: "android.permission.READ_SMS" - final String READ_SMS = 'android.permission.READ_SMS'; + final String readSms = 'android.permission.READ_SMS'; /// Allows applications to read the sync settings. /// /// Protection level: normal /// /// Constant Value: "android.permission.READ_SYNC_SETTINGS" - final String READ_SYNC_SETTINGS = 'android.permission.READ_SYNC_SETTINGS'; + final String readSyncSettings = 'android.permission.READ_SYNC_SETTINGS'; /// Allows applications to read the sync stats. /// /// Protection level: normal /// /// Constant Value: "android.permission.READ_SYNC_STATS" - final String READ_SYNC_STATS = 'android.permission.READ_SYNC_STATS'; + final String readSyncStats = 'android.permission.READ_SYNC_STATS'; /// Allows an application to read voicemails in the system. /// /// Protection level: signature|privileged|role /// /// Constant Value: "com.android.voicemail.permission.READ_VOICEMAIL" - final String READ_VOICEMAIL = + final String readVoicemail = 'com.android.voicemail.permission.READ_VOICEMAIL'; /// Required to be able to reboot the device. @@ -1906,14 +1896,14 @@ class _ManifestPermission { /// Not for use by third-party applications. /// /// Constant Value: "android.permission.REBOOT" - final String REBOOT = 'android.permission.REBOOT'; + final String reboot = 'android.permission.REBOOT'; /// Allows an application to receive the Intent.ACTION_BOOT_COMPLETED that is broadcast after the system finishes booting. If you don't request this permission, you will not receive the broadcast at that time. Though holding this permission does not have any security implications, it can have a negative impact on the user experience by increasing the amount of time it takes the system to start and allowing applications to have themselves running without the user being aware of them. As such, you must explicitly declare your use of this facility to make that visible to the user. /// /// Protection level: normal /// /// Constant Value: "android.permission.RECEIVE_BOOT_COMPLETED" - final String RECEIVE_BOOT_COMPLETED = + final String receiveBootCompleted = 'android.permission.RECEIVE_BOOT_COMPLETED'; /// Allows an application to monitor incoming MMS messages. @@ -1923,7 +1913,7 @@ class _ManifestPermission { /// This is a hard restricted permission which cannot be held by an app until the installer on record allowlists the permission. For more details see PackageInstaller.SessionParams.setWhitelistedRestrictedPermissions(Set). /// /// Constant Value: "android.permission.RECEIVE_MMS" - final String RECEIVE_MMS = 'android.permission.RECEIVE_MMS'; + final String receiveMms = 'android.permission.RECEIVE_MMS'; /// Allows an application to receive SMS messages. /// @@ -1932,7 +1922,7 @@ class _ManifestPermission { /// This is a hard restricted permission which cannot be held by an app until the installer on record allowlists the permission. For more details see PackageInstaller.SessionParams.setWhitelistedRestrictedPermissions(Set). /// /// Constant Value: "android.permission.RECEIVE_SMS" - final String RECEIVE_SMS = 'android.permission.RECEIVE_SMS'; + final String receiveSms = 'android.permission.RECEIVE_SMS'; /// Allows an application to receive WAP push messages. /// @@ -1941,28 +1931,28 @@ class _ManifestPermission { /// This is a hard restricted permission which cannot be held by an app until the installer on record allowlists the permission. For more details see PackageInstaller.SessionParams.setWhitelistedRestrictedPermissions(Set). /// /// Constant Value: "android.permission.RECEIVE_WAP_PUSH" - final String RECEIVE_WAP_PUSH = 'android.permission.RECEIVE_WAP_PUSH'; + final String receiveWapPush = 'android.permission.RECEIVE_WAP_PUSH'; /// Allows an application to record audio. /// /// Protection level: dangerous /// /// Constant Value: "android.permission.RECORD_AUDIO" - final String RECORD_AUDIO = 'android.permission.RECORD_AUDIO'; + final String recordAudio = 'android.permission.RECORD_AUDIO'; /// Allows an application to change the Z-order of tasks. /// /// Protection level: normal /// /// Constant Value: "android.permission.REORDER_TASKS" - final String REORDER_TASKS = 'android.permission.REORDER_TASKS'; + final String reorderTasks = 'android.permission.REORDER_TASKS'; /// Allows application to request to be associated with a virtual display capable of streaming Android applications (AssociationRequest.DEVICE_PROFILE_APP_STREAMING) by CompanionDeviceManager. /// /// Not for use by third-party applications. /// /// Constant Value: "android.permission.REQUEST_COMPANION_PROFILE_APP_STREAMING" - final String REQUEST_COMPANION_PROFILE_APP_STREAMING = + final String requestCompanionProfileAppStreaming = 'android.permission.REQUEST_COMPANION_PROFILE_APP_STREAMING'; /// Allows application to request to be associated with a vehicle head unit capable of automotive projection (AssociationRequest.DEVICE_PROFILE_AUTOMOTIVE_PROJECTION) by CompanionDeviceManager. @@ -1970,7 +1960,7 @@ class _ManifestPermission { /// Not for use by third-party applications. /// /// Constant Value: "android.permission.REQUEST_COMPANION_PROFILE_AUTOMOTIVE_PROJECTION" - final String REQUEST_COMPANION_PROFILE_AUTOMOTIVE_PROJECTION = + final String requestCompanionProfileAutomotiveProjection = 'android.permission.REQUEST_COMPANION_PROFILE_AUTOMOTIVE_PROJECTION'; /// Allows application to request to be associated with a computer to share functionality and/or data with other devices, such as notifications, photos and media (AssociationRequest.DEVICE_PROFILE_COMPUTER) by CompanionDeviceManager. @@ -1978,7 +1968,7 @@ class _ManifestPermission { /// Not for use by third-party applications. /// /// Constant Value: "android.permission.REQUEST_COMPANION_PROFILE_COMPUTER" - final String REQUEST_COMPANION_PROFILE_COMPUTER = + final String requestCompanionProfileComputer = 'android.permission.REQUEST_COMPANION_PROFILE_COMPUTER'; /// Allows app to request to be associated with a device via CompanionDeviceManager as "glasses" @@ -1986,7 +1976,7 @@ class _ManifestPermission { /// Protection level: normal /// /// Constant Value: "android.permission.REQUEST_COMPANION_PROFILE_GLASSES" - final String REQUEST_COMPANION_PROFILE_GLASSES = + final String requestCompanionProfileGlasses = 'android.permission.REQUEST_COMPANION_PROFILE_GLASSES'; /// Allows application to request to stream content from an Android host to a nearby device (AssociationRequest.DEVICE_PROFILE_NEARBY_DEVICE_STREAMING) by CompanionDeviceManager. @@ -1994,7 +1984,7 @@ class _ManifestPermission { /// Not for use by third-party applications. /// /// Constant Value: "android.permission.REQUEST_COMPANION_PROFILE_NEARBY_DEVICE_STREAMING" - final String REQUEST_COMPANION_PROFILE_NEARBY_DEVICE_STREAMING = + final String requestCompanionProfileNearbyDeviceStreaming = 'android.permission.REQUEST_COMPANION_PROFILE_NEARBY_DEVICE_STREAMING'; /// Allows app to request to be associated with a device via CompanionDeviceManager as a "watch" @@ -2002,7 +1992,7 @@ class _ManifestPermission { /// Protection level: normal /// /// Constant Value: "android.permission.REQUEST_COMPANION_PROFILE_WATCH" - final String REQUEST_COMPANION_PROFILE_WATCH = + final String requestCompanionProfileWatch = 'android.permission.REQUEST_COMPANION_PROFILE_WATCH'; /// Allows a companion app to run in the background. This permission implies REQUEST_COMPANION_START_FOREGROUND_SERVICES_FROM_BACKGROUND, and allows to start a foreground service from the background. If an app does not have to run in the background, but only needs to start a foreground service from the background, consider using REQUEST_COMPANION_START_FOREGROUND_SERVICES_FROM_BACKGROUND, which is less powerful. @@ -2010,13 +2000,13 @@ class _ManifestPermission { /// Protection level: normal /// /// Constant Value: "android.permission.REQUEST_COMPANION_RUN_IN_BACKGROUND" - final String REQUEST_COMPANION_RUN_IN_BACKGROUND = + final String requestCompanionRunInBackground = 'android.permission.REQUEST_COMPANION_RUN_IN_BACKGROUND'; /// Allows an application to create a "self-managed" association. /// /// Constant Value: "android.permission.REQUEST_COMPANION_SELF_MANAGED" - final String REQUEST_COMPANION_SELF_MANAGED = + final String requestCompanionSelfManaged = 'android.permission.REQUEST_COMPANION_SELF_MANAGED'; /// Allows a companion app to start a foreground service from the background. @@ -2027,7 +2017,7 @@ class _ManifestPermission { /// /// REQUEST_COMPANION_RUN_IN_BACKGROUND /// Constant Value: "android.permission.REQUEST_COMPANION_START_FOREGROUND_SERVICES_FROM_BACKGROUND" - final String REQUEST_COMPANION_START_FOREGROUND_SERVICES_FROM_BACKGROUND = + final String requestCompanionStartForegroundServicesFromBackground = 'android.permission.REQUEST_COMPANION_START_FOREGROUND_SERVICES_FROM_BACKGROUND'; /// Allows a companion app to use data in the background. @@ -2035,7 +2025,7 @@ class _ManifestPermission { /// Protection level: normal /// /// Constant Value: "android.permission.REQUEST_COMPANION_USE_DATA_IN_BACKGROUND" - final String REQUEST_COMPANION_USE_DATA_IN_BACKGROUND = + final String requestCompanionUseDataInBackground = 'android.permission.REQUEST_COMPANION_USE_DATA_IN_BACKGROUND'; /// Allows an application to request deleting packages. Apps targeting APIs Build.VERSION_CODES.P or greater must hold this permission in order to use Intent.ACTION_UNINSTALL_PACKAGE or PackageInstaller.uninstall(VersionedPackage, IntentSender). @@ -2043,7 +2033,7 @@ class _ManifestPermission { /// Protection level: normal /// /// Constant Value: "android.permission.REQUEST_DELETE_PACKAGES" - final String REQUEST_DELETE_PACKAGES = + final String requestDeletePackages = 'android.permission.REQUEST_DELETE_PACKAGES'; /// Permission an application must hold in order to use Settings.ACTION_REQUEST_IGNORE_BATTERY_OPTIMIZATIONS. @@ -2051,7 +2041,7 @@ class _ManifestPermission { /// Protection level: normal /// /// Constant Value: "android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS" - final String REQUEST_IGNORE_BATTERY_OPTIMIZATIONS = + final String requestIgnoreBatteryOptimizations = 'android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS'; /// Allows an application to request installing packages. Apps targeting APIs greater than 25 must hold this permission in order to use Intent.ACTION_INSTALL_PACKAGE. @@ -2059,13 +2049,13 @@ class _ManifestPermission { /// Protection level: signature /// /// Constant Value: "android.permission.REQUEST_INSTALL_PACKAGES" - final String REQUEST_INSTALL_PACKAGES = + final String requestInstallPackages = 'android.permission.REQUEST_INSTALL_PACKAGES'; /// Allows an application to subscribe to notifications about the presence status change of their associated companion device /// /// Constant Value: "android.permission.REQUEST_OBSERVE_COMPANION_DEVICE_PRESENCE" - final String REQUEST_OBSERVE_COMPANION_DEVICE_PRESENCE = + final String requestObserveCompanionDevicePresence = 'android.permission.REQUEST_OBSERVE_COMPANION_DEVICE_PRESENCE'; /// Allows an application to request the screen lock complexity and prompt users to update the screen lock to a certain complexity level. @@ -2073,20 +2063,20 @@ class _ManifestPermission { /// Protection level: normal /// /// Constant Value: "android.permission.REQUEST_PASSWORD_COMPLEXITY" - final String REQUEST_PASSWORD_COMPLEXITY = + final String requestPasswordComplexity = 'android.permission.REQUEST_PASSWORD_COMPLEXITY'; /// Constant Value: "android.permission.RESTART_PACKAGES" @Deprecated( 'This constant was deprecated in API level 15. The ActivityManager.restartPackage(String) API is no longer supported.') - final String RESTART_PACKAGES = 'android.permission.RESTART_PACKAGES'; + final String restartPackages = 'android.permission.RESTART_PACKAGES'; /// Allows applications to use the user-initiated jobs API. For more details see JobInfo.Builder.setUserInitiated(boolean). /// /// Protection level: normal /// /// Constant Value: "android.permission.RUN_USER_INITIATED_JOBS" - final String RUN_USER_INITIATED_JOBS = + final String runUserInitiatedJobs = 'android.permission.RUN_USER_INITIATED_JOBS'; /// Allows applications to use exact alarm APIs. @@ -2102,14 +2092,14 @@ class _ManifestPermission { /// Protection level: signature|privileged|appop /// /// Constant Value: "android.permission.SCHEDULE_EXACT_ALARM" - final String SCHEDULE_EXACT_ALARM = 'android.permission.SCHEDULE_EXACT_ALARM'; + final String scheduleExactAlarm = 'android.permission.SCHEDULE_EXACT_ALARM'; /// Allows an application (Phone) to send a request to other applications to handle the respond-via-message action during incoming calls. /// /// Not for use by third-party applications. /// /// Constant Value: "android.permission.SEND_RESPOND_VIA_MESSAGE" - final String SEND_RESPOND_VIA_MESSAGE = + final String sendRespondViaMessage = 'android.permission.SEND_RESPOND_VIA_MESSAGE'; /// Allows an application to send SMS messages. @@ -2119,40 +2109,40 @@ class _ManifestPermission { /// This is a hard restricted permission which cannot be held by an app until the installer on record allowlists the permission. For more details see PackageInstaller.SessionParams.setWhitelistedRestrictedPermissions(Set). /// /// Constant Value: "android.permission.SEND_SMS" - final String SEND_SMS = 'android.permission.SEND_SMS'; + final String sendSms = 'android.permission.SEND_SMS'; /// Allows an application to broadcast an Intent to set an alarm for the user. /// /// Protection level: normal /// /// Constant Value: "com.android.alarm.permission.SET_ALARM" - final String SET_ALARM = 'com.android.alarm.permission.SET_ALARM'; + final String setAlarm = 'com.android.alarm.permission.SET_ALARM'; /// Allows an application to control whether activities are immediately finished when put in the background. /// /// Not for use by third-party applications. /// /// Constant Value: "android.permission.SET_ALWAYS_FINISH" - final String SET_ALWAYS_FINISH = 'android.permission.SET_ALWAYS_FINISH'; + final String setAlwaysFinish = 'android.permission.SET_ALWAYS_FINISH'; /// Modify the global animation scaling factor. /// /// Not for use by third-party applications. /// /// Constant Value: "android.permission.SET_ANIMATION_SCALE" - final String SET_ANIMATION_SCALE = 'android.permission.SET_ANIMATION_SCALE'; + final String setAnimationScale = 'android.permission.SET_ANIMATION_SCALE'; /// Configure an application for debugging. /// /// Not for use by third-party applications. /// /// Constant Value: "android.permission.SET_DEBUG_APP" - final String SET_DEBUG_APP = 'android.permission.SET_DEBUG_APP'; + final String setDebugApp = 'android.permission.SET_DEBUG_APP'; /// Constant Value: "android.permission.SET_PREFERRED_APPLICATIONS" @Deprecated( 'This constant was deprecated in API level 15. No longer useful, see PackageManager.addPackageToPreferred(String) for details.') - final String SET_PREFERRED_APPLICATIONS = + final String setPreferredApplications = 'android.permission.SET_PREFERRED_APPLICATIONS'; /// Allows an application to set the maximum number of (not needed) application processes that can be running. @@ -2160,42 +2150,42 @@ class _ManifestPermission { /// Not for use by third-party applications. /// /// Constant Value: "android.permission.SET_PROCESS_LIMIT" - final String SET_PROCESS_LIMIT = 'android.permission.SET_PROCESS_LIMIT'; + final String setProcessLimit = 'android.permission.SET_PROCESS_LIMIT'; /// Allows applications to set the system time directly. /// /// Not for use by third-party applications. /// /// Constant Value: "android.permission.SET_TIME" - final String SET_TIME = 'android.permission.SET_TIME'; + final String setTime = 'android.permission.SET_TIME'; /// Allows applications to set the system time zone directly. /// /// Not for use by third-party applications. /// /// Constant Value: "android.permission.SET_TIME_ZONE" - final String SET_TIME_ZONE = 'android.permission.SET_TIME_ZONE'; + final String setTimeZone = 'android.permission.SET_TIME_ZONE'; /// Allows applications to set the wallpaper. /// /// Protection level: normal /// /// Constant Value: "android.permission.SET_WALLPAPER" - final String SET_WALLPAPER = 'android.permission.SET_WALLPAPER'; + final String setWallpaper = 'android.permission.SET_WALLPAPER'; /// Allows applications to set the wallpaper hints. /// /// Protection level: normal /// /// Constant Value: "android.permission.SET_WALLPAPER_HINTS" - final String SET_WALLPAPER_HINTS = 'android.permission.SET_WALLPAPER_HINTS'; + final String setWallpaperHints = 'android.permission.SET_WALLPAPER_HINTS'; /// Allow an application to request that a signal be sent to all persistent processes. /// /// Not for use by third-party applications. /// /// Constant Value: "android.permission.SIGNAL_PERSISTENT_PROCESSES" - final String SIGNAL_PERSISTENT_PROCESSES = + final String signalPersistentProcesses = 'android.permission.SIGNAL_PERSISTENT_PROCESSES'; /// Allows financial apps to read filtered sms messages. Protection level: signature|appop @@ -2203,13 +2193,13 @@ class _ManifestPermission { /// Constant Value: "android.permission.SMS_FINANCIAL_TRANSACTIONS" @Deprecated( 'This constant was deprecated in API level 31. The API that used this permission is no longer functional.') - final String SMS_FINANCIAL_TRANSACTIONS = + final String smsFinancialTransactions = 'android.permission.SMS_FINANCIAL_TRANSACTIONS'; /// Allows an application to start foreground services from the background at any time. This permission is not for use by third-party applications, with the only exception being if the app is the default SMS app. Otherwise, it's only usable by privileged apps, app verifier app, and apps with any of the EMERGENCY or SYSTEM GALLERY roles. /// /// Constant Value: "android.permission.START_FOREGROUND_SERVICES_FROM_BACKGROUND" - final String START_FOREGROUND_SERVICES_FROM_BACKGROUND = + final String startForegroundServicesFromBackground = 'android.permission.START_FOREGROUND_SERVICES_FROM_BACKGROUND'; /// Allows the holder to start the screen with a list of app features. @@ -2217,7 +2207,7 @@ class _ManifestPermission { /// Protection level: signature|installer /// /// Constant Value: "android.permission.START_VIEW_APP_FEATURES" - final String START_VIEW_APP_FEATURES = + final String startViewAppFeatures = 'android.permission.START_VIEW_APP_FEATURES'; /// Allows the holder to start the permission usage screen for an app. @@ -2225,7 +2215,7 @@ class _ManifestPermission { /// Protection level: signature|installer /// /// Constant Value: "android.permission.START_VIEW_PERMISSION_USAGE" - final String START_VIEW_PERMISSION_USAGE = + final String startViewPermissionUsage = 'android.permission.START_VIEW_PERMISSION_USAGE'; /// Allows an application to open, close, or disable the status bar and its icons. @@ -2233,7 +2223,7 @@ class _ManifestPermission { /// Not for use by third-party applications. /// /// Constant Value: "android.permission.STATUS_BAR" - final String STATUS_BAR = 'android.permission.STATUS_BAR'; + final String statusBar = 'android.permission.STATUS_BAR'; /// Allows an application to subscribe to keyguard locked (i.e., showing) state. /// @@ -2242,7 +2232,7 @@ class _ManifestPermission { /// Intended for use by ROLE_ASSISTANT and signature apps only. /// /// Constant Value: "android.permission.SUBSCRIBE_TO_KEYGUARD_LOCKED_STATE" - final String SUBSCRIBE_TO_KEYGUARD_LOCKED_STATE = + final String subscribeToKeyguardLockedState = 'android.permission.SUBSCRIBE_TO_KEYGUARD_LOCKED_STATE'; /// Allows an app to create windows using the type WindowManager.LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. Very few apps should use this permission; these windows are intended for system-level interaction with the user. @@ -2252,26 +2242,26 @@ class _ManifestPermission { /// Protection level: signature|setup|appop|installer|pre23|development /// /// Constant Value: "android.permission.SYSTEM_ALERT_WINDOW" - final String SYSTEM_ALERT_WINDOW = 'android.permission.SYSTEM_ALERT_WINDOW'; + final String systemAlertWindow = 'android.permission.SYSTEM_ALERT_WINDOW'; /// Allows using the device's IR transmitter, if available. /// /// Protection level: normal /// /// Constant Value: "android.permission.TRANSMIT_IR" - final String TRANSMIT_IR = 'android.permission.TRANSMIT_IR'; + final String transmitIr = 'android.permission.TRANSMIT_IR'; /// Allows an app to turn on the screen on, e.g. with PowerManager.ACQUIRE_CAUSES_WAKEUP. /// /// Intended to only be used by home automation apps. /// /// Constant Value: "android.permission.TURN_SCREEN_ON" - final String TURN_SCREEN_ON = 'android.permission.TURN_SCREEN_ON'; + final String turnScreenOn = 'android.permission.TURN_SCREEN_ON'; /// Constant Value: "com.android.launcher.permission.UNINSTALL_SHORTCUT" @Deprecated( 'Don\'t use this permission in your app. This permission is no longer supported.') - final String UNINSTALL_SHORTCUT = + final String uninstallShortcut = 'com.android.launcher.permission.UNINSTALL_SHORTCUT'; /// Allows an application to update device statistics. @@ -2279,14 +2269,14 @@ class _ManifestPermission { /// Not for use by third-party applications. /// /// Constant Value: "android.permission.UPDATE_DEVICE_STATS" - final String UPDATE_DEVICE_STATS = 'android.permission.UPDATE_DEVICE_STATS'; + final String updateDeviceStats = 'android.permission.UPDATE_DEVICE_STATS'; /// Allows an application to indicate via PackageInstaller.SessionParams.setRequireUserAction(int) that user action should not be required for an app update. /// /// Protection level: normal /// /// Constant Value: "android.permission.UPDATE_PACKAGES_WITHOUT_USER_ACTION" - final String UPDATE_PACKAGES_WITHOUT_USER_ACTION = + final String updatePackagesWithoutUserAction = 'android.permission.UPDATE_PACKAGES_WITHOUT_USER_ACTION'; /// Allows an app to use device supported biometric modalities. @@ -2294,7 +2284,7 @@ class _ManifestPermission { /// Protection level: normal /// /// Constant Value: "android.permission.USE_BIOMETRIC" - final String USE_BIOMETRIC = 'android.permission.USE_BIOMETRIC'; + final String useBiometric = 'android.permission.USE_BIOMETRIC'; /// Allows apps to use exact alarms just like with SCHEDULE_EXACT_ALARM but without needing to request this permission from the user. /// @@ -2312,7 +2302,7 @@ class _ManifestPermission { /// Apps that hold this permission, always stay in the WORKING_SET or lower standby bucket. /// /// Constant Value: "android.permission.USE_EXACT_ALARM" - final String USE_EXACT_ALARM = 'android.permission.USE_EXACT_ALARM'; + final String useExactAlarm = 'android.permission.USE_EXACT_ALARM'; /// Allows an app to use fingerprint hardware. /// @@ -2321,14 +2311,14 @@ class _ManifestPermission { /// Constant Value: "android.permission.USE_FINGERPRINT" @Deprecated( 'This constant was deprecated in API level 28. Applications should request USE_BIOMETRIC instead') - final String USE_FINGERPRINT = 'android.permission.USE_FINGERPRINT'; + final String useFingerprint = 'android.permission.USE_FINGERPRINT'; /// Required for apps targeting Build.VERSION_CODES.Q that want to use notification full screen intents. /// /// Protection level: normal /// /// Constant Value: "android.permission.USE_FULL_SCREEN_INTENT" - final String USE_FULL_SCREEN_INTENT = + final String useFullScreenIntent = 'android.permission.USE_FULL_SCREEN_INTENT'; /// Allows to read device identifiers and use ICC based authentication like EAP-AKA. Often required in authentication to access the carrier's server and manage services of the subscriber. @@ -2336,7 +2326,7 @@ class _ManifestPermission { /// Protection level: signature|appop /// /// Constant Value: "android.permission.USE_ICC_AUTH_WITH_DEVICE_IDENTIFIER" - final String USE_ICC_AUTH_WITH_DEVICE_IDENTIFIER = + final String useIccAuthWithDeviceIdentifier = 'android.permission.USE_ICC_AUTH_WITH_DEVICE_IDENTIFIER'; /// Allows an application to use SIP service. @@ -2344,42 +2334,42 @@ class _ManifestPermission { /// Protection level: dangerous /// /// Constant Value: "android.permission.USE_SIP" - final String USE_SIP = 'android.permission.USE_SIP'; + final String useSip = 'android.permission.USE_SIP'; /// Required to be able to range to devices using ultra-wideband. /// /// Protection level: dangerous /// /// Constant Value: "android.permission.UWB_RANGING" - final String UWB_RANGING = 'android.permission.UWB_RANGING'; + final String uwbRanging = 'android.permission.UWB_RANGING'; /// Allows access to the vibrator. /// /// Protection level: normal /// /// Constant Value: "android.permission.VIBRATE" - final String VIBRATE = 'android.permission.VIBRATE'; + final String vibrate = 'android.permission.VIBRATE'; /// Allows using PowerManager WakeLocks to keep processor from sleeping or screen from dimming. /// /// Protection level: normal /// /// Constant Value: "android.permission.WAKE_LOCK" - final String WAKE_LOCK = 'android.permission.WAKE_LOCK'; + final String wakeLock = 'android.permission.WAKE_LOCK'; /// Allows applications to write the apn settings and read sensitive fields of an existing apn settings like user and password. /// /// Not for use by third-party applications. /// /// Constant Value: "android.permission.WRITE_APN_SETTINGS" - final String WRITE_APN_SETTINGS = 'android.permission.WRITE_APN_SETTINGS'; + final String writeApnSettings = 'android.permission.WRITE_APN_SETTINGS'; /// Allows an application to write the user's calendar data. /// /// Protection level: dangerous /// /// Constant Value: "android.permission.WRITE_CALENDAR" - final String WRITE_CALENDAR = 'android.permission.WRITE_CALENDAR'; + final String writeCalendar = 'android.permission.WRITE_CALENDAR'; /// Allows an application to write and read the user's call log data. /// @@ -2390,14 +2380,14 @@ class _ManifestPermission { /// This is a hard restricted permission which cannot be held by an app until the installer on record allowlists the permission. For more details see PackageInstaller.SessionParams.setWhitelistedRestrictedPermissions(Set). /// /// Constant Value: "android.permission.WRITE_CALL_LOG" - final String WRITE_CALL_LOG = 'android.permission.WRITE_CALL_LOG'; + final String writeCallLog = 'android.permission.WRITE_CALL_LOG'; /// Allows an application to write the user's contacts data. /// /// Protection level: dangerous /// /// Constant Value: "android.permission.WRITE_CONTACTS" - final String WRITE_CONTACTS = 'android.permission.WRITE_CONTACTS'; + final String writeContacts = 'android.permission.WRITE_CONTACTS'; /// Allows an application to write to external storage. /// @@ -2412,7 +2402,7 @@ class _ManifestPermission { /// Protection level: dangerous /// /// Constant Value: "android.permission.WRITE_EXTERNAL_STORAGE" - final String WRITE_EXTERNAL_STORAGE = + final String writeExternalStorage = 'android.permission.WRITE_EXTERNAL_STORAGE'; /// Allows an application to modify the Google service map. @@ -2420,15 +2410,14 @@ class _ManifestPermission { /// Not for use by third-party applications. /// /// Constant Value: "android.permission.WRITE_GSERVICES" - final String WRITE_GSERVICES = 'android.permission.WRITE_GSERVICES'; + final String writeGservices = 'android.permission.WRITE_GSERVICES'; /// Allows an application to read or write the secure system settings. /// /// Not for use by third-party applications. /// /// Constant Value: "android.permission.WRITE_SECURE_SETTINGS" - final String WRITE_SECURE_SETTINGS = - 'android.permission.WRITE_SECURE_SETTINGS'; + final String writeSecureSettings = 'android.permission.WRITE_SECURE_SETTINGS'; /// Allows an application to read or write the system settings. /// @@ -2437,21 +2426,21 @@ class _ManifestPermission { /// Protection level: signature|preinstalled|appop|pre23 /// /// Constant Value: "android.permission.WRITE_SETTINGS" - final String WRITE_SETTINGS = 'android.permission.WRITE_SETTINGS'; + final String writeSettings = 'android.permission.WRITE_SETTINGS'; /// Allows applications to write the sync settings. /// /// Protection level: normal /// /// Constant Value: "android.permission.WRITE_SYNC_SETTINGS" - final String WRITE_SYNC_SETTINGS = 'android.permission.WRITE_SYNC_SETTINGS'; + final String writeSyncSettings = 'android.permission.WRITE_SYNC_SETTINGS'; /// Allows an application to modify and remove existing voicemails in the system. /// /// Protection level: signature|privileged|role /// /// Constant Value: "com.android.voicemail.permission.WRITE_VOICEMAIL" - final String WRITE_VOICEMAIL = + final String writeVoicemail = 'com.android.voicemail.permission.WRITE_VOICEMAIL'; } @@ -2462,82 +2451,82 @@ class _ManifestPermissionGroup { /// Used for permissions that are associated with activity recognition. /// /// Constant Value: "android.permission-group.ACTIVITY_RECOGNITION" - final String ACTIVITY_RECOGNITION = + final String activityRecognition = 'android.permission-group.ACTIVITY_RECOGNITION'; /// Used for runtime permissions related to user's calendar. /// /// Constant Value: "android.permission-group.CALENDAR" - final String CALENDAR = 'android.permission-group.CALENDAR'; + final String calendar = 'android.permission-group.CALENDAR'; /// Used for permissions that are associated telephony features. /// /// Constant Value: "android.permission-group.CALL_LOG" - final String CALL_LOG = 'android.permission-group.CALL_LOG'; + final String callLog = 'android.permission-group.CALL_LOG'; /// Used for permissions that are associated with accessing camera or capturing images/video from the device. /// /// Constant Value: "android.permission-group.CAMERA" - final String CAMERA = 'android.permission-group.CAMERA'; + final String camera = 'android.permission-group.CAMERA'; /// Used for runtime permissions related to contacts and profiles on this device. /// /// Constant Value: "android.permission-group.CONTACTS" - final String CONTACTS = 'android.permission-group.CONTACTS'; + final String contacts = 'android.permission-group.CONTACTS'; /// Used for permissions that allow accessing the device location. /// /// Constant Value: "android.permission-group.LOCATION" - final String LOCATION = 'android.permission-group.LOCATION'; + final String location = 'android.permission-group.LOCATION'; /// Used for permissions that are associated with accessing microphone audio from the device. Note that phone calls also capture audio but are in a separate (more visible) permission group. /// /// Constant Value: "android.permission-group.MICROPHONE" - final String MICROPHONE = 'android.permission-group.MICROPHONE'; + final String microphone = 'android.permission-group.MICROPHONE'; /// Required to be able to discover and connect to nearby Bluetooth devices. /// /// Protection level: dangerous /// /// Constant Value: "android.permission-group.NEARBY_DEVICES" - final String NEARBY_DEVICES = 'android.permission-group.NEARBY_DEVICES'; + final String nearbyDevices = 'android.permission-group.NEARBY_DEVICES'; /// Used for permissions that are associated with posting notifications /// /// Constant Value: "android.permission-group.NOTIFICATIONS" - final String NOTIFICATIONS = 'android.permission-group.NOTIFICATIONS'; + final String notifications = 'android.permission-group.NOTIFICATIONS'; /// Used for permissions that are associated telephony features. /// /// Constant Value: "android.permission-group.PHONE" - final String PHONE = 'android.permission-group.PHONE'; + final String phone = 'android.permission-group.PHONE'; /// Required to be able to read audio files from shared storage. /// /// Protection level: dangerous /// /// Constant Value: "android.permission-group.READ_MEDIA_AURAL" - final String READ_MEDIA_AURAL = 'android.permission-group.READ_MEDIA_AURAL'; + final String readMediaAural = 'android.permission-group.READ_MEDIA_AURAL'; /// Required to be able to read image and video files from shared storage. /// /// Protection level: dangerous /// /// Constant Value: "android.permission-group.READ_MEDIA_VISUAL" - final String READ_MEDIA_VISUAL = 'android.permission-group.READ_MEDIA_VISUAL'; + final String readMediaVisual = 'android.permission-group.READ_MEDIA_VISUAL'; /// Used for permissions that are associated with accessing body or environmental sensors. /// /// Constant Value: "android.permission-group.SENSORS" - final String SENSORS = 'android.permission-group.SENSORS'; + final String sensors = 'android.permission-group.SENSORS'; /// Used for runtime permissions related to user's SMS messages. /// /// Constant Value: "android.permission-group.SMS" - final String SMS = 'android.permission-group.SMS'; + final String sms = 'android.permission-group.SMS'; /// Used for runtime permissions related to the shared external storage. /// /// Constant Value: "android.permission-group.STORAGE" - final String STORAGE = 'android.permission-group.STORAGE'; + final String storage = 'android.permission-group.STORAGE'; }